0% found this document useful (0 votes)
865 views1,131 pages

Crate Full E-Book

Uploaded by

Balaji D
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
865 views1,131 pages

Crate Full E-Book

Uploaded by

Balaji D
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1131

Proceedings of

Second National Virtual Conferenceon


Recent Advances in Technology & Engineering
(CRATE-2021)
August 13th & 14th, 2021

VEMU INSTITUTE OF TECHNOLOGY


(Approved by AICTE, New Delhi Recognized under 2(f) &12(B) of UGC Act.
Accredited by NAAC and NBA [ECE, CSE, EEE])
P. Kothakota Post, near Pakala,
Chittoor, Andhra Pradesh, 517112
Website: www.vemu.org
ii
Proceedings of
Second National Virtual Conferenceon
Recent Advances in Technology & Engineering
(CRATE-2021)
August 13th & 14th, 2021

Editors
Dr. A. Mahamani
Dr. Naveen Kilari
Mr. P. Nageswara Rao

Paramount Publishing House


NEW DELHIHYDERABAD

iii
All rights are reserved. No part of this publication which is material protected by this copyright notice
may not be reproduced or transmitted or utilized or stored in any form or by any means now known or
hereinafter invented, electronic, digital or mechanical, including photocopying, scanning, recording or by
any information storage or retrieval system, without prior written permission from Paramount Publishing
House.

Information contained in this book has been published by Paramount Publishing House, Hyderabad and
has been obtained by its Author(s) from sources believed to be reliable and are correct to the best of their
knowledge. However, the Publisher is not liable for any errors, omissions or damages arising out of use
of this information and specifically disclaim any implied warranties or merchantability or fitness for any
particular use. The authors are solely responsible for the contents published in the paper.

Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021)

First Edition - 2021


Copyright © Dr.A.Mahamani, Dr.Naveen Kilari, Mr.P.Nageswara Rao

ISBN : 978-93-90631-89-6

Price : Rs. 575.00

Paramount Publishing House


A-531, H.No. 4-32-521, Phase-1, Allwyn Colony, Kukatpally, Hyderabad - 500 072.
Ph. : 7799000082.

Sales Offices :
Hyderabad
A-531, H.No. 4-32-521, Phase-1, Allwyn Colony, Kukatpally, Hyderabad - 500 072.
Ph. : 7799000082.

New Delhi
C/14, SDIDC Work Centre Jhilmil Colony, New Delhi-100095. Phone: 011-2162365.
paramountpublishers@gmail.com | alluriasr2005@yahoo.com
Published by Krishna Prasad Alluri for Paramount Publishing House and printed by him at Sai Thirumala Printers.

iivv
PREFACE
It is a great privilege for us to present the proceedings of"Second National Virtual Conference on Recent
Advances in Technology & Engineering (CRATE-2021)" is being organized by Vemu Institute of Technology, P.
Kothakota, Pakala, Chittoor, Andhra Pradesh on August 13-14, 2021 to the authors and delegates of the event.
We hope that you will find it useful, exciting and inspiring.
Vemu Institute of Technology is one of the emerging Engineering College in India, has achieved the global
identity through the best academics, which situated in Chittoor, Andhra Pradesh, the southern part of India. Vemu
is best destination for engineering aspirant. The college offers the Bachelor of Engineering, Master of Engineering
in all major Discipline. Vemu is an ISO Certified Institute, is known for its rich traditional and high values bestowed
upon it by its founder and Chairman Prof. K. Chandra Sekhar Naidu. VEMU Institute of Technology is one of
the best and finest engineering colleges in Chittoor District, Andhra Pradesh. Beginning its quality inputs in 2008,
it has attained ISO2015:9001 certification for quality management within a short span of time. The institution's
progress and contribution to the field of technical education for over one decade and accredited by NAAC in the
year 2017, Recognized under 2(F) and 12(B) UGC Act, Permanent Affiliation with JNTUA (Anantapuramu)
and accredited by NBA[ECE, CSE, EEE]in the year 2021. It is located in P. Kothakota, near to Tirupati on the
Chittoor Highway in a beautiful 16-acre campus. A diverse, talented community united by a passion for learning
and quest for more, VEMUIT challenges its students to make a difference on its campus, in the region, and in the
companies, wherever they join. With unmatched results in every sphere of education, its commitment to be the
best has grown to transform its departments into Centers of Excellence.
The "CRATE-2021" is a notable event, which brings academia, researchers, engineers, industry experts
and students together. Efforts taken by reviewers contributed to improve the quality of papers are gratefully
appreciated. We are very grateful to all the authors who have contributed their research works to the conference.
We thank our Management for their wholehearted support and encouragement. We thank our Principal for his
continuous guidance. We thank all the members of our organizing Committee and all the faculty members.

v
vi
CHIEF PATRON'S DESK

It is a matter of great pleasure for me to know that Vemu Institute of Technology, Chittoor is organizing the
"Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-
2021)" on August 13-14, 2021. The interaction of engineers, academicians and scholars from national organizations
will go a long way in knowledge sharing in diverse fields for the promotion of research culture in the country.
Providing a platform to people and researchers for the promotion of research will immensely benefit young
scholars participating in the conference. I am convinced that the conference will definitely provide a platform for
the participating delegates to discuss important issues to develop new knowledge in engineering and Technology.
Being patron in chief of the conference, I heartily welcome all the distinguished speakers, research scholars and
researchers presenting papers and the participants to this "Second National Virtual Conference on Recent Advances
in Technology & Engineering (CRATE-2021)". I congratulate the Principal, Teaching Faculty, Students &
Administrative staff for organizing this conference and pray for the successful accomplishment of objectives.

vii
viii
PRINCIPAL'S DESK

On behalf of Vemu institute of Technology, Chittoor, Andhra Pradesh, I extend a very warm welcome to all
the delegates and participants for presenting their research thoughts in the "Second National Virtual Conference
on Recent Advances in Technology & Engineering (CRATE-2021)" on August 13-14, 2021"
Under the able guidance of our management, VEMU continues to march on the way of success with
confidence. The sharp clear-sighted vision and precise decision-making powers of our management has benefited
our college to say competitive.
The dedicated HOD's and staff members and disciplined students of VEMU are the added features of our
college. The role students in building nation cannot be overlooked and students at VIMU are trained in all
aspects to become a successful engineers and good citizens.
CRATE-2021 has been planned to provide a suitable platform for the research community to interact with
each other and to share the knowledge and learning experience to all the participants. Sessions on different
domains, keynote addresses from eminent professors and opportunity to network with the researchers will help
the participants immensely in their research career. This proceeding of the conference has been documented with
utmost care. I believe strongly that, this will stand as a great source of knowledge and researchers. With great
pleasure and pride, I welcome all the participants and convey my best wishes for CRATE-2021.

ix
x
CONVENER MESSAGE

It gives me an immense pleasure to inform that our Department is organizing "Second National Virtual
Conference on Recent Advances in Technology & Engineering (CRATE-2021)" on August 13-14, 2021.
The conference is aimed at providing a platform to all researchers and faculty members to interact, share
their research findings and to discuss their research ideas with the co-researchers from all over the country. It also
provides an opportunity to highlight recent developments and to identify emerging and future areas of growth in
the field of Science, Engineering and Management. I am sure that the deliberations of the conference will promote
the research in the thrust areas of Science, Engineering and Management.
I take this opportunity to thank the Chairman, Principal and the Heads of the Departments for keeping the
trust on me to organize this program. I would also be thankful to all the coordinators, staff members and the
participants, who extended their help and support for the success of this program.
I wish a bright career to all the participants.

xi
xii
CHIEF PATRON
Prof K Chandra Sekhar Naidu, Chairman

PATRON
Dr. Naveen Kilari, Principal

CHIEF GUEST AND WHOLE CONFERENCE KEYNOTE SPEAKER


Dr. G.S.N. Raju,
Vice-Chancellor, Centurion University, Andhra Pradesh.
Former Vice-Chancellor, Andhra University, Visakhapatnam

GUEST OF HONOR
Dr. H. Sudarsana Rao, Professor, Department of Civil Engineering,
J.N.T. University Anantapur,Andhra Pradesh

KEYNOTE SPEAKERS
Dhananjay V. Gadre
Founder, Centre for Electronics Design and Technology and TI Centre for Embedded Product Design,
Netaji Subhas University of Technology, New Delhi.
Dr. Jayavardhana G.
Senior Scientist,
Tata Consultancy Services
Bangalore
Prof. Ajith Kumar. V.V
Vice Chancellor, Skyline University, Nigeria
Dr. Savithri S
Senior Principal Scientist,
CSIR-National Institute for Interdisciplinary Science and Technology (NIIST),
Thiruvananthapuram.
Dr. P.Sakthivel,
Department of Physics, Faculty of Engineering,
Karpagam Academy of Higher Education, Coimbatore.
Dr. G.Appa Rao,
Department of Civil Engineering, Indian Institute of Technology Madras,
Chennai.
Prof. Ch. Sai Babu
Professor in Electrical Engineering Department & Director-Foreign University Relations,
JNT University, Kakinada.
xiii
ORGANIZING COMMITTEE
CONVENER
Dr. A.Mahamani, Dean R&D
CO- CONVENER
Mr.P.Nageswara Rao

HEADS OF THE DEPARTMENTS


Dr K.V.N.V.N. Rao,
Professor & HOD Department of MECH
Dr. S.MuniRathnam,
Professor & HOD, Department of ECE
Dr. D. Chandrasekhar
Professor & HOO, Department of EEE
Dr. S Raj Anand,
Professor & HOD, Department of CSE
Mrs. D V Sai Sireesha,
Professor & HOD, Department of HSS
Dr. C. Sambaiah,
Professor & HOD, Department of MBA

COORDINATORS
Dr. S.Murali Mohan, ECE
Mr.P.H.ChandraMouli, ECE
Dr.A.Hema Sekhar, EEE
Mr.M.Murali, EEE
Dr. K Venkata Ramana, CSE
Mrs. P Nirupama, CSE
Dr. G Ramesh, ME
Mr. Hema Mahesh Babu, ME
Mr. S. Ramprasath, CE
Ms. K.Sarumathi,CE
Dr. K.R.Sekhar, H&S
Dr. K. Chaitanya Kumar, H&S
Dr.G.Bhaskar, MBA
Dr. C.Bhupati, MBA

xiv
CONTENTS

Preface v
Messages vii

Sl.No. Title of the Paper Page No.

Department of Electronics & Communication Engineering


1. Electric Vehicles:Its Perspectives and Issues 3
- Pratik Tawde
2. MEMS based Sensor for Location Tracking and Monitoring Process 7
- Kaustubh Kumar Shukla, Dr. T. Muthumanickam
3. Automatic Penalty Assortment System for Traffic Light Violation 12
- Mr.B.Malakonda Reddy, Ch. Sravya, A. Sahithi, K. Indu, N. Sai Kumar
4. Smart Antenna Simulation Using MATLAB 17
- M.Jyothirmai, M.Jyothi
5. Implementation of Wallace Tree Multiplier Using Different Adders 24
- P. Padmavathi, M. Shafeequr Rahamon, P. Mukesh Babu
6. Fire Fighting and Extinguishing Robot 31
- M. Jyothi, M. Jyothirmai
7. Deep Learning Based Automatic Crack Detection Using Convolutional Neural 35
Networks
- Mrs. R.Rani, Ms.V.Leela Madhuri, Mr. N. Niranjan
8. Implementation of Red Sandalwood Protection Based on Advanced Microcontroller 40
System
- G. Sivakoteswarrao, Y. Murali
9. The Mobile Personal Health Management System: A Research Study 44
- G. Ramachandran, S. Kannan
10. Identification of Heart Disease Using Machine Learning in E-Healthcare 48
- Mr. G. Siva Koteswara Rao, Mr. Y. Murali, Ms. S. Aiyesha
11. IoT Based Collide Vehicle Number Plate Capturing and Alerting Via E-Mail and SMS 55
- P. Siva Madhuri, Syed.Irfan, Manjusha Chinta
12. Sign to Voice Conversion 61
- SK. Rafi, P. Pravallika, Manjusha Chinta
13. Navigation Solutions: Statistical Analysis of GPS Position Errors in 3-Dimensional 66
Surface
- Dr. P. Sirish Kumar
14. Analysis and Modification of a Smart Light and Movement Regulator 73
- Benjamin. O. Ezurike, Stephen. A. Ajah, Uchenna Nwokenkwo,
Udora. N. Nwawelu, Philip Eze

xv
Sl.No. Title of the Paper Page No.

15. Study and Analysis of Various Image Enhancement Method using MATLAB 78
- Y. Mahesh, B.Suresh Babu
16. Railway Track Crack Detection and Alert System using Arduino 84
- B. Sreevalli, D. Hemalatha, Manjusha Chinta
17. IOT Based Air Quality Monitoring System 88
- S. Chenchu Jyoshna, P. Srividya, Manjusha Chinta
18. Detection of Copy-Move Forgery using Keypoint Clustering Algorithm 92
- Mrs. P. Tejaswini, Mr. S. Naveen Kumar
19. Area, Power and Delay Analysis of Approximate Redundant Binary Multiplier 97
- S. Murali Mohan, A. V. Santhosh, K. Devendra
20. A Review on Various Pseudorandom Bit Generators 102
- Ashly George, Varghese A
21. Autometro Train Shuffle Between the Stations Using Raspberry PI 112
- P. V. Kusuma
22. Borrow Select Subtractor for Low Power and Area Efficiency 117
- C. Laxmanasudheer, D. Jayanayudu
23. IOT Based Smart Helmet for Construction Workers 125
- C. Laxmanasudheer, D. Jayanayudu, K. Maheshwari
24. Design of Low Power High Speed SRAM Architecture using SK-LCT Technique 130
- D. Jayanayudu, C. Laxmanasudheer
25. Heart Beat Monitoring and Heart Attack Detection Using IoT 137
- M. Tulasiram
26. Automated EV Wireless Charging Bunk 141
- Anand T, Gagan B K, Swaroop M R, Vishal Nayak
27. A Survey on Image Fire Detection using Learning Techniques 145
- G. Elaiyaraja, N. Kumaratharan
28. Energy Efficient Reconfigurable Approximate Carry Look Ahead Adder 155
- Rizvana K Latheef, Sindhu T V, Ajeesh S
29. Design of Very Fast, High Performance 5:2 and 7:2 Compressors for Rapid Parallel 164
Accumulations
- P. H. Chandra Mouli, K. Munisimha Deepak
30. An AES-Based Privacy Preserving for Secure Image Retrieval and Sharing in Cloud 170
Computing
- Ms.Y.Neha, Ms.N.Reena, Ms.V. Jyoshna Priya, Mr.V. Jayaprakash
31. Synthesis and Simulation of Double Precision Floating Point Arithmetic Unit- CRATE 175
2021
- Ms C. Bhagya, Mr.P.Chandu Prasad Reddy, N.Sirisha
32. High Speed with Reduced Delay Han-Carlson Adder (HC3A) 182
- Ms.V.Bharathi, Ms.S.Mahalakshmi
33. Early-Stage Prediction of Lung Cancer Using Logistic Regression 187
- C. Manikanta
xvi
Sl.No. Title of the Paper Page No.
34. Detection of Kidney Artifacts in Ultrasound Images Using Support Vector Machine 191
Classifier
- P. Vemaiah, Kolla Malleswari
35. Design of Low Power Carry Speculative Block Based Approximate Adder 199
- P. H. Chandra mouli, N. Suma hrudaya
36. An Error Analysis of Discrete Cosine Transfrom Using Algorithm Based Fault 208
Tolerance Technique
- R. Narayana Rao
37. Multiresolution Fusion Techniques for Analysis of Medical Images 216
- Mr. N. Kiran Kumar, Mrs. A .Mounika, V. Nagendra Kumar
38. CNN Technique for Deblurring and Super-Resolution of Image 220
- Ms. K. Deepika, Ms. M. Navya Sree, Mr. E. Kalyan Kumar, Mr. B. Balaji
39. Raspberry Pi Based Vehicle Anti-Theft Face Recognition System 224
- P. Subbarayudu, S. Mohammed Sharif, S. Noor Mohammed
40. AI Vision for Spy 228
- Rachana Veerabommala, S. Murali Mohan, Bhargav Jonnagadla
41. Sharp-Witted Control SystemWith RFID And GSM Using IOT 233
- K. Swapna, Jagadeesh Nandivargam
42. Covid-19 Identification and Alerting System 239
- K. K. Gouse, C. Ahalya, M.Jayalakshmime Surname
43. Smart Card Payment Solution for Campus Using Mifare Card 244
- Mrs. C.Munikantha, Ms.B.Lakshmi Prasanna
44. Automatic Detection of Diabetic Retinopathy in Retinal Images by Using Machine 250
Learning
- Mrs.R.Sindhu, Ms.N.Gayathri
45. Home Automation Using IoT And Security System Using Image Based 254
Authentication
- Mr.B.Malakonda Reddy, SK.Roshni, S.Bhanu Prakash, R.Vani,
P.Venkateswarlu
46. Compact Ultra-wide Band Microstrip Antenna For Iot Application 260
- R.Kalyan, S. Vidyarani, A.Mounika, K.S. Deveswari, P.H.Chandramouli
47. Covid-19 Detection and Safety Measures 266
- K.S.Deveswari, R.Kalyan, S.Vidya Rani, E.Devisri, T.H.Chandramouli
48. Design of High Speed and Efficient Block Based Carry Speculative Approximate 270
Adder
- Dr. Boda Saroja, Dr. Rajesh Gundlapalle
49. GPS and GSM Based Detection and Extraction of Landmines 275
- M. Arun Kumar
50. Road Sign Recognition Using Open CV With Raspberry PI 279
- A. Mahesh Reddy
51. A Review on Solar Power Monitoring Using Internet of Things 284
- Suvidya Arif Patel
xvii
Sl.No. Title of the Paper Page No.
52. A Neoteric Data Hiding and Color Image Sharing Based on Compressed Sensing 291
- Shaik.Shabeera Bee
53. Automatic Em Based Video Deraining and Desnowing Using Temporal Correlation 296
and Low-Rank Matrix Completion
- Allabaksh SK, K.R.Surendra, D.Chaitanya
54. Convolutional Neural Network for Diagnosing Skin Cancer 302
- Mrs. K. Jayasree, Ms.M. Navyasree
55. Design and Development of Silent Sound Integrated Smart Defence Helmet 305
- Srinigha A, Vigashini GP, Vishnupriya J, Yashwanthi V
56. An Efficient Design of Optimized Low Power Dual Mode Logic for Full Adder Design 309
- G. Munirathnam, S.Hema Madhuri, P.Bhaskar Reddy, V. Indhu, S.Mamatha
57. Identification of Bone Fracture using Support Vector Machine Classifier 316
- Dr. S. Muni Rathnam, Ms. Y. Viritha, Ms. G. Mounika, Mr. R. Muni Prathap,
Mr. P. Karthik
58. IoT Based Smart Bot 321
- Debjyoti Roy, Debojyoti Banerjee, Debolina Sett, Epsita Das, Partha Das,
Pushpendu Kanjilal
59. ATMEGA328 Microcontroller Based Air and Noise Pollution Monitoring System Over 324
IoT
- Dr.K.Gopi, Mr.K.M.Hemambaran
60. An Attribute Based Encryption for Data Security in Cloud Storage 328
- Ms. A. N. Hemavathy, Mr. G. Murali, Ms. K. Swarna, Mr. K. Ajith
61. Lossless Hyperspectral Image Compression Based on Reversible Integer of TDLT and 333
KLT
- M. Renu Babu, G. Chenna Keshava Reddy
62. An Application of Red Sandalwood Protection Using Rasberry Pi 339
- Y. Mahesh, Y.Murali
63. Design of Power and Area of Efficient Approximate Multipliers 343
- Mrs.N.Kavya
64. A Novel Method to Detect Alzheimer's Disease Using Image Processing 348
- Mr. B.Praveen Kumar, Ms.C.Yamini, Ms. M. Sravani, Ms. M. Nirmala,
Mr. G. Parthasarathy Reddy
65. Evaluation of Wireless Power Consumption and Energy Efficient in Green 352
Communication
- G. ChennaKesava Reddy, Dr. A.A.Ansari, M. Renu Babu

xviii
Sl.No. Title of the Paper Page No.

Department of Computer Science & Engineering


1. Data Acquition System for Greenhouse Management Based on IoT 361
- Dr.Bommi R.M, Ravimukilan.M, Akashkumar.M.L, Ashwini.P
2. Agree- Culture: Eventual Fate of Precision Agriculture in India Utilizing Machine 369
Learning and Artificial Intelligence
- Mr. Rajesh R Yadav
3. Email Spam Filtering Using Naive Bayes Classifier 373
- Dr. Keshetti Sreekala, Ganesh Dasari
4. Appraising the Strength of Machine Learning in Healthcare: Novel Perspectives 377
- Manas Kumar Yogi, Jyotsna Garikipati
5. Revamping the CIA Triad: Novel Perspectives 384
- PattabhiKeerthana, Darapu Uma, Manas Kumar Yogi
6. Using Machine Learningand Artificial Intelligence to Personalizeand Track 389
Workout Routines with Computer Vision
- P.Thanish Kumar, M.Vimal Raj
7. DNA Sequence Global Alignment Method using Needleman-Wunsch Algorithm 395
- N. Senthilkumaran
8. A Review on Blockchain Based Cloud Computing 401
- Sushma Sumant, Monika Madhukar Raut
9. Body Mass Index Prediction Using Logistic Regression 409
- Shanthini Chandrasekar, Vaishnavi Sriraman, Suganthi Muthusamy
10. IoT Based Design for a Smart Plastic Waste Collection System 413
- Tharun V, Kowsik J, Haribharathi S, Jeevankarthick B
11. Emotion Detection Sentiment Analysis using NLP and ML along with Speech
Recognition and Speech Synthesis 416
- Ms. Harshada U. Dhamapurkar, Ms. Anu T. Thomas
12. A Novel Approach For Home Security System 424
- Abinav Gowtham N, ]Jaisuriya Y, Mrs.Shanmugapriya S
13. Plant Disease Identification by Analysing Leaf Images: A Survey Report 429
- Priya S. Patil, Mahendra A. Pund
14. Fashion Online Shopping System Using Python 439
- Kotoju Rajitha, Leela Chandana Daki
15. A Comparative Study of Three Symmetric Key Fusion Algorithms DES-Blowfish, 443
DES-RC6 and BlowfishRC6
- Dr. Dube H.V, Dr. Amale B.B, Prof. Galande C.S
16. Hand Gesture Recognition Using Sensors for Deaf-Mute People 446
- Shanmugapriya S, Shalini TB, Ramya M
17. Using Random Forest Algorithm to Predict Differential Diagnosis of Erythemato- 451
Squamous Diseases
- Syed Nisar Hussain Bukhari, D.S. Oberoi

xix
Sl.No. Title of the Paper Page No.
18. An Outline on Focal Conception of Machine Learning 455
- Reddamma. K, Bhargavi. T
19. Security Issues: A Case Study 459
- Aswani Podili, N.S.Lohitha
20. Importance of Cloud Computing and Internet of things in Healthcare Systems 465
- Dr. Kamini Solanki, Dr. Abhishek Mehta
21. Smart Glass with Navguide System for Visually Impaired People 471
- Mrs.S.Shanmuga Priya, Mrs.M.Queen Mary Vidya, Rashmi Sai Sree M,
Pavithra M
22. Breast Cancer Histopathology Using CNN 476
- S.Venkata lakshmi, K.Pavithra

xx
Sl.No. Title of the Paper Page No.

Department of Electrical & Electronics Engineering


1. A Novel Management System of Energy in Hybrid Wind Solar Microgrid Operated 483
with Battery
- K. Prathibha, MV Bramhananda Reddy, Gowtham Chendra,
M. Jyothsna Devi
2. Reactive Power Optimization Control for Using Dual-Tank DBSRC 493
- C.L.Sravanthi, E .Neeraja
3. Review on Various Multilevel Inverter Topologies for Solar Photovoltaic and Wind 500
Systems
- C.Dinakaran, Dr.T.Padmavathi
4. Improvement of Power Quality in Grid Connected Distribution Systems using AI 509
based Controller
- Naga Hymavathi Ulli
5. Analysis and Modification of A Smart Light and Movement Regulator 516
- Benjamin. O. Ezurike, Stephen. A. Ajah, Uchenna Nwokenkwo,
Udora. N. Nwawelu, Philip Eze
6. Electrical Car Using Solar Energy 521
- Dr.G. Balaji, S.Rathinavel, M.Risheeba, K.Nisha
7. High Step-Up Interleaved Boost Converter for Distributed Generation Using 528
Renewable and Alternative Power Sources
- K. Sai Priyanka, G. Mallikarjuna
8. Analysing Bi Directional DC -DC Converter Based Lithium -Ion Battery Charging 534
and Discharging Systems for Effective Energy Storage
- Dr.P.Selvaraj, Dr.T.Muthukumari
9. Introducing Adaptive Multilevel Inverter as a PV Generator Interface to Power 539
System
- P. Anil, M. Sekhar
10. An Innovative Methodology for Enhancement of Reliability of Engineering System 545
using Social Learning Particle Swarm Optimization (SL-PSO)
- Aditya Tiwary, Praveen Patel
11. Design of Photo-Voltaic Renewable Energy Sources Using Bidirectional Converter 548
- Ravi Anand, Ashutosh Kumar Singh, R.K.Mandal, Zeeshan Hussain
12. Microcontroller based Feeder Protection From Over Load and Earth Fault Relay 556
- Dr. T. Ravi Kumar, M.Deepika, G. Srichandana, M. Sindhusree,
SK.Umme Habiba
13. Power Factor Improvement in Modified Bridgeless Landsman Converter Fed EV 563
Battery Charger
- S.Spandana, M.Sekhar
14. An Artificial Intelligence Based Solar Tracking System 570
- C.Harika, B.Ramya, Dr.K.Sudheer, Dr.P.Suresh

xxi
Sl.No. Title of the Paper Page No.

15. Relay Control and Operation for 220KV Feeder 575


- Murali Dasari, A.Nandini, P. Sreevidya, M.Jyothi Reddy, L.Divya
16. Sag, Swell Protection for Domestic Equipments and Motors Using Arduino 582
- M.Rajesh, A.Sindhupriya, K.Anusha, D.Chandra Lekha, Y.Teja Sri
17. Distributed Generation System Inverter with Overload Tripping Through IoT 589
- Dr. T. Ravi Kumar, Dr. G. Srinivasa Rao, B. Yaswanth, K. PavanKalyan
18. Hemp Battery (Hemp Super Capacitor) 599
- Debanga Bhattasaly
19. Power System Stability Enhancment Using Facts Controller 605
- Arti Prasad, Priyanka Rajput
20. MPPT Algorithm Based on Particle Sswarm Optimizations for PV Array Under Partial 609
Shading Conditions
- Abderrezzak Lalouli, Aicha Wahabi
21. Multiple Faults Detection of Transformer by Microcontroller and Conventional 618
Methods
- V. Anjaneyulu, Syed Fowzia, G. Anusha, R.Rajeswari, S.Nirmala
22. An Optimal Placement and Sizing of Distributed Generators in Unbalanced 622
Distribution Systems Using Supervised Big Bang-Big Crunch Method
- Pavan Gubbala
23. Investigation of Equilibrium Optimizer to Solve Economic Dispatch with Practical 634
- Y.V. Krishna Reddy, B.V. Arun Kumar, A. Sudhakar

xxii
Sl.No. Title of the Paper Page No.

Department of Mechanical Engineering


1. Design and Fabrication of High Speed Effortless Bicycle 643
- T. Sathees, S.Vengatesh, S.Santhoshkumar, A.Prathishg, S.Rajaselvam
2. Air as a Fuel (Alternative Fuels) 646
- Raghul J.R, Navaneethan R, Kavin Sankar M, Pradeep R V,
Kavin Prasanth M, Roshan J
3. The Effect of Holding Time on the Characteristics of Titanium and Austenitic 650
Stainless-Steel Joints
- A.Arun Negemiya, K.S.Mohanraj, S.Gnanasekaran, C.Sangeevi
4. CFD Analysis of Heat Transfer in Helical Coil Heat Exchanger with Constant Wall 655
Heat Transfer Coefficient
- R.Selvan, V.Sowndaryan
5. Design of Contactless Braking System 662
- T. Sathees, J.Vikram, B.Vinith Kumar, M.Yogeshwaran, N.V.Sundharrajan
6. Solar Water Desalination Using Paraffin Wax as Phase Change Material 667
- Sudhakar S,Shanmugavel S,Sherwin Moses Daniel A,Sanjei Pranav S,
Tarun S,Suriya Prakash V
7. IoT Based Automatic Temperature Checker and Mask Scanner 672
- Sudharsan B, Santhosh Kumar S, Suresh V, Sukumar K, Sarvesh R N,
Sathurgantha K
8. Finite Element Analysis of Fatigue Strength of Fabricated Aluminium 5000 Series 678
Alloy Using ANSYS Software
- Sasidhar Gurugubelli, Tirupathi Tirlangi, Avinash Vemmala
9. Fluid Flow and Heat Transfer Over a Double Forward-Facing Step With Obstacles 684
- Sri Ram Deepak Akella, Satish Geeri
10. Microstructure Analysis of the Surface Coated with TiN in Aluminium Alloy 2024 691
Grade by using Physical Vapour Deposition Method
- C.Sangeevi, Dr. A. Arun Negemiya, A Syed Ismail, K.S. Athiabiraman,
B. Arunkumar
11. Electricity Generation from Vehicle Parking Area 696
- Saran.S, Santhoshsivan.R, Seenidurai.M, Shiva Prasath.A,
Umashankar.P, Keerthi Shriram.S
12. Welding Technology 703
- Gokulapriyan G, Balaganesh S, Hareeswer M, Harshavartthan A,
Cheran B, Hariprasath S
13. Fiber Reinforcement Composite Material 705
- Gaurav Tamrakar, Priyanka Gupta
14. Moisture Absorption Characteristics of 3D Printed PLA-Carbon Fiber Composites 710
- Dr.A.Mahamani, K.Guna Sekhar, K.Mounika, N. Jyothish
15. Non-Chemical Water Treatment for Enhancing - pH Factor in Drinking Water 713
- Dr. K. Naveena Latha, Dr. P. Ram Reddy, Dr. D.V.Ravi Shankar

xxiii
Sl.No. Title of the Paper Page No.
16. A Review on Wire + Arc Additive Manufacturing of AA 7075 Correlation of Arc 718
Mode Microstructure & Mechanical Properties
- P. Koteswara Rao, Dr. K.L. Narayana
17. Behaviour of Artificially Introduced Circular Defect in Glass/Epoxy Composites Under 727
Four Point Bending
- Srikar Gemaraju, Kiran Kumar Yadav A, K.Vengal Rao, K. Ismail,
M.Venkataiah
18. A Review Study on Materials of Earth Air Heat Exchanger 731
- Niraj R. Shingala, Dr. Chetankumar M. Patel
19. Low Cost Portable Biogas Digester for Methane Capturing from Cow Dung 739
- Mohammad Zafar Anwar, Md. Afzal Ali, R. Venumadhav
20. Underwater Renewable Energy (Underwater Windmill) (Renewable Energy) 745
- Navaneethan S,Pradeep R.V,Navaneetha Krishnan P,Mutharasu A,Karthick,
Kumaran Jawahar M
21. Effect of Production Characteristics on Production of Biodiesel from Acacia Seeds 749
- P.Jaya Prakash, Dr.J.M.Babu, A.T.Praveen Kumar
22. Application of Evaporative Cooling on the Condenser of Window-Air-Conditioner 755
- Ch. Sreenivasa Rao
23. Synthesis of Fuel from Waste Plastic 761
- Kiran Kumar Yadav A, Srikar Gemaraju, K.Vengal Rao, M.A. Mateen,
P.Hemalatha
24. Influence of Cerium Oxide Nanoparticles Additive Blended in Palm oil Biodiesel 767
Used as Alternative Fuel in the Diesel Engine
- Dr. Hanchate Suresh Babu Rao, Gopavaram Sudarsana Reddy,
Thudmella Pavan Kumar
25. Computer Aided Design and Analysis of Heat Sinks With Square, Circular and 774
Rectangular Fins of Different Sizes Using ANSYS
- Vennapusa Vijayabhaskar, Dr. Kolla Srinivas
26. Security, Privacy and Reliability Issues in IoT 777
- Renu Bala
27. Bamboo: An Eco-Friendly Material for Structural Applications 780
- Dr. Asheesh Kumar, Mr. V. Vijaya Bhaskar, Dr. P. Badari Narayana
28. Design and Analysis of Horizontal Boring Spindle 784
- Mr. M. Mahesh
29. Development and Performance of Electro-Hydraulic Excavator 789
- Mohanraj K S, A. Arun Negemiya, C. Sangeevi
30. Thermal Performance Investigation for Direction of Twist of Inserted Twisted Tape in 795
Evacuated Tube Solar Water Heater
- Hitendra Damarlal Chaudhary, Dr. Sadanand A. Namjoshi
31. A Review: Composite Materials Used in Medical Field 798
- Komma Hema Mahesh Babu, Dr. K. Prahlada Rao

xxiv
Sl.No. Title of the Paper Page No.

Department of Civil Engineering


1. Approach Towards Sustainability by Employing Industrial Byproducts 805
- Ashwathi R
2. Experimental Investigation on Cement Concrete with Partial Replacement of Sand 809
by Waste Granite Powder
- S.Ramprasath, M.Gurusamy
3. Analysis and Design of Apartment Building Using Software's 813
- Sai Revanth, D.Manoj
4. Durability Study on Fly Ash Aggregate Concrete with Respect to Carbonation Test 823
- Parthiban P, S.Gunasekar, Anju M J
5. Study of Treatment of Municipal Sewage from Khan River (Indore, MP) by using 829
Fenton Process Method
- Mr. Aditya Narela
6. Experimental Study of Sugarcane Bagasse Ash and Quarry Dust in Partial 835
Replacement of Brick Material
- Parthiban P, S Gunasekar, Anju M J
7. To Study the Behaviour of Nanoparticles in Concrete; Nano-Concrete 842
- S Sivasankari, S Raja
8. Comparison of Buildings with Different Plan Orientation Using SAP 2000 Software 847
- Gandla Nanabala Sreekanth, Kummari Srikanth
9. Impact of Various Influencing Factors on NMT Modechoice 851
- U. Anand Anil
10. Laboratory Performance on Hot Mix Asphalt by Using Reclaimed Asphalt Pavement 858
Material (BC Roads)
- Santosh Kumar, Priyanka Patil, Bharat Koner
11. Marine Strains For Chintinase Production For Various Applications - A Review 865
- S. Krithika, Dr. C. Chellaram, Dr.M.Menaga

xxv
Sl.No. Title of the Paper Page No.

Department of H&S
Mathematics
1. Applications of Rough Sets in Graphs 873
- R.Aruna Devi, R.Nithya, K.Anitha
2. A Study of Guided or Unknown Game Theory in the Banking Industry using the 876
Brute Force Algorithm
- Dr. Sridevi, Dr.SM.Chithra
3. Model of Flow Network as Linear Programming and its Solution 880
- K. Bharathi
4. Wavelet Based Lifting Schemes for the Numerical Solution of Generalized 885
Burgers-Huxley Equation
- L. M. Angadi
5. Finite -Difference Investigation of Laminar Natural Convection Flow in an 891
Odd-Shaped Enclosure
- Veena Chandanam, C. Venkata Lakshmi, K. Venkatadri
6. ISI Index of Hexagonal Chain 895
- A. Dhanalakshmi
7. A Fuzzy Susceptible-Infected-Removed Model for the Transmission of Covid-19 898
- S. Sweatha, Sindu Devi
8. A Note On mN Disconnectedness 902
- Mrs.N.Raksha Ben, Dr.G. Hari Siva Annam
9. Application of Intuitionistic Fuzzy Soft Matrices in the Field of Medical Diagnosis for 907
Covid-19 Patients
- Dr.J.Sengamalaselvi
10. Mass and Heat Transfer Effect on MHD Flow of a Visco-Elastic Fluid through Porous 911
Nedium with Oscillatory Suction and Heat Source
- Rama Mohan Reddy.L, Veera Sanjeeva Kumar.P
11. A Sectional Survey on Solution of Transportation Problem in Operations Research 919
- M. Chaitanya Sreelakshmi
12. MHD Forced Convective Laminar Boundary Layer Flow from A Convectively Heated 921
Moving Vertical Plate With Soret and Dufour Effects
- B. Nagabhushanam Reddy, Kuppala R Sekhar
13. Heat and Mass Transfer in MHD Tangent Hyperbolic Fluid Over Chemically Reacting 924
Exponentially Shrinking Surface
- Kuppala R Sekhar

xxvi
Sl.No. Title of the Paper Page No.

Physics
1. Impact of Oxidation Number on the Structural and Optical Properties of Sn Doped 931
ZnO Nanoparticles
- Deepannita Chakraborty,Ragavi,Nishanthini,Yamuna,Chaitanya Kumar.K,
S.Kaleemulla
2. Investigation on Physical, Structural and Luminescence Characteristics of Dy3+ - Ions 936
Doped Bismuth Borate Glasses for Photonic Applications
- B Munisudhakar, N.Manohar Reddy, G.Manjula
3. Influence of Plasticizer on (PEO+PVP) Based Blended Solid Polymer Electrolyte 943
Membraneces
- U. Sasikala, P. Naveen Kumar
4. Improved Adhesion and Enhanced Field Emission of Multi-Walled Carbon Nanotubes 949
Based Cold Cathode by Copper Oxide Buffer Layer
- Yawar Alamgeer, Shambhu Kumar Yadav
5. Effect of Annealing on Structural and Optical Properties of Mn: ITO Thin Film 953
- Deepannita Chakraborty, Chaitanya Kumar K, S.Kaleemulla
6. Correlation of Nano Capacitance with Electrical Properties of Advanced Materials 958
- Dr. Alla Srivani, Dr. Charugundla Nagarathnamaiah, Dr. Raghavendra,
Syed Beeban Basha, Praveen kumar Namburu, Dasari Sreedhar
7. Emerging Trend's in Pico Technology for Medical Application's 962
- Dr A Srivani, Gurram Vasanth

ES/ Chemistry
1. Characterization and Therapeutical Study for Leaf Extract of Phyllanthus Niruri 967
(Bhumi Amla), Assessment of Silver Nanoparticles (AgNP) Synthesis and Comparative
in-Vitro Studies of Extract+AgNP
- Debasish Sahoo, Tanushree Chatterjee, Navita Gupta, Bhawna Pandey,
Virendra Kumar Vaishnav, Rajat Kumar Nayak
2. Study of Municipal Sewage Water Treatment from Khan River (Indore, MP) by using 974
Fenton Process Method
- Aditya Narela
3. Natural Synthesis of Nanoparticles and its Applications by Green Synthesis Process 980
- S.D.Mankar, Anjali Arvind Dama
4. Sustainable Development Through Biofuel as Future Energy Resource 985
- Dr. Shalini Jaiswal

English
1. The Prominence of Soft Skills in one's Academic and Professional Enrichment 992
- Madderi Muthuvel Gopi
2. The Importance of English Language and Literature in the Development of Students 996
Language Skills
- Madhu Panse, Hassan Md Jillun Noor, Prajakta Vijaykumar Patil

xxvii
Sl.No. Title of the Paper Page No.

3. Challenges and Latest Trends in ELT 1000


- K. Nirmala Priya, P.Kusuma Harinath
4. Soft Skills Among Professionals 1004
- Sailakshmi Yadav
5. Soft Skills Among Professionals 1008
- A.Manjubhashini
6. Collaborative Method with a SMILE to Improve English Language 1013
- S. Feroz Begum

xxviii
Sl.No. Title of the Paper Page No.

Department of MBA
1. Understanding E-Commerce:A Study with Reference to Present Scenario of COVID-19 1019
- Rajwinder Kaur
2. Exploring the Interrelationship between Green Human Resource Management and 1025
Corporate Social Responsibility
- Sapna, Anjali Gupta, Mr. Pardeep Kumar
3. A Study of Relationship Between Celebrity Endorsement and Brand Personality 1030
- Simran Sikka, Jitender Kumar
4. Government Schools: A Sustainable Initiative for Parents With Reference to Post 1034
Covid Financial Situation
- Dr. Shweta Mishra, Dr Sonal Sidana
5. An Evaluative Comparative Study on SBI & ICICI Bank in India 1040
- Dr.K.Karthikeyan, M.Dinesh Kumar
6. Digital Marketing- A Boost to Today's Businesses 1046
- Dr.Balaji.K
7. A Study on the Efficacy of the Public Distribution System in India 1050
- Kiran Sudi
8. A Systematic Application for Public Distribution- Ration Shop 1056
- Sanjeeva Kumara
9. Innovative Marketing Communications 1059
- Dr. Sindhu Varghese
10. Management of Non-Performing Assets in Banking Sector in India 1061
- Dr. P. Raghunadh Reddy, Y. Maheswari
11. Digitalization in India: Opportunities and Challenges 1067
- Dr. P. Subramanyachary, Dr.B.M.Raja Sekhar
12. Sports Marketing-A Pioneering Style of Marketing Management 1072
- Dr.B.M.Raja Sekhar
13. Role of Women in the Entrepreneurship Context: A Brief Literature Study 1077
- Mahanish Panda
14. HR Initiatives in Banks: Need for a Pragmatic Approach 1082
- Dr. Thimmaiah Bayavanda Chinnappa, Dr. Bashir Garba
15. Environmental Accounting and Reporting on Organisation - The Next Generation 1086
Importance and Impact
- Dr. Thimmaiah Bayavanda Chinnappa
16. A Contemporary Issue on Eco -Friendly Consumerism- Post Covid 19 1092
- Dr. Thimmaiah Bayavanda Chinnappa
17. A Study of the Emotional Wellbeing of Service-Sector(Education) Employees Working 1097
from Home During Covid-19
- Mr.Rohan Thomas Jinu, Dr.K.D.Balaji

xxix
xxx
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Department of Electronics & Communication Engineering

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 1


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

2 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Electric Vehicles: Its Perspectives and Issues


Pratik Tawde
Department of Electronics and Telecommunication Engineering, Vidyalankar Polytechnic, Mumbai,India
Email: pratik.tawde@vpt.edu.in

Abstract- In a country like India,the usage of


two wheelers for daily activities is high.To bring
the advancements in these two wheelers,hybrid
electric vehicle prototype is being developed.From
the vehicles,mostly two wheeler are used than the
other vehicle. As the ICE (Internal Combustion
Engine) is least efficient at low speed (traffic
condition).The electric drive is not only silently but
also low heat dissipation compared to petrol
powered two wheeler.The objective is developing Fig 2. Supply System:Possible Configurations
of hybrid two wheeler with geared system powered
by ICE and electric motor with the help of fuel and
battery supply.
Keywords-Electric vehicles charging and
interaction with grid,e-mobility and future
trends,conventional car,electrical car
I. INTRODUCTION
A vehicle is termed as an electric vehicle if it uses Fig 3 On-board Energy Management
electric motors to drive the wheels directly through
differential gears by receiving energy either fully City electric car Biro with series connected batteries
contributed by the on-board DC source or contributed as main source of energy and assisted by ultra
in part by the lower sized IC engine as compared to capacitors bank and photovoltaic panel mounted on
the conventional ICE based engines,with the objective the roof top of the city car.Ultra capacitor bank is used
of improved performance and reduced emissions.Pure to absorb and supply battery current ripples during
electric vehicle in which whole of the required energy regeneration and acceleration ,this improves life of the
for the traction is contributed by the on-board DC battery as well as extension in the autonomy of the city
source whereas hybrid electric vehicle in which a part car.Photovoltaic panel assists the city electric car
of the energy for the traction is contributed by ICE. partially by harnessing solar energy to charge the vehicle
when in parking or in motion.This result in considerable
II. PURE ELECTRIC VEHICLE extension in autonomy of the city car.
SUBSYSTEMS

Fig 1. Pure Electric Vehicle Subsystems

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 3


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Conductive charging is most common charging


method and has two categories:AC and DC charge.The
advantage of AC charging conductive charging method
is that battery can be recharged anywhere there is
standard electrical outlet.DC charging conductive
charging method is suitable for high power design,and
power output of fast charges is limited only by the ability
of the batteries to accept the charge.DC charging
request higher investment of installation compare to AC
charging.
Inductive charge is the energy transfer from the
Fig 4.Biro with HESS
power supply to EV via magnetic induction coupling
based on the principle of electromagnetic induction at
high frequency.
Dynamic charging is similar to static inductive
charging and energy transfer from charger to the car
through magnetic induction coupling.
Battery swap is basically switching out the depleted
Fig 5.Block Diagram of Battery Management System battery and replacing same with a full battery.
Process of submission energy to a battery by forcing
current in to it is called charging of a battery.
For fast charging,injection of the charging current in
to a battery to be charged at a rate higher than C/10
(normal charging) is termed as fast charging.Degree of
fastness can be higher or lower and is represented by
Kc/10 that is number of times the C/10.

Fig 8.Inductive coupled wireless charging

Constraint with the fast charging are with the increase


in charging current,battery temperature increases which
adverse affect the life of battery.For regulation of rise
in temperature,cooling arrangement is required and
Fig 6.Charging Levels
pulse charging/reflex charging is preferred.Smart
charging is defined as series of intelligent functionalities
to control the EV charging power in order to create a
flexible,sustainable,low cost and efficient charging
environment.
III. OVERVIEW OF E-MOBILTY AND
FUTURE TRENDS
India can save 64% of anticipated road based
Fig 7.Means of Charging mobility related energy demand and 37% of carbon
emissions in 2030 by pursuing a shared,electric and
4 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

connected mobility resulting in a net savings of roughly distributed source of renewable energy growth.Itt has
Rs. 3.9 lakh crore in 2030. advantages for consumers,stakeholders regarding the
electricity grid and for society as a whole.Open
protocols will be crucial for development of charging
infrastructure market.

Fig 9. Electric Vehicle Market by Region

Fig.12:Protocol Comparison:Non Functional

Amongest EV manufacturers it has now become


unofficially recognized that EV in the future must have
a battery capacity that can provide 200-300 mile
Fig 10. Schematic of Electric Vehicle
range.This is more than sufficient for city commutes and
Limitations of Electrical Vehicle are best suitable raw removes the range highway for long distance driving in
material, Lithium-iron availability for battery combination with highway fast charging.Manufacturers
manufacturing, battery of good quality and its price, are moving towards designing electric vehicles from the
range limit, frequency charging and cycle time and bottom up rather than building them based on existing
disposal of battery. combustion engine cars.This apporach provides more
flexibility in design,scope to add larger batteries and is
expected to reduce cost of the vehicle in the long run.

Fig 11. EV Components Development

III. ICT PROTOCOL FOR CHARGING


Charging electric cars is part of an evolving Choice of the electrical machine and its control
ecosystem with many different machines and algorithm,high density power electronic converters and
stakeholders that must be able to exchange information battery storage w.r.t size selection,monitoring health of
automatically.There are lots of protocols that are in use the batteries and charging time reduction.
and both protocol specifications and their applications IV. NEXT GENERATION TRANSPORT
are still emerging.Smart charging is something that will
Potential transport of future are flying EV,hyperloop
be increasingly important as more electric vehicles
and Rockets.
become available and as the use of intermittent and
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 5
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES
1. Overview of e-mobility and future trends of EV by Sanjay
Nibandhe.
2. Conversion of conventional car in to Electric car by Dr. A V.Ravi
Teja.
3. Introduction of Electric vehicles charging and interaction with
grid by Dr.Ritesh Kumar Keshri.
4. Battery charges and management system by Dr. Manoj Rathi.
Fig 13. Flying Electric Vehicle 5. Electric cars Technology by DelftX Ecar
Feature are uses multiple rotors for lifting,BLDC
motor presently used,safety and battery issues will be
next mode of transport

Fig 14. Hyperloop

Features are MAGLEV concept in vacuum,1200


kmph attainable and passenger comfort and contingency
issues.
Features of rocket as a mode of transport are re-
usable rocket and anywhere in less than 2 hours.
CONCLUSION
Transport using Electrical vehicle is the need of the
hour for sustainable development.An electric vehicle
can be designed in several possible ways.Main
challenges in EV are choice of the electrical machine
and its control algorithm,battery selection and its
management,EV charging takes considerably longer time
than re-fueling.While vehicles are being developed with
batteries alternative to battery storage is focus of the
future.Flying EV,Hyperloop and Rocket vehicles is next
generation transport.

6 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

MEMS based Sensor for Location Tracking and


Monitoring Process
Kaustubh Kumar Shukla1, Dr. T. Muthumanickam2
1
Research Scholar,Department of ECE, Vinayaka Mission's Research Foundation
(Deemed to be University), Salem,Tamilnadu,India.
2
Professor and Head,Department of ECE, Vinayaka Mission's Kirupananda Variyar Engineering College
(Vinayaka Mission's Research Foundation), Salem,Tamilnadu,India.
Email: kkshuklaece@gmail.com1, aswmuthu@yahoo.com2

Abstract -The most essential point of this paper in the field of MEMS can be understand using
is to plan a gadget utilizing MEMS based vibration micromachining. Since in micromachining technology
sensor which assists with distinguishing the area the analysis can be done up to micro level or even
of the vehicle and in the event of any tragic mishap beyond that so silicon based micromachining is getting
promptly message ought to be reached to the close
enough interaction from all researchers. [1-3].To
by emergency clinics at ostensible expense with
simple availability. In present existing framework develops any kind of MEMS based device one has to
we don't have an area overall arranging structure. know about the basic steps of MEMS (Micro-Electro-
It is accessible just in exorbitant vehicles like Mechanical-Systems) process [4-5]. In short it has four
BMW. Airbag discharge structure isn't open in major steps which have been shown in fig.-1. Its
standard vehicles. In this paper vibration sensor methodologies and scaled down scale structure based
has been utilized which perceives even slight contraptions can radically impact of the aggregate of
vibrations like speed breakers. In framework our daily routines and the way in which we experience
MEMS sensor has been utilized which sees [6-9].There are lot many designs are possible by
massive combinations along all headings. It is like modifying the MEMS structures and even though by
way includes district overall arranging structure in modifying in geometrical construction as a outcome
which we use GPS module. Embedded designs
there is much impact on sensitivity.MEMS based sensors
outright an amazingly certain task; they can't be
redone to do explicit things. Implanted plans have plays a vital role in almost all the fields [10-14].
particularly kept resources, particularly the
memory. An express action should be done inside
an unequivocal time. In some introduced
structures, called predictable systems, the due
dates are outrageous. Missing a due date may
cause a catastrophe loss of life or mischief to
property. So by utilizing this undertaking practical
data can be dispatched off the closest clinical office
including degree and longitude data and store move
can be made right away.
Keywords-Arduino, Detection, MEMS,
Modeling, Vibration Sensor. Fig.-1: Basic Process of MEMS

I. INTRODUCTION The primary work of a sensor is to take input


(Mechanical, Magnetic, Thermal, and Optical) and
Micro-Electro-Mechanical Systems has got huge
produce a usable output like voltage or current. Since
popularity because of silicon technology based
in this paper vibration detection is very necessary then
MEMS.Generally, the leading role of silicon technology
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 7
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

only accident detection is possible; thus, through fig.-2 likewise screen the vehicles constantly. There are
vibration detection has been shown using piezoelectric different approaches to follow a vehicle. Bigger
sensor. associations use web administrations to parcel huge
number of vehicles while limited scope ventures can
utilize different versatile applications. To discover careful
area, distance and assessing time to arrive at specific
objective an android application is created [19-21].
Hypothetical it is not difficult to say we can get the
specific area of a vehicle, however basically now and
then it is close to inconceivable. Despite the fact that
we have trend setting innovation it is hard to really
acquire the geological directions right constantly. Use
Kalman channel should be possible, to get a careful
Fig.-2: Detection of Vibration longitude and scope position. MEMS-based
accelerometers are one of the least difficult yet in
Vibration sensor identifies vibrations or unexpected
addition most material miniature electromechanical
regulations and gives a computerized yield high/low
gadgets. They are broadly utilized in expense touchy,
rationale relying upon the module [15-18]. Here utilized
low force, movement and slant detecting applications
a functioning high rationale vibration sensor module. It
like cell phones, gaming frameworks, plate drive
implies at whatever point the vibration sensor will
assurance, picture adjustment and sports and wellbeing
recognize vibration it will give high rationale to the
gadgets. MEMS-based accelerometers are accessible
microcontroller.
with various advances. The most widely recognized
depend on capacitors and gas chambers. In this structure
we use MEMS sensor which recognizes enormous
assortments along all direction. It furthermore involves
zone following structure in which we use GPS module.
Embedded frameworks complete a specific assignment;
they can't be adjusted to do obvious things inserted
structures have incredibly restricted assets, especially
the memory an unequivocal activity should be done
inside an express time. In some introduced structures,
called progressing systems, the due dates are severe.
Fig.-3: Operation of Piezo and Vibration Sensor Missing a due date may cause a catastrophe loss of life
With the help of piezo and vibration sensor in fig.-3 or damage to property. MEMS (Micro-Electro
on and off conditions has been shown depending on its Mechanical System)- based accelerometers are gadgets
connectivity according to its terminals and by altering that measure the legitimate increasing speed. In relativity
the terminals connections. In this work the main purpose hypothesis, appropriate quickening is the actual
is It is utilized for vehicle following and whenever any increasing speed experienced by an item. The psychical
approved individuals offers message to GSM at mishap speeding up is quantifiable by sensors. These sensors
area then it sends back the message of the mishap area are essential for the detecting group of pervasive
long and lat esteems. The vehicle following innovation advancements. Detecting innovations utilize actual
utilizes the GPS frameworks by means of numerous boundaries from the climate, for example, temperature,
applications. These applications are useful as the track pressing factor, power and light. An accelerometer
the vehicles and their accomplice web applications estimates weight for every unit of mass, an amount
otherwise called explicit power, or g-power. Estimating
8 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

g-powers permits clients to for example cooperate with all the gear portions needed for the endeavor execution.
items by methods for signal acknowledgment. The fragment assurance put a critical occupation in this
II. METHODOLOGY outcome. A portion of the assignment sections are
control supply, Arduino UNO, LCD, Relay, GSM and
MEMS based vibration sensor has been used in this GPS Module. The process of working of this model
work. At very initial stage of the work using multiphysics which is shown in fig.-6 is given below:-
software COMSOL 5.2a different MEMS based
structures like microcantilevers (with different shapes)
has been analyzed to understand the concept of
deflection,vibration,displacement,stress,strain and many
more mechanical parameters. At second stage
concentration has been done about interfacing MEMS
based vibration sensor with 8051 microcontroller.
Further for the purpose of location tracking different
concepts of GPS and GSM has been utilized by proper
analysis which has been shown in the fig.-4. The primary Fig.-5: Working Model
Process and method of this work has been shown • Switch on the Power supply.
through this block diagram which is showing below in
figure-4. • Full wave rectifier (FWR) is extensive in nature and
it is very much helpful to understand does the change
of the forced air system. Additionally it supports
transformer.
• Voltage supply of 5v is given to the microcontroller.
• Arduino UNO microcontroller for productive yield.
It goes about as a control unit.
• MEMS sensor will detects the vibrations of mishap
and sends its response to the regulator.
• GPS and GSM modules enact and send area to the
Fig.-4: Block Diagram portable number which is preprogrammed.
The above Fig.-4 shows that in this research MEMS Result has been analyzed and screen short has been
sensor has been utilized which perceives huge taken for the same which has been shown in the figure-
assortments along all headings. It furthermore contains 6, which is given below:-
territory worldwide situating system in which GPS
module has been utilized. Embedded designs all out a
specific undertaking; they can't be modified to do
specific things installed frameworks have incredibly
bound assets, especially the memory. An express activity
done inside an unequivocal time. In some presented
structures, called consistent frameworks, the due dates
are serious. Missing a due date may cause a catastrophe Fig.-6: Screen short of working model result
death toll or underhandedness to property.
After effective plan and execution it has been
III. RESULT ANALYSIS altogether cheeked and yield has checked and it has
As per the goal of the paper it has been implemented been found that some sort of sign issues are present,
and tested which can be seen in fig.-5.This part includes rest of the things are fine.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 9
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

CONCLUSIONS [5] C. Prabha, R. Sunitha, R. Anitha, "Automatic vehicle accident


detection and messaging system using GSM AND GPS modem"
Finally,in this paper analysis has been done to by IJAREEIE 7, July 2014
understand the different mechanical properties of [6] V. P. Raj, K. Natarajan and S. T. G. Girikumar, Induction motor
MEMS based sensors(like microcantilever fault detection and diagnosis by vibration analysis using MEMS
accelerometer, 2013 International Conference on Emerging Trends
structure),mainly here MEMS based vibration sensor in Communication, Control, Signal Processing and Computing
has been used.Apart from that with the help of Applications (C2SPCA), Bangalore, 2013, pp. 1-6.
GSM,GPS and microcontroller proper interfacing [7] T. Deng, D. Y. Chen, J. B. Wang, J. Chen, W. T. He, and Y. J. Fan,
detection has been done,the model has been shows "A MEMS based electrochemical seismic sensor," in Proc. 17th
that while any kind of mishap takes place ARM7 Int. Conf. Solid-State Sensors, Actuators Microsyst., Jun. 2013,
pp. 920-923.
processor will plays a major role through its functionality
[8] J. Marek, U. Gómez, "MEMS (Micro-ElectroMechanical
and in this way GSM modem receives the relevent Systems) for Automotive and Consumer Electronics", in Chips
details so that LCD will be in a position to gleam and 2020, The Frontiers Collection, pp 293-314, 2012.
accedent can be detected as well as message will be [9] C. C. Hindrichsen, N. S. Almind, S. H. Brodersen, Rasmus Lou-
reached to the nearby healthcare centre so that timely Møller , K. Hansen, E. V. Thomsen, "Triaxial MEMS
cure is possible.With the proper use of different accelerometer with screen printed PZT thick film," J Electroceram
, vol. 25 pp. 108-115, 2010
technology like GSM,MEMS and GPS this work has
[10]S. Thanagasundram, F. S. Schlindwein, "Comparison of integrated
been planned and attempted and to have a better clarity micro-electrical-mechanical system and piezoelectric
Latitude:1337.74887 and Longitude:07924.49632 has accelerometers for machine condition monitoring," Proc. IMechE.
been obtained from the working model in case-I,wheras Part C: J. Mechanical Engineering Science, Vol. 220, 2006
Latitude:1337.74887 and Longitude:07924.49737 has [11]G. Welch, G. Bishop, "An Introduction to the Kalman Filter",
been obtained in case-II.These parameters are helping July 24, 2006. http://www.cs.unc.edu/~welch/media/pdf/
kalman_int ro.pdf
one to find the accident location quickly and to shave
the human life quickely.This kind of research work will [12]G. Lammel, S. Armbruster, C. Schelling, H. Benzel, J. Brasas, M.
Illing, R. Gampp, V. Senz, F. Schaefer, S. Finkbeiner, "Next
be more useful by using IOT technology because of generation pressure sensors in surface micromachining
advanced features and flexibility of this technology.So technology", Digest Tech. Papers Transducers'05 Conference,
that MEMS(sensors) with the collabration of IOT Seoul, Korea, June 5-9, 2005.

Technology can be a better plateform for accedent [13]F. Laermer, A. Urban, "Milestones in deep reactive ion etching",
Digest Tech. Papers Transducers'05 Conference, Seoul, Korea,
detection as well as secure and timely information for June 5-9, 2005.
better cure,specially in the field of biomedical
[14]Artech House Microwave Library, Artech House, Boston, MA,
applications. 1999.
REFERENCES [15]Kovacs, G.T.A., Micro machined Transducers Sourcebook,
McGraw-Hill, New York, NY,1998.
[1] Kang Rao, Huafeng Liu*, Xiaoli Wei, Wenjie Wu, Chenyuan Hu,
Ji Fan, Jinquan Liu and Liang-cheng Tu*:A High-resolution Area- [16]Madou, M., Fundamentals of Micro fabrication, CRC Press,
change-based Capacitive MEMS Accelerometer for Tilt Sensing, Inc., Boca Raton, FL, 1997.
978-1-7281-2983-9/20/$31.00 ©2020 IEEE [17]M. Offenberg, F. Laermer, B. Elsner, H. Muenzel, W.
[2] Corina Covaci, Aurel Gontean, Piezoelectric Energy Harvesting Riethmueller, "Novel Process For A Monolithic Integrated
Solutions: A Review, Sensors 2020, 20, 3512; doi:10.3390/ Accelerometer", in Digest Tech. Papers Transducers'95 and
s20123512 Eurosensors IX Conference, Stockholm, June 25-29, 1995.

[3] A. Sabato, C. Niezrecki and G. Fortino, Wireless MEMS-Based [18]Tilmans, H. A. C. "MEMS components for wireless
Accelerometer Sensor Boards for Structural Vibration Monitoring: communications" (invited paper). In Proceedings of the 16th
A Review, in IEEE Sensors Journal, vol. 17, no. 2, pp. 226-235, European Conference on Solid-State Transducers,Prague, Czech
Jan.15, 15 2017. Republic, September 15-18, 2002, pp. 1-34.

[4] Freescale Semiconductor. MMA8451Q, 3-Axis, 14-bit/8-bit [19]Gibbs1, M. R. J. E. W. Hill and P. J. Wright, Magnetic materials
Digital Accelerometer, Rev. 9.1. 2015. for MEMS applications, Inst. of Physics Publishing, J. of Physics
D: Applied Physics, 37, 2004.

10 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[20]Aggarwal, P., and El-Sheimy, N., "Extended Particle Filter (EPF)


for Land and Airborne Applications," submitted to Measurement
Science and Technology, 2008.
[21]John A. Pelesko,David H. Bernstein, "Modeling MEMS and
NEMS", Chapman & Hall/CRC-2003.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 11


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Automatic Penalty Assortment System for Traffic Light


Violation
Mr.B.Malakonda Reddy1, Ch. Sravya2, A. Sahithi3, K. Indu4, N. Sai Kumar5
1
Associate Professor, 2,3,4,5Students
1,2,3,4,5
Department of ECE, Narayana Engineering College, Gudur.
Email: bmalakondareddy1@gmail.com1, sravyachimmili2000@gmail.com2

Abstract: Due to the increase in traffic problems, old vehicles do not have RFID tags. So here we are
we see so many cases of red signal breakage every using ultrasonic sensor, so if a vehicle passes by without
day, to solve this problem we have developed a an RFID tag, the sensor detects this and the camera
system called "Automatic Penalty Assortment takes the picture. Hence the system is useful to keep
System for Traffic Light Violation" with IoT. The
track of all vehicles. India is the second most popular
purpose of the project is to properly track traffic
signal violations with the help of cameras using
country in the world and a rapidly growing economy.
RFID tag and infrared sensor. This document shows The number of vehicles is increasing exponentially from
the entire traffic light handling system using the day to day.
latest technologies. The system works with red Increased traffic will bring many problems, such as
light. In the existing system SMS are being sent accidents, various pollution, time loss and health
on the phone, so we use email notifications. us,
problems. The main causes of traffic problems are the
our system would be helpful so that traffic
management officers can successfully track all
increase in the number of cars and violation of traffic
traffic sign issues in the most appropriate and rules. The main purpose of the project is to collect fines
desired manner. for violating traffic lights. The project includes the use
of RFID tags in cars and the use of RFID readers in
Keywords: RFID reader, IR sensor, Node MCU
signals. Responsible for detecting vehicles that violate
camera, Arduino UNO.
traffic rules.
I. INTRODUCTION
Traffic officers
Traffic sign violations often lead to accidents. To
In the traffic module, they have authority over the
solve this problem, police authorities and our traffic
details of the penalties, view photos, send notifications
department have many solutions, as we see surveillance
and also see the list of rule breakers of the day. Penalties
cameras today, through which additional measures are
or not, traffic agents can check all of this through
taken in the event of any type of vehicle breakdown.
applications.
Many systems are available there. Our system works
out of the box, as all vehicles with registered users now Vehicle owners
have RFID tags. Therefore, when the red light is on In the system's user module, users have the right to
and the vehicle passes the line it recognizes this see what kind of penalties the image that the system
automatically and the detection of the rule breaker sends to their license plate assigns all data to them.
becomes easy for the system. The notification of the
criminal details will be sent to this user immediately. II. LITERATURE REVIEW
There is an application through which we can see all Hiasat and Almomani have developed and
the data of the penalties with the details of this user. implemented a system that combines radio frequency
This also allows users to see how the fees were identification (RFID) with the Global System for Mobile
charged. for them and by camera there is also a picture Communications (GSM) to control traffic and identify
of their violations. If there is no RFID tag, because our searched vehicles. This document introduces a system
12 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

that uses adaptive components, including radio based on the number of tags sent in the GPRS mode in
frequency identification (RFID) transponders, which can the saved database. The web server algorithm is derived
be placed anywhere on the road, and then transmits from the two vehicle driving times. Finally, drivers can
real-time collected data from a short time to a server in identify traffic jams on monitored roads through websites
a fixed and static state. Message retention (SMS) to or short message services (SMS). The street selected
the next or police station. Stop offending vehicles via by SMS or email. In another study [4] the author G.
GSM and can choose to notify the driver Violation Vara Prasad proposed a low-cost system that handles
through e-government system (in Jordan) and immediate over speeding through Zigbee. The system in this
payment of fines. document consists of two parts: the sending part or
In another study [1] the author Shruthi KR was unit and the receiving unit. The transmitter module is
proposed a system for detecting car accidents and located in a certain area. The speed limit is programmed
speed limits. Electromechanical system technology in the PIC16F877A microcontroller. The information
(MEMS), radio frequency (RF), global positioning is sent to the receiver module in the car through the
system (GPS) and global system for mobile Zigbee radio protocol (CC2530). The receiver module
communications (GSM). The dashboard also displays is divided into two blocks, one of them is next to the
driver warnings for accidents and speed limits. rear-view mirror, composed of a Zigbee receiver that
receives wireless signals, a 16F877A PIC
In another article [2] the author Sayanti Banerjee microcontroller that receives signals from the Zigbee
has a system was introduced to automatically control receiver, and a CAN controller that receives signals
car brakes using speed limit displays and active RFID from the microcontroller. The baud rate is 125KB/ab.
tags on traffic signs. In his work, he proposed a system The other unit is next to the dashboard of the vehicle.
based on three stages: identifying the RFID transponder The communication between the two CAN controllers
(tag), inputting the vehicle speed sensor into the comes from two sub-units. In the second sub-unit, the
electronic control unit (ECU), and finally controlling the CAN controller receives the vehicle speed from the
vehicle brakes. [2] The system uses an RFID reader speedometer and sends it. [2] The microcontroller then
(30m reading range) to send the reference speed from compares the speed of the car with the maximum speed
an RFID tag connected to a road sign or speed limit and draws conclusions from it.[5]-[7] The speed
sign to the ECU, and the ECU provides an output signal difference is constantly checked and a warning is issued
to control the speed of the vehicle. on the liquid crystal display (LCD). If the speed limit is
In another study [3] the author r. Hedge has exceeded, an audible warning is issued to slow down.
developed a system that can track traffic congestion in If the driver ignores the warning, the violation will be
real time. The controller is updated via short message recorded and recorded. [1] The microcontroller will
service (SMS) or a website using radio frequency save any violations detected by the vehicle and will
identification (RFID) and general packet radio service display a message containing the speed difference and
(GPRS) technology and Google Maps API. [3] The vehicle license plate information.
design of the proposed system is divided into two BACKGROUND
categories: 1. The server, which is usually composed
of a GSM modem and a website or portal, and 2. The In recent years, the digital space has undergone
client is usually composed of a GPRS modem and two tremendous changes, and industry experts believe that
RFID readers (Texas Instruments). In the system, two it will continue to develop. The Internet of Things (IoT)
radio frequency identification readers (RFID) are placed is the latest player in the digital field. The Internet of
at a certain distance on the road, and passive RFID Things can also be defined as the interoperability of
tags are affixed to the car. Essentially, the RFID reader software, telecommunications, and electronic products.
reads passive tags when they pass, and then uses the The hardware industry has brought huge opportunities
web server algorithm to calculate the vehicle speed to many industries.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 13
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

III. EXISTING SYSTEM Working


Various devices for detecting traffic rule violations The project will reduce all the problems associated
are available on the market. They are as follows: with traffic rule violation on road. In this system it
1) Integrated system consists of RFID reader will read the RFID tag number
which is attached to the vehicle while purchasing or
2) Android traffic detection system passing the vehicle for the amount plate received by
3) RFID technology for intelligent control of vehicles RTO which will be mandatory. The camera will also be
by communicating speed limit signs of traffic signs there for capturing the image of auto that has broken
4) Detection of violations in traffic signs by RFID system the rule. The latest image capture by camera and send
this information to the server database. the related image
IV. PROPOSED SYSTEM
from server and related details about that particular
The proposal deals primarily with the use of the vehicle like name of owner, address, license number,
system in order to take appropriate measures against passing number, photo, mobile number, their checking
traffic sign violations in a timely manner. Therefore, the account number. This application will receive the fine
agents can easily do their work with the help of the automatically from the owner's checking account
system. Vehicle, but in some situations, there are no consistent with the rule broken by vehicle driver and
RFID tags available in some vehicles, so the situation fine decided by government. This application also will
sensor is in the street to detect the vehicle. There are send the message to vehicle owner about the breaking
also cameras available to take pictures of injured of traffic rule, fine according to that rule, proof of
vehicles. If several vehicles interrupt the signal at the breaking the rule in the form of image capture by
same time, automatically capture the image of all camera, date and time of breaking the rule and accurate
vehicles and send it to the next traffic Additional policing fine is issued and SMS will be sent.
is done manually. Difference Between Existing system and proposed method

BLOCK DIAGRAM Parameter Embedded Traffic Violation ProposedMethod


System Detection detectionat
system using trafficsignals
Android using RFID
Power Supply
system
Def IR sensors are It determined We can If any violate therule
used to behaviour of integrate RFID of traffic signal then it
measure traffic in a tagon very read RFIDtag number
density of the particular vehicle which ofthat vehicle send the
GSM vehicles location. It can be read by info to that smart
IR Sensor which are calculates the RFID phone via SMS. And
fixed with in speed of reader, ifany also, it sends the
fixed vehicleson violate the rule captured photo to the
distance. the basis of of trafficsignal. mail
Red Led sensors. id.
Device Micro- GPS RFID tag & Camera, RFID tag
Dependency controller RFID and RFIDReader
ReaderPC
Green Led Automatic No No No Yes
RFID Fine
Ardu in o Collection
UN0 Maintain No No Yes Yes
Data Base
Buzzer Way of Measure Calculates RFID RFID
Detection density of speed of system System &smart phone
vehicles vehicles

Slide
Switch
N ode MCU
Camera

14 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Flow Chart: 2. Corruption Avoidance


3. Automatic Penalty Collection
Start
4. Reduce Work load of Traffic Police
V. RESULT
V Result
The
Thesystem
system described abovehas
described above hasbeen
beenfound
foundto to
bebe
Signal
effective in detecting
effective vehicles
in detecting withwith
vehicles a latency of about
a latency of
color about 1.5
1.5 seconds. Theseconds.
system has The
beensystem has been
implemented with
implemented with co mmercially available RF
commercially available RF transmitters and receivers
transmitters and receivers that are supplied as a
that are supplied as a receiver-transmitter pair so that
receiver-transmitter pair so that the system can only
the system canvehicles
detect the only detect
whosetherespective
vehicles whose respective
transmitter, in a
transmitter, in a commercial
commercial implementation,
implementation, will be able towill be able
receive
Red Green
to receive signals
signals othermultiple
other than than multiple
Detect Detect transmitters,
transmitters, such
as cellular signals that you are using a considerably
such as cellular signals that you are using a considerably
manymany vehicles.
vehicles.
IR sensor When aavehicle
When vehicle crosses
crosses the
thezebra
zebracrossin g line
crossing at at
line
on traffic sign then GSM send the message like
Vehicle traffic sign then GSM send the message like
allows Your Vehicle Number AP XX-XXXX Violated. An
Your Vehicle Number AP XX-XXXX Violated. An
Amount o f 100/-Fined
Amount of 100/-Fined
RFID

Sensor on

Vehicle
crossing
thezebra VI Conclusion
line
In this way,VI. the CONCLUSION
system is automatically penalized
for violating traffic
In this way, the system rules and, in turn, leads
is automatically to
penalized
disciplined traffic in our country. It will
for violating traffic rules and, in turn, leads to disciplined help
RFID detect minimize many traffic-related prob lems that cause
the vehicle traffic in our country. It will help minimize many traffic-
system-wide disrup tions and red uce the number of
related problems
accidents. that jam
Traffic cause system-wide
that d evours o urdisruptions
precious
and reduce
time. In our system, we only monitor trafficjam
the number of accidents. Traffic that
at the
devours our precious
signposts, but it could time. In useful
also be our system, we only
for mo nitoring
no entry,
monitor trafficone-way streets, etc.
at the signposts, butThe systemalso
it could saves
betime
useful
Camera capture the and is designed fo r fast application. The Automated
vehicle number and
for monitoring no entry, one-way streets, etc. The
Penalty System for Traffic Sign Violatio ns is a very
send to the user and End system saves time and is designed for fast application.
easy to use application that saves time and effort.
also penal ty msg is to The TheAutomated
applicationPenalty System and
works efficiently for helps
Traffic Sign
traffic
send mobile. Violations
system ismanagement
a very easytotoreduceuse application
your manual thatwork
saves
timeandand effort. The application works efficiently and
time.
Features of Proposed System:
helps traffic system management to reduce your manual
The different features in this proposed system are:- work and time.
1. Application Interface
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 15
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES [4]. G. Vara prasad and R. S. D Wahida Banu, "Flexible Routing


Algorithm for Vehicular Area Networks", in Proc. IEEE Conf.
[1]. Shruti KR and Vindhya K, Priority-based traffic light controllers Intel. Transp. Syst. Tele communication., Osaka, Japan, 2010,
using wireless sensor networks, International Journal of Electronic pp.30- 38.
Signals and Systems (IJESS) ISSN:
[5] Varsha Sehdev Nagmode, Prof. Dr. S.M. Rajbhoj, "An IoT
[2] Ms. Pallavi Choudekar, Ms. Sayanti Banerjee and Prof. M K Platform for Vehicle Traffic Monitoring System and Controlling
Muju, "Real Time Traffic Light Control Using Image Processing", System Based on Priority" 978-1-5386-4008-1/17/, IEEE, 2017ss
Pallavi Choudekar et. al./ Indian Journal of Computer Science
and Engineering (IJCSE), ISSN: 0976-5166, Vol. 2 No. 1. [6] Imperial Journal of Interdisciplinary Research (IJIR) Vol-2, Issue-
5, 2016 ISSN: 2454-1362, http://www.onlinejournal.in Violation
[3]. R. Hegde, R. R. Sail, and M. S. Indira, "RFID and GPS Based Detection at Traffic Signals Using RFID System.
Automatic Lane Clearance System for Ambulance", Int. J. Adv.
Elect. Electron.Eng, vol.2, no. 3, pp. 102-107, 2013. [4] Marianne [7]. Bhargavi Yadav N and B Mohan Kumar Naik, "RFID and ZIG
A. Azer, Ahmed Elshafee," A Real-Time Social Network- Based BEE Based Intelligent Traffic Control System", International
Traffic Monitoring & Vehicle Tracking System" 978-1-5386- Journal of Computer Engineering and Applications, ICCSTAR-
5111-7/18/, IEEE,2018. 2016, Special Issue, May.16

16 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Smart Antenna Simulation Using MATLAB


M.Jyothirmai1, M.Jyothi2
1,2
ECE, Ravindra College of Engineering For Women, Kurnool
mjyothirmaiece@recw.ac.in1, mjyothiece@recw.ac.in2

Abstract- In communication process the signals One type of antenna that radiates energy in all the
are to be transmitted over a long distance to reach directions is an omnidirectional antenna in which the
the distance then they may undergo through the gain of this antenna is small in comparison with
obstacles and signal scattering takes place. In our directional antenna. The longer distance can be covered
paper we hired beamforming antennas which are
by the radio waves radiated by directional antennas.
controlled electronically so that radiation pattern
gets adjusted. The interfering signals are get An antenna is an electrical conductor or system of
suppressed and at the same time the received conductors
signals are maximized. The smart antenna will
decrease the noise by increasing the signal to noise • Transmitter - Radiates electromagnetic energy into
ratio and have better system competence. In space
adaptive beam we can use spacing of several • Receiver - Collects electromagnetic energy from
antennas and phase of the signal of each antenna space
array to control the shape as well as the direction
of the signal beam. In this paper we can observe The IEEE definition of an antenna as given by
the use of smart antennas using an adaptive beam Stutzman and Thiele is, "That part of a transmitting or
method as a better system for the signal receiving system that is designed to radiate or receive
transmission. Comparison for both omnidirectional electromagnetic waves".
antenna system and smart antenna system by
II. LITERATURE REVIEW
simulating them. Advantages of smart antenna
system over omnidirectional antenna is discussed Adaptive beam forming smart antenna can be used
in this paper. In this paper, it was seen that the for indoor positioning systems. The paper "Analysis of
higher the signal frequency (between 3 GHz, 4 GHz, Beamforming Antenna for Practical Indoor Location-
and 5 GHz) had a more limited range of angles it Tracking Application" done by Kim, S.W., and Choi,
could detect due to the beamwidth of the main lobe. D.Y. in 2019 [6] makes use of the beamforming antenna
Keywords- Smart antenna, Beam forming as a single anchor point to receive indoor localization
antenna, Directivity, Elevation angle, Power gain signals. The beamforming antenna used in this paper is
I. INTRODUCTION a 1x4 antenna array connected to a 4x4 Butler matrix.
The function of the Butler matrix is to control the
The devices that are used to send and receive direction of the main lobe. The antenna array inputs the
electromagnetic waves over a long distance are antenna. received signal into the Butler matrix and in turn, the
The transmitting antenna takes physical energy and Butler matrix feeds a signal with varying phases to each
converts into electrical energy and radio waves that element antenna to produce a directed signal. The
travel miles around the earth and back to earth towards indoor positioning system was implemented by setting
from atmosphere. There are different types of antennas up 10 target locations lined up in a perimeter of a half-
used based on requirements. While designing an antenna circle each separated by an angle of 15o. In the
always gain, polarization and direction are the three experimentation, it was seen that the higher the signal
fundamental properties should be considered always. frequency (between 3 GHz, 4 GHz, and 5 GHz) had a
more limited range of angles it could detect due to the
beamwidth of the main lobe.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 17
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The system can detect targets 2 meters away from square, and sample matrix inversion to prove that a
the anchor point. Additionally, the main lobe of a proposed fast conjugate gradient method was superior
beamforming antenna can be directed in two directions to the existing beamforming algorithms and was most
at the same time, the beamforming antenna in the indoor suitable for high-speed mobile communication.
positioning localization system can also detect multiple Previous studies on adaptive beamforming algorithms
targets at a time. The paper utilizes the steering angle of have also been made. The conference paper
the beamforming antenna to detect the location of a "Performance Analysis of Adaptive Beamforming
target. In high-speed data communications, smart Algorithms" done by P. R. Jeripotula and B. Rajendra
antenna systems are prominently used with various Naik in 2018 analyzed two beamforming algorithms
modulation techniques. The article "CL-SA-OFDM: which are the least mean square and normalized least
Cross-layer and smart antenna based OFDM system mean square algorithms. The paper suggests that the
performance enhancement" done by Shivapan normalized least mean square algorithm converges at a
chakshari, T. G., and Aravinda, H. S. in 2020 makes faster rate than the latter. The simulation of both of these
use of smart antennas with the modulation technique, algorithms was also conducted in MATLAB. The use
orthogonal frequency-division multiplexing (OFDM). of smart antenna systems concerning omnidirectional
With regards to OFDM, adaptive beamforming causes antennas was conducted with regards to mobile ad hoc
problems in the designs of medium access layers which networks. The article "A low energy consumption smart
lead to complications in the adaptive resource allocation antenna adaptive array system for mobile ad hoc
mechanism. Various smart antenna mechanisms were networks" by V. Inzillo, F. De Rangoand, A. A.
used to suit the needs of different users with regards to Quintana in 2017 used adaptive array smart antennas
the quality of service. Smart antenna designs can be in mobile ad hoc networks for the enhancement of
utilized to improve transmission rates. properties such as energy management. The paper
The article "Smart antenna design for high-speed proposed an adaptive array smart antenna which would
moving vehicles with minimum return loss" done by enhance some Ad hoc Distance Vector network
Sarkar, M., Singh, A., Gupta, S., and Hassanien, A. E. protocol features utilizing optimizing the energy
in 2020 makes use of a machine learning technique for consumption. The simulation of the said system used a
the design of a smart antenna that can improve Least Mean Square algorithm and used the MATLAB
transmission rate with a minimized return loss. software.
The experiment suggested a four-element cylindrical III. PROPOSED METHOD
antenna array that was wrapped around a cylindrical Smart antenna proposes a release by transmitting
surface. The bandwidth of the proposed design was or receiving power only to or from the desired user.
set at 200 Mhz with a center frequency of 3.9 GHz
and covered the range of 3-3.9 GHz with a gain of 4.9 Basically, smart antennas are of 2 types.
dBi. The design that was suggested was low profile 1. Phased array: - It consists of either a number of fixed
and was theoretically usable in high-speed avionic beams with one beam turned on towards the desired
applications. The study was made to solve a problem user as shown in Fig 1.
concerning transmission processes in highspeed moving 2. Adaptive array: - It puts a main beam in the direction
vehicles and the growing concern of power of desired user and nulls in the direction of the
consumption. Adaptive Beamforming may also be used interference Omni directional antenna and the
in high-speed mobile communications. The article Adaptive Beam forming Antenna is compared
"Adaptive Beamformers for High-Speed Mobile accordingly and the simulation is recorded.
Communication" done by V. Dakulagi and M.
Alagirisamy in 2020 compared various beamforming
techniques such as least mean square, recursive least
18 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

SLOTTED WAVEGUIDE ANTENNA:


Omni directional Antenna
An omnidirectional antenna is a Wi-Fi transmitting
or receiving antenna that radiates or intercepts radio-
frequency (RF) electromagnetic fields similarly nicely
in all horizontal guidelines in a flat, two-dimensional (2D)
geometric aircraft. Omnidirectional antennas are utilized
in maximum purchaser RF Wi-Fi devices, together with
cell telecellsmartphone units and Wi-Fi routers.
In theory, a vertically orientated, instantly conductor
inclusive of a dipole antenna measuring no greater than
half wavelength from cease-to-cease usually reveals
Figure 1: Flow chart for Omni Directional Antenna.
omnidirectional homes in a horizontal (azimuth) aircraft.
Multiple collinear (in-line) vertical dipoles additionally
showcase omnidirectional conduct with inside the
azimuth aircraft; they could provide stepped forward
overall performance over a unmarried dipole in a few
applications. If the conductor axis isn't always orientated
vertically, then the antenna radiates and gets similarly
nicely in all guidelines with inside the aircraft thru which
the conductor passes at a proper angle. However, this
best situation exists best with inside the absence of
obstructions or different close by carrying out objects.
In practice, surrounding objects (inclusive of the person
of a cellular telecellsmartphone set or a pc subsequent
to a Wi-Fi router) distort the radiation and reception
pattern.
Working of Omni Directional Antenna
Waveguide is a transmission line where loss of a
signal is very low. Propagation is taken place in number
Figure 2: Flow chart for Adaptive Beam Forming Antenna
of antennas or slots. With the help of a simple coaxial
IV. WORKING AND DESIGN probe signal and waveguide is get coupled and traverse
DESIGN: in allowed slots along the guide. In these slots radiation
because these slots allows small amount of energy. Slots
In this paper constructed two RF antennas and are arranged in a linear pattern and the signals which
Simulated are used. are radiated will adds up to a very significant power
The antennas that we constructed were: gain over a small range of angles close to the horizon.
We can also say that, the more amount of waveguide
1) Slotted Waveguide Antenna. (Omni directional)
antennas energy is transmitted at the horizon, according
2) Adaptive Beam Forming antenna. (Smart Antenna) to our desire. In the elevation plane its exceptional gain
gives it high power gain. The slotted waveguide transmits
its energy by hiring horizontal polarization unlike vertical
co-linear antennas. And this is the one of the best
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 19
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

approach for the distance transmission line. radiates pattern of the antenna array by adding
ADAPTIVE BEAMFORMING ANTENNA: constructively the phases of the signals in the direction
of the targets mobiles desired in the multiplying the
Smart antennas are of two types they are 1) Switched patterns are used in the targets. The sensor array
Beam Antenna 2) Adaptive antenna array. We hired analyser application was used to design and simulate
switched-beam system in order to improve the received the two antennas of the paper.
signals. Incoming signal is get detected to enable the
base station in order to realize the beam which was An alternative application that can be used is the
best aligned in the signal-of-interest direction. Then it antenna designer application in the antenna toolbox. To
switches to that beam to communicate with the user. compare the two antennas, the length of the
omnidirectional array and the radius of the circular planar
In an adaptive array, it contains number of patterns array was kept the same. The signal frequency and
which are adjusted in the real-time adaption of the radio propagation speed of the antennas were also the same
environment. It is an array where multiple antenna values. . switched beam antenna systems form multiple
elements are continuously changing its pattern along with fixed beams with heightened sensitivity in particular
the time through collecting feedback from the directions these antenna systems detect signal strength
surroundings to maintain optimum state. In case they choose from one of several predetermined.
desired angles are continuously changing along with the
time then we need to devise such a scheme then it can The application requires the user to input certain
continuously update the array weights. In short we can parameters to simulate the antenna. For the
say that this is the best technique for tracking the mobile omnidirectional antenna, a linear array geometry was
user without distraction in changing RF environment. selected, the number of elements was 2, the spacing
element was set to 5 m, the chosen antenna element
In smart antenna system, the radiation pattern of an was an isotropic antenna, the propagation speed was
antenna can be controlled by using DSP i.e., Digital set to 3x108 m/s and the signal frequency was set to
Signal Processing. Desired signals, interfering signals, 300 MHz. For the adaptive beamforming smart antenna,
and Gaussian noise are the input signals for antenna the array geometry chosen was a circular plane with
array. Array weights can be controlled and also the the radius set to 5m; the spacing element was set to
output error also can be minimized by adaptive 0.5m. The MATLAB source file was extracted from
algorithms. The errors can be calculated by the the sensor array analyzer.
subtraction of output signals from reference signals. With
the suitable design of adaptive algorithms, the signal- V. EXPERIMENTAL RESULTS
to-interference ratio is maximized or minimized Geometry array:
according to the different optimization parameters like The performance of an array will depend on the
variance, MSE, interference nulling, and the steering of number of elements in the array (generally more
main beam toward the user. The two most important elements yields better performance), the weighting
aspects of the smart antenna are an estimation of vector used, and the geometry of the array. Observing
Direction of Arrival (DOA) and the digital beamforming the Array Factor, you will note that the array's output
(DBF) (or reception pattern) is a strong function of the geometry
WORKING PRINCIPLE: (positions of the antenna elements that make up the
An important toolbox in MATLAB to design and array).
simulate the paper is the Phased Array System Toolbox. For uniformly spaced arrays (either 1D, 2D, or 3D
The phased array system toolbox has built-in commands arrays with a constant spacing between elements), the
and applications that contain the algorithm for sensor maximum spacing is a half-wavelength to avoid grating
array systems. It is the method used to create the lobes. This effect is sometimes called "aliasing", which

20 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

is a term that is borrowed from the signal processing BEAM FORMING SMART ANTENNA OUTPUTS:

field. Aliasing occurs when plane waves from two


distinct direction of arrivals (DOAs) produce the same
set of phases across the array. Since an antenna array
manipulates signals based on the phase differences that
it observes across the array, aliasing results in the array
being unable to distinguish signals from distinct DOAs.
Azimuth angle(elevation 0.0)
Azimuth and elevation are angles used to define the Figure 3: Array Geometry
apparent position of an object in the sky, relative to a
specific observation point. The observer is usually (but
not necessarily) located on the earth's surface.
Azimuth angle
The azimuth (az) angle is the compass bearing,
relative to true (geographic) north, of a point on the
horizon directly beneath an observed object. The
horizon is defined as a huge, imaginary circle centered
on the observer, equidistant from the zenith (point Figure 4: 2D Azimuth cut Rectangular Coordinates
straight overhead) and the nadir (point exactly opposite
the zenith). As seen from above the observer, compass
bearings are measured clockwise in degrees from north.
Azimuth angles can thus range from 0 degrees (north)
through 90 (east), 180 (south), 270 (west), and up to
360 (north again).
Elevation angle
The elevation (el) angle, also called the altitude, of
an observed object is determined by first finding the
compass bearing on the horizon relative to true north, Figure 5: 2D Azimuth cut Polar Coordinates
and then measuring the angle between that point and
the object, from the reference frame of the observer.
Elevation angles for objects above the horizon range
from 0 (on the horizon) up to 90 degrees (at the zenith).
Sometimes the range of the elevation coordinate is
extended downward from the horizon to -90 degrees.
The final output is in the form of 3D rectangular and
polar coordinates which is having the frequency of
300MHz and also the max directivity of 22.3722.
Figure 6: 2D Elevation Rectangular coordinates

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 21


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

planar array geometry was chosen for the adaptive


antenna due to its ability to suppress sidelobes and
improve directivity. The simulation presented that the
circular planar geometry was effective in the directivity
of the antenna. Other variations of the parameters were
also explored with its effects were observed. The
omnidirectional antenna with similar parameters was also
simulated.
The variations of the parameters were also explored
with its effects were observed. The radiation patterns
Figure 7: 2D Elevation Polar Coordinates
of the two antennas were observed along with its gain
for an isotropic antenna. The results of the simulation
confirmed that the adaptive beamforming smart antenna
has a higher gain compared to the omnidirectional
antenna. The stronger gain of an antenna means that it
could travel a greater distance. The steering angle leads
the angle of direction of the radiated energy. It causes
the shift in the phases of the signals of the elements in
the array of the antenna. The simulation also illustrated
the complexity of the circuit of the two antennas. In as
simple as the run time of the simulation, it can be seen
Figure 8: 3D Plot Polar Coordinates that the run time of the omnidirectional antenna is faster
than the adaptive beamforming smart antenna. The
software generated the output of the adaptive antenna
at a relatively much longer time due to the complexity
of the algorithm involved. This would be reflected in
the cost of the two antennas. Due to its complexity,
adaptive antennas are more expensive than
omnidirectional antennas. However, in certain
applications, the complexity and cost of a directional
antenna can be overlooked.
REFERENCES
Figure 9: 3D Plot Rectangular Coordinates
1. B. Kumoro and Y. Mukhlis, "Dipole antenna design with CPS
VI. CONCLUSIONS matching for RFID application," Journal of Physics: Conference
Series, vol. 1175, no. 1, 2019.
The application Sensor Array Analyzer from the
2. M. Wnuk, "Antenna radiation patterns indication on the basic
MATLAB software provided the researchers with ease measurement of field radiation in the near zone," WIT
in design and simulation of the omnidirectional antenna Transactions on Modelling and Simulation, vol. 48, pp. 191-
202, 2009.
and the adaptive beamforming smart antenna. The
phased array toolbox provided the algorithms needed 3. P. Hazdra, M. Capek, M. Masek, and T. Lonsky, "An introduction
to the source concept for antennas," Radioengineering, vol. 25,
to simulate the two antennas. The computation of the no. 1, pp. 12-17, 2016.
radiation intensity to graph the radiation pattern is done
4. D. Savitri, A. Azzahra, P. Wulandari, and S. Rahmatia,
by the toolbox. The model of the adaptive beamforming "Comparison between hollow aluminum yagi-uda and dipole
smart antenna was done in the application. Circular antenna for indoor antenna TV," IOP Conference Series: Materials
Science and Engineering, vol. 453, no. 1, 2018.

22 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

5. F. Ali, A. Urban, and M. Vossiek, "A high resolution 2D 10. [M. Sarkar, A. Singh, S. Gupta, and A. Hassanien, "Smart antenna
omnidirectional synthetic aperture radar scanner at K band," the design for high-speed moving vehicles with minimum return loss,"
European Microwave Week 2010, EuMW2010: Connecting the International Journal of Communication Systems, vol. 33, no.
World, Conference Proceedings - European Radar Conference, 11, 2020.
EuRAD 2010, pp. 503-506, 2010.
11. V. Dakulagi and M. Alagirisamy, "Adaptive beamformers for
6. A. Innok, P. Uthansakul, and M. Uthansakul, "Angular high-Speed Mobile communication," Wireless Personal
beamforming technique for MIMO beamforming system," 2012 Communications, vol. 113, no. 4, pp. 1691-1707, 2020.
9th International Conference on Electrical Engineering/Electronics,
12. P. Jeripotula and B. Rajendra Naik, "Performance analysis of
Computer, Telecommunications, and Information Technology,
adaptive beamforming algorithms," 2018 International Conference
ECTI-CON, 2012.
on Circuits and Systems in Digital Enterprise Technology,
7. W. Li, Y. Zhao, and Q. Ye, "Semi-virtual antenna array ICCSDET, 2018,
beamforming method," Progress in Electromagnetics Research
13. V. Inzillo, F. De Rango, and A. Quintana, "A low energy
Letters, vol. 68, pp. 33-37, 2017.
consumption smart antenna adaptive array system for mobile ad
8. S. Kim and D. Choi, "Analysis of beamforming antenna for hoc networks," International Journal of Computing, vol. 16, no.
practical indoor location-tracking application," Sensors 3, pp. 124-132, 2017.
(Switzerland), vol. 19, no. 14, 2019.
9. T. Shivapanchakshari and H. Aravinda, "CL-SA-OFDM: Cross-
layer and smart antenna based OFDM system performance
enhancement," International Journal of Electrical and Computer
Engineering, vol. 10, no. 5, pp. 4663-4670, 2020.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 23


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Implementation of Wallace Tree Multiplier Using


Different Adders
P. Padmavathi1, M. Shafeequr Rahamon2, P. Mukesh Babu3
Department of ECE, Sree Venkateswara College of Engineering, Nellore
Email: padma.mtec@gmail.com1, shafeeq2626@gmail.com2, pasupuletimukesh11@gmail.com3

Abstract- Arithmetic units are the major blocks Wallace tree multiplication algorithm is beneficial in
of processing units in a processor. Multiplication terms of speed among other multiplication algorithms
is one of the important operation among all [2]. In the operation of Wallace tree multiplier, first we
arithmetic operations. The existing multipliers produce the partial products which is similar to binary
occupy more area and delay. Wallace tree
multiplier. In the second stage we perform addition using
multiplication algorithm is a better one in terms of
half adders and full adders. In the final addition stage
speed among other algorithms. With more
advancements in technology we need to have we use conventional adders to produce the final
circuits which operate with better performance. So, product. Hence the adders play a very important role
in order to decrease the delay in the Wallace tree in generation of final product. The speed of addition is
multiplier without degrading its area, we design new going to affect the operation of multiplication.
Wallace tree multiplier structures using different Hence to improve the performance of multiplication,
Parallel prefix adders in this paper. In the proposed
we opt for a new structure of Wallace tree multiplier in
multipliers, we use Parallel Prefix adders in the
final stage of addition of multiplier in place of this paper which uses fast adders known as Parallel
conventional adders. In this paper, we design four prefix adders (PPA) in the final stage addition in place
32-bit Wallace tree multiplier structures using of conventional adders. The Conventional adders such
Sklansky adder, Kogge Stone adder, Brent Kung as ripple carry adder carry look ahead adder has some
adder, Ladner Fischer adder. These Multiplier major drawbacks which can be eliminated by using
structures are designed using Verilog HDL & are Parallel Prefix adders.
simulated and synthesized using Xilinx ISE 14.7
design suite. The proposed structures are The Parallel prefix adders are designs which are
compared and analyzed in terms of area and delay. originally derived from carry look ahead adder concept
of generating and propagating of carry bits. The carry
Keywords- Wallace tree multiplier, Parallel
generation tree mainly consists of two components-
prefix adders, Sklansky adder, Kogge Stone adder,
black cell and grey cell. The black cell and grey cell are
Brent Kung adder, Ladner Fischer adder.
interconnected to from carry tree network. Kogge stone
I. INTRODUCTION adder, Sklansky adder, Brent-Kung adder, Ladner-
With evolution in the era of technology in very less Fischer adder are some of the Parallel prefix adders
span of time, the need for fast computation of circuits used in the design of proposed Wallace tree multiplier
used in devices has been rapidly increasing. There is a in this paper.
high demand for the circuits being designed with some This research paper is composed as follows, section
billions of components having low area and high speed. II presents the detailed operation of Wallace tree
All modern processors such as microprocessors, digital multiplier. Section III is composed of many sub sections
signal processors contain Arithmetic Logic Unit (ALU) which describes in depth operation of PPA, different
[1]. Multipliers are very essential for designing industrial PPAs used in the design of multiplier and the structure
applications such as Finite Impulse Response, Fast of proposed multiplier using PPAs. The result analysis
Fourier Transform, etc.
24 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

is clearly explained in section IV. Section V is conclusion • Step-1: The addition operation is performed on first
of the proposed paper. three rows of partial products generated in Stage-1
which generates result of two rows having sum terms
II. WALLACE TREE MULTIPLIER in first row and carry terms in second row.
Wallace tree multiplier is a hardware implementation • Step-2: The last row of partial products of Stage-1 is
of binary multiplier which is used to multiply two added with the sum and carry row which again result
integers. Most extensively used multiplier design in many two rows comprising of one sum row and one carry
processors and memory units is Wallace tree structure row.
[3].

Fig. 3. Partial product addition step-1 & step-2

Stage-3: Final rows Addition:


• To acquire final product, the sum and carry row are
added.

Fig. 1. Block Diagram of Wallace tree Multiplier

To explain the Wallace tree multiplication process


we consider here an example of two 4-bit binary
integers as multiplier and multiplicand. This example is Fig. 4. Final rows addition
explained in different stages as shown in the Fig. 2-4. As discussed earlier, in entire process of
Stage-1: Partial Product Generation: multiplication, addition process holds major role. To
perform fast addition, carry must be propagated
• The input numbers are applied to AND gate to
quickly. But in the final stage of addition i.e. by using
produce partial products.
conventional adders such as ripple carry adder and
• Four rows of partial products are generated as the carry look ahead adder carry propagation delay is more
size of input is 4- bits. in this methodology which is the major drawback. To
over this drawback, Parallel prefix adders are used in
place of Conventional adders in Stage-3 of this
multiplier.
III. PROPOSED WALLACE TREE
MULTIPLIER
A. Parallel Prefix Adders
Fig. 2. Partial product generation
Parallel prefix adder (PPA) is one of the fastest types
Stage-2: Partial Product Addition: of adder and they are also called as the "Carry-tree
• These partial products are added in step by step adders". PPA is equivalent to the Carry Look Ahead
process by using half and full adders. adder. They differ in the way their carry generation block
is implemented. PPA improves the speed of operation.
In PPA, a carry generation tree is present which
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 25
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

generates carry for all preceding stages which improves


the speed of operation [8]. High speed operation adders
in tree structure PPA like Sklansky adder, Kogge-
Stone adder, Brent-Kung adder and Ladner- Fischer
adder [9]. PPA mainly consists of three blocks as shown
in the figure 5.
Pre-processing block Fig. 7. Black cell

Four types of Parallel prefix adders are used in this


Carry generation block paper to design the Wallace tree multiplier. They are
Sklansky adder, Kogge Stone adder, Brent Kung
Sum generation block adder, Ladner Fischer adder.
Fig. 5. Block diagram of parallel prefix adders 1) Sklansky adder: Sklansky adder is also called as
Pre-processing: Propagate and Generate signals are the "Divide -and-conquer tree". This adder has
obtained. Computation of carry generation and carry Minimal depth, High fan-out nodes. The delay of the
propagation signals by number of input bits. structure is given by log2n with n/2 log2n computation
nodes. The fan-out of this adder increases
Gi = Ai . Bi significantly from the inputs to outputs along the critical
Pi = Ai ⊕ Bi path, which accounts for large amount of latency [5].
Figure 8. Shows the schematic of Sklansky adder.
Carry generation Tree: Calculating all the carry
signals in parallel that is called prefix computation. It
generates carry bits for all stages parallely at a time. It
has two components, Black cell and grey cell that are
interconnected to form a carry tree network.
Gi-j=Gi:k+Pi:k . Gk-1:j
Pi:j = Pi:k . Pk-1:j
Sum Generation Block: Evaluating total sum of Fig. 8. Sklansky Adder
given inputs. 2) Kogge Stone adder: KSA is a parallel prefix form
Si = Pi ⊕ Gi-1 developed by "Peter M. Kogge" and "Harold S.
Stone". The Kogge-Stone adder has Low depth, High
node count (implies more area), and Minimal fan-out
(implies faster performance). The delay of the
structure is given by log2n with [n(log2n)-n+1]
computation nodes [4]. This comes at the cost of
many long wires that must be routed between stages.
The tree also contains more PG cells; while this may
Fig. 6. Black cell
not impact the area if a structure to achieve delay
that grows with log N. Figure 9. Shows the schematic
of Kogge Stone adder.

26 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. 9. Kogge stone adder


Fig. 11. Ladner Fischer adder
3) Brent Kung adder: BKA was developed by "Brent"
and "Kung". The Brent-Kung adder has: Maximum
B. Wallace Tree Multiplier using Parallel Prefix
logic depth (implies longer calculation time), Minimum Adders
number of nodes (implies minimum area) [6]. Its In this paper, four different Wallace Tree multiplier
performance is lower compared to kogge-stone adder. structures are designed using four different PPAs namely
The interconnection complexity of black and grey cells Sklansky adder, Kogge stone adder, Brent Kung adder,
is less when compared to Kogge stone adder. The
and Ladner Fischer adder as shown in Figure 11. These
delay of the structure is given by [2(log2 n)-2] with
adders are used in final addition process in stage 3 to
[2n-2-log2 n] computation nodes. Figure 10. Shows
the schematic of Brent Kung adder. improve the performance of the operation of the
multiplier.

Fig. 10. Brent Kung adder

4) Ladner Fischer adder: Ladner-Fischer trees are a


family of networks between Sklansky and Brent-
Fig. 12. Block diagram of Proposed Wallace tree Multiplier
Kung. The Ladner-Fischer adder has Low depth, High
fan-out nodes. This adder is designed from Sklansky IV. SIMULATION AND SYNTHESIZED
adder design having delay of (log2n)+1 with [(n/ RESULTS
2)log2n] computation nodes [7]. Ladner Fischer adder
Four 32-bit Wallace tree Multiplier using Parallel
consists of same number of nodes as in Brent Kung
adder but it has less number of stages then Brent
Prefix adders is designed using Verilog HDL and has
Kung adder, so this adder will have more speed then been simulated and synthesized using Xilinx ISE 14.7
Brent Kung adder. Figure 11. Shows the schematic Design suite. Simulation results, Device Utilization
of Ladner Fischer adder. summary, RTL schematic and timing constraints of
Wallace tree multiplier using Sklansky adder are shown
in Fig. 13 - Fig. 16.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 27


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. 13. Simulation result of WTM using Sklansky adder


Fig. 18. RTL Schematic of WTM using Kogge Stone adder

Fig. 14. RTL Schematic of WTM using Sklansky adder Fig. 19. Device Utilization summary of WTM using Kogge
Stone adder

Fig. 15. Device Utilization summary of WTM using Sklansky


adder

Fig. 20. Timing Constraints of WTM using Kogge stone adder

Simulation results, Device Utilization summary, RTL


schematic and Timing constraints of Wallace tree
multiplier using Brent Kung adder are shown in Fig 21-
Fig 24

Fig. 16. Timing Constraints of WTM using Sklansky adder

Simulation results, Device Utilization summary, RTL


schematic and timing constraints of Wallace tree
multiplier using Kogge stone adder are shown in Fig. Fig. 21. Simulation result of WTM using Brent Kung adder

17- Fig. 20

Fig. 17. Simulation result of WTM using Kogge Stone adder Fig. 22. RTL Schematic of WTM using Brent Kung adder

28 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. 23. Device Utilization Summary of WTM using Brent


Kung adder Fig. 27. Device Utilization summary of WTM using Ladner
Fischer adder

Fig. 28. Timing Constraints of WTM using Ladner Fischer


Fig. 24. Timing Constraints of WTM using Brent Kung adder adder
Simulation results, Device Utilization summary, RTL The below table shows the performance
schematic and Timing constraints of Wallace tree characteristics like area, delay of four Wallace tree
multiplier using Ladner Fischer adder are shown in Fig structures using PPA and based on comparison we can
25- Fig 28. say that kogge stone adder has least delay among other
structures and ladner fisher has least area among other
structures [10].
Table 1. Performance Analysis of Wallace tree multiplier
using PPAs

Input Area (No.


Multiplier Structure Delay (ns)
size of LUTs)
Fig. 25. Simulation result of WTM using Ladner Fischer
adder Wallace tree
multiplier using 1,780 19.817
Sklansky adder
Wallace tree
multiplier using 2,599 17.696
Kogge Stone adder
32-bit
Wallace tree
multiplier using 1,780 19.817
Brent-Kung adder
Wallace tree
multiplier using 1,761 18.682
Fig. 26. RTL schematic of WTM using Ladner Fischer adder
Ladner Fischer adder
V. CONCLUSION
This paper gives the detailed description of four
Wallace tree structures using Parallel prefix adders like
Sklansky Adder, Brent-Kung Adder, Kogge-Stone

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 29


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Adder and Ladner-Ficher Adder. The Parallel prefix [4] P. M. Kogge and H. S. Stone, "A parallel algorithm for the efficient
solution of a general class of recurrence equations," IEEE
adders are faster because of less delay and area efficient Transactions on Computers, vol. C-22, no. 8, pp. 786-793, 1973.
compared to other basic adders. The work compares
[5] J. Sklansky, "Conditional-sum addition logic," IRE Transactions
the area, delay of parallel prefix adders. Four multiplier on Electronic Computers, vol. EC-9, no. 2, pp. 226-231, 1960.
structures are simulated and synthesize using Xilinx 14.7. [6] R. P. Brent and H. T. Kung, "A regular layout for parallel adders,"
Wallace tree multiplier using Ladner fischer adder can IEEE Transactions on Computers, vol. C-31, no. 3, pp. 260-
be used for application circuits which require less area 264, 1982.
and speed of the circuits will also be in medium. [7] R. E. Ladner and M. J. Fischer, "Parallel prefix computation,"
Whereas for high speed application circuits, Wallace Journal of the AssoclaUon for Computing Machinery, vol. 27,
no. 4, pp. 831-838, 1980.
tree multiplier using Kogge stone adder can be used
[8] Rakesh.S,K.S.Vijula Grace, "A comprehensive review on the VLSI
but costing little bit more area when compared to other design performance of different Parallel Prefix Adders"
proposed structures. The proposed multiplier structures ScienceDirect, Materials Today: Proceedings 11 (2019) 1001-
can be used in high speed and low area application 1009.
circuits basing on requirement. [9] P.Chaitanya kumari, R.Nagendra, "Design of 32-bit Parallel Prefix
Adders", IOSR Journal of Electronics and Communication
REFERENCES Engineering (IOSR-JECE) e-ISSN: 2278-2834, p- ISSN: 2278-
8735. Volume 6, Issue 1 (May. - Jun. 2013), PP 01-06.
[1] B. Neil H. E Weste and David Money Harris, "CMOS VLSI
Design: A circuits and Systems Perspective", 4th Ed: Addition- [10]Shilpa K. C, Shwetha M, Geetha B. C, Lohitha D. M, Navya
Wesley, 2004. and Pramod N. V.," performance analysis of parallel prefix adder
for datapath vlsi design", 2018 Second International Conference
[2] C. S. Wallace, "A Suggestion on Fast Multipliers," IEEE
on Inventive Communication and Computational Technologies
Transactions on Electronic Computers, vol. EC-13, Issue-1, 1964.
(ICICCT), 20-21 April 2018.
[3] Himanshu Bansal, K. G. Sharma, Tripti Sharma," Wallace Tree
Multiplier Designs: A Performance Comparison Review",
Innovative Systems Design and Engineering, Vol.5, No.5, 2014.

30 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fire Fighting and Extinguishing Robot


M. Jyothi1, M. Jyothirmai2
1,2
Electronics and Communication Engineeeirng, Ravindra College of Engineering for Women, Kurnool.
Email: mallayjyothi@gmail.com1, jyothi23984@gmail.com2

Abstract- This inventive firefighting robotic Application of Embedded System includes:


system, it detects fire and turn off them. Thereby
fire accidents take place from time to time; there 1) Robotic (Machinelike) science,
are many backstops to it. Apart from many things a 2) Medical,
technology called Robotics is invented to replace
humans against robots to cease fire. 3) Networking,
In this technology, robot is power-driven by an 4) Home Devices,
Arduino Uno development board which resides an 5) Automobiles, etc.,
HC-SR04 sensor which is mounted on a servo
motor and helps in detection of obstacles and finds ARDUINO UNO
the direction of fire. It is also includes w an Optical A wide range of Innovative electronics projects are
Flame sensor to get aware of fire and arranged with developed by a renowned open-source platform named
water tank that sprays water to end fire. The water
Arduino. This platform requires a bodily programmable
is sprayed in motion to cover all-out area.
circuit board (often referred to as a microcontroller)
Keywords- Firefighting robot, Arduino Uno and a section of software, or IDE (Integrated
board, L293D Motor driver, Optical Flame sensor Development Environment) that can be executed on
I. INTRODUCTION computer.
A fire extinguisher robot is designed so that it can
self-guide on its own, has fire sensors interfaced in its
control unit part which detects the presence and intensity
of the fire and takes action consequently. In this
competitive world with advancement in technology it
has given rise to factories, office buildings and dense
studio flat blocks located in cosmopolitan areas. To
overcome such tough incidents. Robot advanced
innovative technology is introduced. This programmed
robot is directed to detect the fire intensity and head
towards controlling the fire at the newest place. Hence
for fire accidents applications this technology is used.
EMBEDDED SYSTEMS
Fig 1. Arduino Uno
As embedded systems have extensive libraries ROBOT
available, writing software would be a minor task.
Where computer and embedded system differ. For Real Place where human can't act this machine-driven
Time applications this Embedded System is preferable. robot is capable of carrying an outstanding series of
An embedded system is distinctive when gives maximum actions mechanically. It is reprogrammable with
accuracy and also ease in debugging. multifunctional schemer.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 31


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

OPTICAL FLAME SENSOR II. IMPLEMENTATION


A wide range of sensors are used for various However, there are many components and
applications This sensor is a sort of indicator which is technologies used to make the robotic technology to
designed to find and fighting on the incident of a fire. exist. The execution of the project comprises of two
parts.
1. Hardware
2. Software
HARDWARE ENACTMENT
This Machine Robot is built using a plywood
framework with desired base which owns stability and
strength. A chassis is built in such a way that the robot
has enough space to hold water and all the components
Fig 2. Flame Sensor
necessary for this project. Four dummy wheels are used
L293D MOTOR DRIVER for the chassis. At the bottom, two DC motors are fixed
A classic L293D is a Motor driver or Motor Driver on each side. Water tank is placed in between two
IC which empowers DC motor to start off over all plywood frames. The sensors have to be effectively
directions. placed in the front since they can't detect the presence
of fire. All the electric components are designed and
mounted on the PCB. The water pump is placed at the
center, such that it faces the fire.
SOFTWARE ENACTMENT
For the working of this Robot, a programmable
Arduino UNO is required. A low-cost interface
between high-level software and robot hardware is
provided using Arduino which is an open-source
implanted system
ARDUINO IDE
Fig 3. Pin Description of L293D
The inscription and assembling of the code in the
Arduino Module are done by open-source software,
IDE. It is formal Arduino software, where building the
code and collection is easy.

Fig 4. Overview of L293D

32 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Though Arduino stands as the main part of this


project, but for sensing of fire, we use the flame sensor
(Temp sensor). 0V (LOGIC-LOW) will be given if the
output pin (Do) during fire and if there is no fire the
output pin will be 5V (LOGIC-HIGH).
Three sensors are fixed, each in three directions so
as to detect the direction of fire. For the detection of
direction of fire, motors are assembled to move near
the fire by driving our motors through the L293D. A
water sprinkler is used to stop fire threat if fire is detected
anywhere nearby. A small container is arranged to carry
water, a 5V pump is also placed in the container to
control the direction in which the water has to be
sprayed. To control the connecting wire from
overheating and for binding the damage, a fan motor is
Fig 5. Arduino IDE overview
used, since a robot is largely based on industry and
trade matters.
III. WORKING
The prototype of the robot is shown below figure 7.

Fig 6. Architecture of firefighting robot

The ARDUINO is the main monitoring unit and is Fig 7. Prototype


associated to sense fire unit. Temperature sensor, smoke
IV. CONCLUSION
sensor, and gas sensor are taken into account by fire
sensing entity Figure 6. Tremendous damage and loss of human lives and
assets take place due to fire. Firefighting robots have
Motors and motor driving unit L293D can which is
been used in many countries to overcome such
controlled by program is also a part of the machine
destructive accidents.
robot unit. When the sensing unit data is above threshold
level i.e. high temp and smoke are detected, the filter To conclude, our solution is good for implementing
will be switched on. A filter pump, water tank, and the firefighting robot, as the prefabricated design line of
driver circuit are also parts of this unit. A battery of 12 attack made it easier to detect and extinguish fire. The
V is used for this machine robot. integration step is modest as the Arduino UNOs have
ensured it due to its wide-ranging uses. Thus, our final

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 33


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

model of robot can effectively find fire and extinguish 4. J. S. C. Bose, M. Mehrez, A. S. Badawy, W. Ghribi, H. Bangali,
and A. Basha, "Development and designing of firefighter robotics
the fire with the help of a water sprinkler pump without using cybersecurity," 2017 2nd International Conference on Anti-
running into any obstacles. Cyber Crimes (ICACC), Abha, 2017, pp. 118- 122. doi: 10.1109/
Anti-Cybercrime.2017.7905275
V. REFERENCES
5. B. S. Sampath, "Automatic fire extinguisher robot," 2011 8th
1. K. Altaf, A. Akbar, and B. Ijaz, "Design and Construction of an International Conference on Ubiquitous Robots and Ambient
Autonomous Fire Fighting Robot," 2007 International Conference Intelligence (URAI), Incheon, 2011, pp. 215-218. doi: 10.1109/
on Information and Emerging Technologies, Karachi, 2007, pp. URAI.2011.6145964
1-5. doi: 10.1109/ICIET.2007.4381341
6. S. Dearie, K. Fisher, B. Rajala, and S. Wasson, "Design and
2. J. Suresh, "Fire-fighting robot," 2017 International Conference construction of a fully autonomous fire fighting robot,"
on Computational Intelligence in Data Science(ICCIDS), Chennai, Proceedings: Electrical Insulation Conference and Electrical
2017, pp. 1-4. doi: 10.1109/ICCIDS.2017.8272649 Manufacturing and Coil Winding Conference (Cat.
3. A. Hassanein, M. Elhawary, N. Jaber and M. El- Abd, "An No.01CH37264), Cincinnati, OH, USA, 2001, pp.303-310. doi:
autonomous firefighting robot," 2015 International Conference 10.1109/EEIC.2001.96563.
on Advanced Robotics (ICAR), Istanbul, 2015, pp. 530-535.
doi: 10.1109/ICAR.2015.7251507

34 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Deep Learning Based Automatic Crack Detection Using


Convolutional Neural Networks
Mrs. R.Rani1, Ms.V.Leela Madhuri2, Mr. N. Niranjan3
1
Associate Professor, Dept of ECE, Vemu Institute of Technology, P Kothakota, Chittoor-517112.
2,3
UG Student, Dept of ECE, Vemu Institute of Technology, P Kothakota, Chittoor-517112.
Email: ranikps30@gmail.com1, venkiteelamadhu2000@gmail.com2, niranjanneerugattu@gmail.com3

Abstract - Crack plays an important role in the Pang-jo Chun, Shota Izumi, Tatsuro Yamane,
field of evaluating the quality of concrete structures. "Automatic detection method of cracks from concrete
For the concrete structures, cracks are frequently surface imagery using two-step light gradient boosting
encountered disease. It affects the safety, machine", 2020.
applicability and durability of the structure. At
present, pavement crack is detected by manual In this paper, they proposed a Light GBM method
method that has some disadvantages is replaced to detect the surface cracks and obtained an accuracy
by the deep learning method. Manual method of 97.6%.
consumes more time and man power. Here, a vision
based method using a deep-architecture of III. EXISTING METHOD
Convolutional Neural Networks for detecting This paper includes a method for detecting cracks
pavement cracks. based on the light gradient boosting machine (Light
Index Terms - Convolutional Neural Networks, GBM) which is a highly efficient gradient boosting
Image processing, GBM method, decision tree. Similar to other supervised machine
I. INTRODUCTION learning methods, the performance of Light GBM
depends on the feature set. In crack detection, the
To overcome the challenges in manual method, target pixel values and geometric features of cracks,
number of Image processing techniques are evolved to such as whether they are connected linearly, should be
manipulate the images. So, the existing methods are considered. In this study, the method for generating
not yet accurate due to the difficulty and complexity of features based on pixel values and geometric shapes in
the problem. Thus, more accurate and practical methods two stages. In the first stage, we propose a new method
should be developed. Here, the presented deep learning for generating features that explain the crack
method uses Discrete Wavelet Transforms to process characteristics using square and non square filters, which
the images. The CNN is mainly based on the 3 layers : could not be obtained in previous studies. Then, in the
input, hidden, output layers. The biggest challenge of second stage, the geometric characteristics of connected
automated crack detection is to consistently achieve components derived in the first stage are used as features
high performance under various complex environments. of Light GBM.
II. LITERATURE REVIEW
N. Hoang and Q. Nguyen, "A novel method for
asphalt pavement crack classification based on image
processing and machine learning," Engineering with
Computers, 2018.
In this they proposed a machine learning based
ANN algorithm for pavement crack detection. This
method has obtained accuracy of 84.25%. Fig. 1: Block Diagram of Existing Method.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 35


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. 4: Block diagram of Convolutional Neural Network


(proposed method)

Fig. 2: Crack detection results of Light GBM method


D. Algorithm of Proposed Method Training:
A. Results of Existing Method: Step 1: Choose the Image from the testing set.
• Accuracy = 96.6% Step 2: Resize the image pixels into 227×227 pixel.
Step 3: Extract the features like mean, standard
• Precision = 68.2% deviation, Skewness and kurtosis.
• Sensitivity = 75.7% Step 4: Train the Convolutional Neural Network
• Specificity = 95.6% (CNN).
B. Advantges: E. Algorithm of Proposed Method Testing:
• Less Memory. Step 1: Choose the Image from the testing set.
C. Disadvantages: Step 2: Resize the image pixels into 227×227 pixel.
• Sensitive to noise. Step 3: Extract the features like mean, standard
• It is an iterative algorithm deviation, Skewness and kurtosis.

IV. PROPOSED METHOD Step 4: Find the output of CNN.

Here, the proposed method is Deep learning based Step 5: Find TP, TN, FP, FN.
Convolutional neural networks using Alexnet. The Step 6: Find the performance parameters accuracy,
proposed CNN architecture contains mainly input layer, precision, sensitivity, specificity.
hidden layers and output layer. Table 1: Dataset of Crack and No crack Images

The hidden layers consist of many layers like Dataset Cracked Non-Cracked Total images
Convolutional layers, max-pooling layers, fully Images Images in the dataset
Training 250 100 350
connected layers, Rectified Linear Unit (ReLU) layer. Data
Alexnet consists of 5 Convolutional layers and 3 fully Testing Data 50 50 100
connected layers. Total 300 150 450
Table 2: Confusion Matrix

Confusion Matrix Crack(Predicted) No Crack


(Predicted)
Crack(Actual) 48 2
No Crack(Actual) 0 50
F. PERFORMANCE PARAMETERS OF
PROPOSED METHOD:
Crack is defined as positive class, No Crack is
defined as negative class.
Fig. 3: Block diagram of proposed method

36 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

True Positives (TP): Correctly predicts the positive


class.
False Positives(FP): Incorrectly predicts the positive
class.
True Negatives (TN): Correctly predicts the negative
class.
False Negatives (FN): Incorrectly predicts the
negative class.
Table 3: TP, TN, FP, FN values Fig. 6: Example of images in the dataset. Sample size is
227×227 pixel(This patch shows negative samples)
True positives(TPs) :48 False positives(FPs) : 2
FalseNegatives(TNs) :0 True Negatives(TNs) : 50 V. RESULTS
Accuracy: The percentage of number of correct Existing Method Results:
positive predictions out of total images.
= [(TP + TN) / (TP + TN + FP + FN)]×100 =
98%
Precision: It defines "what proportion of positive
predictions were actually correct" = [TP / (TP + FP)]
×100 = 96%
Sensitivity: It defines "what proportion of actual
positives were predicted correctly" = [TP / (TP + FN)]
×100=100%
Specificity: It defines "what proportion of actual
negatives were predicted correctly" = [TN / (FP + TN)]
× 100
= 96.15%

Fig. 7: Experimental Results of Images


a) Original Image, b)Contrast image, c) Gray conversion
Image

Fig. 5: Example of images in the dataset. Sample size is


227×227 pixel (This patch shows positive samples)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 37


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

SOFTWARE TOOLS REQUIREMENTS:


• Simulation Tools : MATLAB R2019b
• Operating System : Windows 7
Parameters Existing Proposed
Method Method
Accuracy (%) 96.6 98
Precision (%) 68.2 96
Sensitivity (%) 75.7 100
Specificity (%) 95.6 96.15
Table 4: Comparison of parameters of Existing & proposed
Methods

VI. CONCLUSION AND FUTURE SCOPE


CONCLUSION:
In this paper, an efficient architecture based on
Convolutional Neural Network (CNN) is described
for the automated detection of pavement cracks. This
Fig. 8: Experimental results of image'd) Segmentation Image, study reveals that applications of deep-learning
e) & f) Filtered Image techniques may provide much better solutions than
traditional crack detection algorithms. CNN can
produce high classification accuracy in an acceptable
real-time execution
FUTURE SCOPE:
Future work for this paper includes the development
of Autonomous Robot System (ARS) that consists of
lightweight CNN, Wi-Fi Camera and GPS sensor that
can be executed online to detect pavement cracks.
Building a GUI will give better performance to analyze
the detection and analysis of pavement.
VII. REFERENCES
[1] Zheng-zheng Wang, Chao Su, Wenjun Wang, "Concrete Cracks
Detection Using Convolutional Neural Network Based on
Transfer Learning" Mathematical Problems in Engineering,
Volume 2020.
[2] X. Yang, H. Li, Y. Yu, X. Luo, T. Huang, and X. Yang, "Automatic
pixel-level crack detection and measurement using fully
convolutional network," Computer-Aided Civil and Infrastructure
Engineering, vol. 33, no. 12, pp. 1090-1109, 2018.
[3] Y. J. Cha, W. Choi, and O. Büyüköztürk, "Deep learning? based
crack damage detection using convolutional neural networks,"
Computer? Aided Civil and Infrastructure Engineering, 32(5),
pp. 361-378, 2017.
[4] Y. J. Cha, W. Choi, and O. Büyüköztürk, "Deep learning-based
Fig. 9: Experimental results of image d) Segmentation Image, crack damage detection using convolutional neural networks,"
e) & f) Filtered Image Computer- Aided Civil and Infrastructure Engineering, vol. 32,
no. 5, pp. 361-378, 2017.

38 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[5] Y. lecun, y. bengio, and g. hinton, "deep learning," nature, vol.


521, no. 7553, pp. 436-444, 2015.
[6] R.Rani,"A Novel Approach on Improve Image De-blurring on
RGB Images" in IJMECE,VOL:7,ISSN:2321 2152,Issue
no:3,May 2019.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 39


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Implementation of Red Sandalwood Protection Based


on Advanced Microcontroller System
G. Sivakoteswarrao1, Y. Murali2
1
Dept of ECE, Vemu IT, P.Kothakota
2
Dept.of ECE, MREC, Hyderabad

Abstract: Background and Objective: This around exorbitant. These are for the most part helpful
research article has proposed that to find the in the therapeutic sciences just as beautifying agents.
smuggling activities in the thick forest area. Our Because of huge amount of money involved in selling
life is dependent upon trees. There is a long of such tree woods and lots of incidents are happening
association of man and trees. Since the hoary past
of cutting of tree and their smuggling. This issue isn't
man and trees have been the two major creations
of Nature. In his prehistoric days man turned to
identified with India just, in China, Australia and African
trees and plants to collect the things vitally nations are additionally battling with same issues. Placing
necessary for his existence. Since that time man cost at the top of the priority list, Indian sandalwood
and trees have been interdependent, though man costs 12000 to 13000 INR for every kg though in global
is more indebted to trees. Amongst the variety of market Red Sanders order a high cost of INR 10 center
flora available on the planet, "SANDALWOOD" for every ton. The Indian sandalwood tree has turned
is one of the most costly as well as less available out to be jeopardized as of late, and trying to control
trees. They are useful in medical sciences and its conceivable eradication the Indian government is
cosmetics. From the past few years, we are finding attempting to restrict the exportation of sandalwood.
that the newspapers and news channels are For an individual, most extreme passable buy limit isn't
frequently filled with news regarding the smuggling
to surpass 3.8kg according to Govt. The tree is as of
activities. Since they are costly, smugglers
allegedly cut down many of these trees and
now government controlled, and evacuation is
transport them to their factories for commercial disallowed whether on private or sanctuary grounds
purposes. until the tree is thirty years of age. But even though
some corner of newspaper shows us the same title.
Methodology: Anti-smuggling system is a
measure that has been taken to stop these 2. SYSTEM IMPLEMENTATION
smuggling activities using GSM module and Metal
Embedded system includes mainly two sections, they
Detector sensor, IR Sensor, MEMS Sensor. All
these modules are interfaced with Raspberry pi.
are

Keywords: Raspberry pi 3, GSM module and 1. Hardware


MEMS Sensor. 2. Software
1. INTRODUCTION Embedded System Hardware:
Forests constitute approximately 30 % of the global As with any electronic system, an embedded system
land area. They give natural surroundings to the two requires a hardware platform on which it performs the
people and a few animal types that share the profitable operation. Embedded system hardware is built with a
environment's merchandise. Dealing with woodland has microprocessor or microcontroller. The embedded
turned into an amazingly hard undertaking. Illicit logging system hardware has elements like input output (I/O)
speaks to one of the greatest difficulties of woods interfaces, user interface, memory and the display.
maintainability. For a long time we are perusing in the Usually, an embedded system consists of:
papers about pirating of the tress. These trees are all
40 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Microprocessor
CPU on a chip.
We can attach required amount of ROM, RAM and
I/O ports.
Expensive due to external peripherals.
Microcontroller
Computer on a chip fixed amount of on-chip ROM,
RAM, I/O ports Low cost.
Embedded System Software:
The embedded system software is written to perform
a specific function. It is typically written in a high level
Power Supply format and then compiled down to provide code that
Processor can be lodged within a non-volatile memory within the
hardware. An embedded system software is designed
Memory to keep in view of the three limits:
Timers Availability of system memory
Serial communication ports Availability of processor's speed
Output/Output circuits When the system runs continuously, there is a need
System application specific circuits to limit power dissipation for events like stop, run and
Embedded systems use different processors for its wake up.
desired operation. Some of the processors used are Implementation flow:
Stage 1:
Considering the problems of existing methods and
giving solution to that problem by considering the basic
requirements for our proposed system
Stage 2:
Considering the hardware requirement for the
proposed system
For this we need to select the below components:
1. Microcontroller
2. Inputs for the proposed system (ex: sensors,
drivers etc..,)
3. Outputs (ex: relays, loads)
Stage 3:
Figure 2: Block diagram of embedded system After considering hardware requirements, now we
1. Microprocessor need to check out the software requirements. Based
2. Microcontroller on the microcontroller we select there exists different
software for coding, compiling, debugging. we need to
3. Digital signal processor
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 41
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

write source code for that proposed system based on WORKING:


our requirements and compile, debug the code in that • Every tree will be armed with one small electronics
software . unit which consists of Micro Controller, Mems
After completing all the requirements of software Accelerometer Sensor, PIR sensor, metal detector
and hardware we need to bring both together to work and IOT modem Interfaced with Raspberry Pi
our system. For this we need to burn our source code module.
into microcontroller, after burning our source code to • Tree cutting will be noticed by Server unit, cutting
microcontroller then connect all input and output trees will be shown in Data base communication
modules as per our requirement. among the trees and server will be done by IOT
modem.
BLOCK DIAGRAM OF THE PROPOSED
SYSTEM: • It alerts the near by control room that the tree getting
smuggled.
In case of failure or any disturbance occurred to the
system the alert will be sent to control system The fig
shows the flow diagram for proposed system illustrates
that sensing module is divided into three streams
1) Metal detection
2) Motion detection.
1. Starts the process and sense the sensor inputs If the
Metal is detected (Metal Detector sensor) then it
fetches the geographical location (latitude and
longitude) using GPS tracker. Then sends the alert to
forest officials in the form of text message to their
mobile phones and\ captured images to Gmail. It also
updated in the IOT cloud server webpage for every
30 seconds.
The above figure shows the block diagram ofthe
project mainly consists of three blocks a tree block, a 2. If motion is detected (PIR sensor) then it works on
the next step. It reports the tree status and also checks
server and controlling data base block and web App
whether there is a vibration on the tree.
as shown in the block diagram. The tree block is
connected to all the trees where it is having a centralized Now with the exact geo location it sends the message
microprocessor interfaced with a Mems sensor on the alert to the mobile phone and also Captured images to
body of a tree.When Whenever anybody tries to cut Gmail and updates the data in the IOT webpage.
the tree then the sensor senses the variation and sends 3. CONCLUSION
the information to processor. The purpose of this is to save valuable trees which
Upon receiving the signal the processor track the have high demand in market like Sagwaan, Sandalwood
location of that tree and the predefined ID number and etc. These trees are very costly as well as less available
send the information to server using IOT modem which in the world. These are use in the medical sciences as
is inbuilt in Raspberry Pi. The server sends the data to well as cosmetics. Because of huge amount of money
web app provided to Govt. officials to keep the track involved in selling of such tree woods lots of incidents
of it. In addition with sending the data to nearest base are happening of cutting of trees and their smuggling.
station the information will also be sent the Web app. Here we have developed a system which prevents the
smuggling of valuable trees and save the money of
nation.
42 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

4. REFERENCES
[1] Mr.V.Narasimman Asst. Prof, Anand.M, Anandha kumar.C,
Krishnan.T "Design of a WSN node for forest trees against
poaching", 978-93-87793-11-8, ICAETS-2018.
[2] Santhosh Hebbar, Praveenraj Pattar, Rajeshwari Madli,
Varaprasad Golla, "Sandalwood Tree Protection Using Bluetooth
Version 4.0", Conference on Computing and Network
Communications, 978-1-4673-7309- 8/15/$31.00 ©2015 IEEE.
[3] Prof. Mhaske D.A. , Bhabad Vishnu S., PathareSagar A.
"Antismuggling System for Trees in Forest using Flex Sensor
with GSM & Zigbee Network", International Journal of
Advanced Research in Computer and Communication.
Engineering Vol. 5, Issue 4, April 2016.
[4] Mohan Sai.S, Naresh K, RajKumar.S, Mohan Sai Ganesh, LokSai,
Abhinav "An Infrared Image detecting System model to monitor
human with weapon for controlling smuggling of Sandalwood
Trees", International Conference on Inventive Communication
and Computational Technologies.
[5] Prof. P. G. Salunkhe, Poonam U. Chaudhari "Design of WSN
Node For Protection Of Forest Trees Against Poaching Based
MSP430", International Conference On Advances in
Communication and Computing Technology (ICACCT),978-1-
5386-0926-2/18/$31.00 ©2018 IEEE.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 43


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The Mobile Personal Health Management System: A


Research Study
G. Ramachandran1, S. Kannan2
1,2
Assistant Professor, Department of Electronics and Communication Engineering, Vinayaka
Mission's KirupanandaVariyar Engineering College, Vinayaka Mission's Research Foundation
(Deemed to be University), Salem, Tamil Nadu, India

Abstract -This study establishes a system home-based, and institution-based care, as well as an
structure of mobile personal health management, integrated healthcare information platform. The general
which is separated into three components, based public could benefit from healthcare teams' health and
on the demand characteristics of distant care. daily life services as a result of this programme. This
network health information management system,
also enables for continued service in the event of a
blood pressure blood glucose pulse machine, radio
frequency identification (RFID) system. Users can model transfer. Telecare is defined as the remote
use the finished mobile personal health delivery of healthcare and social services to clients in
management system to perform physiological their homes, communities, or institutions via
measurements and numerical upload records telecommunication and information technology.
anytime, anyplace, and to simply retrieve a list of Technology for computers .[1] Remote healthcare was
personal health measurement records using a tablet developed in the mid-twentieth century as a response
or smart phone using the wireless network to changes in medical needs and high medical costs
environment. And, when combined with the record among an ageing population, as well as changes in illness
and analysis of network health information type.[2] In current practise, remote healthcare is critical
management, the analysis chart, the measurement for reducing medical personnel needs and realising
data of this system is measured and transmitted,
personalised health management. It's also one of the
can improve the immediacy and accessibility of
long-term and long-distance care, as well as simplify most crucial aspects of the digital health business.
the medical services process. Concalls or remote communication are utilised in
Telecare.promote contact between patients and
Keyword:- Remote care, health management
healthcare providers who are separated by geography
system, radio frequency identification, wireless
.[3] It enhances the healthcare and supportive services
network environment.
for ageing populations or chronic patients in rural or
1. INTRODUCTION underserved locations .[4]
The average lifetime has been growing as a result of The key to building an integrated home care service
recent advances in medical and information technology. using home-based Telecare is to connect medicine, care,
According to data from the Ministry of Interior's and everyday life resources. A technology-based care
Department of Statistics, the old population in Dec 2019 service network is being built for clients in their homes
was 3.34 million (15.1 percent of the overall population), or for care service providers, and a lot of effort is being
and it is continually growing. The Ministry of Health put into developing daily life support services through a
and Welfare has been working on long-term care cross-industry collaboration to bring care services into
regulations and remote healthcare service programmes the home. This enables the general population to use
in recent years. For example, under the Ministry's care services in all aspects of their lives and realises
Telecare Pilot Program .Three models of care were Telecare's technology-based administration.
developed using a combination of healthcare and Meanwhile, due to concerns with information device
information technology, including community-based,
44 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

accessibility, the integrated use of computer networks looked into the use of these small, easy-to-carry mobile
and medical information may result in digital divides .[5] gadgets in the health-care system. For example, they
The competent authorities must therefore devise enable quick access to nutritional information and
solutions such as rapid advancements in wireless calorie intake, as well as calories expended during
networks and communications technology with the activity and automatic calorie computation. Depending
addition of new software, hardware, and network on personal needs, food intake increases or decreases.
equipment, as well as improved information skill training. personal physiological history as the foundation of
The Ministry of Education, for example, has established diagnosis, facilitating personal data input at hospital/clinic
over a hundred digital opportunity centres across the visits, and providing personal health information with
country to increase computer and network skills. reference to diet, exercise, and medication use They're
Accessibility has improved as information equipment also utilised to construct home care need assessment
has improved, as has residents' acceptance of scales, which aid in decision-making in the field. Care
information technology in mountainous or rural places. professionals can record a patient's condition with just
The personal health record (PHR) is a network-based a few taps on the device screen by putting the most
technology that allows members of the public to access often used nursing record sheets into the simulated
and coordinate their health information, as well as remote platform of mobile devices.
designate sections of it to be shared with those who 2. ANALYZE THE SYSTEM
are in need. PHR provides an integrated view of a
patient's health information, including data from the In this study, the mobile personal health management
general public, such as symptoms and prescription use, system includes hardware and software study
as well as data from physicians, such as diagnoses, test instruments. As far as the software goes, it's a
results, and data from pharmacies and insurance management package. Among the devices investigated
companies. Users can access their PHR online at any are: 1.a gadget for measuring blood pressure, blood
time and from anywhere using a system that uses the sugar, and pulse, 2.three. mobile devices The software
most up-to-date security and privacy protection management applications comprise 1. RFID tag; 2. A
technologies, and their family, physician, and nurse can system for identifying and managing mobile devices.3.
view portions of their PHR.PHR can also be used by a PHR management system Information system for
emergency room professionals to get key information health and medicine. The user or care provider uses
at critical times. PHR allows patients to gain a better the mobile personal health management system to
understanding of their sickness and health state, which collect blood pressure, blood glucose, pulse rate, and
enhances patient satisfaction. Participation and other physiological indicators, then verify identity using
adherence Although Radio Frequency Identification the RFID system in the devices. The measurement data
(RFID) was invented in 1969, its application in all can be sent by Bluetooth tethering to mobile device
industries would not be determined for another thirty management systems, and ultimately to an online
years. Mobile gadgets, such as smart phones and database server via a 4G or Wi-Fi wireless network.
tablets, compete in terms of convenience, power The online physiological data management platform
efficiency, and use on the go, with a significantly different saves user data and sends it to patients, their authorised
target audience than desktop PCs (a more traditional family and/or friends, or clinicians as physiological health
source of information). However, high-speed, complex reference data in real time. The health and medical
calculations still necessitate the use of desktop or information site system also provides relevant health
notebook computers. Mobile devices have become suggestions in a timely manner. A sphygmomanometer
more adaptable in areas such as banking, network is a blood pressure measuring instrument. Mercury,
communication, healthcare, bibliographies, eBooks, and electrical, and aneroid devices are the most common
recreation, as well as smaller and lighter to make them types of such devices currently accessible (dial).
easier to carry around .[6] Numerous research have Electronic sphygmomanometers not only measure
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 45
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

blood pressure but also pulse rate and save daily data measurement records are listed below. Account,
to allow for long-term monitoring of these variables. password, access control, tester RFID number, storage
The cuffs of mercury and dial sphygmomanometers are and categorization of test values such as systolic and
wrapped around the arm for this measurement, while diastolic pressure, pulse rate, blood glucose, and test
the cuffs of electronic sphygmomanometers may be time/date are all included in the personal health
wrapped around the arm or wrist. The wrist type is information management system (Fig. 3).
smaller and easier to carry, but it is less accurate than
the arm type. Blood glucose is usually checked using a
glucose strip and a glucose metre. A glucose strip is a
sophisticated glucose bio-detector that is used in
conjunction with a blood glucose analyzer to determine Fig 3 The server flow chart for the health management
network
blood glucose levels using electrochemistry principles.
The sampling volume can be as little as 1.5 litres using Users can access and query about personal health
a sampling technique based on capillary tubes. To begin information and test records via the operating interface
testing, the user does not required to press any buttons; and test data listings, which are built as web sites. The
instead, they must insert the strip. healthcare information website system's key functions
are as follows: 1.Introduces the operation of
3. SOFTWARE FOR THE MANAGEMENT measurement devices used in the mobile personal health
PROGRAM SYSTEM: management system, as well as providing a video
A. Identity management system: A management example of how to use them. Provides the user with
programme app for mobile devices that includes an the suggested ("healthy") basic blood pressure, blood
NFC Reader and an RDIF card to identify the user. It glucose, and pulse rate reference ranges 3. Users can
can receive measurement data from blood pressure, get related medical information and health news.
blood glucose, and pulse rate metres via Bluetooth Provides a mechanism for customers to contact
tethering and then send it to an online personal health healthcare practitioners, such as by e-mail 5.Manages
information management system via 4G or Wi-Fi. the membership. The healthcare information website
Personnel management is at the heart of the system.The system has a about us page, normal ranges of health
user management section allows the user to inquire, add, examination, sitemap, medical information, contact us,
alter, or delete information such as name, date of birth, and member centre, as illustrated in Figure 4. The
sex, and RFID number.To avoid the requirement for website's design and user experience are simple to
future data addition, RFID reading just requires a one- comprehend.
time setting. An RFID identity verification is required 4. CONCLUSION
to upload blood pressure and glucose data to an internet
server ( Fig. 2). Users can utilise mobile devices to The technology allows consumers to undertake
access management system interfaces, the system menu, testing at home or have testing administered by
and personal management. healthcare providers, according to this study. Basic
physiological measures such as blood pressure, blood
The user interface is simple and intuitive.B.System glucose, and pulse rate are among the tests provided.
for managing personal health information: A network The technology verifies user identity using radio
application administration system based on a distant frequency identification (RFID) and permits data transfer
server. Its principal roles are as follows: 1.Data to mobile devices via Bluetooth tethering. Physiological
administration and upkeep for users 2.Management of parameter data from mobile devices, such as blood
user accounts, passwords, and RFID cards 3.Data on pressure and blood glucose, can be uploaded to an
blood pressure, blood glucose, and pulse rate are internet database. with a wireless network of 4G or
recorded and transferred. User physiological WiFi. The online physiological information management

46 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

platform saves user data and sends it to patients, their [3] Kovner, R., Hardy Havens, D. M. (1996). Telemedicine: Potential
Applications And Barriers To Continued Expansion. Journal Of
authorised family and/or friends, or clinicians as Pdiatric
physiological health reference data in a timely manner.
[4] Bagayoko, C. O., Muller, H., Geissbuhler, A. (2006). Assessment
5. REFERENCES Of Internet-Based Tele-Medicine In Africa (The RAFT Project).
Computerized Medical Imaging And Graphics Vol. 30, 407-416.
1] Burtt, K. (1997). Nurses use telehealth to address rural health
care needs. prevent hospitalizations. American Nurse, 29(6), 21. [5] Fuchs, C., Horak, E. (2008). Africa and the digital
divide.Telematics and Informatics Vol. 25, 99-116.
[2] Crist, T., Kaufman, S., Crampton, K. (1996). Home
telemedicine:A home health care agency strategy for maximizing
resources.Home Health Care Management & Practice, 8(1), 9.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 47


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Identification of Heart Disease Using Machine Learning


in E-Healthcare
Mr. G. Siva Koteswara Rao1, Mr. Y. Murali2, Ms. S. Aiyesha3
1
Assistant Professor, Dept.of ECE, VEMU IT, Chittoor
2
Assistant Professor, Dept.of ECE, Malla Reddy Engineering College, Hyderabad.
3
UG Student, Dept. of ECE, VEMU IT, Chittoor.
Email: gskrvit@vemu.org1, muraliy85@gmail.com2

Abstract: Heart disease, alternatively known as effective in improving the prediction accuracy of
cardiovascular disease, encases various conditions weak classifiers, and exhibit satisfactory
that impact the heart and is the primary basis of performance in identifying risk of heart disease. A
death worldwide over the span of the past few maximum increase of 8% accuracy for weak
decades. It associates many risk factors in heart classifiers was achieved with the help of ensemble
disease and a need of the time to get accurate, classification. The performance of the process was
reliable, and sensible approaches to make an early further enhanced with a feature selection
diagnosis to achieve prompt management of the implementation, and the results showed significant
disease. It is used in solving many problems in data improvement in prediction accuracy.
science. One common application of machine
Keywords: Heart Disease Classification,
learning is the prediction of an outcome based upon
Feature Selection, Disease Diagnosis, Medical
existing data. The machine learns patterns from
Data Analytics.
the existing dataset, and then applies them to an
unknown dataset in order to predict the outcome. I. INTRODUCTION
Classification is a powerful machine learning
One of the prominent diseases that affect many
technique that is commonly used for prediction.
Some classification algorithms like Support vector people during middle or old age is heart disease, and in
machine(SVM), Logistic regression and Random many cases it eventually leads to fatal complications.
forest predict with satisfactory accuracy, whereas Heart diseases are more prevalent in men than in women.
others exhibit a limited accuracy. This paper According to statistics from WHO, it has been estimated
investigates a method termed random forest that 24% of deaths due to non-communicable diseases
classification, which is used for improving the in India are caused by heart ailments. One-third of all
accuracy of weak algorithms by combining multiple global deaths are due to heart diseases. Half of the
classifiers. We also proposed Novel fast conditional deaths in the United States and in other developed
mutual information feature selection algorithm to countries are due to heart ailments. Around 17 million
solve feature selection problems. Experiments with people die due to cardiovascular disease (CVD) every
this tool were performed using a heart disease
year worldwide, and the disease is highly prevalent in
dataset. A comparative analytical approach was
done to determine how the ensemble technique Asia . The Cleveland Heart Disease Database (CHDD)
can be applied for improving prediction accuracy is considered the de facto database for heart disease
in heart disease. The focus of this paper is not only research .
on increasing the accuracy of weak classification Age, sex, cholesterol, high blood pressure, intake
algorithms, but also on the implementation of the are considered to be risk factors for heart disease, and
algorithm with a medical dataset, to show its utility
hereditary risk factors such as high blood pressure and
to predict disease at an early stage. The results of
the study indicate that ensemble techniques, such
diabetes also lead to heart disease. Some risk factors
as random forest and logistic regression are are controllable. Apart from the above factors, lifestyle
habits such as eating habits, physical inactivity, and
48 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

obesity are also considered to be major risk factors. due to the Liver Problem. The healthcare industry
There are different types of heart diseases such as collects a huge amount of data which is not properly
coronary heart disease, angina pectoris, congestive heart mined and not put to the optimum use. Discovery of
failure, cardiomyopathy, congenital heart disease, these hidden patterns and relationships often goes
arrhythmias, and myocarditis. It is difficult to manually unexploited. Our research focuses on this aspect of
determine the odds of getting heart disease based on Medical diagnosis by learning pattern through the
risk factors. However, machine learning techniques are collected data of Liver disorder to develop intelligent
useful to predict the output from existing data. Hence, medical decision support systems to help the physicians.
this paper applies one such machine learning technique In this paper, we propose the use decision trees J48,
called classification for predicting heart disease risk from Naive Bayes, ANN, ZeroR, 1BK and VFI algorithm
the risk factors. It also tries to improve the accuracy of to classify these diseases and compare the effectiveness,
predicting heart disease risk using a strategy termed correction rate among them. Detection of Liver disease
ensemble. in its early stage is the key of its cure. It leads to better
II. LITERATURE SURVEY performance of the classification models in terms of their
predictive or descriptive accuracy, diminishing of
[1]Rohit Murty, Satish Patle, Saurabh Bute, Sneha computing time needed to build models as they learn
Bhilkar, Durga Wanjari "Prediction of heart faster, and better understanding of the models. In this
disease by using machine learning",
paper, a comparative analysis of data classification
International Journal of All Research Writings,
ISSN (O) - 2582-1008, June 2020, Vol. 1 Issue.
accuracy using Liver disorder data in different scenarios
12. is presented. The predictive performances of popular
classifiers are compared quantitatively.
With the rampant increase in the heart stroke rates
at juvenile ages, we need to put a system in place to be [3] Smriti Mukesh Singh1, Dr. Dinesh B.
Hanchate2, "Improving Disease Prediction by
able to detect the symptoms of a heart stroke at an
Machine Learning", International Research
early stage and thus prevent it. It is impractical for a Journal of Engineering and Technology
common man to frequently undergo costly tests like (IRJET), Volume: 05 Issue: 06 | June-2018.
the ECG and thus there needs to be a system in place
which is handy and at the same time reliable, in predicting These days utilization of Big Data is expanding in
the chances of a heart disease. Thus, we propose to biomedical and human services groups, exact
develop an application which can predict the investigation of medicinal information benefits early
vulnerability of a heart disease given basic symptoms malady discovery, quiet care and group administrations.
like age, sex, pulse rate etc. The machine learning Fragmented therapeutic information lessens examination
algorithm neural networks has proven to be the most precision. The machine learning calculations are
accurate and reliable algorithm and hence used in the proposed for successful expectation of ceaseless
proposed system. infection. To beat the trouble of deficient information,
Genetic algorithm will be utilized to remake the missing
[2]Tapas Ranjan Baitharua, Subhendu Kumar information. The dataset comprises of structured data
Panib, "Analysis of Data Mining Techniques For
and unstructured data. To extract features from
Healthcare Decision Support System Using
Liver Disorder Dataset", International
unstructured data RNN algorithm will be utilized.
Conference on Computational Modelling and Framework proposes SVM calculation and Naive
Security (CMS 2016) Procedia Computer Bayesian calculation for sickness expectation utilizing
Science 85 (2016) 862 - 870. unstructured and structured information individually
from hospital information. Community Question
Accuracy in data classification depends on the
Answering (CQA) system is additionally proposed
dataset used for learning. Now-a-days the most
which will foresee the inquiry and answers and will give
important cause of death for both men and women is
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 49
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

proper responses to the clients. For that, two research, particularly in Heart Disease prediction. This
calculations are proposed KNN and SVM. KNN paper has analysed prediction systems for Heart disease
algorithm will perform classification on answers and using a greater number of input attributes. The system
SVM calculation will perform classification on answers. uses medical terms such as sex, blood pressure,
It will help client to discover best inquiries and answers cholesterol like 13 attributes to predict the likelihood
identified with infections. of patient getting a Heart Disease. Until now, 13
[4] Abhishiek Taneja, "Heart Disease Prediction attributes are used for prediction. This research paper
System Using Data Mining Techniques" added two more attributes i.e., obesity and smoking.
IRJCST, ISSN: 0974-6471 Online ISSN: 2320- The data mining classification techniques, namely
8481 - 2015. Decision Trees, Naive Bayes, and Neural Networks
are analyzed on Heart Disease database. The
In today's modern world cardiovascular disease is
performance of these techniques is compared, based
the most lethal one. This disease attacks a person so
on accuracy. As per our results accuracy of Neural
instantly that it hardly gets any time to get treated with.
Networks, Decision Trees, and Naive Bayes are 100%,
So diagnosing patients correctly on timely basis is the
99.62%, and 90.74% respectively. Our analysis shows
most challenging task for the medical fraternity. A wrong
that out of these three classification models Neural
diagnosis by the hospital leads to earn a bad name and
Networks predicts Heart Disease with highest accuracy.
loosing reputation. At the same time treatment of the
said disease is quite high and not affordable by most of III. EXISTING METHODOLOGY
the patients particularly in India. The purpose of this SUPPORT VECTOR MACHINE (SVM)
paper is to develop a cost-effective treatment using data
mining technologies for facilitating data base decision Support vector machine is the one of the machine
support system. Almost all the hospitals use some learning algorithms. The support vector machine is a
hospital management system to manage healthcare in supervised learning algorithm. The SVM is used to
patients. Unfortunately, most of the systems rarely use classify the given data. The algorithm uses a hyper-plane
the huge clinical data where vital information is hidden. to differentiate the different classes. SVM is also used
As these systems create huge amount of data in varied for the regression analysis. SVM classify the both linear
forms but this data is seldom visited and remain and non linear data.
untapped. So, in this direction lots of efforts are required SVM (having a pre- defined target variable) it is
to make intelligent decisions. The diagnosis of this used as a classifier as well as a predictor. For
disease using different features or symptoms is a classification, it finds a hyper-plane in the feature space
complex activity. In this paper using varied data mining that differentiates between the classes. An SVM model
technologies an attempt is made to assist in the diagnosis represents the training data points as points in the feature
of the disease in question. space, mapped in such a way that points belonging to
[5] Chaitrali S. Dangare, Sulabha S. Apte "Improved separate classes are segregated by a margin as wide as
Study of Heart Disease Prediction System using possible. The test data points are then mapped into
Data Mining Classification Techniques", that same space and are classified based on which side
International Journal of Computer Applications, of the margin they fall.
DOI:10.5120/7228-0076 , Corpus ID: 4996681
- 2016.
The Healthcare industry is generally "information
rich", but unfortunately not all the data are mined which
is required for discovering hidden patterns & effective
decision making. Advanced data mining techniques are
used to discover knowledge in database and for medical
50 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IV. MATERIALS AND METHODS


A. DATA SET
Cleveland Heart Disease dataset is considered for
testing purpose in this study. During the designing of
this data set there were 303 instances and 75 attributes,
however all published experiments refer to using a
subset of 13 of them. In this work, we performed pre-
processing on the data set, and 6 samples have been
Figure 1: Support Vector Machine
eliminated due to missing values. The remaining samples
ALGORITHM FOR SUPPORT MACHINE of 297 and 13 features dataset is left and with 1 output
VECTOR label. The output label has two classes to describe the
• Step 1 : Import the dataset. absence of HD and the presence of HD. Hence features
matrix 297*13 of extracted features is formed.
• Step 2 : Explore the data to figure out what they look
Table 2: List of attributes which are used in the Input Dataset
like.
• Step 3 : Pre-process the data.
• Step 4 : Split thed ata into attributes and labels.
• Step 5 : Divide the data into training and testing sets.
• Step 6 : Train the SVM Algorithm.
• Step 7 : Make some predictions
FEATURE SELECTION
Feature selection is the process where you
automatically or manually select those feature which
contribute most to your prediction variable or output in B. PRE-PROCESSING OF DATA SET
which your interested in. Having irrelevant feature in The pre-processing of dataset required for good
your data can decrease the accuracy of the model and representation. Techniques of pre-processing such as
make your model learn based on irrelevant. removing attribute missing values, Standard Scalar (SS),
FEATURE SELECTION METHODS Min-Max Scalar have been applied to the dataset.
There are 3 feature selection techniques that are V. PROPOSED METHODOLOGY
easy to use and also gives good results
1. Univariate selection
2. Feature selection
3. Correlation matrix with Heat map
Table 1: Results of Existing Method

S. No Existing method Accuracy Figure 2: Block Diagram of Proposed Heart Disease


1. Feature Selection 66% Identification System

2. Support Vector Machine 80.41% LOGISTIC REGRESSION


Logistic Regression is one of the most popular
Machine Learning algorithms, which comes under the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 51
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Supervised Learning techniques. It is used for predicting Instead of relying on one decision tree, the random
the categorical dependent variable using a given set of forest takes the prediction from each tree and based
variables. Logistic Regression predicts the output of a on the majority votes of predictions, and it predicts the
categorical dependent variable. Therefore, the outcome final output. The greater number of trees in the forest
must have be a categorical or discrete value. It can be leads to higher accuracy and prevents the problem of
either Yes or No, 0 or 1, true or false, etc. but instead over fitting.
of giving the exact value as 0 and 1, it gives the
probabilistic values which lie between 0 and 1.

Figure 4: Random Forest Simplified

a) Training process of Random Forest Classifier


Figure 3: Sample Graph of Logical Regression using Bagging Method
a) Training Process of Logical Regression Step 1: Select the randomly sample data from the
Step 1: Read the data from the training set. training dataset.

Step 2: The data is pre-processed. Step 2: Construct several instances to be used


repeatedly for the training set where we are sampling
Step 3: Fit the logistic regression model to Training with the replacement.
set.
Step 3: Fitting a model to these training datasets
Step 4: Train the system with the sufficient Data and a decision tree to each.
Step 5: Evaluate the model. Step 4: Predicting the results.
b) Testing Process of Logical Regression b) Testing process of Random Forest Classifier
Step 1: Read the data from the testing process. using Bagging Method
Step 2: The data is being pre-processed. Step 1: Select the data from test set.
Step 3: Predicting the test results with Training data Step 2: Consider the dataset construct a decision
tree for every sample, and then get the prediction result
Step 4: By Confusion Matrix, calculating the
from every decision tree.
accuracy of the test results.
Step 3: Then voting is performed for every predicted
Step 5: Visualizing the test set results.
result.
RANDOM FOREST
Step 4: At last, select the most voted prediction
Random forest is a classifier that contains a number result as the final prediction result.
of decision trees on various subsets of decision trees
on various subsets of the dataset and takes the average
to improve predictive accuracy of that dataset.

52 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

• Comparison table between existing method and


proposed method:

Figure 5: Results of Proposed Method

VI. RESULTS AND DISCUSSION


Figure 6: Comparison between Existing Method & Proposed
There are so many machine learning algorithms to Method
check whether has heart disease or not for the people. VII. CONCLUSION & FUTURE SCOPE
Here, the Logistic Regression, K-Nearest Neighbors,
Random Forest, XGBoost algorithms for the prediction Conclusion:
process were used. After applying various algorithms, it can be said that
• The dataset which is the input of proposed machine learning is proving to be extremely valuable in
system shown below: predicting heart disease which is one of the most
prominent problems of the society in today's world.
The algorithms such as Logical Regression and
Random Forest are used in this experiment have
performed really well using the available attributes and
the accuracy of the predicting system also improved.
Thus another innovative touch of our study to used
features selection algorithms to selects the appropriate
features that improve the classification accuracy as well
as reduce the processing time of the diagnosis system.
Future Scope:
In the future, the other features selection algorithms,
optimization methods to further increase the
performance of a predictive system for Heart Disease
diagnosis. The accuracy can be increased by using other
adaptive techniques with feature selection algorithm
(FCMIM) is feasible with classifier support vector
machine for designing a high-level intelligent system to
identify heart disease. The suggested other diagnosis
system (FCMIM-SVM) achieved good accuracy as
compared to previously proposed methods. The
controlling and treatment of disease is significance after
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 53
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

diagnosis, therefore, the treatment and recovery of 8. Meyer, Alexander, Dina Zverinski, Boris Pfahringer, Jörg
Kempfert, Titus Kuehne, Simon H. Sündermann, Christof
diseases in future also for critical disease such as heart, Stamm, Thomas Hofmann, Volkmar Falk, and Carsten Eickhoff.
breast, Parkinson, diabetes. Further, increase in "Machine learning for real-time prediction of complications in
accuracy helps to predict the heart disease efficiently. critical care: a retrospective study." The Lancet Respiratory
Medicine 6, no. 12 (2018): 905-914.
VIII. REFERENCES 9. Singh, Smriti Mukesh, and Dinesh B. Hanchate. "Improving
1. Khourdifi, Youness, and Mohamed Bahaj. "Heart disease disease prediction by machine learning." Int J Res Eng Technol 5,
prediction and classification using machine learning algorithms no. 6 (2018): 1542-1548.
optimized by particle swarm optimization and ant colony 10. Gavhane, Aditi, Gouthami Kokkula, Isha Pandya, and Kailas
optimization." International Journal of Intelligent Engineering & Devadkar. "Prediction of heart disease using machine learning."
Systems 12, no. 1 (2019): 242-252. In 2018 Second International Conference on Electronics,
2. Beyene, Chala, and Pooja Kamat. "Survey on prediction and Communication and Aerospace Technology (ICECA), pp. 1275-
analysis the occurrence of heart disease using data mining 1278. IEEE, 2018.
techniques." International Journal of Pure and Applied 11. Baitharu, Tapas Ranjan, and Subhendu Kumar Pani. "Analysis
Mathematics 118, no. 8 (2018): 165-174. of data mining techniques for healthcare decision support system
3. Marimuthu, M., M. Abinaya, K. S. Hariesh, K. Madhankumar, using liver disorder dataset." Procedia Computer Science 85
and V. Pavithra. "A review on heart disease prediction using (2016): 862-870.
machine learning and data analytics approach." International 12. Thomas, J., and R. Theresa Princy. "Human heart disease
Journal of Computer Applications 181, no. 18 (2018): 20-25. prediction system using data mining techniques." In 2016
4. Kohli, Pahulpreet Singh, and Shriya Arora. "Application of international conference on circuit, power and computing
machine learning in disease prediction." In 2018 4th International technologies (ICCPCT), pp. 1-5. IEEE, 2016.
conference on computing communication and automation 13. Kaur, Beant, and Williamjeet Singh. "Review on heart disease
(ICCCA), pp. 1-4. IEEE, 2018. prediction system using data mining techniques." International
5. Ramalingam, V. V., Ayantan Dandapath, and M. Karthik Raja. journal on recent and innovation trends in computing and
"Heart disease prediction using machine learning techniques: a communication 2, no. 10 (2014): 3003-3008.
survey." International Journal of Engineering & Technology 7, 14. Taneja, Abhishek. "Heart disease prediction system using data
no. 2.8 (2018): 684-687. mining techniques." Oriental Journal of Computer science and
6. Rajamhoana, S. P., C. Akalya Devi, K. Umamaheswari, R. Kiruba, technology 6, no. 4 (2013): 457-466.
K. Karunya, and R. Deepika. "Analysis of neural networks based 15. Dangare, Chaitrali S., and Sulabha S. Apte. "Improved study of
heart disease prediction system." In 2018 11th International heart disease prediction system using data mining classification
Conference on Human System Interaction (HSI), pp. 233-239. techniques." International Journal of Computer Applications 47,
IEEE, 2018. no. 10 (2012): 44-48.
7. Rajkomar, Alvin, Michaela Hardt, Michael D. Howell, Greg
Corrado, and Marshall H. Chin. "Ensuring fairness in machine
learning to advance health equity." Annals of internal medicine
169, no. 12 (2018): 866-872.

54 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IoT Based Collide Vehicle Number Plate Capturing and


Alerting Via E-Mail and SMS
P. Siva Madhuri1, Syed.Irfan2, Manjusha Chinta3
1,2,3
Dept. of E.C.E, Narayana Engineering College, Dhurjati Nagar, Gudur.
Email: Pmadhuri1129@gmail.com1, Shaikirfan217@gmail.com2, Manjusha.chinta@necg.ac.in3

Abstract- The objective of this scheme is to lives. Living in a very tech world that's growing day by
minimize the delay and capturing the vehicle details day with new technologies, we can apply these
which causes the collision to the vehicle. So that techniques in our society and help them overcome such
the ambulance can reach the spot in time and human problems. The Vision of the Internet of Things (IOT)
life can be saved and the accident location is
has embarked to succeed in unexpected bounds of
identified sends the accident location immediately
to the person (doctor or family member).The main
today's computing world. It's an idea that not only can
server finds the nearest ambulance to the accident impact human's life but also how they function. The
zone and sends the exact location to the emergency centre of IOT is sensible sensors without which it might
vehicle. We use, web camera with Arduino to send not have existed. These sensors form an enormous
the accident information to the person via email. network for his or her communication. They capture
By using this data, we can save the accident victim minute details of their surroundings and pass this
and also can catch the person who done the important information to every other. Based on the
accident. The purpose of this project is to introduce received information, relevant actions are performed
a framework using IoT, which helps in detecting accordingly. It's the most recent communication model
car accidents and notifying them immediately. that imagines the proximate future, within which objects
Keywords-Collision Detection, GPS, GSM, of day-to-day life are going to be incorporated with
Internet of Things (IoT), Notifications. microcontrollers for electronic communication with the
I. INTRODUCTION assistance of appropriate protocol stacks which will
make them capable of communication with each
Now-a-days, there's a rise within the number of another. The importance of accident detection and
accidents that happen within the world. The foremost notification system is extremely prominent for our
prominent reason for the loss of a life during an accident society.
is that the unavailability of immediate help that can save
a personality's life by some seconds. The instant an Imagine a situation where an accident happened,
accident has occurred, the lifetime of all passengers it's immediately notified to the emergency services. This
travelling within the vehicle is at stake. It all depends on can lead to the rescue of injured people involved within
response time that may save their lives by some minutes the accident. Because the Internet of Things has
or seconds. Per statistics, reducing accident delay time witnessed fast growth nowadays, it's the ability to bridge
by even 1 minute can save 6 per cent of lives. Hence, these two situations. For the IOT paradigm be effective,
this time it should have the aptitude to trace the situation of the
objects (i.e. cars in our case) which might serve to be
Interval is extremely crucial, and it has to be reduced useful for the ambulances to achieve on time.
or a minimum of either improved to save lots of their
lives. To contribute to our society and reduce the II. LITERATURE SURVEY
quantity of accidents happening in our day-to-day life, The purpose of the project is to search out the vehicle
there are several techniques and mechanisms that may where it is located the vehicle by means of sending a
drop down the speed of accidents and might save lot message using a system which is placed within vehicle
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 55
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

system. Most of the days we might not be able to find the image of number plate of the vehicle which collided
accident location because we don't know where our vehicle are visiting be sent to the authorized person
accident will happen. This project detects the accident via email using Wi-Fi module.
through GPS and designed to avoid such situations. Advantages:
The notification phase, immediately after an accident is
indicated, it's accustomed send detailed information like This system can resolve most of the accidents by
images, video, accident location, etc. to the emergency detecting accidents on time; poor emergency incident
responder for fast recovery. is a major cause of death rate in our country.
III. EXISTING WORK Delay time caused by the medical vehicles can be
resolved
A. Manual Detection System:
BLOCK DIAGRAM:
In this method, accident is detected from
• Motorist report
• Transportation department
• Public crews report
• Close circuit camera surveillance
The downside of this sort of detection system is that
somebody needs to witness the incident.
B. Driver Initiated Detection System:
Driver initiated incident detection system has more HARDWARE REQUIREMENTS:
advantages which has the fast reaction, more incident
1. ARDUINO UNO
information etc. However, with these varieties of the
accident, driver might not be ready to report in any 2. POWER SUPPLY
respect. 3. NODEMCU CAMERA
IV. PROPOSED WORK 4. MEMS SENSOR
Car accidents that happen daily are the key social 5. GSM
problems towards which serious action must be taken. 6. GPS
One altogether the solutions for this domain is that the
Internet of Things which is that the present trend in 7. LCD
technology. For this purpose, many authors have
worked during this domain by applying this technology.
This is often to introduce a framework using IOT, which
helps in detecting car accidents and notifying them
immediately. This might be achieved by integrating smart
sensors with a microcontroller within the car which is
ready to trigger at the time of an accident. The other A. ARDUINO UNO:
modules like GPS and GSM are integrated with the
Arduino could be a single-board microcontroller
system to urge the placement coordinates of the
meant to form the application more accessible which
accidents and sending it to registered numbers and
are interactive objects and its surroundings. The Arduino
nearby ambulance to notify them about the accident
Uno board may be a microcontroller supported the
to obtain immediate help at the situation. This system,
56 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

ATmega328. It's 14 digital input/output pins within which 230V


6 are often used as PWM outputs, a 16 MHz ceramic AC Step
down Filter
resonator, an ICSP header, a USB connection, 6 analog transfor
Rectifier capacitor
Regulator

inputs, an influence jack and a push button. This contains mer

all the specified support needed for microcontroller. So


as to induce started, they are simply connected to a C. MEMS SENSOR:
computer with a USB cable or with a AC-to-DC The MMA7660FC could be a ±1.5 g 3-Axis
adapter or battery. It's featured by the Atmega16U2 Accelerometer with Digital Output(I2C). It's aawfully
programmed as a USB-to-serial converter. Arduino was low power, low profile capacitive MEMS sensor
created within the year 2005 by two Italian engineers featuring an occasional pass filter, compensation for 0g
David Cuartielles and Massimo Banzi with the goal of offset and gain errors, and conversion to 6-bit digital
keeping in mind about students to create them find out values at a user configurable samples per second. The
how to program the Arduino Uno microcontroller and device is used for sensor data changes, product
improve their skills about electronics and use it within orientation, and gesture detection through an interrupt
the planet. Arduino uno microcontroller can sense the pin (INT). The device is housed in a very small 3mm x
environment by receiving input from a variety of sensors 3mm x 0.9mm DFN package.
and may affect its surroundings by controlling lights,
motors, and other actuators.

D. NODE MCU Camera:


The NODE MCU ESP32 CAM Wi-Fi Module
Bluetooth with OV2640 Camera Module 2MP For
Face Recognition contains a very competitive small-
B. POWER SUPPLY: size camera module that may operate independently as
a minimum system with a footprint of only 40 x 27 mm;
Many electronic circuits need a direct current (DC)
a deep sleep current of up to 6mA and is widely used
voltage source, but what we commonly find are voltage
in various IoT applications.It's suitable for home smart
sources of AC (AC)Input which fits to the transformer
devices, industrial wireless control, wireless monitoring,
primary winding may be a sine wave and its amplitude
and other IOT applications. This module adopts a DIP
depends on the country's electric distribution system
package and might be directly inserted into the
(110/220 VAC or other). So as to attain an
backplane to appreciate rapid production of products,
instantaneous current voltage source, the alternating
providing customers with high-reliability connection
current input must follow a conversion process just like
mode, which is convenient for application in various
the one shown within the power supply diagram below:
IOT hardware terminals.ESP integrates Wi-Fi,
traditional Bluetooth, and BLE Beacon, with 2 high-
performance 32-bit LX6 CPUs, 7-stage pipeline
architecture. It's the most frequency adjustment range
of 80MHz to 240MHz, on-chip sensor, Hall sensor,
temperature sensor, etc.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 57


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

E. GPS: PIC governing the remote control) that can be either


GPS receivers are generally used in smart phones, AT standard or AT-enhanced SIMComtype. The
fleet management system, military etc. for tracking or module is furnished with continuous energy (between
finding location. Global Positioning System (GPS) could 3.4 and 4.5 V) and absorbs a maximum of 0.8 A during
be a satellite-based system that uses satellites and transmission.
ground stations to live and compute its position on
Earth.GPS is additionally referred to as Navigation
System with Time and Ranging (NAVSTAR) GPS.GPS
receiver has to receive data from at least 4 satellites for
accuracy purpose. GPS receiver does not transmit any
information to the satellites. This GPS receiver is
employed in many applications like smart phones, Cabs,
Fleet management etc.

G. LCD:
A liquid crystal display (LCD) could be a thin, flat
display device made of any number of colour or
F. GSM:
monochrome pixels arrayed ahead of a lightweight
GSM stands for Global System for Mobile source or reflector. Each pixel consists of a column of
Communication. It is a digital cellular technology used liquid molecules suspended between two transparent
for transmitting mobile voice and data services.GSM is electrodes, and two polarizing filters, the axes of polarity
that the most generally accepted standard in of which are perpendicular to each other. Without the
telecommunications and it's implemented globally. GSM liquid crystals between them, light passing through one
operates on the mobile communication bands 900 MHz would be blocked by the opposite. The liquid twists
and 1800 MHz in most parts of the planet. This is often the polarization of sunshine entering one filter to permit
a GSM/GPRS-compatible Quad-band cellular phone, it to suffer the opposite. A program must interact with
which works on a frequency of 850/900/1800/ the skin world using input and output devices that
1900MHz and which might be used not only to access communicate directly with an individual's being. One
the web, but also for language (provided that it is amongst the foremost common devices attached to an
connected to a microphone and a little loud speaker) controller is an LCD display.
and for SMSs. Externally, it's sprt of a big package
(0.94 inches x 0.94 inches x 0.12 inches) with L-shaped
contacts on four sides in order that they'll be soldered
both on the side and at the underside.
The TTL serial interface is accountable not only of
communicating all the information relative to the SMS
already received and people that are available during
TCP/IP sessions in GPRS (the data-rate is decided by
GPRS class 10: max. 85,6 kbps), but also of receiving
the circuit commands (in our case, coming from the
58 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

H. BUZZER
A buzzer or beeper could be a signalling device,
usually electronic, typically employed in automobiles,
household appliances like a microwave, or game shows.
It most typically consists of a number of switches or
sensors connected to an impact unit that determines if
and which button was pushed or a pre-set time has
lapsed, and frequently illuminates a light-weight on the V. CONCLUSION
suitable button or board, and sounds a warning within In this mode, the modernizing supported the
the variety of a nonstop or intermittent buzzing or reduction of road facet accident. Ordinarily it's associate
beeping sound. expertise concerning passing vehicle through the
tollbooth, there it's want to pay a fee then our vehicle
number plate was trying to next step of entry. Around
this idea, modernizing was enhanced by the preceding
session, if the accident arose in association spot there a
Page machine use to create a salve for the delay.
However, here change return by the messaging system
to their relatives and machine by victimization GSM, to
RESULT: grasp the position of the vehicle by victimization GPS.
In proposing system, it enhances this problem by
using messaging and tracking system. First, it's used to
manage the vehicle number plate in a toll booth. If it's
authorized there if capture the quantity plate and store
it in an exceedingly. After that, if the accident was
occurring in-between booths, the message alert is
intimated to the nearby police headquarters and hospital
using GSM, by using GPS location is tracked.

REFERENCES:
[1] Khyati Shah, Vile Parle, Swati Bairagi, Vile Parle "Accident
Detection and Conveyor System using GSM and GPS Module"
International journal of Computer Applications (0975-8887)
Voluma-176-No.2,October 2017.
[2] E. Krishna Priya, P. Manju, V. Mythra, "IoT Based Vehicle
Tracking and Accident Detection System" International journal
of Innovative Research in Computer and Communication
Engineering, (An ISO 3297:2007 Certified organization)
Vol.5,Issue 3, March 2017.
[3] Surekha Pinnapati, Manjunath Kamath K, Carmal Joseph,
"Automatic Accident Detection and Alerting System Based on
IOT" International Journal of Innovative Research in Computer
and Communication Engineering (An ISO 3297:2007 Certified
organization) Vol.5, Issue5, May 2017.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 59
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[4] Namrata H. Sane Damini S. PatilSnehal D. "Real Time Vehicle [8] Aishwarya S. R., et al., "An IoT Based Accident Prevention and
Accident Detection and Tracking Using GPS and GSM" Tracking System for Night Drivers," International Journal of
International journalon Recent and Innovation Trends in Innovative Research in Computer and Communication
Computing and Communication, Issue-4,Vol.4 April 2016. Engineering, vol/issue: 3(4), Apr 2015.
[5] Vikram singh Kushwaha, Abusayeed Topinkatti, "Car Accident [9] V. K. Pratiksha and Rajesh G., "Proposed Model for the Smart
Detection System Using GPS and GSM", International journal Accident Detection System for Smart Vehicles using Arduino
of Emerging Trend in Engineering and Basic Science (IJEEBS) board, Smart Sensors, GPS and GSM," International Journal of
Vol.2, Feb 2015. Emerging Trends and Technology in Computer Science, 2015.
[6] C.Prabha, R. Sunitha, R.Anitha, "Automatic Vehicle Accident N. H. Sane, et al., "Real Time Vehicle Accident Detection and
Detection and Messaging System Using GSM and GPS Modem", Tracking Using GPS and GSM," International Journal on Recent
International Journal of Advanced Research in Electrical and and Innovation Trends in Computing and Com
Electronic and Instrumentation Engineering (An ISO 3297:2007
Certified organization) Vol.3, Issue 7, July 2014.
[7] Isna K. and S. D. Sawant, "Integration of Cloud Computing and
Internet of Things," International Journal of Advanced Research
in Computer and Communication Engineering, vol/issue: 5(4),
Apr 2016.

60 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Sign to Voice Conversion


SK. Rafi1, P. Pravallika2, Manjusha Chinta3
3
Assoc Professor
1,2,3
Dept. of E.C.E, Narayana Engineering College, Dhurjati Nagar, Gudur.
Email: rafiism494@gmail.com1, pravallikaparnaboina@gmail.com2, manjusha.chinta@necg.ac.in3

Abstract: Communication among deaf-mute and problem. This tool blessings a speech impaired man or
normal people has constantly been a difficult task. woman to speak with a regular man or woman in
The mission pursuits to facilitate human beings with addition to with a listening to impaired man or woman.
the aid of a glove- primarily based on deaf-mute The essential issue of this venture is a glove with
conversation interpreter system. Glove is unmarried MEMS sensors which can be linked to
internally ready with a gesture. For every unique
ARDUINO Uno that's the principle manipulate unit of
gesture, the gesture module produces a
proportional extrude in resistance and
this venture. This tool has a characteristic of person
accelerometer measures the orientation of hand. input. So speech impaired man or woman can
The hand gesture is one of the normal techniques effortlessly use his/her personal selected instructions for
utilized in signal language for non-verbal unique gestures.
conversation. It is typically utilized by human beings It describes a nonspecific individual gesture
who've listening to or speech troubles to speak
reputation device through the use of MEMS
amongst themselves or with other normal human
beings.
accelerometers. The reputation device includes sensor
records collection, segmentation and reputation after
Keywords- ARDUINO Uno, MEMS sensor, receiving acceleration records from the sensing device.
Bluetooth module, LCD display, Voice playback Moreover, different capabilities of the movement
module.
records can be applied for sample classification, i.e.,
I. INTRODUCTION extra reputation techniques may be investigated in our
Speaking is the principle manner of conversation for destiny work.
each regular human being. But consider a gesture who II. LITERATURE REVIEW
cannot capable of speak regularly with a regular with
[1]. Michiko Nishiyama and Kazuhiro Watanabe,
normal people. Because speech impaired humans use
2018, supplied a wearable sensing glove with embedded
signal language for his or her conversation. And
hetero-center fiber-optic nerve, which makes use of
maximum of the humans do not recognize signal
hetero-center fiber optic nerve as sensors that hit upon
language. So it places the speech impaired man or
finger flexion to acquire unconstrained hand movement
woman in a hard situation. In current years, researchers
monitoring. The sensor Heron center encompass a
had been focusing accessible gestures detections and
transmission fibre line whose diameter is 9µm. unmarried
been famous for growing programs with inside the area
mode of transmission is utilized in Hetro center fiber
of robotics and prolonged with inside the vicinity of
sensor e lower back of the hand such that they're now
synthetic or prosthetic arms which could mimic the
no longer laid low with wrinkles with inside the glove
behaviour of a herbal human hand. This venture even
joints .A laser diode of wavelength 1.31µm and an
though makes use of a comparable technique for the
optical energy meter are used to degree the transmission
detection of the motion of fingers, but we've attempted
loss. Splicing gadget is likewise used. The sensor after
to extrapolate the concept in a small but full-size utility
calibration is capable of hit upon the joint angles of the
with inside the area of bioengineering. The essential goal
hands with variations in hand length and the hetero-
of this venture is to layout an digital talking gadget with
center sensing approach lets in the sensing glove to be
inside the shape of a glove to reduce this conversation
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 61
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

built with a minimal wide variety of sensor points. The to carry the message. This entails broadly speaking the
hetro center sensors well-known shows monotonic mixture of shapes, orientation and motion of the hands.
function of optical loss overall performance with
recognize to the flexion perspective of joints. But
irrespective of this a few optical fiber loss may be BLOCK DIAGRAM
located the use of those sensors proposed a grip
Amplified glove. POWER SUPPLY

[2].Kotaro Tadano, Masao Akai,2019[2] the use


of pneumatic synthetic rubble muscle groups (PARMs)
. The PRAM is appropriate with general 10 ranges of LCD

freedom and encompass 4 units. To acquire energy help


ARDUINO UNO
movement ,a PI control, that's primarily based totally FLUX SENSOR VOICEPLAYBACK
MODULE
on stress fee from a balloon sensor is performed .balloon
sensor makes the implemented element loose from the
electricity. EMG styles of muscle groups measured to
FIG.3.1.: BLOCK DIAGRAM OF HAND GESTURE USING
assess the energy help overall performance. The FLUX SENSOR
machine turns into greater complex and bulky.
III.1. GLOVE BASED APPROACHES
[3]. S. Zhou, Q. Shan, F. Fei, W. J. Li, C. P. Kwong,
and C. K. Wu et al. "The paper describes a robustness In this class calls for signers to put on a sensor glove.
of MEMS primarily based totally Gesture Controlled The assignment could be simplified in the course of
Robot is a form of robotic that may be through our segmentation method via way of means of carrying
hand gestures in preference to an normal vintage glove. The downside of this technique is that the signer
switches or keypad. In Future there's a threat of creating has to put on the sensor hardware at the side of the
robots that could engage with people in an herbal glove in the course of the operation of the system. Using
manner. Hence our goal hobby is with hand movement 5 flux sensors hand primarily based totally glove became
primarily based totally gesture interfaces. An used.
revolutionary Formula for gesture reputation is evolved ALPHABETS IN SIGN LANGUAGE
for figuring out the distinct movement symptoms and
symptoms made thru hand movement. A MEMS Sensor
became used to perform this and additionally an
Ultrasonic sensor for satisfied operation. In order to
full-fill our requirement a application has been written
and performed the use of a microcontroller machine.
Upon noticing the consequences of experimentation.
III. EXISTING SYSTEM
Sign Language is the handiest manner of verbal
exchange for deaf humans. With development of
technological know-how and era many strategies were FIG.3.1.1. ALPHABETS IN GESTURE LANGUAGE

advanced now no longer handiest to reduce the trouble III.2. VISION BASED APPROACHES
of deaf and dumb humans however additionally to put
Image processing algorithms are utilized in Vision
into effect it in one-of-a-kind fields. Sign language is a
primarily based totally method to locate and music hand
language which as opposed to voice or sound styles
symptoms and symptoms and facial expressions of the
makes use of guide verbal exchange and frame language
signer. This method is less difficult to the signer seeing
62 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

that there's no want to put on any greater hardware.


However, there are accuracy troubles associated with
BLOCK DIAGRAM
picture processing algorithms and those troubles are
but to be modified. There are once more extraordinary POWER SUPPLY

techniques in imaginative and prescient primarily based


totally signal language recognition: -3-D version
MEMS SENSOR
primarily based totally -Appearance primarily based LCD

totally 3-D version primarily based totally strategies


BLUETOOTH ARDUINO UNO
employ 3-D records of key factors of the frame parts. VOICEPLAYBACK
MODULE
Using this records, numerous essential parameters, like
palm position, joint angles etc., may be obtained. This
technique makes use of volumetric or skeletal models,
Fig.4.1 BLOCK DIAGRAM OF HAND GESTURE USING
or a aggregate of the Volumetric technique is higher MEMS SENSOR AND BLUETOOTH MODULE
desirable for pc animation enterprise and pc imaginative
Gestures like transferring palms from left to proper
and prescient. This technique could be very
or transferring from proper to left to transport among
computational extensive and also, structures for stay
PowerPoint slides. The subsequent section of the
evaluation are nevertheless to be developed.
challenge is controlling electric home equipment with
IV. PROPOSED SYSTEM human gestures. Now the paper is influenced on
This assignment provides a device prototype this is information the signal language and generating speech.
capable of robotically understand signal language to The gadget is already skilled with the information of
assist regular humans to talk greater efficaciously with human gesture movements .The preliminary section of
the listening to or speech impaired humans. This the challenge started out in controlling a easy PowerPoint
assignment includes an ARDUINO controller interfaced presentation with gestures like transferring palms from
with MEMS sensors and Voice play lower back circuit. left to proper or transferring from proper to left to
By the usage of MEMS sensors we are able to produce transport among PowerPoint slides. The subsequent
one of a kind gestures, for every gesture we coded a section of the challenge is controlling electric home
voice track .so different regular humans will effortlessly equipment with human gestures. Now the paper is
apprehend the impaired person. In addition to it we influenced on information the signal language and
use of a Bluetooth device. By the usage of Bluetooth generating speech. The gadget is already skilled with
and Android software we are able to convert the voice the information of human gesture movements.
instructions into Text. This Text instruction will show
on LCD that is beneficial for deaf humans also.

FIG.4.2. COORDINATES OF MEMS SENSOR

The role of every joint is given as an offset from the


Kinect sensor as proven in determine 4. X for left and
right, Y for up and down and Z is to calculate the space
among the person and the sensor. The values are given
in millimetre.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 63


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

FIG.4.3. XYZ COORDINATES USING HAND FIG.6.2. HAND GLOVE USING MEMS SENSOR AT SIDE
ANGLE
V. HARDWARE REQUIEMENTS
Finally, the gesture code is in comparison with the
1) Power Supply saved standard styles to decide the maximum probably
2) MEMS Sensor gesture. Since the usual gesture styles are generated
3) Bluetooth with the aid of using movement evaluation and are easy
capabilities represented with the aid of using eight
4) LCD numbers for every gesture, the popularity machine does
5) Play back Module now no longer require a large records base and desires
now no longer to accumulate as many gestures made
6.) ARDUINO Uno
with the aid of using different human beings as feasible
VI. RESULT to enhance the popularity accuracy. We note here,
This paper describes a nonspecific individual gesture however, to decorate the overall performance of the
reputation machine with the aid of using the use of popularity machine, we can want to enhance the
MEMS accelerometers. The reputation machine segmentation set of rules to boom its accuracy in locating
includes sensor records collection, segmentation and the terminal factors of gestures. Moreover, different
reputation. After receiving acceleration records from capabilities of the movement records can be applied
the sensing device, a segmentation set of rules is carried for sample classification, i.e., greater reputation
out to decide the beginning and end factors of each strategies may be investigated in our destiny work.
enter gesture automatically. The signal sequence of a VII. CONCLUSION
gesture is extracted because the classifying feature, i.e.,
MEMS sensor has the X, y & z coordinates axis ,
a gesture code.
in which X is the top attitude , Y is the side attitude and
Z is the down attitude. right here we're using movement
sensor while the MEMS sensor positioned the down
attitude then the Z voice will performs from the voice
playback module.

FIG.6.1. HAND GLOVE USING MEMS SENSOR

64 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[3] S. F. Ahmed, S. Muhammad, B. Ali, S. Saqib, and M. Qureshi,


"Electronic Speaking Glove for Speechless Patients A Tongue
to," no. November, pp. 56-60, 20I8.
[4] A. Y. Satpute, A. D. Bhoi, and T. Engineering, "ELECTRONIC
SPEAKING SYSTEM FOR DUMB," vo!. 6, no. 3, pp. 1132-
1139.
[5] S. U. N. Praveenkumar S Havalagi, 'THE AMAZING DIGITAL
GLOVES THAT GIVE VOICE TO THE VOICELESS," vol.
6, no. 1, pp. 471-480, 2019.
[6] Luigi Lamberti, Francesco Camastra, . "Real-Time Hand Gesture
Recognition Using a Color Glove", Springer Proceedings of the
sixteenth international convention on Image evaluation and
processing:
FIG.7.1. KIT OF AN SIGN TO VOICE CONVERTER [7] M. Wald, "Captioning for Deaf and Hard of Hearing People by
Editing Automatic Speech Recognition in Real Time", Proceedings
The MEMS sensor will be positioned at the hand of 10th International Conference on Computers Helping People
glove , while the movement sensor sense the position with Special Needs ICCHP , LNCS 4061, pp. 683-690.
then the voice will come from the playback module and [8] Verma, R., Dev A. (2017)."Vision primarily based totally hand
the command may be presentations at the liquid crystal gesture reputation the use of finite nation machines and fuzzy
logic". IEEE International
display module.
[9] Conference on Ultra-Modern Telecommunications &
REFERENCES Workshops(ICUMT )
[1] Michiko Nishiyama and Kazuhiro Watanabe,2018, supplied a [10]Husham Samir, "Playing Wave record the use of arduino."
wearable sensing glove with embedded hetero-center fiber-optic [Online]. Available: http://www.instructables. comlid/PIaying-
nerve Wave-record-the use of-arduinol.
[2]. S. Zhou, Q. Shan, F. Fei, W. J. Li, C. P. Kwong, and C. K. Wu et [11]R. R. Itkarkar and A. V. Nandi, "Hand gesture to speech
al. The paper describes a robustness of MEMS primarily based conversion the use of Matlab," in 2013 Fourth International
totally Gesture Controlled Robot Conference on Computing, Communications and Networking
Technologies (ICCCNT), pp. 1-4.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 65


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Navigation Solutions: Statistical Analysis of GPS


Position Errors in 3-Dimensional Surface
Dr. P. Sirish Kumar
Assistant Professor, Department of Electronics & Communication Engineering
Aditya Institute of Technology and Management, Tekkali-532201, Andhra Pradesh, India.
Email: sirishdg@gmail.com

Abstract- Global Positioning System (GPS) can satellites that revolve around the earth and provides
provide a 3-dimensional (3D) position of the position information based on range measurements [2].
unknown object on or above the earth's surface. With a sufficient number of range measurements, GPS
Inherently, in GPS pseudo-range measurements, can provide position estimates to high degree accuracy
several errors are resulting from various error
[3-4]. The accuracy, in turn, is the function of the type
sources. This article implemented three
of equipment, geographic area, uncertainty in
navigational algorithms, namely the Least Square
Estimator (LSE), Kalman Filter (KF), and Cross- measurements, navigation algorithm, etc. In practice,
Correntropy Kalman Filter (CCKF), and the results the measurement uncertainty can never reach zero even
are compared. Results prove that the proposed though the system noise parameters and biases are
CCKF algorithm exhibits significant improvement modelled effectively and hence need a high accuracy
in position estimation compared to the other two navigation algorithm [5] that makes out an optimal
recursive algorithms (i.e., LSE and KF). It is also estimate from these uncertain measurements.
clear from the results that the implemented two
algorithms (LSE and KF) do not give position In the present paper, we develop a new Kalman
accuracy as that of the CCKF algorithm. filter, compactly called the cross Correntropy Kalman
Filter (CCKF), based on the correntropy criterion [6]
Keywords- Cross Correntropy Kalman Filter,
and a fixed-point iterative algorithm. Similar to the
GPS, Kalman Filter, Least Square Estimator,
traditional KF, the CCKF not only retains the state mean
Pseudo-range..
propagation process but also preserves the covariance
INTRODUCTION matrix propagation process. Thus the new filter also
The introduction of Global Positioning System (GPS) has a recursive structure and is suitable for online
has brought a revolution in the field of positioning and implementation. It is worth noting that the correntropy
leads to the development of many sophisticated criterion has been used in hidden state estimation, but it
positioning systems in the fields of defence and civil involves no covariance propagation process and is in
sectors for guiding of troops in the battlefield, navigation the form not a Kalman filter. Unlike the traditional KF
of ships, the landing of aircraft, etc [1]. Even when algorithm, the CCKF uses a fixed-point algorithm [7]
operated to their full capacity, these systems provide to update the posterior estimate of the state. The small
limited accuracy for these applications and hence need positive number ? provides a stop condition (or a
to be improved. The three primary functions on which threshold) for the fixed-point iteration. The kernel
most of today's defence systems work are Navigation, bandwidth ? is a key parameter in CCKF. In general, a
Tracking and Guiding and it is unimaginable to find a smaller kernel bandwidth makes the algorithm more
system that doesn't have any relation with these robust (with respect to outliers) but converges more
functions. These systems require determining the two slowly. The kernel bandwidth has a significant influence
or three dimensional (3D) position information of an on the convergence behavior of CCKF. If the kernel
object of interest and they use GPS receivers for this bandwidth ? is too small, the algorithm will diverge or
purpose. GPS is the constellation of space bodies called converge very slowly. A larger kernel bandwidth ensures

66 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

a faster converge speed but usually leads to poor


ai ∆pi = a2i ∆lu + ai bi ∆mu + ai ci ∆nu + ai Tcb ⎫
performance in impulsive noises. In practical ⎪
applications, the kernel bandwidth can be set manually bi ∆pi = ai bi ∆lu + b2i ∆mu + bi ci ∆nu + bi Tcb ⎪
or optimized by trial and error methods. The ci ∆pi = ai ci ∆lu + ci bi ∆mu + ci2 ∆nu + ci Tcb ⎬
effectiveness of the proposed algorithm is demonstrated ⎪

∆pi = ai ∆lu + bi ∆mu + ci ∆nu + Tcb ⎭
on the estimation of the position of a GPS receiver,
and its performance is compared to the performance (5)
of traditional Kalman filter [8-9].
After solving equation (4) or (5), we can solve
II. LEAST SQUARE ESTIMATOR equation (2) repeatedly. Finally we can estimate the
In order to determine the position of the receiver receiver's position.
[1] [2], we work out formulas as below. III. CROSS CORRENTROPY NOTATION
(1) A. Cross-Correntropy Notation:
In above equation lu, mu, nu and pi shows GPS Cross-Correntropy [6] [10] is a generalized
receiver position coordinates and pseudo-range similarity measure between two random variables. Given
calculated from the time of signal transmission. Tcb two random variables S, M with joint distribution
represents clock error of the receiver. In this equation function ASM (s,m) , cross correntropy is defined by
there are four unknown parameters, which are the
(6)
position lsp, msp, nsp, and the clocl error Tcb of receiver.
We need more than three equations, that is, we must Where, E denotes the expectation operator, and
acquire 4 satellites at least to calculate the receiver's n(·,·) is a shift-invariant Mercer Kernel. In this paper,
position [4] [5]. without mentioned otherwise the kernel function is the
To solve equation (1) Newton method is usually Gaussian Kernel (J) given by
used, which expands nonlinear equation as follows.
(7)

(2) Where, e = s - m, and  > 0 stands for the kernel


bandwidth.
∂pi u ∂pi ∂pi
pk+1,i = pk,i + ∆l k + ∆mu k + u ∆nu k + Tcb (3) In most practical situations, however, only limited
∂lu k ∂mu k ∂n k
numbers of data are available and the joint distribution
In above equation we define
ASM is usually unknown. In these cases, one can estimate
∂p ∂p ∂p the cross correntropy using a sample mean estimator;
a= u
, b= u
, c= u
∂l ∂m ∂n
∆p = pk+1,i − pk,i (8)
a1 b1 c1 1 ∆p1
a2 b2 c2 1 ⎡∆p ⎤ ∆lu
⎛ ⎞ 2 u Where e(i)=s(i)-m(i) with , Being K
X = ⎜… … … … ⎟ , δP = ⎢⎢ … ⎥⎥ , Lu = ∆mu
… … … … ∆n samples drawn from A SM. Taking Taylor series
⎢ … ⎥ Tcb
a
⎝ k bk ck 1⎠ ⎣∆pk ⎦ expansion of the Gaussian Kernel, we have
δP = X . δLu (k = 4) (4)
(9)
If we acquire more than 4 satellites the solution of
equation is require using least-square method as follow.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 67


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

B. Kalman Filter: The main reason for this is that the KF is developed
Kalman filter [8] [9] provides a powerful tool to based on the MMSE criterion [11], which captures only
deal with state estimation of linear systems, which is an the second order statistics of the error signal and is
optimal estimator under linear and Gaussian sensitive to large outliers. To address this problem, in
assumptions. this work we use the cross correntropy criterion to
derive a new Kalman filter named as Cross Correntropy
Consider a linear system described by the following Kalman Filter (CCKF), which may perform much better
state and measurement equations: in non-Gaussian noise environments[6][12], as cross
(10) correntropy contains second and higher order moments
(11)
of the error.

Where, s(n) denotes the i-dimensional state vector, A. Algorithm Derivation:


m(n) represents the j-dimensional measurement vector For the linear model described in the previous
at instant 'n'. A and B stand for, respectively, the system section, we have [10]
matrix (or state transition matrix) and observation
matrix. p(n-1) and q(n) are mutually uncorrelated (18)
process noise and measurement noise, respectively, with
zero mean and covariance matrices. Where, I represents identity matrix and u(n) is
(12)

In general, Kalman filter includes the following two


steps: With

Step 1: Predict:
The prior mean and covariance matrix are given by
(13)

(14) (19)

Step 2: Update: Where, D(n) can be obtained by Cholesky


decomposition of . Left multiplying both
The KF gain is computed as
sides of Eq. (1) by B-1 (k), we get
(15)
(20)
The posterior state is equal to the prior state plus
the innovation weighted by the KF gain, where,
(16)

Additionally, the posterior covariance is recursively ,


updated as shown in Eq. (12) since
Here, e(n) is a white residual error.
(17)
Now we propose the following cross-correntropy
IV. CROSS CORRENTROPY KALMAN
based cost function
FILTER
Traditional Kalman filter (KF) works well under
(21)
Gaussian noises, but its performance may degrade
significantly under non-Gaussian noises, especially when
the underlying system is disturbed by impulsive noises.
68 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Where, fi(n) is the ith element of F(n), vi (n) is the ith Eq. (28) can be further expressed as follows
row of V(n), and L = a+b is the dimension of F(n). (29)
Then under cross correntropy, the optimal estimate where,
of s(n) is

(30)
(22)

Where ei(n) is the ith element of e(n): V. RESULTS & DISCUSSION

ei(n) = fi(n)- vi(n)s(n) (23) This section presents the simulation results obtained
after the proposed method was utilized to estimate the
The optimal solution can thus be obtained by solving position of a GPS receiver. The accuracy of the
proposed method is compared against the accuracy of
(24) Least Square Estimator (LSE) and traditional Kalman
filter (KF). The raw GPS data, collected over C/A
It follows easily that
measurements from the dual frequency GPS receiver
located at IISc, Bangalore (Lat/Lon: 13.01o N / 77.56o
(25)
E) are processed for Relativistic error and Satellite
Since ei (n) = fi (n)- vi (n)s(n), the optimal solution Clock biases. The data is sampled at the rate of 30
Eq. (25) is actually a fixed-point equation [7][10] of Seconds. The data received on L1 (1575.42MHz)
s(n) and this can be rewritten as frequency is only used for estimating the receiver
position. The obtained estimated receiver positions are
s(n)=g(s(n) ) (26) compared with the surveyed position to measure the
With position error using the three algorithms, i.e., LSE, KF,
and CCKF. And these results are presented in Table 1
to Table 3, respectively and the given values are the
estimated mean values of 22 hours of data.

A fixed-point iterative algorithm can be readily


obtained as
(27)

Where, denotes the solution at the fixed point


iteration 't'.
The Eq. (25) is a fixed-point equation can be further
represented as
(28)

Where ,

with, ,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 69


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table 1. Estimated receiver mean position and error in X- Table 3. Estimated receiver mean position & error in Z-
direction direction

Actual Position in X-direction: 1337936m Actual Position in Z-direction: Z=1427877m


Time Position Error Time Position Error
(Hrs) LSE KF CCKF LSE KF CCKF (Hrs) LSE KF CCKF LSE KF CCKF
1 1337903 1337905 1337913 33 31 23 1 1427889 1427885 1427886 12 8 9
2 1337900 1337901 1337910 36 35 26 2 1427883 1427884 1427883 6 7 6
3 1337892 1337892 1337901 45 44 36 3 1427882 1427882 1427882 5 6 5
4 1337891 1337890 1337901 45 46 35 4 1427885 1427884 1427882 8 7 5
5 1427885 1427884 1427881 8 7 4
5 1337894 1337893 1337904 42 44 32
6 1427884 1427886 1427882 7 9 5
6 1337896 1337897 1337906 40 39 31
7 1427884 1427882 1427880 7 6 3
7 1337902 1337901 1337912 35 36 25 8 1427883 1427880 1427880 6 3 3
8 1337903 1337902 1337915 33 35 22 9 1427886 1427884 1427884 9 7 7
9 1337906 1337905 1337920 30 31 17 10 1427890 1427886 1427885 13 9 8
10 1337910 1337910 1337921 26 26 15 11 1427884 1427885 1427881 7 8 4
11 1337912 1337915 1337924 25 22 13 12 1427883 1427884 1427878 6 7 2
12 1337910 1337911 1337920 27 25 17 13 1427882 1427882 1427878 6 5 1
13 1337904 1337902 1337913 33 35 23 14 1427882 1427880 1427878 5 4 1
14 1337902 1337896 1337911 34 41 25 15 1427882 1427883 1427879 5 6 2
15 1337897 1337889 1337905 40 48 31 16 1427878 1427881 1427875 1 4 2
16 1337895 1337891 1337903 42 45 33 17 1427882 1427880 1427881 5 3 4
17 1337903 1337901 1337914 33 36 22 18 1427883 1427883 1427880 6 6 3
18 1337907 1337904 1337916 29 32 20 19 1427881 1427881 1427879 4 4 2
19 1337906 1337905 1337916 31 32 20 20 1427879 1427878 1427876 2 1 1
20 1337908 1337907 1337918 28 30 18 21 1427880 1427882 1427875 3 5 2
21 1337904 1337905 1337915 32 31 21 22 1427886 1427885 1427884 10 8 7
μ 1427883 1427883 1427880 6 6 4
22 1337901 1337903 1337912 35 33 24
σ 3 2 2 3 2 2
μ 1337902 1337901 1337912 34 35 24 σ2 9 4 4 9 4 4
σ 6 7 7 6 7 7
σ2 36 49 49 36 49 49 Figure 2 represents the mean position error
Table 2. Estimated receiver mean position & error in Y- comparison over an hour among the three algorithms in
direction
a 3D surface.
Actual Position in Y-direction: 6070317m
Time Position Error Mean position error for every 1 Hour
LSE KF CCKF
(Hrs) LSE KF CCKF LSE KF CCKF
1 6070350 6070323 6070335 33 6 18
-- Error in Z- direction -->

2 6070340 6070329 6070329 23 12 12 12


3 6070328 6070337 6070313 11 19 4 10
(meters)

8
4 6070340 6070335 6070329 23 17 12 6
4
5 6070350 6070343 6070335 33 26 18 2

6 6070344 6070344 6070329 27 27 12 50

7 6070342 6070338 6070328 25 21 11 40


8 6070347 6070341 6070335 30 24 18
30 45
9 6070349 6070338 6070334 32 21 17 -- Error in Y- direction --> 40
(meters) 20 35
10 6070349 6070348 6070335 32 30 18 30
25 -- Error in X- direction -->
11 6070356 6070366 6070341 39 49 24 10 20
(meters)
15
12 6070360 6070369 6070346 43 51 29
13 6070365 6070361 6070351 48 44 34 Fig.1. Comparison of mean position error in 3D surface
14 6070361 6070348 6070344 44 31 27
15 6070346 6070347 6070331 29 30 14 When a GPS receiver's location is detected over a
16 6070345 6070347 6070329 28 30 12 period of time, it's found it wanders. When a graph
17 6070333 6070346 6070328 16 29 11
18 6070333 6070345 6070328 16 28 11 charts such moving points, it gives a scatter map. The
19 6070345 6070339 6070331 28 22 14 scatter analysis depends on what information you want
20 6070342 6070340 6070327 25 23 9
21 6070337 6070335 6070322 20 18 5 to get. The location is basically three-dimensional,
22 6070343 6070330 6070328 26 12 11 although not everybody is interested in the precision of
μ 6070346 6070343 6070332 29 26 16
σ 9 11 8 9 11 8 three-dimensions. One consumer may be interested in
σ2 81 121 64 81 121 64 horizontal precision, and another may need vertical
accuracy. Therefore, we obviously have to accept
various levels of accuracy [13].
70 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table 4 lists the most widely used metrics and their Figure 3 depicts the horizontal & vertical position
descriptions of the 3D GPS location accuracy. If we error (X, Y, and Z) scatter plot in a 3D surface along
assume that the distribution of errors along every axis with SEP and SAS values concerning the KF algorithm.
is natural or Gaussian then we can also derive the KF: 3-D SAM

probabilities associated with the accuracy measures. Error


SEP (13.20m)
SAS-90% (21.56m)
SAS-99% (29.04m)

Table 4. 3D Position Accuracy Measures 60

-- Error in Z- direction -->


Accuracy 40

Definition

(meters)
Measure 20
90%
The radius of the sphere centered
SEP 0
50%
at the true position, containing
(Spherical error the position estimate in 3-D with -20

probable) 99%
probability of 50% 60
40
80
60
-- Error in Y- direction --> -- Error in X- direction -->
The radius of the sphere centred (meters) 20 40
(meters)
90% Spherical 0
20
at the true position , containing
accuracy standard
the position estimate in 3-D with Fig.3. Position error scatter plot in 3D surface due to KF
(SAS)
probability of 90%
The radius of the sphere centred Likewise, Figure 3, and Table 5 demonstrate that in
99% Spherical
accuracy standard at the true position , containing a 3D surface, 50% of the estimated position errors lying
the position estimate in 3-D with
(SAS)
probability of 99%
within 13.2m, 90% of the estimated position errors lie
within 21.6m, and 99% of the estimated position errors
Table 5 represents the most commonly used lie within 29.0m for KF.
Statistical position Accuracy Measures (SAM) in a 3D
surface, along with their formulas and probabilities. Figure 4 depicts the horizontal & vertical position
error (X, Y, and Z) scatter plot in a 3D surface along
Table 5. Comparison of Statistical Position Accuracy
Measures with SEP and SAS values concerning the CCKF
(meters) algorithm.
SAM Probability
LSE KF CCKF
CCKF: 3-D SAM
SEP 50% 10.6 13.2 9.0 Error
SEP (9.0m)

SAS_90 90% 17.3 21.6 14.7 SAS-90% (14.69m)


SAS-99% (19.79m)

SAS_99 99% 23.3 29.0 19.8 20

15
90%
-- Error in Z- direction -->

Figure 2 depicts the horizontal & vertical position 10

5
(meters)

error (X, Y, and Z) scatter plot in a 3D surface along 0

-5
50%

with SEP and SAS values concerning the LSE algorithm. -10

-15

99%
30 50
LSE: 3-D SAM 20 40
Error -- Error in Y- direction --> 30
10 -- Error in X- direction -->
SEP (10.61m) (meters) 20
SAS-90% (17.33m) 0 10 (meters)
SAS-99% (23.34m)

Fig.4. Position error scatter plot in 3D surface due to CCKF


-- Error in Z- direction -->

20
90%

10
Figure 4 and Table 5 demonstrates that, in a 3D
(meters)

50%
0

-10
surface, 50% of the estimated position errors lying within
9.0m, 90% of the estimated position errors lie within
50 99%
40
30 50
60 14.7m, and 99% of the estimated position errors lie
-- Error in Y- direction -->
(meters)
20
10
20
30
40
-- Error in X- direction -->
(meters)
within 19.8m, respectively from its mean position.
Fig.2. Position error scatter plot in 3D surface due to LSE Therefore, the overall observations summarize that
From Figure 2 and Table 5, it is worth noting that in the GPS receiver position estimation accuracy is
a 3D surface, 50% of the estimated position errors lying significantly improved when using the proposed
within 10.6m, 90% of the estimated position errors lie algorithm, i.e., CCKF algorithm. Hence, the CCKF
within 17.3m, and 99% of the estimated position errors algorithm can estimate the GPS receiver position in the
lie within 23.3m, respectively from its mean position. Indian subcontinent's southern region.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 71
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

CONCLUSION [4] Sirish Kumar, P., and Srilatha Indira Dutt VBS. "Navigation
solutions for GPS receiver position estimation over the southern
A new Kalman type filtering algorithm, called Cross region of India." Int J Recent Technol Eng (IJRTE), vol. 7, Issue.6,
Correntropy Kalman filter (CCKF), has been proposed 2019.

in this paper. The CCKF is derived by using the [5] Kou, Y., Wu, H. Model and implementation of pseudorange-
bias-free linear channel. GPS Solut 25, 53, https://doi.org/
correntropy criterion as the optimality criterion, instead 10.1007/s10291-021-01093-3, 2021.
of using the well-known minimum mean square error
[6] P. Sirish kumar, V. B. S. Srilatha Indira Dutt, "A sensitivity
(MMSE) criterion. The proposed method was utilized analysis of extended kalman filter for GPS position estimation
to estimate the position of a GPS receiver located at with and without clock offset", Materials Today: Proceedings,
IGS station: IISc, Bangalore (Lat/Lon: 13.010 N/77.56 vol. 33, pp. 3626-3629,2020.

0 E) and its performance was compared against [7] X. Wang and M. Liang, "GPS Positioning Method Based on
Kalman Filtering," 2018 International Conference on Robots &
traditional Kalman filter. The estimated receiver position Intelligent System (ICRIS), Changsha, China, , pp. 77-80, doi:
and error, along with its mean, standard deviation, and 10.1109/ICRIS.2018.00028, 2018.
SAM obtained from the three algorithms i.e. LSE, KF, [8] I. Bilik and J. Tabrikian, "MMSE-based filtering in presence of
and CCKF are assessed. Hence from these results, it non-Gaussian system and measurement noise[J]", IEEE
is concluded that the position estimated with CCKF is Transactions on Aerospace and Electronic Systems, vol. 46, no.
3, pp. 1153-1170, 2010.
more accurate than KF.The results show that the
[9] Liu, Xi, et al. "Extended Kalman filter under maximum correntropy
proposed method (CCKF) outperformed traditional criterion." 2016 International Joint Conference on Neural
Kalman filter and is suitable for real time defense Networks (IJCNN). IEEE, 2016.
applications like navigation of ships, landing of CAT I [10]P. Sirish kumar, V. B. S. Srilatha Indira Dutt, L.Ganesh,
and II aircrafts etc. over the Indian subcontinent. "Implementation of new navigation algorithm based on cross-
correntropy for precise positioning in low latitude regions of
REFERENCES South India", International Journal of Speech Technology (IJST),
https://doi.org/10.1007/s10772-020-09727-6.
[1] Sasibhushana Rao G., Lavanya B. et al., "Satellite Horizon Effects
on Temporal GPS Receiver Position Accuracy over Coastal Area [11]X. Liu, B. Chen, H. Zhao, J. Qin and J. Cao, "Maximum
of South India",. In: Bansal J., Das K., Nagar A., Deep K., Ojha Correntropy Kalman Filter With State Constraints," in IEEE
A. (eds) Soft Computing for Problem Solving. Advances in Access, vol. 5, pp. 25846-25853, 2017 doi: 10.1109/
Intelligent Systems and Computing, vol 817. Springer, Singapore, ACCESS.2017.2769965.
2019.
[12]Chen, et al. "Convergence of a fixed-point algorithm under
[2] Santra, Atanu, et al. "Precision of satellite-based navigation maximum correntropy criterion." IEEE Signal Processing Letters,
position solution: A review using NavIC data." Journal of vol. 22, Issue.10, pp.1723-1727, 2015.
Information and Optimization Sciences, vol.40, Issue.8 ,pp. 1683-
1691, 2019. [13]P. Sirish Kumar, V. B. S. Srilatha Indira Dutt "The Global
Positioning System: Popular Accuracy Measures, Materials
[3] Yang, Y., Yang, Y., Hu, X. et al. BeiDou-3 broadcast clock Today: Proceedings 33 (2020) 4797-4801, https://doi.org/
estimation by integration of observations of regional tracking 10.1016/j.matpr.2020.08.380.
stations and inter-satellite links. GPS Solut 25, 57, https://doi.org/
10.1007/s10291-020-01067-x, 2021.

72 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Analysis and Modification of a Smart Light and


Movement Regulator
Benjamin. O. Ezurike1, Stephen. A. Ajah2, Uchenna Nwokenkwo3, Udora. N. Nwawelu4, Philip Eze5
1,3,5
Department of Mechatronic Engineering, 2Department of Mechanical Engineering,
1,2,3,5
Alex Ekwueme Federal University, Ndufu Alike Ebonyi State, Nigeria
4
Department of Electronic Engineering, University of Nigeria, Nsukka Enugu State
Email: ben4oke2000@yahoo.com1, ajahstephen@gmail.com2, urch53271@gmail.com3, nwabuoku.nwawelu@unn.edu.ng4,
ezephilip54@yahoo.com5

Abstract - The analysis and modification of a algorithm that will count the figures coming in as well as
smart light and movement regulator is presented. turning the room light ON. The people in the place are
The main purpose of the study was to create a counted using sensors and immediately displayed on 7
controller-based system that would count the segment display at the entrance door. The continuous
amount of guests as well as turning the room light
requirement of automatic home appliances in today's
ON each time a visitor comes in. This system
world is very important because it helps to create safety
calculates how many persons going into a room like
offices and classrooms per time. This function is consciousness and awareness. As a result, the need
implemented using PIR and LDR. Seven-segment developing a device that would ensure that whoever
display unit is placed outside the room to show all comes in and goes out of a place is monitored,
the persons that entered the place. This visitor necessitated this research. This also helps to ensure that
counter indicates an additional person whenever the room is not heavily congested per time. If the counter
someone enters the room and at the same time is entered by someone, the lights in that particular room
turns the lights in the room ON. And in a reverse will be switched ON. The lights would automatically
way, visitors counter will decrease whenever go OFF whenever the room is empty. These tasks are
someone exits the room using LDR sensor. done by the program coded in the microcontroller 8051
Whenever there is nobody inside, the relay
and shown on the 7 segments show unit. The sensors
interface which is smart, turns off the light.
send signals to the microcontroller and these signals
Keywords - Arduino, Sensor, Visitor Counter, are controlled by the software which is stored in ROM.
Bio-Directional, Microprocessor Microcontroller 8051 simultaneously scanning the
INTRODUCTION Passive Infrared Ray receivers, anytime there's a
movement across the passive infrared ray collector, then
The necessity to have a system which will
the Passive Infrared will send a signal to the receiver
spontaneously control the lighting arrangement of an
and be obstructed, this obstacle is sensed by the
area and capable of checking the amount persons in a
Microcontroller. [1] The operation sequence is
room on its own is has over stayed. Fire outbreaks that
controlled by a program which is a set of instructions
occur in various homes originate when the occupants
coded in the microcontroller so that the system can read
are either sleeping or not around the house. The
and interpret them. The light dependent resistor (LDR)
designed system can check every person present in such
sensor does the work of reducing the amount of persons
places like; offices, conference hall, sports venue, etc.
allowed to enter per time. Also, whenever a visitor
The whole circuit has been designed to be user-friendly
passed through the door (where the LDR is installed)
with its operation and the working principle self-
the number of visitors is restricted according to the
explanatory. This project would be useful to both
number of people that left the house or room. The
technology developers and the general public at large.
obstruction is sense and communicated to the
The work which was aimed at using a controller-based
microcontroller through the LDR transmitter. [2] The
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 73
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

microcontroller will then signal to the relay to switch


OFF the lights whenever there are no persons present.
The Programmed chamber light controller with guest
counter, not only put ON and OFF the lighting system,
but can a turn on the fan automatically whenever there
is someone sitting inside the room. [3] This invention is
to save energy and is readily available and eco-friendly.
Whenever someone comes inside the chamber the
counter automatically increases by one [4] thereby
prompting the light to come ON and vice-versa when
the person or anyone in the place leaves. Consequently,
Fig. 1: System Block Diagram
whenever there is no one available in the room, the
illuminating gadget carefully goes off. These are all A. Principle of operation
shown on the Liquid Crystal Display (LCD) [5]. The The PIR and LDR antennas are positioned at both
modification to the system was the application of the entry and exit points. As such, it is configured in a
ultrasonic sensors which detects objects at long distance manner which ensures one is fixed at the back of the
as compared to the conventional method that makes other. This is to ensure the sensors are able to capture
use of an IR sensor. This new design is also innovative the person at the uninterruptedly. Moreover, the
as it allows the user to operate the machine with the antennas must not be found at the same time - the reason
use of (RF) technology instead of having to be present the sensors should be restricted only to the entrance
at a particular location to operate the system [6]. This and exit area. As a result of the time delay algorithm
machine can be used successfully in areas which makes which is minute, the 7-segment display keeps refreshing
sure that everyone is checked and monitored. [7] This to avoid time lag at any point in time.
automated global Machinery is exceptionally best-in-
class and we lean toward things to be done Mathematical model
consequently with no human interference and likewise From Ohms law;
assists with decreasing human assistance. This has also V=IR (1)
reduced time and resources been expended to know
the number of persons entry a place which was been Hence,
done manually before now. [8] R=V/I (2)
METHODOLOGY Where; R is resistance, V is voltage, I is current
The following materials are used to design the circuit; For a number of given resistors, the equivalent of
1. LM358 IC the resistors is given as;
2. IR Transmitter with receiver Pair R = R1+ R2+......+ Rn; (series) (3)
3. Resistors
4. Capacitors
The mathematical expression of capacitance is
5. Light Emitting Diode
C=QV (5)
Where C is the capacitance, Q is the charge, and V
is the Voltage

74 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The output voltage to the system can be calculated


based on Faraday's law of induction below:
III. RESULT AND DISCUSSION
A. Experimental Results
Where Vs is the secondary voltage, is the rate of The research work was experimented and tested
change of magnetic flux, Ns is the number of loop in with a PIR and LDR sensing targets model. The
the secondary coil. efficiency of the sensors is calculated using equation
(11), i.e
PIR sensing efficiency (E) =
Where Vp is the primary voltage, Np is the number
Where E is the sensing efficiency
of loop in primary coil.
MD = sensor measured detection, and ED = sensor
Analysis and Design of the Power Supply Unit
expected detection.
To calculate the value of the filter capacitor, we
Sensing error = measured detection - expected
apply the equation:
detection
LDR Sensing distance covered is calculated using
equation (12) =
Fr = Frequency of ripples = 100Hz (50Hz + 50Hz)
RL = Minimum Load resistance for the output B. For Sensor Height
The expected detection is 110cm
To achieve the desire accuracy, error is calculated
The design display interface is a seven segment using measured detection - expected detection
display (SSD) the calculation is obtained as follows: Table 1: Sensor Height

For SSD, Rs = R1 to R4 Measured detection Expected detection Error in


in (cm) in (cm) (cm)
250 110 140
200 110 90
Vs=Vcc- Vf 150 110 40
IS = IF 100 110 -10
50 110 -60
Where Vcc (voltage common collector) is the higher
voltage with respect to the ground; VF (forward voltage)
voltage required to activate the LED and produce an
output; VS (supply voltage), IS (supply current), IF
(forward current).

Where E is the sensing efficiency, MD is the sensor


measured detection, and ED is the sensor expected
detection. Fig. 2: System's PIR Sensing Chart.
Sensing error = measured detection - expected The target height at which the sensor is installed is
detection given as 200cm
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 75
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

From equation (11)

From fig 4, the sensor was tested at different height


to obtain the desire height for installation. In order to
minimize error in sensing, 200cm measured height was
used and 71.8% efficiency was achieved at the
increment and decrement section. The PIR sensor and
LDR sensor were installed at the same height in the
Fig. 4. LDR Sensing Distance
opposite side of the single door. The chosen height helps
the sensor to detect both a tall or short visitor entering The distance at which the two sensors detect the
the room. presence of human is analyzed in figure 4.3. From this
graph, the maximum distance at which the sensor
detects visitors entering or leaving the room is 3m. Any
visitor within this range is sensed by PIR sensor or LDR
sensor. Anybody that passes the above range cannot
be detected by the sensors. This is to avoid counting
people that are passing by and to prevent counting
people within the room when they are walking around
the room. The LDR sensor varies with force that comes
with the light that consequently hits it, further enabling it
as a light sensing circuit. Relay controls the switching
process with the help of information from the
Fig. 3. Analysis of already existing system's ultrasonic sensor microcontroller. And PIR sensor works based on
chart motion or movement of the visitor.
Ultrasonic sensing Efficiency = 63.6% IV. CONCULSION AND
From the chart in figure 4.2 the already existing RECOMMENDATION
system sensing efficiency is 63.6%. The designer only Automatic room light controller with visitor counter
considered the height of adult people entering the room. can be used in developing economies for smarter homes.
This device has error in counting visitors that are short This not only controls the crowd, ensures that whoever
in height. Since system does not count children it also enters a particular room during an event is accounted
affects adults that are short. The existing system's sensor for. It is recommended that additional rays be added to
was installed at the height of 250cm. When visitors are the design to enable it allow more people pass especially
entering or leaving the room, it only sees people within in a hugely crowded event.
the specified height. The cause of this problem was Table 2. Distance
because the sensing error is higher than the expected
Time Speed Distance
detection height for the count.
(second) (m/s) (m)
C. Sensing Distance 2 3.5 2.5
3 4.0 6
The distance at which the sensor captures presence 4 4.5 9
of human is calculated using this formula below: 5 5.0 12.5
6 5.5 16.5

But time = decrementing or incrementing time, and


speed = individual movement speed.
76 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

V. REFERENCES [8] Y. w. Bai, C. F. J and Y. T. taipei and Ku, "Automatic Room Light
Intensity Detection and Control using a Microprocessor and
[1] G. Smith, "Introduction to Arduino," 2011. Light Sensors," Automatic room light intel, pp. 34-40, 2013.
[2] C. &. A. C. Subhankar, "Bidirectional Visitor Counter System [9] Dr.S.Deepa, Y.R.Saravanakumar, P.Kirubakaran, K.Vijaykumar
with Automatic Room Light Controller and Arduino as the Master and M.Tharun, "Bidirectional Visitor Counter with Automatic
Controller.," International Journal of Scientific and Research, pp. Room Light Controller," International Research Journal of
20-25, 2016. Engineering and Technology (IRJET), vol. 08, no. 04, p. 3, 2021.
[3] G. Waradkar, H. Ramina, V. Maitry, T. Ansurkar and A. r. a. P. [10]C. Thomas, "Automatic Room Controller With Bidirectional
Das, "Automatic Room Light Controller using a Bidirectional Visitor Counter," International journal of current engineering and
Visitor Counter.," Imper j. Interdisc, vol. 4, no. 2, 2016. scientific research (IJCESR), vol. 6, no. 2, p. 5, 2019.
[4] M. Umar, F. Aamna, Shakoor and A. Siddique, "Automated Room [11]P. D. S. P. Rasal, "Implementation of Visiting Counter,"
Light Controller with Visitor Counter Using Arduino," Advances International Journal of Emerging Trends in Electrical and
in science technology and engineering systems, pp. 10-15, 2016. Electronics (IJETEE - ISSN: 2320-9569, vol. 7, no. 2, p. 6, 2013.
[5] S. e. a. A. Dey, "Design of Controllable Bidirectional Visitor [12]Anon, "Solar LED Street Lights using Ultrasonic Sensor," 2017.
Counter," Int. J. Innov. Res. Elct Electro, Instru. Cont. Engg., [Online]. Available: https://www.researchgate.net/publication/
pp. 133-136, 2016. 317649190_Solar_Led_Street_Lights_using_Ultrasonic_Sensor.
[6] K. S. N. A. mathur, "Bidirectional Visitor Counter Electronics [Accessed 06 01 2021].
for you," 2016. [Online]. Available: http://www.scribd.com/doc/ [13]C. P., "PIR Sensor Basics and Applications," 2011. [Online].
49533576/BiDirectional-VisitorCounter. Available: https://www.elprocus.com/pir-sensor-basics-
[7] P. K. Shah and M. P. Savaliya, " Automatic Room Light Controller applications/. [Accessed 4 3 2021].
with Bidirectional Visitor Counter," Int. J. ICT Res. Develop,
2015.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 77


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Study and Analysis of Various Image Enhancement


Method using MATLAB
Y. Mahesh1, B.Suresh Babu2
1
Associate Professor, VEMU Institute of Technology- P.Kothakota
2
Associate professor, SRIT-Anantapur
Email: phdmahesh@gmail.com1, Sureshdecs10@gmail.com2

Abstract - The main objective of image which the set of pixel values of one image is transformed
enhancement is to process the input image so that to a new set of pixel values so that the new image formed
the processed image will look much better. Image is visually pleasing and is also more suitable for analysis
enhancement refers to accentuation, or sharpening [8]. Hue, saturation and intensity are the attributes of
of image features such as edges, boundaries, or
color.
contrast to make a graphic display more useful for
display and analysis. It plays a vital role in every Hue is that attribute of a color which decides what
field. This paper covers two parts: first part is based kind of color it is, i.e., a red or an orange. In the
to the study of various types of images and image spectrum, each color is at the maximum purity (or
enhancement and second part is based on analysis strength or richness) that the eye can appreciate, and
of various basic intensity transformation functions the spectrum of colors is described as fully saturated.
in image processing. All these analysis is
If a saturated color is diluted by being mixed with other
performed in MATLAB software. We get various
colors or with white light, its richness or saturation is
results in term of output images and their
histograms respectively. Here we see that each decreased. For the purpose of enhancing a color image,
transformation function is suitable for some it is to be seen that hue should not change for any pixel.
particular applications, not for all. So, According to If hue is changed then the color gets changed, thereby
application requirement, we choose a particular distorting the image [7, 8].
transformation function for image enhancement. We all know that there are various image processing
Keywords -Image processing, Image techniques which we use to process the image. But,
enhancement, Matlab, Hue Transformation, Log one question arise in our mind that what is the need of
transformation, Power Law Transformation. Image Processing techniques and why we process these
I. INTRODUCTION images? So, the answer is motivated by three major
applications [4,7,13]:
Image enhancement refers to accentuation, or
sharpening of image features such as edges, boundaries, Improvement of pictorial information for human
or contrast to make a graphic display more useful for perception. It means whatever image we get, we want
display and analysis. The enhancement process does to enhance the quality of the image. So, that the image
not increase the inherent information content in the data. will have a better look and it will be much better when
But it does increase the dynamic range of the chosen we look at them. Image processing for autonomous
features so that they can be detected easily. Image machine application.
enhancement includes gray level and contrast This has various applications in industries particularly
manipulation, pseudo-coloring, and so on [6]. for quality control, in assembly automation and many
Image enhancement is used to improve the quality such applications.
of an image for visual perception of human beings. It is Efficient storage and transmission. For example, if
also used for low level vision applications. It is a task in we want to store an image on a computer, then this

78 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

image needs a certain amount of disk space. Now, we II. CLASSIFICATION OF IMAGES
will look at whether it is possible to process the image An image can be classified by following categories:
using certain image property.
A. Intensity Images:
So that, the disk space required for storing an image
will be less. Not only that, we can also have applications An intensity image is a data matrix whose values
heard we wants to transmit the image, or a video signal have been scaled to represent intensities. When the
over a transmission media and in that case, if the elements of an intensity image are of class unit 8, or
bandwidth of the transmission medium is very low, we class unit 16, they have integer values in the range [0,
will see that how to process the image or the video can 255] and [0, 65535].respectively. If the image is of
be transmitted over low bandwidth communication class double, the values are floating-point numbers.
channel. Values of scaled, class double intensity images are in
the range [0, 1] by convention.
So, let us first look at first major application which
is meant for human perception. Now, these methods 5 6 13 1
9 8 15 11
mainly employ different image processing techniques
3 1 7 6
to enhance the pictorial information for human 15 10 12 14
interpretation and analysis [1, 2, 3]. Figure 1. 4x4 Intesity Images
Typical applications of these kinds of techniques are: B. Indexed Images
Noise Filtering: In some cases, the images we will Array of class logical, unit 8, Unit 16, single, or double
get have some very noisy. So, we have to filter those whose pixel values are directed indices into a color map.
images so that the noise present in the image can be The color map is an m-by-3 array of class double. For
removed and the image appears much better. In some single or double arrays, integer values range from [1,
other kind of applications, we may have to enhance p]. For logical, unit8, or unit 16 arrays, values range
certain characteristics of the image. So the different kind from [0, p-1]. An indexed image consists of an array
of applications, we may have to enhance certain and a color map matrix.
characteristics of the image. There is some other kind
of application under this category is Contrast The pixel values in the array are directed indices
Enhancement. into a color map.

Content Enhancement: It covers two techniques


such as Contrast Enhancement and Deblurring. So,
sometimes the image may very poor contrast and we
have to enhance the contrast of the image for better
visual. In some other cases, the images may be blurred,
this blurring may occur due to various reason such as
Figure 2. Elements of an indexed image. Note that
may be camera sitting is not proper or the lens is not
the value of an element of integer array X determines
focus properly, so that leads to one kind of blurring.
the row number in the colormap. Each row contains an
The other kind of blurring can be if we can take a picture
RGB triplet, and L is the total number of rows.
from a moving train or moving car, in that case we might
have observed the image that we get a blurred image C. Binary Images
or not cleared image. Binary images have a very specific meaning in
Remote Sensing: In remote sensing, the type of MATLAB. In a binary image, each pixel assumes one
image which are used of the aerial images. In most of of only two discrete values: 1 or 0, interpreted as black
the cases, the aerial images are taken from the satellite. and white, respectively.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 79


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The color of each pixel is determined by the


combination of the red, green, and blue intensities stored
in each color plane at the pixel's location. Graphics file
formats store true color images as 24-bit images, where
the red, green, and blue components are 8 bits each.
This yields a potential of 16 million colors. The precision
Figure 3. Binary image with which a real-life image can be replicated has led
D. Grayscale Images to the commonly used term true color image.

A grayscale image is a data matrix whose values III. BASIC INTENSITY


represent intensities within some range. MATLAB stores TRANSFORMATION FUNCTIONS
a grayscale image as an individual matrix, with each Intensity transformations are among the simplest of
element of the matrix corresponding to one image pixel. all image processing Techniques. The values of pixels,
By convention, this documentation uses the variable before and after processing, will be denoted by f(x,y)
name I to refer to grayscale images. Array of class unit8, and g(x,y), respectively.
unit16, int16, single, or double whose pixel values. For g(x,y) = T [f(x,y)] ……….. (1)
single or double arrays, values range from [0, 1]. For
unit8, values range from [0, 255]. For unit16, values where, T is a transformation that maps a pixel value
range from [0, 65535]. For int16, values range from [- form f (x,y) into pixels g(x,y). Here f(x,y) is input image
32768, 32767]. and g(x,y) is output or processed image.
A. Negative Image Transformation
The most basic and simple operation in digital image
processing is to compute the negative of an image. The
pixel gray values are inverted to compute the negative
of an image. For example, if an image of size X-by-Y,
where X represents number of rows and Y represents
Figure 4. Grayscale image
number of columns, is represented by me (x,y). The
negative n(x,y) of image f(x,y) can be computed as [11,
E. True Color Images 12]:

Figure 5. Color image


Original Digital Mamogram Image Negative Image of
Original Digital Mamogram Image
A true color image is an image in which each pixel is
specified by three values one each for the red, blue, Figure 6. Input Mammogram and output negative
Mammogram image.
and green components of the pixel's color. MATLAB
store true color images as an m-by-n-by-3 data array n(x,y) = 255 - f(x,y) ……… (2)
that defines red, green, and blue color components for where, 0 ≤ x ≤ X and 0 ≤ y ≤ Y
each individual pixel. True color images do not use a
color map.
80 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Here f(x,y) is input image and g(x,y) is output or values. The opposite is true of the inverse log
processed image. It can be seen that, see expression transformation. However, the log function has the
(2), every pixel value from the original image is important characteristic that it compresses the dynamic
subtracted from the 255. The resultant image becomes range of images with large variations in pixel values [10,
negative of the original image. Reversing the intensity 11].
levels of an image in this manner produces the equivalent The log transformation maps a narrow range of low
of a photographic negative. input grey level values into a wider range of output
Negative images are useful for enhancing white or values. The inverse log transformation performs the
grey detail embedded in dark regions of an image [5, opposite transformation. Log functions are particularly
14]. useful when the input grey level values may have an
extremely large range of values, see figure 10 and figure
11 [12, 14].

Original Image After log Transformation Image


Figure 8. Input image and output log transform image
Histogram of Original Digital Mamogram Image

Histogram of Negative Image of Original Digital Mamogram


Image
Histogram of Original Image
Figure 7. Input Mammogram Histogram and output negative
Mammogram Histogram image.

B. Logarithmic Transformations Function


The general form of the log transformation:
g(x,y) = c log2 [1 + f(x,y)] ………. (3)
where c is a constant, here we choose c=0.1.
Here f(x,y) is input image and g(x,y) is output or
processed image. This transformation maps a narrow
range of low gray-level values in the input image into a
Histogram of after Log Transformation Image
wider range of output levels. The opposite is true of
Figure 9. Histogram of Input image and histogram of output
higher values of input levels. We would use a log transform image Grey levels must be in the range [0.0,
transformation of this type to expand the values of dark 1.0].
pixels in an image while compressing the higher-level

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 81


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

C. Power-Law Transformations Function This transformation function is also called as gamma


The general form of the power-law transformation: correction. For various values of  different levels of
enhancements can be obtained. This technique is quite
g(x,y) = c[f(x,y)] ……… (4) commonly called as Gamma Correction. If you notice,
where c and  are positive constants. We use c= different display monitors display images at different
0.1 and  = 0.465. intensities and clarity. That means, every monitor has
built-in gamma correction in it with certain gamma ranges
Here f(x,y) is input image and g(x,y) is output or
and so a good monitor automatically corrects all the
processed image. Sometimes expression (5) is written
images displayed on it for the best contrast to give user
as
the best experience. The difference between the log
g(x,y) = c*[f(x,y) + exp.]  ………. (5) transformation function and the power-law functions is
to account for an offset (i.e. a measurable output that using the power-law function a family of possible
when the input is zero). However, offsets typically are transformation curves can be obtained just by varying
an issue of display calibration and as a result they are the .
normally ignored in expression (5) [9, 12]. D. Hue Transformation Function
Hue preservation is necessary for color image
enhancement. Hue is what most people think of when
we say "color." Hue is the name of a distinct color of
the spectrum- red, green, yellow, orange, blue, and so
on.
Original Image

After power law transformation Image Input Image Out Hue Transformation
Function Image
Figure 10. Input Image and output power law transformation
i ma g e Figure 14. Input and hue transformation output image

Histogram of Input Image

Histogram of Original Image

Histogram of Output Hue Transformation Function Image


Figure 15. Histogram of Input and hue transformation output
i ma g e

Histogram of After Power law Transformation Image


IV. CONCLUSIONS
Figure 11. Histogram of Input Image and histogram of output Image enhancement is the improvement of digital
power law transformation image [13]
image quality (wanted e.g. for visual inspection or for
machine analysis), without knowledge about the source
82 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

of degradation. In this paper, the study of various types [8] Berns, R. S., Billmeyer, F. W., and Saltzman, M. (2000), "Billmeyer
and Saltzman's Principles of Color Technology", 3rd ed. New
of images, image enhancement, and their analysis is York: Wiley.
successfully done. This paper analysis is based on some
[9] Yang, C. C. and Kwok, S. H. (2000), "Gamut Clipping in Color
basic intensity transformation function. All these methods Image Processing", IEEE, pp. 824-827.
for greyscale images and color images show good result. [10] Naik and Murthy, C. A. (2003), "Hue-Preserving Color Image
REFERENCES Enhancement Without Gamut Problem" in THE IEEE transactions
on image processing, vol. 12, no. 12, december pp.1591-159.
[1] Toet, A. (1992), "Multiscale color image enhancement," Pattern
[11] Chen, Soong-Der, and Rahman (2004), "Preserving brightness
Recognit. Lett., vol. 13, pp. 167-174.
in histogram equalization based contrast enhancement
[2] Trahanias, P. E. and Venetsanopoulos, A. N. (1992), "Color image techniques," Digital Signal Processing, Vol 12, No.5, pp.413-
enhancement through 3-D histogram equalization," in Proc. 15th 428.
IAPR Int. Conf. Pattern Recognition, vol. 1, pp. 545-548.
[12] Sun, C. C. , Ruan, S. J., Shie, M. C., Pai, T. W. (2005), "Dynamic
[3] Mlsna, P. A. and Rodriguez, J. J. (1995), "A multivariate contrast Contrast Enhancement based on Histogram Specification," IEEE
enhancement technique for multispectral images," IEEE Trans. Transactions on Consumer Electronics, Vol. 51,No.4, pp.1300-
Geosci. Remote Sensing, vol. 33, no. 1, pp. 212-216. 1305.
[4] Yang, C. C. and Rodriguez, J. J. (1995), "Efficient luminance and [13] Murtaza, Mashhood, Ahmad, Jahanzeb, and Usman (2006),
saturation processing techniques for bypassing color coordinate "Efficient Generalized Colored image Enhancement", IEEE, CIS.
transformations," in Proc. IEEE Int. Conf. on Systems, Man,
[14] Zhiming, WANG, and Jianhua, TAO (2007) "A Fast
and Cybernetics, vol. 1, pp. 667-672.
Implementation of Adaptive Histogram Equalization" 8th
[5] Mlsna, P. A., Zhang, Q., and Rodriguez, J. J. (1996), "3-D International Conference on Signal Processing.
histogram modification of color images," Proc. IEEE Intl. Conf.
[15] Taguchi, Akira (2008), "Enhancement of MPEG/JPEG Images
Image Processing, vol. III, pp. 1015-1018.
Based onHistogram Equalization Without Gamut Problem", 2008
[6] Zhang, Q., Mlsna, P. A., and Rodriguez, J. J. (1996), "A recursive IEEE Conference on Soft Computing in Industrial Applications
technique for 3-D histogram enhancement of color images," Proc. (SMCia/08), June 25-27, Muroran, JAPAN.
IEEE Southwest Symp. On Image Analysis and Interpretation,
[16] Kyung, Wang et. al. (2011), "Hue Preservation using Enhanced
pp. 218-223.
Integrated Multi-scale Retinex for Improved Color Correction",
[7] Thomas, B. A., Strickland, R. N., and Rodriguez, J. J. (1997), Journal of Imaging Science and Technology, 55(1): 010504-
"Color image enhancement using spatially adaptive saturation 010504- 10.
feedback," in Proc. IEEE Int. Conf. on Image Processing.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 83


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Railway Track Crack Detection and Alert System using


Arduino
B. Sreevalli1, D. Hemalatha2, Manjusha Chinta3
1,2,3
Dept. of E.C.E, Narayana Engineering College, Dhurjati Nagar, Gudur.
Email: valli2000ece@gmail.com1, dasari.hemalatha22@gmail.com2, manjusha.chinta@necg.ac.in3

Abstract: In India, rail is quite possibly the most resolve this issue of crack detection in railway tracks
every now and again utilized methods for transport, with the most extreme consideration because of the
the fourth biggest railway assemblage on the planet. recurrence of the utilization of railway lines. Because of
Albeit the Indian railways are going through an
the manual railway line checking and sporadic support,
excellent blast, a portion of the fundamental issues,
there is a high possibility that these cracks are by and
for example, the issue at the door crossing, the
fire fiascos and the issue out and about that stays large ignored. Henceforth, there is a requirement for
unattended and causes derailment, stay beset. computerized frameworks to investigate and recognize
Because of changes in the season the inclines the cracks in the railway lines. A large portion of the
contract and expand. Therefore, cracks on the track current frameworks are outfitted with Light Dependent
can create. This proposed framework identifies the Resistor (LDR) and Light Emitting Diode (LED), the
cracks and obstructions on the track by means of disadvantages with these sorts of frameworks are the
sensors and utilizations a GSM and GPS module to sensors need to be adjusted inverse to one another to
alarm the control room through a SMS. The recognize the cracks. In our work, we have utilized a
primary goal is to recognize the cracks on the solitary module ultrasonic sensor, which has both
railway track to keep away from train mishaps
transmitter and beneficiary addressing arrangement
because of derailment. This model proposes a
issues.
financially savvy answer for the issue of railway
track crack detection using ultrasonic sensor get The fundamental issue is that there is no solid and
together which tracks the specific area of flawed reasonable hardware to analyze train track issues and
track, then, at that point illuminate to close control the absence of legitimate support. The appropriate
room through SMS, so numerous lives will be working and upkeep of transport framework, in any
saved. case, fundamentally affects the economy. This model
Keywords: Arduino Uno, Ultrasonic sensors, talks about a proposed test train plan for distinguishing
GSM Module, GPS Module, DC Gear Motors. impediments and cracks, like the line following the test
I. INTRODUCTION train. To overcome this issue multiple techniques have
been proposed which involve graphical inspections,
The Indian Railway network is the fourth biggest in Non-destructive testing (NDT) technologies such as
the world with a course length of 67,368 Kilometers magnetic field methods, radiography, fiber optic sensors
(41,861 mi), a absolute track length of 121,407- of various kinds, use of LDR[1] etc. Another composite
kilometer (75,439 mi) and 7,349 Railway stations. In detection framework is proposed which comprises of
contrast with the worldwide guidelines, the Indian laser source, an advanced preparing CCD camera and
railway networks do not have the wellbeing framework an oversight framework. These current frameworks for
causing incessant derailment bringing about extreme loss detection of crack are either not extremely exact or a
of human lives. In the year 2016-17, India has seen the bit of unwieldy interaction. The essential target of the
most elevated demise cost in the decade because of proposed work is to foster a minimal expense breakage
derailments and out of which 90% were because of detection arrangement of railway tracks utilizing
cracks in the railway tracks. Hence, there is a need to
84 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

ultrasonic sensors and send the area data to the In this task we presented the incorporation of
approved faculty for additional activity. ultrasonic and absolute station for railway track
II. LITERATURESURVEY calculation looking over framework. this venture
comprise of GPS module, GSM modem, IR sensor,
Shailesh D. Kuthe, Sharadchandra A. Amale, Vinod PIR sensor for utilization of correspondence reason,
G. Barbuddhye "Modern Method for Detecting Cracks crack detection and finding of individual present in the
In Railway Tracks By The Efficient Utilization Of railway track. The GPS module and GSM modem assist
Ultrasonic Sensor System" us with finding and sending railway mathematical
In the proposed design, the LED will be attached to boundary of crack detection to closest railway station.
one side of the crack sand the LDR to the opposite III. PROPOSED SYSTEM
side. During typical activity, when there are no cracks,
the LED light doesn't fall on the LDR and consequently We use Arduino UNO board in this proposed
the LDR obstruction is high. Accordingly, when the LED system. Arduino is an integrated open source
light falls on the LDR, the obstruction of the LDR gets development environment, which simplifies coding
diminished and the measure of decrease will blare considerably. The system proposed is consisting of an
generally relative to the power of the episode light. As ultrasonic sensor designed to detect cracks and IR
an outcome, when light from the LED veers off from its sensors used to detect obstacles. The motor controller
way because of the presence of a crack or a break, an L293D helps to power the DC motors. The Arduino
unexpected reduction in the opposition worth of the controller is primarily used for controlling the sensor
LDR results. This adjustment of opposition outputs and is used for the transmission of information
demonstrates the presence of a crack or some other through GSM module, the purpose of which is to send
comparative underlying deformity in the rails. To the signal to the base station whenever a crack or
recognize the Existing area of the gadget if there should obstacle is detected via an SMS. Using the GPS
be an occurrence of detection of a crack, a GPS module, the exact latitude and longitudinal direction of
recipient whose capacity is to get the Existing scope the faulty track is obtained.
and longitude information is utilized. To convey the got A. BLOCK DIAGRAM:
data, a GSM modem has been used.
V.Muralidharan, V.Dinesh, P.Manikandan "An
Enhanced Railway Track Crack Detection System",
This strategy is utilized for outside of base station.
Estimating distance between two rail tracks IR sensors
are utilized to recognize the crack in the track. In the
event that anybody seeking after on the track implies
they stop the studying work IR sensors used to
distinguish the crack in railway track. Two IR sensors
are fixed before the train is utilized to discover the crack
on the rail. Every sensor will create the sign related Fig. Block diagram

situation with the rail. HARDWARE REQUIREMENTS:


Sadhana Gawade, Sandhya Solunke, Supriya • Arduino Uno(ATMega 328P)
Nimunkar, Yogita Survase "CRACK DETECTION
• Ultrasonic sensors
SYSTEM FOR RAILWAY TRACK BY USING
ULTRASONIC AND PIR SENSOR" • L293 Driver circuit
• DC Gear Motors
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 85
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

• GPS Modem V. RESULTS AND DISCUSSION


• GSM Modem The proposed system has the ability to detect the
• Buzzer crack and obstacles if any on the track. There are many
advantages with the proposed system as compared with
• Battery the traditional detection techniques which include Low
• LCD cost, Low power consumption, fast detecting system
without human intervention and less analysis time. By
SOFTWARE REQUIREMENTS:
this modal we can easily avoid train accidents and
• Software IDE derailments so that many human lives can be saved.
• C Language V. CONCLUSION
B. FLOW CHART: The proposed framework can be utilized to identify
the crack adequately and send the area of issue precisely
in least an ideal opportunity to the predefined portable
numbers. The benefits of the proposed framework are
that it has no clamor, yield is a lot of exact and the
expense is similarly lesser than the composite
framework. This framework can be utilizedbothduring
daytime and evening. In future Solar board can be
associated with power the framework instead of
battery-powered battery utilized for the reason which
would utilize environmentally friendly power sources.

Fig . Flow chart

IV. WORKING PRINCIPLE


The method showcased here is the detection of faulty
rail track using ultrasonic sensors and sending the
information to the near by stations through an SMS
viva GSM case faulty track is detected. In this module,
we are utilizing two ultrasonic sensors. The Ultrasonic
sensor produces ultrasonic sound waves which hits the
article and returns back. In the event that the article has
any crack the time taken for returning the reverberation
signal shifts. It estimates the distance by utilizing the
equation, Test distance = (high level time * sound
velocity (340M/S) / 2. When the testing teach exceeds
the set value, it reads latitude and longitude position of
the faulty track is obtained using GPS module and send
to the base station through GSM modem.

86 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

VII. REFERENCES
[1] Shailesh D. Kuthe, Sharadchandra A. Amale, Vinod G. Barbuddhye
"Modern Method for Detecting Cracks In Railway Tracks By
The Efficient Utilization Of LDR And LED System" Advance
Research in Electrical and Electronic Engineering, Volume 2,
Number 5; April - June, 2015
[2] V.Muralidharan, V.Dinesh, P.Manikandan "An Enhanced Crack
Detection System for Railway Track", International Journal of
Engineering Trends and Technology Volume 21, Number 6 - March
2015.
[3] Prof. P.Navaraja, "Crack Detection System for Railway Track
by ultrasonic and PIR sensor", IJAICT Volume -1, Issue1, May
2014.
[4] Ravi Shankar Shekhar, Purushottam Shekhar, Ganesan P,
"Automatic Detection of Squats in Railway Track", IEEE
Sponsored 2 nd International Conference on Innovations in
Information Embedded and Communication Systems. vol.3, issue.
6, December 2015
[5] Selvamraju Somalraju, Vigneshwar Murali, Gourav Saha,
Dr.V.Vaidehi, "Robust Railway Crack Detection Scheme
(RRCDS) Using LDR Assembly," IEEE Int. Conf. on Networking,
Sensing and Control,vol. 6, issue. 3, May2012.

Fig . System To Detect The Crack On The Railway Track

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 87


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IOT Based Air Quality Monitoring System


S. Chenchu Jyoshna1, P. Srividya2, Manjusha Chinta3
1,2,3
Dept. of E.C.E, Narayana Engineering College, Dhurjati Nagar, Gudur.
Email: chenchu.jyotsna@gmail.com1, srividya.panta468@gmail.com2, manjusha.chinta@necg.ac.in3

Abstract: The level of pollution has increased The living things on earth and under water are
with times by lot of factors like the increase in suffering many problems like change in life due to lack
population, increased vehicle use, industrialization of proper facilities of life.
and urbanization which results in harmful effects
on human wellbeing by directly affecting health of 1.1 Embedded system implementation
population exposed to it. In order to monitor air An embedded system is one kind of a computer
quality, we developed an IOT Based Air Pollution
system mainly designed to perform several tasks like
Monitoring System in which Air trigger a alarm i.e.,
message will be sent when the air quality Quality
to access, process, and store and also control the data
is monitored over a web server using internet and in various electronics-based systems. Embedded
will goes down or above beyond a certain level, systems are a combination of hardware and software
means when there are sufficient amount of harmful where software is usually known as firmware that is
gases are present in the air like CO2, smoke, embedded into the hardware. One of its most important
alcohol, benzene and NH3. It will show the air characteristics of these systems is, it gives the o/p within
quality on the LCD as well as on webpage so that the time limits. Embedded systems support to make
we can monitor it very easily. In this IOT project, the work more perfect and convenient. So, we
you can monitor the pollution level from anywhere frequently use embedded systems in simple and complex
using your computer or mobile. devices too. The applications of embedded systems
Keywords: IoT, MQ135, MQ3, MQ5, mainly involve in our real life for several devices like
MQ7,Thingspeak microwave, calculators, TV remote control, home
1. INTRODUCTION security and neighborhood traffic controlsystems, etc.
Air pollution is the biggest problem of every nation, 1.2 Embedded system:
whether it is developed or developing. Health problems Embedded system includes mainly two sections, they
have been growing at faster rate especially in urban are
areas of developing countries where industrialization and
1. Hardware
growing number of vehicles leads to release of lot of
gaseous pollutants. Harmful effects of pollution include 2. Software
mild allergic reactions such as irritation of the throat,
eyes and nose as well as some serious problems like
bronchitis, heart diseases, pneumonia, lung and
aggravated asthma. According to a survey, due to air
pollution 50,000 to 100,000 premature deaths per year
occur in the U.S. alone whereas in EU number reaches
to 300,000 and over 3,000,000 worldwide. The main
reason for the climate change and people health is air
pollution. It has brought changes in climate like global
warming, global dimming, over raining, drought, storms,
Fig:1.1- Overview of embedded system
acid rain, foggy weather etc.

88 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

1.2.1 Embedded System Hardware: circuit finally displays the PPM values as well as Air
As with any electronic system, an embedded system Quality level of gases on an Android application which
requires a hardware platform on which it performs the fetches data from ThingSpeak. The current model is
operation. Embedded system hardware is built with a implemented successfully and can be deployed for real
microprocessor or microcontroller. The embedded system implementations.
system hardware has elements like input output (I/O) IEEE Transaction(2020), Design and Analysis of IoT
interfaces, user interface, memory and the display. based Air Quality Monitoring System, Ajitesh Kumar,
Usually, an embedded system consists of: The system can measure local area air contamination
• Power Supply and generate analyzed data based on which it alerts the
people through a buzzer device integrated into the
• Processor system. The user-friendly and easy handling of the
• Memory system technology is such that it can be installed in
houses and in small places.
• Timers
III. EXISTING SYSTEM
• Serial communication ports
The existing system is Zigbee based wireless air
• Output/Output circuits
quality monitoring device. The communication between
• System application specific circuits nodes and host is based (Zigbee protocol) using the
1.2.2 Embedded System Software: Zigbee module and the communication between host
and PC is performed through an USB interface.
The embedded system software is written to perform
a specific function. It is typically written in a high level 3.1 Drawbacks of existing method:
format and then compiled down to provide code that • Zigbee is only for limited distance
can be lodged within a non-volatile memory within the
• Due to this we cannot monitor the air quality from
hardware. An embedded system software is designed long distances
to keep in view of the three limits:
• It requires PC to monitor the values, we cannot carry
• Availability of system memory PC and Zigbee receiver all the time.
• Availability of processor's speed So we moved to proposed system.
• When the system runs continuously, there is a need IV. PROPOSED SYSTEM
to limit power dissipation for events like stop, run and
wake up. The proposed IoT based Air Pollution Monitoring
System is as the block diagram as shown. The data of
II. LITERATURE REVIEW
air is recognized by MQ135,MQ3, MQ5, MQ7 gas
IEEE Transaction(2019), Air Quality Arduino Based sensors. The sensor can sense NH3, NOx, alcohol,
MonitoringSystem, Abdullah J. Alabdullah. This paper Benzene, smoke, CO2. So it is dynamic gas sensored
presents a design for a system that aims to notify the for our Air pollution Monitoring system. When it is
residents of VOC's concentration level in both indoor connected to Arduino, then it will sense all gases, and it
and outdoor environments. The system is Arduino- will give the Pollution level in PPM (parts per
based, it will monitor and detect total volatile organic million).Gas sensor will give the output in the form of
compounds (TVOC) and then inform the user via voltage levels and we have to convert it into PPM.
wireless communication system of its levels to take
actions.
IEEE Transaction (2020), Air Quality Sensing and
Reporting System Using IoT, Rohan Kumar Jha. The
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 89
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

4.1 Block Diagram of proposed method: • SENSORS


• MQ3 sensor
Cloud • MQ5 SENSOR
Power Supply server
• MQ7 SENSOR
• MQ135 GAS SENSOR
• LCD
MQ3 Sensor GPRS/GSM Software Requirements:
Arduino

Arduino IDE:
MQ5 Sensor
LCD
Arduino IDE where IDE stands for Integrated
Development Environment - An official software
MQ7 Sensor
introduced byArduino.cc, that is mainly used for writing,
compiling and uploading the code in the Arduino Device.
MQ135 Sensor
Almost all Arduino modules are compatible with this
software that is an open source and is readily available
Fig:4.1- block diagram of proposed method to install and start compiling the code on the go.
4.2 Flow Chart for Proposed Method VI. RESULTS

Fig:4.2- Flow chart of proposed method

V. HARDWARE AND SOFTWARE


REQUIREMENTS
Hardware Requirements:
• ARDUINO
• GSM/GPRS

90 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The graphical analysis of the collected values with [5] WORLD HEALTH ORGANIZATION, AIR POLLUTION
AND CHILD HEALTH-PRESCRIBING CLEAN AIR, WHO,
time on X axis and AirQuality PPM on Y axis.We see GENEVA, SWITZERLAND, 2018, SEPTEMBER 2018,
the output on LCD screen also. H TT P S : / / WW W. W H O . I N T / C E H / P U B L I C AT I O N S /
ADVANCE-COPY-OCT24_18150_AIR-POLLUTION-AND-
VII. CONCLUSION CHILD-HEALTH-MERGED-COMPRESSED.PDF.
This system includes the sensors that detect the [6] G. ROUT, S. KARUTURI, AND T. N. PADMINI,
parameters causing pollution. The sensors are NH3, "POLLUTION MONITORING SYSTEM USING IOT," ARPN
JOURNAL OF ENGINEERING AND APPLIED SCIENCES,
NOx, alcohol, Benzene, smoke, CO 2 sensors. VOL. 13, PP. 2116-2123, 2018.VIEW AT: GOOGLE SCHOLAR
Whenever there is an increase in the level of these [7] .N.KAMARUZZAMAN AND N. A. SABRANI, "THE
parameters the sensor senses thesituation and an alarm EFFECT OF INDOOR AIR QUALITY ( IAQ ) TOWARDS
or indication is given. The message is displayed in the OCCUPANTS ' PSYCHOLOGICAL PERFORMANCE IN
OFFICE BUILDINGS," JOURNAL OF DESIGN AND THE
LCD display. BUILT ENVIRONMENT, VOL. 4, NO. 2001, PP. 49-61, 2011.
The system to monitor the air of environment using [8] E. P. AGENCY, "AN OFFICE BUILDING OCCUPANTS
Arduino microcontroller proposed to improve quality GUIDE TO INDOOR AIR QUALITY," 1997. [ONLINE].
AVAILABLE: HTTP://WWW.EPA.GOV/IAQ/PUBS/
of air. Here the using of MQ3, MQ5, MQ7 and OCCUPGD.HTML.
MQ135 gas sensor gives the sense of different type of
[9] M. G. APTE, W. J. FISK, AND J. M. DAISEY, "INDOOR
dangerous gas and Arduino is the heart of this project CARBON DIOXID CONCENTRATIONS AND SBS IN
which controls the entire process and LCD is used for OFFICE WORKERS," HEALTHY BUILDINGS, VOL. 1, PP.
the visual Output. 133-138, 2000.
[10]C. A. ERDMANN, K. C. STEINER, AND M. G. APTE,
VIII. REFERENCES "INDOOR CARBON DIOXIDE CONCENTRATIONS AND
[1] GSMA, AIR QUALITY MONITORING USING IOT AND SICK BUILDING SYNDROME SYMPTOMS IN THE BASE
BIG DATA: A VALUE GENERATION GUIDE FOR MOBILE STUDY REVISITED: ANALYSES OF THE 100 BUILDING
OPERATORS, 2018, SEPTEMBE,2018, HTTPS:// DATASET," INDOOR AIR, PP. 443-448, 2002.
WWW.GSMA.COM/IOT/WPCONTENT/UPLOADS/2018/ [11]S. DE VITO, G. FATTORUSO, R. LIGUORO, A. OLIVIERO,
02/IOT_CLEAN_AIR_02_18.PDF. E. MASSERA, C. SANSONE, V. CASOLA, AND G. DI
[2] MINISTRY OF ENVIRONMENT, INVESTIGATION FRANCIA, "COOPERATIVE 3D AIR QUALITY
RESULTS OF MINISTRY OF ENVIRONMENT, MARCH ASSESSMENT WITH WIRELESS CHEMICAL SENSING
2019, HTTP://WWW.ME.GO.KR/HOME/WEB/BOARD/ NETWORKS," PROCEDIA ENGINEERING, VOL. 25, PP. 84-
READ.DO?BOARDMASTERID=1&BOARDID=727840&MENUID=286. 87, JAN. 2011.

[3] G. PARMAR, S. LAKHANI, AND M. CHATTOPADHYAY, [12]CHEMICAL SENSING NETWORKS," PROCEDIA


"AN IOT BASED LOW COST AIR POLLUTION ENGINEERING, VOL. 25, PP. 84-87, JAN. 2011.
MONITORING SYSTEM," IN 2017 INTERNATIONAL [13] ZISHAN KHAN, ABBAS ALI, MOINMOGHAL, "IOT
CONFERENCE ON RECENT INNOVATIONS IN SIGNAL BASED AIR POLLUTION USING NODEMCU AND
PROCESSING AND EMBEDDED SYSTEMS (RISE), THINGSPEAK", IRANS, PP. 11-16, MARCH 2014.
BHOPAL, INDIA, OCTOBER 2017.VIEW AT: PUBLISHER
SITE | GOOGLE SCHOLAR [14]SAIKUMAR, M. REJI, P.C. KISHORERAJA "AIRQUALITY
INDEX IN INDIA", IEEE CONFERENCE CHENNAI,
[4] K. OKOKPUJIE, E. NOMA-OSAGHAE, O. MODUPE, S. AUGUST 2014.
JOHN, AND O. OLUWATOSIN, "A SMART AIR
POLLUTION MONITORING SYSTEM," [15] MOHAN JOSHI, "RESEARCH PAPER ON IOT BASED AIR
INTERNATIONAL JOURNAL OF CIVIL ENGINEERING AND SOUND POLLUTION MONITORING SYSTEM",
AND TECHNOLOGY, VOL. 9, PP. 799-809, 2018.VIEW AT: IETS JOURNAL, PP. 11-17, SEPTEMBER 2015.
GOOGLE SCHOLAR

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 91


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Detection of Copy-Move Forgery using Keypoint


Clustering Algorithm
Mrs. P. Tejaswini1, Mr. S. Naveen Kumar2
1,2
Dept of ECE, Vemu Institute of Technology, P Kothakota
Email: tejaswini.412@gmail.com1, naveenkumarsiripuri@gmail.com2

Abstract - Key point based detection is Since in practical forensics applications, figuring out
recognized as effective in copy-move forgery the tampered regions compared to forgery detections
detection(CMFD).This project proposes an is more important and necessary.
efficient CMFD method via clustering SIFT key
points and searching the similar neighborhoods to In this project, an improved CMFD method is
locate tampered regions. In the proposed method, proposed, which includes clustering the key points
the key points are clustered based on scale and before matching and locating the tampered regions at
color, grouped into several smaller clusters and pixel level.
matched separately , which reduce the high time
complexity caused in matching caused by the high II. LITERATURE REVIEW
dimensionality of SIFT. E. Ardizzone , A. Bruno, and G. Mazzola, ''Copy-
In order to locate the tampered regions Move forgery detection by matching triangles of key
accurately at pixel level finally, a novel localization points,'' IEEE Trans. Inf. Forensics Security, vol. 10,
algorithm is designed to compare the similar no. 10, pp. 2084-2094, Oct. 2015.
neighborhoods of matching pairs by two similarity
measures, and mark the tampered regions in pixels
C.-M. Pun, X.-C. Yuan, and X.-L. Bi, ''Image
iteratively. The experimental results show that the forgery detection using adaptive over segmentation and
proposed method is superior to existing state-of- feature point matching,'' IEEE Trans. Inf. Forensics
art methods in terms of matching time complexity, Security, vol. 10, no. 8, pp. 1705-1716, Aug. 2015.
detection reliability and forgery location accuracy. Y. Wu, W. Abd - Almageed, and P. Natarajan ,
INDEX TERMS Copy-move forgery detection, ''BusterNet : Detecting copy move image forgery with
digital image forensics, keypoint clustering, similar Source/Target localization ,''in Proc. ECCV Int., Oct.
neigh bor hood search algorithm. Index Terms - 2018, pp. 168-184.
Copy-move forgery detection, digital image
forensics, keypoint clustering, similar neigh bor III. EXISTING METHOD
hood search algorithm. In today's digital world the important and convenient
I. INTRODUCTION source of information is the digital image. Due to their
ease of acquisition and storage they convey information
In recent years, the authenticity and dependability
in the fastest. In the court of law the images can be
of images have become the hot issues of research, and
used as proof or evidence. Digital images having large
a key technology in digital image identification is copy-
applications ranging from military to medical and from
move forgery detection(CMFD).The goal of CMFD
art piece to user photography. Hence the digital image
is to find some regions similar to other regions of the
forensic evolve as fast growing need for society. The
image , because the tampered part is copied from the
image needs to be authentic. Now a days due to
same image. However , the time complexity of existing
advancement in computers and easiness in availability
methods is high, especially in the feature matching stage,
of low cost tools that is hardware and software. It
and the location of tampered regions are not accurate
becomes very easy to manipulate the digital image
enough to meet the practical requirements.
without leaving any visible traces of manipulation and it
92 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

becomes difficult to trace it. As consequences the


integrity, authenticity and secrecy of digital image is lost.
The purpose of this modification is to hide some
important traces of an image. Thus, such images transmit
false information. To identify the authenticity of the
images it needs to identify any changes in the image.
There is a branch of science known as digital forensic
which leads at exposing the image manipulation. Sift
matches the images based on feature key points. This
algorithm is one of the widely used for image feature
extraction. The algorithm finds the key points of the
images, which include SIFT description and SIFT Fig. 2: Flow Chart of SIFT
descriptor. The low response feature are discarded by
applying SIFT algorithm. The widely used technique to A. Results of Existing Method:
edit the digital images is copy move image forgery. Copy Data True True False False
move simply requires the pasting the portion of image Set Positive Negative Positive Negative
in input image and hiding some important information (TP) (TN) (FP) (FN)
156 67 66 23 00
or element from the image. Thus the originality of the
Method Sensitivity FPR F1 Specificity Precision
image changes and violates the authenticity of that image. (TPR) (PPV)
It becomes very difficult to detect forgery when the SIFT 100 25.84 85.35 74.15 74.44
copied portions are from the same image because they Output:
have similar properties of input image.
Elapsed time: 71.920394 seconds
The wide applications of the SIFT features can be B. Advantges:
attributed to their invariance to the scale and rotation
along with robustness to the white Gaussian noise, some • Locality
form of affine distortion, occlusion, perspective shifts • Distinctiveness
and illumination. SIFT is a classic and still popular • Quantity
feature descriptor in the field of forgery detection. The
• Efficiency
essence of SIFT algorithm is to find key points (feature
points) in different scale spaces and calculate the • Extensibility
dominant orientation of key points. The key points found C. Disadvantages:
by SIFT are some very prominent points, such as
• Slower computation and matching.
corners, edges, bright spots in dark areas, and dark
spots in bright areas, which are not changed by • It does not work with lighting changes if blur.
illumination, affine transformation, and noise. • Not accurate at pixel level.
• Forgery detection less accurate.
• Detection not reliable.

IV. PROPOSED METHOD


Following the traditional CMFD process, an
efficient method is designed based on SIFT keypoints
scale-color clustering and similar neighborhoods
Fig. 1: Block Diagram of Existing Method.
searching.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 93


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The proposed method consists of feature extraction, Output:


key points clustering, feature matching, mismatches Elapsed time: 71.920394 seconds
removal and tampered region location. Firstly, SIFT
was selected to describe key points. Then we cluster PERFORMANCE PARAMETERS OF
the key points based on scale and colour to put them PROPOSED METHOD:
into several smaller clusters which have been matched The performance of the proposed system is
separately. J-Linkage algorithm is used to remove evaluated in terms of following parameters
mismatches and estimate affine transformation matrix.
The ability to identify the Tampered Image correctly
Finally, similar neighborhoods of matching pairs are
is Sensitivity = TP/(TP+FN)
searched to locate tampered regions.
False Positive Rate(FPR)= FP/(FP+TN)
Comprehensive Evaluation Index, F1 = 2TP/
(2TP+FP+FN)
The ability to identify the Non Tampered Fractured
Image correctly is Specificity = TN/(TN+FP)
Precision or Positive Predictive Value (PPV) is the
proportion of the positive results = TP/(TP+FP)
V. EXPERIMENTAL RESULTS
Fig 3 : Block diagram of proposed method Existing Method Results:

Algorithm of Proposed Method: Input image

STEP 1: SIFT was selected to describe key points.


STEP 2: Then we cluster the key points based on
scale and color to put them into several smaller clusters
which have been matched separately.
STEP 3:J-Linkage algorithm is used to remove
mismatches and estimate affine transformation matrix.
STEP 4: similar neighborhoods of matching pairs
are searched to locate tampered regions.
Input Image Output of The System
Original Image Tampered Image
Original Image True Positive(TP) False Positive(FP)
Tampered False True Negative(TN)
Image Negative(FN)
Table 1: Performance Of SIFT

Data True True False False


Set Positive Negative Positive Negative
(TP) (TN) (FP) (FN)
156 87 56 15 00
Table 2: Evaluation Parameters Of SIFT

Method Sensitivity FPR F1 Specificity Precision Fig 4: Experimental Results of Images a)Original Image,
(TPR) (PPV) b)Tempered image, c) Resized input image d) Gray conversion
SURF 100 18.84 93.04 81.15 87 Image

94 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Tampered Input image

Fig 6:Localization-Gray,Localization-Binary

Gray conv e rsion of Tampe re d Input image

Histogram of the proposed feature


1200

1000

800

600

400

200

0
-6 -4 -2 0 2 4 6

Fig7: Probability Map, Histogram of the proposed feature

Output:
Fig 5: Experimental results of image (a)Contrast adjust input Forgery detected Elapsed Time is 48.679003
image (b)Contrast adjust input tampered image(c)Gray
Conversion of input image(d) Gray Conversion of input seconds
Tempered image(e) Matched point detection using SURF
SOFTWARE TOOLS REQUIREMENTS
• Simulation Tools : MATLAB R2019b
• Operating System : Windows 7

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 95


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

COMPARISON BETWEEN EXISTING METHOD & PROPOSED REFERENCES:


METHOD:
[1] B. Soni, P. K. Das, and D. M. Thounaojam, ''CMFD: A detailed
review of block based and key feature based techniques in image
copy - move forgery detection,'' IET Image Process., vol. 12, no.
2, pp. 167-178, Feb. 2018
[2] E. Ardizzone , A. Bruno, and G. Mazzola, ''Copy-Move forgery
detection by matching triangles of key points,'' IEEE Trans. Inf.
Forensics Security, vol. 10, no. 10, pp. 2084-2094, Oct. 2015.
Table 4: Comparison of parameters of Existing & proposed [3] C.-M. Pun, X.-C. Yuan, and X.-L. Bi, ''Image forgery detection
Methods using adaptive over segmentation and feature point matching,''
IEEE Trans. Inf. Forensics Security, vol. 10, no. 8, pp. 1705-
V. CONCLUSION AND FUTURE SCOPE 1716, Aug. 2015.
CONCLUSION: [4] Y. Liu, Q. Guan, and X. Zhao, ''Copy-move forgery detection
based on convolution kernel network,'' Multimedia Tools Appl.,
In this project, we present a novel CMFD method vol. 77, no. 14, pp. 18269-18293, Nov. 2017.
based on SIFT key point to locate the doctored regions
at the pixel level, and the experimental results show
that the method has performed well.
Compared with the existing methods, our method
has better robustness and could accurately locate
tampered regions, especially on simple forgery,
geometric transformation forgery and small-scale post-
processing forgery.
FUTURE SCOPE:
In large-scale forgery, this method is not stable and
has poor effect , which is also the problem will need to
solve in the future.
How to improve the detection of post-processing
forgery is also a problem will need to solve in the future.

96 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Area, Power and Delay Analysis of Approximate


Redundant Binary Multiplier
S. Murali Mohan1, A. V. Santhosh2, K. Devendra3
1
Professor, 2,3UG Student
1,2,3
Dept of ECE, Vemu Institute of Technology, P Kothakota.
Email: santhoshav27@gmail.com2

Abstract- As technology scaling is reaching its processing (DSP), multimedia, machine learning and
limits, new approaches have been proposed for pattern recognition. Approximate computing can be
computational efficiency. Approximate computing applied to these applications due to the large and
is a promising technique for high performance and redundant data sets with significant noise, so numerical
low power circuits as used in error-tolerant exactness can be relaxed. Approximate computing not
applications. Among approximate circuits,
only reduces power consumption, but also increases
approximate arithmetic designs have attracted
significant research interest. In this project, the performance by reducing the critical path delay.
design of approximate redundant binary (RB) Approximate techniques can be applied at several levels
multipliers is studied.Simulation results has proven including circuits, architectures and software]. The
different key performance parameters (power, area, application of approximate computing to deep learning
delay) has improved. The proposed approximate has also been studied. At circuit level, the design of
RB multipliers are compared with previous exact approximate arithmetic units has received significant
booth multipliers. The results show that the research interest due to its importance in many
approximate RB multipliers are better than exact computing applications. Typical applications, such as
RB booth multipliers with respect to key DSP and machine learning, require arithmetic computing
performance parameters are Power(3.03mw), 77% in the form of addition and multiplication. Addition has
of the Area is reduced andDelay(1.115ns).
been extensively studied for approximate circuit
Key words: Redundantbinary(RB) multiplier, implementations; various approximate adders have been
modified Boothencoder, RB compressor, RB-NB proposed to attain reductions in power consumption
converter, partial productarray. and delay. Current approximate adder designs include
I. INDRODUCTION speculative adders and non-speculative transistor-level
full adders approximate floating-point arithmetic has also
As classic Dennard scaling is coming to an end, on
been studied. Multiplication is more complex than
chip power consumption has becomeprohibitively high.
addition, because it requires the accumulation of the
Therefore, improvement in the performance of
partial product (PP)rows.
computing systems is encountering significant hurdles
at the same power level. Recently, approximate The main differences are summarized as follows
computing has been proposed as a new approach for • A new approximate Booth encoder with six errors in
efficient low power design. In this context, efficiency the K-map isproposed.
refers to the generation of approximate results and
comparable performance at a lower power • A new approximate RB 4:2 compressor at a smaller
complexity isproposed.
consumption. Approximate computing can generate
results that are good enough rather than always fully • For small approximate factors, rather than achieving
accurate. Approximate computing is driven by a regular PP array by ignoring the correction term,
applications that are related to human perception and an exact regular PP array is designed by combining
inherent error resilience to include digital signal the correction terms into the PPs using logic
optimization for more accurateresults.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 97
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

• New approximate RB-NB converters are proposed Table 1: MBE scheme

• Case studies are provided with applications to FIR b2i+1, b2i, b2i-1 Operation
filters, k-mean clustering and HDR image processing. 000 0
001 +A
II. LITERATURE SURVEY 010 +A
011 +2A
N. Maheshwari, Z. Yang, J. Han and F. Lombardi," 100 -2A
A design approach for compressor based approximate 101 -A
multipliers". In this paper, a new design approach is 110 -A
proposed to exploit the partitions of partial products 111 0
using recursive multiplication for compressor- based RB Partial Product Generator:
approximate multipliers. As two bits are used to represent one RB digit, then
G. Zervakis, K. Tsoumanis, S. Xydis, D. Soudris a RBPP is generated from two NB partial products.The
and K. Pekmestzi," Design-efficient approximate addition of two N-bit NB partial products X and Y
multiplication circuits through partial product using two's complement representation can be
perforation". In this paper, we focus on Partial Product expressed as follows :
Perforation technique for designing approximate X+Y=X-Y-1
multiplication circuits. The authors prove in a
Table 2: RB encoding
mathematically rigorous manner that in partial product
perforation, depending only on the input distribution. X1 X2 X
0 0 0
H. Jiang, J. Han, F. Qiao, F. Lombardi, 0 1 1
"Approximate radix-8 Booth multipliers for low- power 1 0 1
and high performance operation,". In this paper, this 1 1 0
issue is alleviated by the application of approximate Booth algorithm gives a procedure for multiplying
designs. An approximate 2-bit adder is deliberately binary integers in signed 2's complement representation
designed for calculating the sum of a binary number. in efficient way, i.e., less number of additions/
This adder requires a small area, a low power and a subtractions required.This modified booth multiplier's
short critical path delay. computation time and word length of operands are
III. EXISTING METHOD proportional to each other. We can reduce half the
number of partial product.
Radix-4 Booth Encoding:
Booth encoding has been proposed to facilitate the
multiplication of two's complement binary numbers. It
was revised as modified Booth encoding (MBE) or
radix-4 Booth encoding. The MBE scheme is
summarized in Table 1.

Fig 1:Modified Booth Encoder

98 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

MBE 2. In the second step, all RB PPs are accumulated by a


PP reduction tree (PPRT) using RB 4:2 compressors.
ppij =(b2i ? b2i?1)(b2i+1?aj )+(b2i ?b2i-1)(b2i+1
? b2i)(b2i+1 ? aj?1) 3. Finally, in the third step, the RB-NB converter adds
the PP rows.
Table 3: K-Map of MBE
RB 4:2 Compressor
0 0 0 0 1 1 1 1
a/b 0 0 1 1 1 1 0 0 As a RBA adds two RB operands to produce one
0 1 1 0 0 1 1 0 RB number, it has four inputs and two outputs. The
00 0 0 0 0 1 0 1 1 main advantage of RB multipliers that relay on RBAs,
is the continuous carry-free characteristic. The RBA
01 0 0 1 0 1 0 1 0
ensures that the addition time is fixed, so it is independent
11 0 1 1 1 0 0 0 0 of the word length of the operands.
10 0 1 0 1 0 0 0 1 RB-NB Converter
NMBE After the RB PP accumulation, two rows of NB
numbers remain. They must be added by a RB-NB
pp?ij =(b2i ? b2i?1)(b2i+1 ? aj ) + (b2i ?b2i-1)
converter to form the final NB product.
(b2i+1 ? b2i)(b2i+1 ? aj?1) + b2i+1.b2i.b2i?1
Table 4: K-Map of NMBE
IV. PROPOSED METHOD
Proposed RBPartial Product Generator
0 0 0 0 1 1 1 1
a/b 0 0 1 1 1 1 0 0 A new RB modified partial product generator based
0 1 1 0 0 1 1 0 on MBE is presented in this section; in this design.
00 0 0 0 0 1 1 1 1

01 0 0 1 0 1 1 1 0
11 0 1 1 1 0 1 0 0
10 0 1 0 1 0 1 0 1

In this zero's in table 3 is replaced by one's in the


table 4 to design k-map of NBME.
Fig 3: Approximate Modified Booth Encoder

Compared with the exact MBE, Approximate


Modified Booth Encoder can significantly reduce both
the complexity and the critical path delay of Booth
encoding.
AMBE
appij = (b2i + b2i+1)(b2i+1 ⊕ ai)

Fig 2: Overall structure of an 8-bit RB multiplier

1. In the first step, a RB Booth encoder generates the


PPs, in which the operands are converted from NB
to RB.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 99


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table 5: K-Map of AMBE Approximate 4:2 Compressors


0 0 0 0 1 1 1 1 This can be obtained by ignoring the asymmetric
a/b 0 0 1 1 1 1 0 0 part of the exact RB compressor. ARBC-1 and ARBC-
0 1 1 0 0 1 1 0
2 are used.
00 0 0 0 0 1 1 1 0
01 0 0 0 0 1 1 1 0
11 0 1 1 1 0 0 0 0
10 0 1 1 1 0 0 0 0

ANMBE
app'ij= b2i+1 ⊕ aj+ b2i.b2i-1
Table 6: K-Map of ANMBE

0 0 0 0 1 1 1 1
a/b 0 0 1 1 1 1 0 0
0 1 1 0 0 1 1 0
00 0 0 1 0 1 1 1 1
Fig 5: Approximate 4:2 Compressor(ARBC-1)
01 0 0 1 0 1 1 1 1
Approximate RB-NB Converter
11 1 1 1 1 0 1 0 0
The approximate RB-NB converter uses those small
10 1 1 1 1 0 1 0 0 values to convert to NB, which has been produced by
In table 3 and table 4 zero's is replaced by one's the 4:2 compressors.
and one's are replaced by zero's in the table 5 and table V. RESULTS
6 to design k-map of AMBE and ANMBE.
Synthesis Results of Proposed Method (Area)

Approximate

modified booth
encoder

Fig 4 :Overall structure of an Approximate 8-bit RB


multiplier Fig 6: Area report of Proposed Method
In the first stage, MBE is replaced by the
Approximate MBE. In the Second Stage, single 4:2
Compressor is replaced by two 4:2 Compressors. The
RBA produce the smaller results than the exact so the
Complexity RB-NB is reduced.

100 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Synthesis Results of Proposed Method (Power) with key performance parameters Area, Power and
Delay.
VII. REFERENCES
[1] J. Han and M. Orshansky, "Approximate computing: an emerging
paradigm for energy-efficient design," in Proc. 18th IEEE
EuropeanTest Symposium, 2013.
[2] S. Venkataramani, S. Chakradhar, K. Roy and A. Raghunathan,
"Approximate computing and the quest for computing efficiency,"
in Proc. 52nd Annual Design Automation Conference (DAC),
2015.
[3] N. Maheshwari, Z. Yang, J. Han and F. Lombardi, "A design
approach for compressor based approximate multipliers," 2015.
[4] H. Jiang, J. Han, F. Qiao, F. Lombardi, "Approximate radix-8
Fig 7: Power report of Proposed Method
Booth multipliers for low-power and high performance
Synthesis Results of Proposed Method (Delay) operation," IEEE Trans. Computers, vol. 65, pp. 2638-2644,
Aug. 2016.
[5] Q. Xu, N. S. Kim and T. Mytkowicz, "Approximate computing:
a survey," IEEE Design and Test, vol. 33, no.1, pp. 8-22, 2016.
[6] G. Zervakis, K. Tsoumanis, S. Xydis, D. Soudris and K.
Pekmestzi," Design-efficient approximate multiplication circuits
through partial product perforation," 2016.
[7] H. Jiang, J. Han, F. Qiao, F. Lombardi, "Approximate radix-8
Booth multipliers for low-power and high performance
operation," Aug 2016.
[8] W. Liu, L. Qian, C. Wang, H. Jiang, J. Han and F. Lombardi,
"Design of approximate radix-4 booth multipliers for error-tolerant
computing," Aug. 2017.
Fig 8: Delay report of Proposed Method
[9] Y. Wang, H. Li, X. Li, "Real-time meets approximate compureting:
Advantages of Proposed Method An elastic CNN inference accelerator with adaptive trade-off be-
tween QoS and QoR," in Proc. 54th Annual Design Automation
• Numerical exactness can be relaxed. Conference (DAC), 2017.
• Area is Reduced.
• Reduces power consumption.
• Increases performance by reducing the critical path
delay.
VI. CONCLUSION
The Approximate RB multipliers contains
Approximate MBE, two 4:2 compressors and RB-NB
converter. The results proved that Approximate RB
multiplier is better than Exact RB multiplier. Approximate
MBE is used to generate the Partial products(PP) and
two 4:2 compressors used to reduce the number of
Partial Products. The Approximate RB multiplier
reduces the area by 77% with power consumed of 3.03
micro watts and delay is 1.115ns. The proposed
approximate redundant binary multipliers are efficient
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 101
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

A Review on Various Pseudorandom Bit Generators


Ashly George1, Varghese A2
1
P.G Scholar, Department of ECE, IESCE Chittilappilly
2
Assistant Professor, Department of ECE, IESCE Chittilappilly
Email: ashly523@gmail.com1, bencyvarghesea@iesce.info2

Abstract:- Pseudorandom bit generator (PRBG) manage user privacy in IoT enabled resource constraint
is an essential component for securing data during devices. A high bit-rate, cryptographically secure and
transmission and storage in various cryptography large key size PRBG is difficult to attain due to hardware
applications. Among popular existing PRBG limitations which demands efficient VLSI architecture
methods such as linear feedback shift register
in terms of randomness, area, latency and power.
(LFSR), linear congruential generator (LCG),
coupled LCG (CLCG), and dual-coupled LCG The PRBG is assumed to be random if it satisfies
(dual-CLCG), the latter proves to be more secure. the fifteen benchmark tests of National Institute of
The hardware implementation of this method has Standard and Technology (NIST) standard. The outputs
a bottleneck due to the involvement of inequality of such generators may be used in many cryptographic
equations. Initially, a direct architectural mapping applications, such as the generation of key material.
of the dual-CLCG method is performed. Since two Generators suitable for use in cryptographic applications
inequality equations are involved for coupling, it
may need to meet stronger requirements than for other
generates pseudorandom bit at unequal interval of
time that leads to large variation in output latency. applications. In particular, their outputs must be
Besides, it consumes a large area and fails to unpredictable in the absence of knowledge of the inputs.
achieve the maximal period. Hence, to overcome A pseudorandom number generator (PRNG), also
the aforesaid drawbacks, a new efficient PRBG known as a deterministic random bit generator (DRBG),
method, i.e., "coupled variable input LCG is an algorithm for generating a sequence of numbers
(CVLCG)" and its architecture are proposed. The
whose properties approximate the properties of
novelty of the method is the coupling of two newly
formed variable input LCGs that generates
sequences of random numbers. The PRNG-generated
pseudorandom bit at every uniform clock rate, sequence is not truly random, because it is completely
attains maximum length sequence and reduces one determined by an initial value, called the PRNG's seed
comparator area as compared to the dual-CLCG (which may include truly random values). Although
architecture. An analysis on various PRBG methods sequences that are closer to truly random can be
have been done on this paper. generated using hardware random number generators,
Keywords: Pseudorandom Bit Generator pseudorandom number generators are important in
(PRBG), VLSI Architecture, FPGA Prototype practice for their speed in number generation and their
reproducibility.
1. INTRODUCTION
PRNGs are central in applications such as simulations
Security and privacy over the internet is the most
(e.g. for the Monte Carlo method), electronic games
sensitive and primary objective to protect data in various
(e.g. for procedural generation), and cryptography.
Internet-of-Things (IoT) applications. Millions of
Cryptographic applications require the output not to
devices which are connected to the internet generate
be predictable from earlier outputs, and more elaborate
big data that can lead to user privacy issues. Also, there
algorithms, which do not inherit the linearity of simpler
are significant security challenges to implement the IoT
PRNGs, are needed. PRNGs are central in applications
whose objectives are to connect people-to-things and
such as simulations (e.g. for the Monte Carlo method),
things-to-things over the internet. The pseudorandom
electronic games (e.g. for procedural generation), and
bit generator (PRBG) is an essential component to
102 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

cryptography. Cryptographic applications require the comparator area as compared to the dual-CLCG
output not to be predictable from earlier outputs, and architecture. Also, it generates pseudorandom bits at a
more elaborate algorithms, which do not inherit the uniform clock rate with one initial clock latency and
linearity of simpler PRNGs, are needed. A linear achieves the maximum length sequence. Moreover, the
congruential generator (LCG) is an algorithm that yields CVLCG method successfully passes all the fifteen
a sequence of pseudo-randomized numbers calculated benchmark tests of National Institute of Standard and
with a discontinuous piecewise linear equation. The Technology (NIST).
method represents one of the oldest and best-known 2. VARIOUS PRNG METHODS
pseudorandom number generator algorithms. The
theory behind them is relatively easy to understand, and Computer's first requirement of random numbers was
they are easily implemented and fast, especially on for simulations and numerical computations such as
computer hardware which can provide modular Monte Carlo calculations. It is significant to note that
arithmetic by storage-bit truncation. the requirement of randomness is different in
cryptographic applications than that of simulation.
The generator is defined by recurrence relation: Prediction is often a prerequisite when we talk about
X(n+1) = (a X(n)+c) mod m cryptographically secure pseudo random number
where X is the sequence of pseudorandom values, generator.
and m, 0 < m - the "modulus" a,0 < a < m - the First cryptographically secure pseudo random
"multiplier" c,0 ≤ c < m - the "increment" X0,0 ≤ X0<m number generator [7], in terms of unpredictability, was
- the "seed" or "start value" are integer constants that introduced by Adi Shamir in 1981 who is one of the
specify the generator. If c = 0, the generator is often inventors of RSA [8]. Shamir uses the core concept of
called a multiplicative congruential generator (MCG), RSA i.e. the problem of Integer factorization to ensure
or Lehmer RNG. If c ≠ 0, the method is called a mixed the security of his new CSPRNG, with the assumption
congruential generator. When c ≠ 0, a mathematician of the strength of this CSPRNG is equivalent to the
would call the recurrence an affine transformation, not security of the RSA cryptosystem because of
a linear one, but the misnomer is well-established in intractability of the problem of Integer factorization. On
computer science. the other hand, since it uses modular exponentiation of
As motivated by the concept of coupling and huge numbers, makes it slow as well as not suitable for
considering the challenges of efficient hardware practical applications.
implementation, the CVLCG method is developed by 2.1 Computer Based PRNG
the coupling of two variable input LCGs for generating An early computer-based PRNG, suggested by John
pseudorandom bit at every iteration. The main von Neumann in 1946[2], is known as the middle-
contribution of the CVLCG PRBG method is the square method. The algorithm is as follows: take any
replacing of a constant parameter with a variable input number, square it, remove the middle digits of the
in the LCG equation (the newly formed equation is resulting number as the "random number", then use that
named as variable-input LCG or Vi-LCG) and further number as the seed for the next iteration. For example,
uses the concept of coupling as post-processing squaring the number "1111" yields "1234321", which
between two Vi-LCGs for generating pseudorandom can be written as "01234321", an 8-digit number being
bit at every iteration. The variable-input LCG (Vi-LCG) the square of a 4-digit number. This gives "2343" as
is the class of LCG in which the variable parameter is the "random" number. Repeating this procedure gives
derived from another LCG. The coupling of two variable "4896" as the next result, and so on. Von Neumann
input LCGs in the CVLCG method provides the same used 10 digit numbers, but the process was the same.
security strength as existing dual-CLCG method in the A problem with the "middle square" method is that all
order of O(n22n). The CVLCG architecture saves one sequences eventually repeat themselves, some very
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 103
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

quickly, such as "0000". Von Neumann was aware of Among these, Blum-Blum-Shub generator (BBS)[6]
this, but he found the approach sufficient for his is one of the proven polynomial time unpredictable and
purposes and was worried that mathematical "fixes" cryptographic secure key generator because of its large
would simply hide errors rather than remove them. Von prime factorize problem. Although it is secure, the
Neumann judged hardware random number generators hardware implementation is quite challenging for
unsuitable, for, if they did not record the output performing the large prime integer modulus and
generated, they could not later be tested for errors. If computing the large special prime integer. There are
they did record their output, they would exhaust the various architectures of BBS PRBG, discussed in Panda
limited computer memories then available, and so the et. al.[7] and Lopez et.al.[8]. Most of them either
computer's ability to read and write numbers. If the consume a large amount of hardware area or high clock
numbers were written to cards, they would take very latency.
much longer to write and read. 2.3 Coupled LCG Based PRNG
2.2 Shift Register &Congruential Generator A bit "1" is output if the first LCG produces an output
Based PRNGs that is greater than the output of the second LCG and a
In computing, a linear-feedback shift register (LFSR) bit "0" is output otherwise. Breaking this scheme would
is a shift register whose input bit is a linear function of require one to obtain the seeds of the two independent
its previous state. The most commonly used linear generators, given the bits of the output bit sequence.
function of single bits is exclusive-or (XOR). Thus, an The problem of uniquely determining the seeds for the
LFSR is most often a shift register whose input bit is CLCG requires
driven by the XOR of some bits of the overall shift (i) a knowledge of at least log2 m2 (m being the LCG
register value. The initial value of the LFSR is called modulus) bits of the output sequence
the seed, and because the operation of the register is
(ii) the solution of at least log2 m2 inequalities where each
deterministic, the stream of values produced by the
inequality (dictated by the output bit observed) is
register is completely determined by its current (or applied over positive integers.
previous) state. Likewise, because the register has a
finite number of possible states, it must eventually enter Computationally, we show that this task is
a repeating cycle. However, an LFSR with a well- exponential in n (where n = log2 m is the number of bits
chosen feedback function can produce a sequence of in m) with complexity O(22n).The quality of the PRBS
bits that appears random and has a very long cycle. so obtained is assessed by performing a suite of
Applications of LFSRs include generating pseudo- statistical tests (NIST 800-22) recommended by NIST.
random numbers, pseudo-noise sequences, fast digital We observe that a variant of our generator that uses
counters, and whitening sequences. Both hardware and two CLCGs (called dual CLCG), pass all the NIST
software implementations of LFSRs are common. The pseudo randomness tests with a high degree of
mathematics of a cyclic redundancy check, used to consistency.
provide a quick check against transmission errors, are A linear congruential generator (LCG) is defined by
closely related to those of an LFSR. the recurrence xi+1 = a xi+b (mod m) where a, b and m
Zenner et. al.[4] and Stern et. al.[5] reported, linear are known and x0 is secret [11]. The LCG is full period
feedback shift register (LFSR) and linear congruential if the period of the sequence generated is m. The LCG
generator (LCG) are the most common and low has a fixed point (this implies that there exists i such
complexity PRBGs. However, these PRBGs badly fail that xi+1 = xi) when (1-a)-1(mod m) exists. When this
randomness tests and are insecure due to its linearity occurs the maximum period of the sequence is m-1, if
structure. Numerous studies on PRBG based on LFSR, the fixed point is not used as an initial condition. The
chaotic map and congruent modulo are reported. maximum period occurs when the following conditions
are satisfied.
104 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

1) b and m are relatively prime. the maximum length period of 2n (it depends on the
2) (a -1) is divisible by every prime factor of m. number of 0's in the CLCG sequence and is nearly 2n-
1
for randomly chosen n-bit input seed) and also fails
3) (a -1) is divisible by 4 if 4 divides m.
five major NIST statistical tests. Hence, to overcome
An example of the CLCG follows. these shortcomings in the existing dual-CLCG method
Example 2.1: and its architecture, a new PRBG method and its
architecture have been proposed.
Let a1 = 5, b1 = 5, a2 = 5, b2 = 3, and m = 8. Both
sequences, xi and yi have a period of 8 and are hence 2.4 DUAL-CLCG METHOD
full period. If the initial condition (or the seed) is (x0, y0) 2.4.1 Architectural Mapping of The Dual CLCG
= (2,7), then the sequences are, Method
xi = (7,0,5,6,3,4,1,2) The dual-CLCG method is a dual coupling of four
yi = (6,1,0,3,2,5,4,7) linear congruential generators and is defined
mathematically as follows:
The bit sequence Bi therefore is,
xi+1 = a1×xi+b1 mod 2n (2.1)
Bi = (1,0,1,1,1,0,0,0)
yi+1 = a2×yi+b2 mod 2n (2.2)
To mitigate the aforesaid problems of LFSR and
LCG based PRNGs, a low hardware complexity pi+1 = a3×pi+b3 mod 2n (2.3)
coupled LCG (CLCG) has been proposed in Katti et. qi+1 = a4×qi+b4 mod 2n (2.4)
al[9]. The coupling of two LCGs in the CLCG method
Zi ={1 if xi+1 > yi+1 and pi+1 > qi+1 and
makes it more secure than a single LCG and chaotic
based PRBGs that generates the pseudorandom bit at 0 if xi+1 < yi+1 and pi+1 < qi+1
every clock cycle. Despite an improvement in the The output sequence Zi can also be computed in an
security, the CLCG method fails the discrete Fourier alternative way as:
transform (DFT) test and five other major NIST
statistical tests. DFT test finds the periodic patterns in Zi = Bi if Ci = 0 (2.5)
CLCG which shows it as a weak generator. To amend Where,
this, Katti et al. [10] proposed another PRBG method,
Bi ={1, if xi+1 > yi+1 0, else;
i.e. dual-CLCG that involves two inequality
comparisons and four LCGs to generate pseudorandom Ci ={1, if pi+1 > qi+1 0, else
bit sequence. The dual-CLCG method generates one- Here, a1, b1, a2, b2, a3, b3, a4 and b4 are the constant
bit random output only when it holds inequality parameters; x0, y0, p0 and q0 are the initial seeds.
equations. Therefore, it is unable to generate
pseudorandom bit at every iteration. Hence, designing Following are the necessary conditions to get the
an efficient architecture is a major challenge to generate maximum period.
random bit in uniform clock time. (i) b1, b2, b3 and b4 are relatively prime with 2n(m).
To the knowledge of authors, the hardware (ii) (a1-1),(a2-1),(a3-1) and (a4-1) must be divisible by 4.
architecture of the dual-CLCG method is not deeply Following points can be observed from the dual-
investigated and therefore, in the beginning, the CLCG method i.e.
architectural mapping of the existing dual-CLCG
1. The output of the dual-CLCG method chooses the
method is developed to generate the random bit at a
value of Bi when Ci is 'zero'; else it skips the value of
uniform clock rate. However, it experiences various Bi and does not give any binary value at the output.
drawbacks such as: large usage of flip-flops, high initial
clock latency of 2n for n-bit architecture, fails to achieve
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 105
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

2. As a result, the dual-CLCG method is unable to clock cycle. Other three LCG equations can also be
generate pseudorandom bit at each iteration. mapped to the corresponding architecture similar to the
LCG equation (2.1). To implement the inequality
equation, a comparator is used that compares the output
of two LCGs. The comparator and two linear
congruential generators (LCG) are combined to form
a coupled-LCG (CLCG). Two CLCGs are used in
the dual-CLCG architecture. One is called controller-
CLCG which generates Ci and another one is called
controlled-CLCG which generates Bi. To perform the
operation of Zi =Bi if Ci =0, a 1-bit tristate buffer is
Fig. 2.1 Architectural mapping of the existing dual-CLCG employed that selects the Bi (output of controlled-
method. CLCG) only when Ci = 0 (the output of controller-
A hardware architecture of the existing dual-CLCG CLCG) and it does not select the value of Bi while Ci
method is developed to generate pseudorandom bit at =1. Since the CLCG output (Ci) is random; it selects
an equal interval of time for encrypting continuous data tristate buffer randomly. Therefore, the direct
stream in the stream cipher. The architecture is designed architectural mapping of the existing dual-CLCG
with two comparators, four LCG blocks, one controller method does not generate random bits in every clock
unit and memory (flip-flops) as shown in Fig. 2.1. The cycle at the output of the tristate buffer. In this case, the
LCG is the basic functional block in the dual-CLCG overall latency varies accordingly with the number of
architecture that involves multiplication and addition consecutive 1's between two 0's in the sequence Ci
processes to compute n-bit binary random number on (output of controller-CLCG). This asynchronous
every clock cycle. The multiplication in the LCG generation of pseudo-random bits is applicable only
equation can be implemented with shift operation, when where asynchronous interface is demanded. However,
a is considered as (2r+1). Here, r is a positive integer,1 in stream cipher encryption, the key size should be larger
< r < 2n. Therefore, for the efficient computation of than the message size where bitwise operation is
xi+1, the equation (2.1) can be rewritten as, performed at every clock cycle. Therefore, a fixed
number of flip-flops can be employed at the output stage
xi+1 = (a1xi+b1)mod 2n = [(2r1+1)xi+b1] mod 2n
of dual-CLCG architecture for generating pseudo-
random bit in a uniform clock time.
If the sequence Ci is considered to be known and
the zero-one combinations are in a uniform pattern, then
the fixed number of flip-flops can be estimated to
generate random bit at every uniform clock cycle. For
example:
If, C i = (0,1,1,0,1,0,0,1,0,1,0,1); and B i =
(1,0,1,1,1,0,0,0,1,1,0,1); then, Zi = Bi if Ci = 0; Zbufi
= (1,x,x,1,x,0,0,x,1,x,0,x)
Fig. 2.2 Architecture of the linear congruential generator. In this example, it is observed that the number of 0's
The architecture of LCG shown in Fig. 2.2 is and 1's are equal in every 4-bit patterns. There are two
implemented with a 3-operand modulo 2n adder, 2 ×1 0's and two 1's in every pattern. Therefore, a pair of
n-bit multiplexer and n-bit register. LCG generates a two flip-flops (two 2-bit registers) is sufficient to get
random n-bit binary equivalent to integer number in each the random bit in the uniform clock cycle. However, Ci

106 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

is not known to the user and is not always in a uniform for generating k number of pseudorandom bits. In
pattern. Consider an example, this case, it is assumed k ≈ 2n-1 for randomly chosen
n-bit input seed, therefore it needs 2n-1 flip-flops.
If, Ci = (0,1,0,0,0,1,1,0,0,1,1,1,0,1,0,1); and Bi =
(1,0,1,1,0,0,0,1,0,0,1,0,1,1,1,1); then, Z bufi = 2. Initial clock latency (input to first output) depends on
the number of clock cycles required to generate k
(1,x,1,1,0,x,x,1,0,x,x,x,1,x,1,x). No such uniform
random bits. The dual-CLCG architecture takes 2n
pattern can be observed in the sequence Ci of the above
initial clock latency if k is considered as maximum
example. Therefore, the fixed number of flip-flops length.
cannot be estimated in this case.
3. Maximum length period of dual-CLCG method
Considering this problem as mentioned above, k depends on the number of 0's in Ci and is nearly 2n-1
number of bits are generated first and then stored in k- for randomly chosen n -bit input seed.
flip flops (termed as 1×k-bit memory) when Ci = '0’. 4. The proposed architecture works when it is assumed
Further, these stored bits are released at every equal that the number of 0's ≤ number of 1's in a maximum
interval of clock cycle. If there are k number of 0's in length sequence generated from controller-CLCG.
the sequence Ci, then the dual-CLCG architecture can
5. The existing dual-CLCG method fails five major NIST
generate maximum of k- random bits in 2n- clock
randomness tests.
cycles. It can utilize k- flip-flops to store k different bits
of Bi while Ci = '0’. After 2n clock cycles, it releases 3. EXISTING CVLCG METHOD
these stored bits serially at every two clock cycles (1- To overcome the aforesaid shortcomings in the
bit per two clock cycles). Here, it is assumed that the existing dual-CLCG method and its architecture, a new
number of 0's = number of 1's = 2n-1 (for n-bit input PRBG method and its architecture have been designed.
seed) in the sequence Ci. This architecture may work The coupling of two or four LCGs is the main principle
even if the number of 0's in the sequence Ci are less for generating a pseudorandom bit sequence in the
than 2n-1. However, when the number of 0's are greater CLCG and dual-CLCG methods which make them
than the number of 1's, then this architecture may not more secure than any other linear PRBGs. Therefore,
work correctly. The maximum length period of dual- the same coupling concept is used as post-processing
CLCG method depends on the number of 0's in Ci and in the proposed PRBG method for generating
is nearly 2n-1 for randomly chosen n-bit input seed. pseudorandom bit at every iteration. Before post
The maximum combinational path delay in the dual- processing, a new formulation of congruential equation
CLCG architecture is the three-operand adder with is used instead of using LCG. The new form of
multiplexer. The reason is that three-operand adder with congruential generator is the class of LCG in which a
multiplexer has highest critical path delay as compared constant parameter is replaced with a variable input
to the comparator. Therefore, parameter and is defined as follows,
Area, ADCLCG = 4ALCG+2Acmp+Atri+Amem+Acntrl xi+1 = a1×xi+pi mod 2n (3.1)
Critical path, TDCLCG = Tadd +Tmux yi+1 = a2×yi+qi mod 2n (3.2)
2.4.2. Drawbacks: The newly formed equations (3.1) and (3.2) are
named as variable input linear congruential generators
Although the dual-CLCG method is secure when
(Vi-LCG), where, the variable parameters and are
compared with CLCG and single LCG, it suffers from
obtained from two different LCGs and are defined as,
several drawbacks in terms of hardware and
randomness test as mentioned below, pi+1 = a3×pi+b3 mod 2n (3.3)
1. It requires control circuit and a large number of flip- qi+1 = a4×qi+b4 mod 2n (3.4)
flops (referred as memory). It requires k flip-flops

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 107
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The pseudorandom bit sequence Zi is obtained by 3.1 VLSI Architecture


using the inequality equation (3.5) in the post processing
as follow,
Zi ={1, if xi+1 > yi+1; 0, else (3.5)
Where,
Bi ={1, if xi+1 > yi+1 0,else;
Ci ={1,if pi+1 > qi+1 0,else
Here, a1, b1, a2, b2, a3, b3, a4 and b4 are the constant
parameters; x0, y0, p0 and q0 are the initial seeds. The
necessary conditions to get the maximum length period
are same as the existing dual-CLCG method. The
mathematical equations (3.1) and (3.2) signify the
congruential modulo 2n addition process where the
variable pi and qi are separately calculated from two Fig. 3.1 Coupled Variable-input LCG Architecture.
LCGs as specified in equation (3.3) and (3.4)
An efficient VLSI architecture of the CVLCG
respectively. The pseudorandom bit is obtained by the
method is developed to obtain the pseudorandom bit
comparison of two Vi-LCG outputs xi+1 with yi+1 as
at equal interval of time. The architecture is developed
stated in equation (3.5) in the post processing stage.
by mapping the two variable input LCG (Vi-LCG)
Since only one inequality condition involves in the
equations and one inequality equation which is shown
proposed PRBG method, it generates a pseudorandom
in Fig. 3.1. The architecture mapping of Vi-LCG is
bit at every iteration without skipping any value at the
highlighted with a dotted line box. It computes n-bit
output. Moreover, it reduces one comparison process
binary output xi+1 and yi+1 from (xi,yi) and (pi,qi)
and one tristate logic as compared to the existing dual-
respectively. The multiplication in the Vi-LCG and LCG
CLCG method. Due to coupling of two variable-input
equations is implemented with logical shift operation
LCGs, the proposed PRBG method is referred as
and three-operand adder when ai = (2ri+1) is considered.
"Coupled Vi-LCG" or "CVLCG" in short.
The inequality equation (3.5) is realized with a binary
Example: comparator that compares the n-bit binary output xi+1
Let a1 = 5, a2 = 9, a3 = 9, b3 = 3, a4 = 5, b4 = 3 and with yi+1 and produces one-bit output zi in every equal
m = 2n = 24 = 16. If the initial condition or the seed are interval of time. The proposed architecture consumes
(x0,y0,p0,q0) = (3,6,11,5) then the pseudorandom bit the area of four n-bit multiplexers, four n-bit registers,
sequence is computed as follows: four n-bit three-operand modulo 2n adders and one n-
bit comparator.
x1 = 10, y1 = 11 Here x1 < y1, therefore, z1 = 0.
Similarly the sequence zi = z1,z2,..........,zi is evaluated The combination of three-operand adder with
as, multiplexer has the highest worst-case delay than the
comparator in the proposed CVLCG architecture, i.e.,
xi = 10,8,1,9,4,6,3,........;
Critical Path, TCVLCG = Tadd +Tmux
yi = 11,15,6,4,13,5,0,........
Area, ACVLCG = 4(Aadd +Amux+Areg)+Acmp
The final sequence Zi generated from the CVLCG
method is, Therefore, the CVLCG architecture saves one
comparator area in comparison to the dual-CLCG
Zi = 0,0,0,1,0,1,1,1,....... architecture. The three-operand modulo 2n adder and
the n-bit binary comparator are the two main functional
108 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

units which consume the maximum area in the gate area (A) and 29.1% NOT gate area (A) as
architecture of the CVLCG method. Thus, the area of compared to the dual-CLCG architecture
the architecture is further reduced by employing the carry The CVLCG design of 32- bit word size is
save adder (CSA) [26] and mux based comparator implemented on Xilinx Virtex5, Virtex7 and Zynq7000
[27] to perform three-operand modulo 2n addition and FPGA devices; therefore the other existing PRBG
the n-bit binary comparison respectively. methods such as dual-CLCG, CLCG and BBS
The same carry-save adder and mux based methods are also implemented on the same FPGA
comparator are employed in both CLCG and dual- platforms to ensure a fair comparison. The performance
CLCG architectures for evaluating their overall on Virtex7 and Zynq7000 FPGA devices reports the
complexity. Section 4 summarizes the area and timing same results due to both fabricated with same 28nm
complexity of the architecture of the new CVLCG process technology. The CVLCG architecture is
method along with the architecture of the CLCG and compared with the most recent PRBG methods
dual-CLCG methods. considered for the comparison in Table 4.3. The physical
4. IMPLEMENTATION RESULTS implementation results such as FPGA resource
utilization, worst case delay, maximum operating
frequency, dynamic power and the power per megahertz
frequency are listed in Table 4.1. The estimated power
is computed using Xilinx Xpower analyzer at the
maximum operating frequency. The hardware
implementation in Table 4.1 reports that the CVLCG
architecture consumes considerably less hardware
resources than the existing PRBG methods.
Table 4.3 Result of 32 bit CVLCG and Its Comparison
This section presents the physical implementation
results of the CVLCG method of 32-bit word size
along with other existing PRBG methods. Further, the
statistical tests are performed on the captured random
bit sequences by using the NIST test tool for measuring
randomness. The proposed CVLCG architecture of 32- bit size
Table 4.1 summarizes the area and timing complexity saves upto 16.8% and 17.6% total area
of the architecture of the new CVLCG method along (8×[FF+LUT]) in comparison to the dual-CLCG and
with the architecture of the CLCG and dual-CLCG BBS architectures respectively on the Virtex5 FPGA
methods. It is observed that the CVLCG architecture device. The post synthesis analysis reports that the
significantly reduces the area of one comparator when critical path delay or minimal period (T) is consistent
compared with the architecture designed for the existing for CLCG, dual-CLCG and proposed CVLCG
dual-CLCG method. Furthermore, it generates architectures of 32- bit word size by taking estimated
pseudorandom bit at every uniform clock cycle, wire delay model. Similarly, the place and route (PAR)
whereas the architecture developed for the dual-CLCG static timing analysis reports that the critical path of
method is unable to generate pseudorandom bit at every above three architectures is consistent with small
uniform clock rate. Table 4.2 summarizes the deviations. The best achievable clock timing of the
comparison of the proposed CVLCG architecture with CLCG, dual-CLCG and proposed CVLCG
the CLCG and dual-CLCG architectures for 32- bit architectures are 4.101 ns, 4.170 ns and 4.174 ns
word size. It reports that a 32-bit architecture of the respectively. This deviation in clock timing could be due
proposed CVLCG method saves upto 14.9% basic to adding of actual wire delay after implementation.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 109
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Therefore, the CVLCG architecture can operate at variable-input LCG (CVLCG)" and its VLSI
the maximum frequency of 219.35 MHz which is 1.76 architecture. The CVLCG method is developed by
times faster than the BBS architecture. Moreover, it coupling of two variable-input LCGs, which generates
utilizes 15.3% and 10.6% less power per megahertz pseudorandom bit at every iteration and also attains
as compared to the dual-CLCG and BBS architectures. the maximum length sequence. Moreover, it saves one
Besides this, the proposed CVLCG architecture comparator area in comparison to the existing dual-
generates pseudorandom bit at every clock cycle CLCG architecture.
(output to output delay is one clock delay) with one The FPGA implementation results show that the
initial clock latency (input to first output delay). proposed CVLCG architecture is indeed capable of
Whereas, the BBS architecture [21] takes 69 clock generating pseudorandom bit with the latency of one
cycles to generate one random bit signal with 69 initial clock cycle, less hardware resources and low power.
clock latency and the dual-CLCG architecture is unable The battery of NIST test results report that all the
to generate pseudorandom bit in every clock cycle that stringent tests including linear complexity are
lead to varying in the output latency. The physical successfully passed with a high degree of consistency.
implementation results in Table 4.3 report that The advantages such as less area, low latency, low
architecture of the dual-CLCG method consumes power, long period, pseudorandom bit generation at
83.8%, 88.9% and 81.4% less flip-flops, slices and the uniform clock rate and a high degree of randomness
LUTs respectively.Similarly, it utilizes 42.3% less power in the CVLCG method makes it suitable for real-time
than the dual-CLCG architecture on Virtex5 for 8-bit secure information exchange and data security in the
design. The 8-bit dual-CLCG architecture takes 28 light weight IoT enabled smart devices.
initial clock cycles (input to first output latency) to get
the first pseudo-random bit and further, it takes two REFERENCES
clock cycles (output to output latency) to generate each [1] A.K. Panda and C.K. Ray "A Coupled Variable Input LCG Method
pseudo-random bit. The implementation of the dual- and its VLSI Architecture for Pseudorandom Bit Generation., "
IEEE Transactions on Instrumentation and Measurement, January
CLCG architecture failed for the 16- and 32- bit word 2020
size on both FPGA devices due to excessive usage of [2] A.K. Panda and C.K. Ray "Modified Dual-CLCG Method and
memory (< 215) resources on FPGA chip. Therefore, Its VLSI Architecture for Pseudorandom Bit Generation" IEEE
the CVLCG method is the efficient PRBG method for Transactions On Circuits And Systems-I: Regular Papers January
2020
generating pseudo-random bit at every uniform clock
[3] E. Fernandes, A. Rahmati, K. Eykholt and A. Prakash, "Internet
rate because of its advantages such as good of things security research: A rehash of old ideas or new intellectual
randomness, maximal period, less area, low power, low challenges," IEEE Security & Privacy, vol. 15, no. 4, pp. 79-84,
output latency and low initial clock latency. 2017.
[4] F. Firouzi, B. Farahani, M. Ibrahim and K. Chakrabarty, "From
5. CONCLUSION EDA to IoT e-Health: promise, challenges, and solutions," in
IEEE Transactions on Computer-Aided Design of Integrated
The aim of this work is analyze different PRBG Circuits and Systems, vol. PP, no. 99, pp. 1-1, 2018.
methods and find an efficient hardware architecture for [5] G. Mois, S. Folea and T. Sanislav, "Analysis of three IoT-based
generating pseudorandom bit sequence by targeting the wireless Sensors for environmental monitoring," in IEEE
IoT enabled applications. Initially, the BBS, CLCG and Transactions on Instrumentation and Meas., vol. 66, no. 8, pp.
2056-2064, Aug. 2017.
dual-CLCG algorithm is studied to perform its hardware
architecture. However, it experiences the drawbacks [6] K. Yu, M. Arifuzzaman, Z. Wen, D. Zhang and T. Sato, "A key
management scheme for secure communications of information
of generating pseudorandom bit at an unequal interval centric advanced metering infrastructure in smart grid", in IEEE
of time that lead to varying in the output latency and Trans. on Instrumentation and Meas., vol. 64, no. 8, pp. 2072-
also fails to achieve the maximum length period. 2085, Aug. 2015.

Therefore, the aforesaid drawbacks are overcome by [7] O. Goldreich, "Foundations of Cryptography II: Basic
Applications." Cambridge University Press, 2009, New York,
proposing a new efficient PRBG method, i.e. "coupled USA.

110 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[8] J.G. Pandey, T.Goeland A.Karmakar, "A High-Performance and


Area-Efficient VLSI Architecture for the PRESENT Light weight
Cipher," 31st International Conference on VLSI Design and 17th
Int. Conference on Embedded Systems (VLSID), Pune, 2018,
pp. 392-397.
[9] D. E. Knuth, "Deciphering a linear congruential encryption," in
IEEE Trans. Inform. Theory, vol. 31, no. 1, pp. 49-52, Jan 1985.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 111
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Autometro Train Shuffle Between the Stations Using


Raspberry PI
P. V. Kusuma
UG Student,Department of ECE, Narayana Engineering College, Gudur
Email: kusumamallikarjunreddy@gmail.com

Abstract: This project illustrates the equipment and safety system in order to make the more productive.
utilized in metro train motion which is employed in Driver less automated concepts have been adopted.The
most of the progressed countries. during this intent of this project to drive the train automatically with
automatic metro train, we've provided Raspberry the help of sensors and safety of passenger is the basic
PI based controller that facilitates the programmed concern of our model based pro-type metro train in
stopping of the train from one station to a different
this work part of auto mutation task is considered, and
station. This work presents the enhancement
process of a framework for a driver less train
a raspberry based protype is developed work like
instigated using Raspberry PI based controller. running through a given path with predefined stations
The hardware circuit is meant on circuit boards, and sensing the arrival at the station and hence, proper
are given various sensors for automation purposes stopping are implemented within the framework
like IR sensor for out and in counting. The information that are sinked with the trains movement
hardware is assembled during a toy- like train . through its path are announced to passenger via LCD
Driver- less trains are use the RFID module for display moreover alarm signals are produced as
automatic stopping of train at their prescribed appropriate. Controlling of the doors in terms of open
stations. Train timings path,delay timings , and shut and timings of such actions are considered.
distances between the required stations are all
predefined. Messages are automatically showed the II. LITERATURE SURVEY
passengers. This paper presents the event process 1. International Open Access Journal Driverless Metro
of a framework for a driver less train implemented Train Shuttle between the Stations using LabVIEW
employing a RASPBERRY PI. The hardware Manoj Kumar M1 , Hemavathi.R2 , H. Prasanna
circuits, which are built on handmade PCB board, Kumar3 PG Scholar (C&I), Dept. of EE, UVCE,
are interfaced with various sensors for automation Bangalore, India Assistant Professor, Dept. of EE,
purposes. The Raspberry pi on python language is UVCE, Bangalore, India The aim of this paper is to
employed for programming the Raspberry pi. illustrate an improvement in the existing technology
Keywords: Framework, actuators, raspberry pi, used in metro train movements. This train is provided
automation, sensors with an controller and a IR Object sensor that allows
the automatic stopping of the station. This paper used
I. INTRODUCTION for the development process of a first model for a
Recent technological advancements are being driver less train executed using a RASPBERRY PI
assimilated in almost all point of our life including controller.
transportation, where a lot of up gradation has been 2. International Research Driver less Metro Stations u
made . railway transport for fact has underground a Manoj Kumar M PG Scholar (C&I), Dept. of EE,
huge transformation, start in with the early steam UVCE, Bangalore, India Assistant Professor, Dept.
operated engines to the most recent bullet train. Many of EE, UVCE, Bangalore, India. The object of this
developments in transport has utilized the existing paper is to demonstrate an betterment in the present
infrastructure where the existing metro system is being technology used in metro train shifting. This train
accommodates with a controller and the IR Object
modernized and equipped with automatic train control
sensor that is used for the automatic stopping of the
112 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

train from one station to another station. This paper IV. PROPOSED SYSTEM
presents the development process of a pattern for a
driver less train using an RASPBERRY PI controller.
This project is designed to demonstrate the
technology used in auto metro train movement which
3. International Journal of Scientific Research and are used in most of the developed countries like France
Development ISSN: 2456-6470 @ Issue - 1| Nov-
. This train is equipped with RFID module that enables
Dec 2017 also the stop and start timing of the train in
the automatic running of the train from one station to
between the two stations is the distance is also be
determined. New technologies are being merge in another. This proposed system is an Auto metro train
almost all detail of our life including transportation, and it eliminates the need of any driver. Because of
where a lot of improvement has been made. Railroad automation the human error is ruled out. In this project
transport, for particular, has undergone a large servomotor is used for automatic opening and closing
transformation, starting with the early steam operated of doors. Whenever the train reaches the station it stops
engines to the most recent bullet train using an automatically by reading RFID tag. Then the door is
controller. opens automatically so that the passengers can go
4. Prakash et al in "Auto metro train shuffle between outside or inside the train. The door then closes after
two stations" is designed to demonstrate the technology some prescribed time set in the controller by using
used in movement of metro train which is used in program which is in python language. It is also equipped
most of the developed countries like Germany and with a counting section for passengers by using IR
France.This train is provided with RFID module for sensors which counts the number of passengers entering
automatic movement of train from one station to and leaving the train. The door closes when it reaches
another.The passenger count will be displayed using maximum occupancy level of passengers . The humidity
IR sensor.
and temperature will be displayed on a seven segment
5. A. P. More et.al in "Smart Metro trine" Presents a display interface to the micro controller. Motor driver
driverless trine which is demonstrated to run between IC controls the moment of the train . As the train reaches
two stations> it eliminates the need of the driver. Then the destination the process will be repeats.In this
the human error will be ruled out. RFID module is Autometro train project the humidity and temperature
used to run the train from one station to another. The
will be displayed in LCD screen for passengers
servo motor is used to control the doors opening and
closing of train.
convinience. This project is advanced version for "Mass
rapid transit system "to reduce the disadavantages in
6. Thabit sultan mohammad,wisam fahmi Al-Azzo et al "mass rapid transit system".
proposed a concept of " Fully Automated metro
train.The proposed system challenges many problems
in the metro trains.
III. EXISTING SYSTEM
Rail based "Mass Rapid transit system" has been
extensively used in developed countries in overall world
as a remedy for traffic related problems. when traffic
will increased respectively the vehicles also increases
due to this the traffic problems will be increases from
past years.In order to improve the transport system
the "mass transit system will be introduced. The major
problems related to existing system is human
error,Higher cost, consumes more time to install. Block diagram

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 113
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Ultrasonic Sensor can control two DC motor with single L293D IC. The
The ultrasonic sensor is a transducer which converts L293D is designed to provide bi directional drive
electric electricity into sound waves and vice versa. currents of up to 600-m A at voltages from 4.5V to
These sound waves fall above the everyday variety of 36V. Both the devices are designed to drive inductive
human listening to and therefore it's far referred to as loads such as relays, solenoids, DC and bipolar stepping
ultrasonic waves. These sort of waves are above the motors has high current or voltage loads in positive
frequency of approximately 18000 Hz. An ultrasonic supply applications. Each output is a completely totem
sensor transmits ultrasonic waves into the air and detects pole drive circuit with a Darlington transistor sink and a
contemplated waves from an object. There are many pseudo-Darlington source. Drivers are enabled in pairs
packages for ultrasonic sensors, consisting of in intrusion with driver 1 and driver 2 enabled by 1,2 EN and driver
alarm systems, automated door openers and backup 3 and driver 4 enabled by 3 and 4 EN. The L293 and
sensors for automobiles. Accompanied via way of L293D is operated from 0°C to 70°C.
means of the fast improvement of facts processing DC Servomotor
technology, new fields of application, consisting of A DC servo motor consist of a small DC motor
manufacturing unit automation system and vehicle feedback potentiometer, gearbox,motor drive electronic
electronics, are growing and have to preserve to do circuit and electronic feedback control loop. It's high
so.Ultrasonic sensors are superb creatures. Blind from or low similar to the normal DC motor. The rotor
the eyes and but a imaginative and prescient so particular consists of brush and shaft. A commutator and rotor
that would distinguish among a moth and a damaged metal supporting frame are attached to the outside of
leaf even if flying at complete speed. No doubt the the shaft .A brush is built with an armature coil that
imaginative and prescient is sharper than ours and is a supplies current to commutator. At the back of the shaft
whole lot past human abilities of seeing, however is detector is built into the rotor in order to detect the
actually now no longer past our understanding. speed of rotation. it's simple to design a controller using
Ultrasonicranging is the method utilized by bats and simple circuitry because the torque is proportional to
plenty of different creatures of the animal country for the amount of current flow through the armature. Types
navigational purposes. In a bid to mimic the methods of DC Servo motors include series motor, shunt control
of nature to gain an side over everything, we people motor, split series motor and permanent magnet shunt
have now no longer best understood it however have motor.
correctly imitated a number of those manifestations and
harnessed their ability to the finest extent Ultrasonic RFID Module
sensors are gadgets that use electric-mechanical Whenever the train reaches the station it stops
electricity transformation, the mechanical electricity automatically, as sensed by RFID reader. Then the door
being within side the shape of ultrasonic waves, to is opens automatically the passengers can go inside and
degree distance from the sensor to the goal object. outside the train . The door then closes after a certain
Ultrasonic waves are longitudinal mechanical waves time set in the controller by the program. It is also
which tour as a succession of compression and rare equipped with a passenger counting section, which
factions alongside the route of wave propagation thru counts the number of passengers entering and leaving
the medium. Any sound wave above the human auditory the train. The passenger in and out counts are displayed
variety of 20,000 Hz is known as ultrasound. on a LCD display. The movement of the train is
Motor driver controlled by a motor driver IC interfaced to it. When
the train reaches the destination the process repeats .
L293D is a typical Motor driver which allows DC The train is automated as we know which will work
motor to drive in both directions. L293D can control a without a driver. Thus this train will avoid human errors.
set of two DC motors at a time in any direction. We Thus this train will be very beneficial to us. If we use

114 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

this type of trains then the timetable of trains also will of a resistive detail and a experience of moist NTC
be maintained. Our proposed system uses RFID temperature size gadgets and with a excessive-overall
module which will detect the station. The train performance 8-bit micro controller linked. DHT11
incorporates a station by using command on WIFI output calibrated virtual sign. It makes use of distinctive
module start the train start and reach station the RFID virtual- sign-collecting-approach and humidity sensing
card reader is read the card action for stopping train, generation, assuring its reliability and stability. Its sensing
at that time display the station one is arrived as well as factors are linked with 8-bit single-chip computer. Every
by door is open automatically the door is close then sensor of this version is temperature compensated and
train is reaches to next station. When next station is calibrated in correct calibration chamber and the
arrived the controller send vacancies by WIFI module calibration-coefficient is stored in OTP memory. Small
it display on the LCD display which mounted on the size & low consumption & lengthy transmission distance
train coach. At that time the RFID card reader detects (20m) permit DHT11 to be proper in all sorts of harsh
RFID card which fixed on the station, that time display software occasions. Single- row packaged with 4 pins,
station 2 on LCD display the door open for 5sec to making the relationship very convenient.
enter/leave passenger after certain time door of coach Fire sensor
is closed and reach to next station.
It is used to detect the fire, when we met fire
Electric battery accidFire sensor or flame detector is a sensor designed
Electric battery is a combination of one or to come across and reply to the presence of a flame or
more Electrochemical cells, used to convert chemical hearth place, allowing flame detection. Responses to a
energy (stored) into electrical energy. The battery has detected flame rely on the installation, however can
become a common power source for many industrial consist of sounding an alarm, deactivating a gas line
applications, robotics..etc. Larger batteries provide (along with a propane or a herbal gas line), and activating
standby power for computer data centers or telephone a hearth place suppression system. When utilized in
exchanges programs along with commercial furnaces, their function
IR sensor is to offer affirmation that the furnace is properly; in
those instances they take no direct motion past notifying
Transmits infrared rays in the range of the operator or manage system. A flame detector can
wavelength760nm .Such LED's are usually made of regularly reply quicker and extra as it should be than a
gallium arsenide and aluminum gallium arsenic. IR smoke or warmness detector because ofents inside the
receivers are commonly used as sensors. The human train.
eye cannot see the infrared radiations, it is not possible
to identify whether the IR LED is working or not, unlike Raspberry pi:
a standard LED. To overcome this problem, the camera Raspberry pi is a small single board computer. It
on a cell phone is used. does not need to add peripherals like keyboards,mics
DTH sensor and cases.All models are featured like soc(system on
chip) and the processor ranges from 700MHZ to
It is used to measure the temperature and humidity 1.4GHZ.The code will be installed in Raspberry for
present inside the train. DHT11 virtual temperature and processing.
humidity sensor is a calibrated virtual sign output of the
temperature and humidity mixed sensor. It makes use V. RESULTS
of a committed virtual modules seize generation and After successfully giving connections to given to the
the temperature and humidity sensor generation to make raspberry pi processor the code will be install int he
certain that merchandise with excessive reliability and raspberry processor by using raspberry OS on system
exquisite lengthy-time period stability. Sensor consists by connectingraspberry pi setup to same system using

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 115
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

connector. The OS used in raspberry pi the code is in VII. REFERENCES


python language.The train starts frm the station for [1] ManojKumar.M, Hemavathi.R, H.PrasannaKumar, "Driverle ss
another station when the RFID reader reads the rfid Metro Train Shuttle between the Stations using Lab
card the train stops at the station the doors will be open "International Journal of Trend in Scientific Research and
,then th ir sensors Starts counting of passengers when Development", Vol. 02, Issue 01, Nov-Dec 2017.
the count is rechaed to limit the doors will automatically [2] Naga Swetha R, Yashwanth Badri, Mahesh, Rabbani Basha, "Auto
close the train starts moving to another station. Metro Train To Shuttle Between Stations",
International Journal Of Current Engineering and Scientific
Project outcomes: Research, Vol.05, Issue 04, 2018.
1. Automatic stopping of train using RFID module. [3] K.S.Shilpashree, Lokesha.H, HadimaniShuvkuamr, "Imple
mentation of Image Processing on RaspberryPi", International
2. Automatic doors opening . Journal of Advanced Research in Computer and Communication
3. In count of passengers. Engineering, Vol. 04,Issue 05, May 2015.
[4] G.Senthilkumar, K.Gopalkrishnan, V.SathishKumar, "Emb edded
4. Out count of passengers. Image Capturing System Using Raspberry Pi System",
5. Temperature and humidity display. International Journal of Emerging Trends and Technology in
Computer Science, Vol. 03, Issue 02, April 2014.
6. Fire detection. [5] Guru Prasad Patil, Dr.C.R. Rajshekhar, "RFID Based Metro
7. Automatic stopping of train when a obstacle is in Train System", VOL. 3, NO. 5,May 2014
distance less than 10 meters. [6] Thabit sultan Mohammed, Wasam fahmi Al- Azzo,Mohammed
Ahmed Akaak, Mohammed Laheeb Europe "Full Automation in
VI. CONCLUSION Driverless Trains:A Microcontroller-based prototype". , Vol 3,
Issue 7,July 2014 pp. 10417- 10422.
The driverless train that is framework presented in
[7] Friyadi, Achmad Dwi (27 July 2019). "Pakai Teknologi Jerman,
this paper in fact a final year project. Research In and LRT Jabodebek Bisa Jalan Tanpa Masinis". detikfinance.
developing working prototype enhance self-confidence detikcom. detikcom. Retrieved 6 November 2019.
and assure that it is possible to design a system and [8] "Uji Coba Sistem Persinyalan LRT Jabodebek Berjalan Mulus |
Apply it for solving a particular problem by acquiring PT Len Industri (Persero)". PT LEN Industri. PT LEN Industri.
the necessary information. Moreover, developing a 4 November 2020. Retrieved 24 May 2021.

prototype system can serve as a basis of a far more


sophisticated and advance form of control system such
as driverless strain system. In this paper we have
decided how metro train can be automated with the
help of paper presented above and it main advantage
is counting the no of passengers automatically as they
enter the train.This counting helps to reduce the
overpopulation inside the train. The counting on the
other hand is displayed on 16*12 LCD train.

116 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Borrow Select Subtractor for Low Power and Area


Efficiency
C. Laxmanasudheer1, D. Jayanayudu2
1,2
Assistant Professor, Siddartha Institute of Science and Technology, Puttur

Abstract- Adders and subtractors are quint RBS with multiple RBS circuits[1]. This method
essential circuit modules in design of processors, generates partial difference and borrow using
which determine the speed of processors. The multiplexers (MUX) and the final difference and borrow
processing speed of subtraction is limited by the is selected. As the BSLS utilizes multiple RBS circuits
sequential borrow bit propagation from LSB to in it, it is proved normally area inefficient. The
MSB, whichin turn depends on the number of bits
conventional method of subtraction for signed numbers
of operands (subtrahend and minuend). This paper
presents two architectures of modified borrow
uses two's complement method using addition. For
select subtractor that consume lower power within addition process, references[7][8][9][10][11][12] and
creased area efficiency. The modifications carried [13]use adders. Note that[12] has lower power
out in the logical flow of subtraction process by using operational advantage and power delay product (PDP).
blocks with lower number of logic gates lead to a Here, PDP is the product of power anddelay.
smaller number of gates, thus resulting in less
The proposed architectures are compared with the
device count, lower area and lowerpower
conventional two's complement method found in
dissipation. Validation of architectures are carried
out using Cadence Virtuoso® simulations on UMC literature, basically employing an adder[14][15]. The
90nm technology library. Comparison with existing adder given in [12] has been considered for comparison
architectures demonstrates the comparative of two's complement method against the proposed
advantages of proposedmethods. architectures. For subtraction of signed numbers, a
Keywords- Borrow Select Subtractor, Lowpower
variant of BSLS [1] is proposed. The primary focus is
Subtractor, Area Efficient Subtractor, BSLS,Adder- on reducing area and power consumption, which is
Subtractor achieved by using logic blocks with fewer gates
occupying less area even while aiming for same logic
I. INTRODUCTION functionality. Section II presents BSLS in brief. Section
Adders, subtractors and multipliers are the essential III portrays the modified architecture of BSLS-BLO
building blocks of processors [1] [2] [3] [4] [5] [6]. and the gate count calculation. Section IV describes
Normally, subtraction is done using adder-subtractor the modified architecture of BSLS-RBHS and its gate
module, which can practically result in slowing down count. Section V depicts the performance analysis and
arithmetic operation, since the same hardware has to comparison interms of power, delay and gate count.
be used for both addition and subtraction processes Section VI provides the summary and conclusion of
using additional control signals. The commonly used the present work.
Ripple Borrow Subtractor (RBS) used for subtraction II. OVERVIEW OFBSLS
of unsigned numbers possesses a simple architecture.
However, performance of RBS is limited by borrow Fig. 1 shows the structure of an half subtractor,
propagation time incurred from Least Significant Bit implemented using an XOR gate, a NOT gate and an
(LSB) to Most Significant Bit (MSB). In other words, AND gate. While producing the output, half subtractor
the delay of RBS depends on binary word length. structure incurs a maximum latency of 2. Difference D
Borrow Select Subtractor (BSLS) architecture is incurs a latency of 1 and generation of borrow B incurs
proposed here to overcome the limitations of existing a latency of 2. Fig. 2 shows half adder implemented
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 117
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

using an XOR gate and an AND gate. In order to difference bit output when the borrow from the previous
produce sum S and carry C, this half adder incurs a stage is 0. The minuend is increased by one using the
maximum of one latency. Fig. 3 shows internal structure BEC block. The subtrahend and increased minuend is
of a full subtractor realized using 2 XOR gates, 2 NOT given as input to RBS. This accounts to generation of
gates, 2 AND gates and 1 OR gate. The full subtractor difference bit when the borrow from previous stage is
incurs a maximum latency of 4. Realization of difference 1. The difference and borrow bits are available for
D incurs a latency of 2 and borrow B introduces a borrow as 0 and 1. The correct output is selected based
latency of 4. on the borrow bit obtained from the previous stage using
the MUX.

Fig. 4. 2-bit BEC [1]


Fig. 1. Half Subtractor [1] TABLE I. FUNTIONAL TABLE FOR GROUP ANDBITS

Group # Number of bits #


2 2
3 3
4 4
5 5
Total bits 16
Fig. 2. Half Adder [1]

Fig. 5. Signed Borrow Select Subtractor [1]


Fig. 3. Full Subtractor Gate Structure [1]
The difference between the subtrahend and the
Fig. 4 depicts the structure of 2-bit Binary to Excess- minuend is in 2's complement form when the subtrahend
1 Converter (BEC) implemented using 1 XOR, 1 AND is greater than minuend. To convert the two's
and 1 NOT gate. The 16-bit BSLS for unsigned complement form into signed magnitude form, additional
numbers consists of five logic groups. Each group blocks are required. When borrow output from
computes the difference and borrow for different number unsigned BSLS is 0, the result is positive. Hence, the
of bits, as shown in Table I. Each functional group output doesn't necessitate the conversion to signed
except first group has 2n-bit RBS, n-bit BEC and a magnitude form. Similarly, as borrow output is 1, the
(2n+2):(n+1) multiplexer. The first group has only one result is negative. Then, the output of borrow-out is
two-bit RBS. The minuend and subtrahend are the complemented and 2's complement is performed on
inputs to RBS. This accounts to generation of the
118 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

entire result in signed magnitude form. Fig. 5 depicts difference and borrow bits. The partial difference and
the signed borrow select subtractor. borrow bits obtained from first n-bit RBS, considering
III. MODIFIED BSLS USING BLO(BSLS- Bin=0 and Binary-Less-One (BLO) considered as
BLO) Bin=1 are given as input bits to multiplexer, which selects
the actual difference and borrow based on Bin generated
The proposed architecture replaces the second n- from previous group. The first group has only one two-
bit RBS and BEC-1 of BSLS using (n+1)-bit Binary- bit RBS, while, each of the functional groups except
Less-One (BLO) logic in all groups. It uses Binary- the first consists of one n-bit RBS, (n+1)-bit BLO and
Less-One (BLO) logic as shown in Fig. 6 for 3-bit a (2n+2):(n+1) multiplexer.
BLO logic. Table II shows the functional table. The 3-
bit BLO has been designed using Boolean expressions A full subtractor normally requires 2 numbers each
(1), (2) and (3). 4-bit BLO, 5-bit and 6- bit BLO of XOR, NOT and AND gates and one OR gate. A
structures can all be realized by using their respective half subtractor can be realized using one each of XOR,
Boolean expressionforms. NOT and AND gates. Torealise2:1MUX, one NOT
gate, 2ANDgates and one OR gate are required. First
X0= ~B0 3-bit processing in RBS requires one half subtractor
X1 = B1◉B0 and 2 full subtractors. Thus, the first 3-bit RBS requires
5 XOR gates, 5 NOT gates, 5 AND gates and 2 OR
X2 = B2 ◌
ْ ~(B0 +B1)
gates. The 4-bit BLO is realized using 2 each of XOR,
NOT and NOR gates and one XNOR gate. 8:4 MUX
selects actual difference and borrow bits, and this
comprises of four 2:1 multiplexers, containing 4 NOT,
8 AND and 4 OR gates.
Total gate count required to implement the group 3
structure in BSLS-BLO is thus the sum of counts,
Fig. 6. 3-bit Binary-Less-One (BLO)
namely, 1) first 3-bit RBS, 2) 4-bit BLO and 3) 8:4
TABLE II. FUNCTIONAL TABLE OF 3-BITBLO
MUX. Therefore, the total number of gates employed
to implement group 3 of BSLS-BLO is 7 XOR, one
B[2:0] X[2:0] B[2:0] X[2:0] XNOR, 11 NOT, 13 AND, 6 OR and 2 NOR gates.
000 111 100 011
001 000 101 100 Totally 40 gates are needed for group 3 in BSLS-BLO.
010 001 110 101 The gate counts for the other groups have also been
011 010 111 110 calculated and tabulated in Table III for comparison.
The proposed Binary-Less-One (BLO) logic
accomplishes the same operation of generating the
difference and borrow assuming that the Bin from the
previous stage is 1. This is analogous to the adder in
[9] but the internal components are different. It takes
the difference and borrow when the Bin is 0 as input
and subtracting one from the received difference and
borrow. The output of the BLO logic is the same as
that of difference and borrow when Bin is 1. Fig. 7 Fig. 7. Modified Borrow Select Subtractor using Binary-Less-
One Logic
shows the architecture of the modified Borrow Select
Subtractor circuit configured using Binary-Less-One
logic (BSLS-BLO). The Binary-Less-One logic is
employed in all groups except the group 1 to compute
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 119
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

output. Else, (B pg = 1), output is produced by


subtracting one from input. This is achieved by use of
half subtractors. Table IV shows functional table of 3-
bit RBHS. An n-bit RBHS comprises of n half
subtractors. The input Y to each half subtractor is from
n-bit RBS with Bin=0. The other input to the half
Fig. 8. 3-bit Ripple Borrow Half Subtractor (RBHS) subtractor is borrow from previous group or from
TABLE III. GATE COUNT FOR UNSIGNED BSLS USING BLO previous half subtractor. The borrow output (Bout) from
Parameter XOR XNOR NOT AND OR NOR Total nth half subtractor is the final borrow out of the n-bit
Group 1 4 0 4 4 2 0 14 RBHS.
Group 2 4 1 7 9 4 1 26
Group 3 7 1 11 13 6 2 40
Group 4 10 1 15 17 8 3 54
Group 5 13 1 19 21 10 4 68
Total 38 4 56 64 30 10 202

The modified 16-bit BSLS-BLO used for unsigned


numbers requires 38 XOR, 4 XNOR, 56 NOT, 64
AND, 30 OR and 10 NOR gates. Totally 202 gates
have been employed while constructing modified 16- Fig. 9. Modified Borrow Select Subtractor using Ripple
bit BSLS using BLO for unsigned numbers. The 16-bit Borrow Half Subtractor
TABLE IV. FUNTIONAL TABLE OF 3-BIT RBHS
borrow select subtractor architecture for signed
numbers has 16-bit borrow select subtractor, two's Bpg Y[2:0] B2 D[2:0] Bpg Y[2:0] B2 D[2:0]
complement circuit and a 34:17 MUX. The two's 0 000 0 000 1 000 1 111
0 001 0 001 1 001 0 000
complement circuit contains 18 NOT, 16 XOR and 15
0 010 0 010 1 010 0 001
AND gates. The 34:17 MUX has seventeen 2:1 MUX. 0 011 0 011 1 011 0 010
Therefore, 34:17 MUX module contains 17 NOT, 34 0 100 0 100 1 100 0 011
gates and 17 OR gates. Thus, the modified 16-bit 0 101 0 101 1 101 0 100
borrow select subtractor using BLO for signed numbers 0 110 0 110 1 110 0 101
0 111 0 111 1 111 0 110
incurs only 320 gates intotal.
TABLE V. GATE COUNT FOR UNSIGNED BSLS USING RBHS
IV. MODOFIED BSLS USING RIPPLE
Parameter XOR NOT AND OR Total
BORROW HALF SUBTRACT OR (BSLS- Group 1 4 4 4 2 14
RBHS) Group 2 5 5 5 2 17
Group 3 8 8 8 3 27
A second variant of the BSLS has been proposed Group 4 11 11 11 4 37
in this Section, which replaces the second n-bit RBS Group 5 14 14 14 5 47
and BEC-1 of BSLS or the n-bit BLO in BSLS-BLO Total Gates 42 42 42 16 142
using n-bit ripple borrow half subtractor (RBHS) in all Fig. 9 shows the structure of the modified borrow
groups. It employs Ripple Borrow Half Subtractor select subtractor circuit using ripple borrow half
(RBHS) as shown in Fig. 8, as depictedfora3-bit ripple subtractor (BSLS- RBHS). Ripple borrow half
borrow half subtractor(RBHS). It is analogous to the subtractor is used in all groups except group 1 to
adder in [10]. The n-bit ripple borrow half subtractor compute difference and borrow bits. The partial
takes the input from n-bit RBS with Bin as 0for difference and borrow bits obtained from first n-bit
corresponding group. Depending on the borrow from RBS, considering Bin=0 and the partial difference and
previous group (Bpg), operation of RBHS varies. If borrow is given as input to the n-bit RBHS. Based on
borrowis0, then the received input is passed as it is to the borrow bit Bin generated from the previous group,

120 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

the difference and borrow bit values have been V. RESULTS AND DISCUSSIONS
computed. The borrow-out bit Bout from both n-bit The proposed architectures have been designed
RBS and n-bit RBHS are given as input to the OR under the same design environment for comparing the
gate. The output of the OR gate is the borrow-out bit results justifiably. Table VI represents the power, delay,
Bout for the current group and borrow-in for the power delay product (PDP), device count comparison
succeeding group. In this architecture, the (2n+2):(n+1) for unsignedoperation.
multiplexer in each group has been replaced with a OR
TABLE VI. COMPARISON OF UNSIGNED SUBTRACTORS
gate. This results in reduction of number of gates. Each
Word Power Device
functional group except first group has one n-bit RBS, Size Architecture (uW)
Delay
PDP (fJ) Count #
(ps)
n-bit RBHS and an OR gate. The first group has only
one two-bitRBS. RBS 26.01 310.6 8.078 28
4-bit BSLS 37.70 232.8 8.776 51
Conventionally, a full subtractor requires 2 XOR BSLS-BLO 33.71 232.8 7.847 40
gates, 2 NOT gates, 2 AND gates and 2 OR gates. A BSLS-RBHS 26.83 265.7 7.128 31
RBS 50.05 647.1 32.387 56
half subtractor is used to be realized using one XOR 8-bit BSLS 91.84 344.6 31.648 128
gate, one NOT gate and one AND gate. First3-bit BSLS-BLO 73.85 344.6 25.448 94
BSLS-RBHS 55.05 477.1 26.264 68
processing in RBS requires one half subtractor and 2 RBS 92.59 1320.0 122.218 112
full subtractors. Therefore, the first 3-bit RBS requires 16-bit BSLS 210.50 567.4 119.437 282
5 XOR gates, 5 NOT gates, 5 AND gates and 2 OR BSLS-BLO 142.40 567.4 80.797 202
BSLS-RBHS 107.30 900.0 96.570 142
gates. It may be noted that Group 3 of BSLS-RBHS
contains 3-bitRBS and 3-bitRBHS.The3-bit RBHS has The power consumed by the modified BSLS-BLO
been realized using 3 XOR gates, 3 NOT gates and 3 is reduced when compared to BSLS, while holding on
AND gates. Total gate count required to implement to the same delay as that of the BSLS for different word
group 3 is the sum of gate counts required to implement size. The result is shown in Fig. 10 and Fig. 11. It can
first 3-bit RBS, 3-bit RBHS and a OR gate. Thus, the also be inferred that the delay of BSLS-RBHS is more
total number of gates employed to implement the group when compared to BSLS but the power is less when
3 is 8 XOR gates, 8 NOT gates, 8 AND gates and 3 compared to other architectures for different word size.
OR gates. Altogether, 27 gates are required for group PDP values of 4, 8, and 16-bit BSLS-BLO is lesser
3. Similarly, the gate count for the other groups are by 10.5%, 19.5%, 32.3%, respectively than BSLS as
calculated and tabulated in Table V for duecomparisons. shown in Figs.12 and 13. The PDP of 4, 8 and 16-bit
BSLS-RBHS is less by 18.7%, 17.0% and 19.1%,
The modified 16-bit BSLS-RBHS designed for
respectively, when compared to BSLS. The PDP of
unsigned numbers requires 42 XOR gates, 42 NOT
BSLS-RBHS for 4-bit is found lower when compared
gates, 42 AND gates and 16 OR gates. Overall, 142
to BSLS-BLO. On the other hand, for 8-bit and 16-
gates are required for constructing the modified 16-bit
bit word sizes, the PDP increases. It is also validated
BSLS using RBHS for unsigned numbers. The 16-bit
that the BSLS- BLO outperforms the BSLS-RBHS in
borrow select subtractor architecture for signed
terms of PDP as the word sizeincreases.
numbers has 16-bit borrow select subtractor, two's
complement circuit and a 34:17 MUX. The two's The modified BSLS-BLO for 4, 8 and 16-bit need
complement circuit contains 18 NOT gates, 16 XOR 11, 34 and 80 fewer gates, respectively, when compared
gates and 15 AND gates. The 34:17 MUX has to BSLS. This accounts to 21.5%, 26.5% and 28.3%
seventeen 2:1 MUX. Therefore, 34:17 MUX consists reduction in number of gates employed, respectively,
of 17 NOT gates, 34 AND gates and 17 OR gates in as shown in Fig. 13. The modified signed BSLS-RBHS
its making. Therefore, the modified 16-bit borrow select for 4-bit, 8-bit, 16-bit utilises 20, 60 and 140 fewer
subtractor using RBHS for signed numbers incurs two gates, respectively, when compared to BSLS,
hundred and sixty gates intotal. accounting to 39.2%, 46.8% and 49.6% reduction in

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 121
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

gate counts. For 4-bit words, it is found preferable to the conventional 2's complement method for different
use BSLS-RBHS, due to the fact that it has lower PDP word size as shown in Fig. 14.
and device count when compared to counterparts. For Fig.15 depicts delay of signed architectures for 4-
increased word size, preference can be made between bit, 8-bit and 16-bit. The delay of signed BSLS-BLO
BSLS-BLO and BSLS-RBHS since the BSLS-BLO is more or less equal to the delay of BSLS and it is less
claims advantage of lower PDP and BSLS-RBHS than 2's complement method for 8-bit and 16-bit. The
claims the advantage of lower device count. delay of signed BSLS-RBHS is more when compared
to BSLS for different word size. However, when
compared to conventional 2's complement method,
delay is more for 4-bit and 8-bit.
The power delay product of 4-bit, 8-bit and 16-bit
signed BSLS-BLO is lower by 16.3%, 18.6% and
Fig. 10. Unsigned DelayComparison
22.0%, respectively, when compared to BSLS as
represented in Fig. 16 and Fig.17. The power delay
product of 4-bit, 8-bit and 16- bit BSLS-RBHS is
reduced by 24.1%, 17.9% and 6.7%, respectively,
when compared to BSLS as represented in Figs. 16
and 17. The PDP of signed BSLS-RBHS for 4-bit is
less than that of BSLS-BLO. However, 8-bit and 16-
bit wordsizes the PDP increases due to the increased
Fig. 11. Unsigned PowerComparison complexity in architecture. It is also observed that signed
BSLS-BLO outperforms the signed BSLS-RBHS in
terms of PDP as the word sizeincreases.
TABLE VII. COMPARISON OF SIGNED SUBTRACTORS
Word Power Delay PDP Device
Architecture
Size (uW) (ps) (fJ) #
2 ’s Co mplement 73.13 408 .4 29 .866 103
BSLS 62.02 427 .7 26.5 25 85
4-bit
BSLS-BL O 51.86 427 .7 22.1 80 74
Fig. 12. Unsigned PDP Comparison BSLS-RBHS 4 3.97 457. 6 20.1 20 65
2 ’s Co mplement 137.70 700 .4 96 .445 169
BSLS 147.30 575 .4 84.7 56 190
8-bit
BSLS-BL O 119.80 575 .4 68.9 32 156
BSLS-RBHS 9 8.380 706. 5 69.5 05 130
2 ’s Co mplement 324.60 121 6.0 394 .713 333
BSLS 347.10 874 .5 303 .538 400
16-bit
BSLS-BL O 270.50 874 .5 236 .552 320
BSLS-RBHS 2 34.80 1205 .0 282 .934 260

Fig. 13. Percentage Reduction in Device Count, PDP of


Unsigned Architectures

Table VII illustrates the power, delay, Power-Delay-


Product PDP and total device count for signed operation
of subtractor circuit. Typical NMOS and PMOS
devices have been used to obtain the results. Modified
signed BSLS-BLO and signed BSLS-RBHS enjoy
reduction in power when compared to the BSLS and Fig. 14. Signed Power Comparison

122 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The modified signed BSLS-BLO for 4-bit, 8-bit


and16-bit requires 11, 34 and 80 fewer gates,
respectively, when compared to BSLS. This accounts
to12.9%,17.8% and 20.0% reduction in the number
of gates used, respectively, as shown in Fig. 17. The
modified signed BSLS-RBHS for 4-bit, 8-bit and 16-
bit utilizes 20, 60 and 140 fewer gates, respectively,
when compared to BSLS. This accounts to 23.5%, Fig. 17. Percentage Reduction in Device Count, PDP of Signed
31.5% and 35.0% reduction in the number of gates Architectures

needed respectively, as shown in Fig.17. VI. CONCLUSION


When compared to the conventional 2's complement This paper presents the design aspect, architecture
method, the delay of BSLS is lower for 8-bit and 16- and comparative operational advantages of modified
bit architectures, however, at the cost of increased borrow select subtractor using BLO and modified
power. In case of proposed BSLS-BLO, the delay and borrow select subtractor using RBHS operating at the
power is comparatively lower when compared to the same performance parameters, even while incurring
conventional 2's complement method. In case of the lower power consumption even while maintaining the
second proposed architecture, BSLS-RBHS, the delay speed performance withoutincurring any adverse impact
in case of 4-bit and 8-bit is more when compared to on the delay of the system. The performance
two's complement method and BSLS. And, the power comparison of modified BSLS-BLO and BSLS-RBHS
consumed is lower when compared to other architecture with borrow select subtractor found in literature, in terms
counterparts. The delay incurred by 16-bit BSLS- of power, PDP (Power-Delay Product) and device
RBHS is lower than that of 16-bit two's complement count depicts the advantages of the BSLS-BLO and
method. However, the delay experienced is greater than BSLS-RBHS. The number of gates employed is less
that of BSLS and BSLS-BLO. in both the modified architectures that the counterpart
architectures. This design approach also leads to
reduced number of transistors utilized, lower area and
reduced power consumption. Under all the process
corners, the BSLS-BLO and BSLS-RBHS outperform
the borrow select subtractor found in the literature
interms of power delay product.
Fig. 15. Signed Delay Comparison

Fig. 16. Signed PDP Comparison

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 123
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES [7] O. J. Bedrij, "Carry-select adder", IRE Transactions on Electronics


& Computers, pp.340-344,1962.
[1] Amit Maruti Kunjir and V S Kanchana Bhaaskaran, "A high
speed borrow select 16-bit subtractor", The Patent Office Journal [8] T.Y.CeiangandM.J.Hsiao,"Carry-SelectAdderUsingSingleRipple
Appl. 2868/CHE/2014 A, Jan. 22,2016. Carry Adder," Electronics Letters, V. 34, No. 22, Pp. 2101-03,
Oct. 1998.
[2] L.E.M. Bckenbury and W.Shao, "Lowering Power in an
Experimental RISC processor", Microprocessor and [9] B. Ramkumar and Harish M Kittur, "Low-Power and Area-
Microsystems, pp. 360-368, 2007. Efficient Carry Select Adder", IEEE Trans. on Very Large Scale
Integration (VLSI) Systems, vol. 20, no. 2, pp.371-75, Feb.2012.
[3] V Jayaprakasan, S Vijayakumar, V S Kanchana Bhaaskaran,
"Evaluation of the Conventional vs. Ancient Computation [10]Kore Sagar Dattatraya and V. S. Kanchana Bhaaskaran, "Modified
methodology for Energy Efficient Arithmetic Architecture", Carry Select Adder using Binary Adder as a BEC-1,", European
Int.Conf on Process Automation, Control and Computing Journal of Scientific Research V.103, no.1, pp.156-164, Jan.2013.
(PACC), 2011, 20-22. [11]Y. Kim and L.-S. Kim, "64-Bit Carry-Select Adder with Reduced
[4] Kore Sagar Dattatraya, Belgudri Ritesh Appasaheb, Ramdas Area," Electronics Letters, Vol. 37, No. 10, pp. 614-615,
Bhanudas Khaladkar and V. S. Kanchana Bhaaskaran, "Low Power May2001.
High Speed and Area Efficient Binary Count Multiplier", Journal [12]B.Srinivasa Ragavan, B.P.Bhuvana and V.S.Kanchana Bhaaskaran,
of Circuits, Systems, and Computers, Vol. 25, No. 4 "Low power 64-bit carry select adder using modified exnor block",
(2016)1650027. Journal of Engg. and Applied Sciences, Vol.10, pp. 17294,
[5] B. R. Appasaheb and V.S.Kanchana Bhaaskaran, "Design and Dec,2015.
Implementation of an Efficient Multiplier Using Vedic [13]Samiappa Sakthikumaran, S. Salivahanan, V. S. Kanchana
Mathematics and Charge Recovery Logic", Proc. of Int. Conf. on Bhaaskaran, V. Kavinilavu, B. Brindha and C. Vinoth "A Very
VLSI, Communication, Advanced Devices, Signals & Systems Fast and Low Power Carry Select Adder Circuit", 3rd International
and Networking (VCASAN-2013), Lecture Notes in Elec Engg, Conference on Electronics Computer Technology - ICECT 2011,
258, July 2013, Chap 16, Pp.101-108. Pp. 273-276, April 8 - 10,2011.
[6] Dalal Rutwik Kishor and V.S. Kanchana Bhaaskaran "Low Power [14]J.M.Rabaey, Digital Integrated Circuits- A Design Perspective.
DividerUsingVedicMathematics",ThirdInternationalConferenceon Upper Saddle River, NJ:Prentice-Hall, 2001.
Advances in Computing, Communications and Informatics
(ICACCI- 2014),24-27Sept.2014inDelhi,Pp.575-580,978-1- [15]M. M. Mano, Digital Design 3rd ed., Upper Saddle River,
4799-3080-7/14. NJ:Prentice- Hall,2002.

124 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IOT Based Smart Helmet for Construction Workers


C. Laxmanasudheer1, D. Jayanayudu2, K. Maheshwari3
1
Assistant Professor, & Siddartha Institute of Science and Technology, puttur-517583
2
Associate Professor, & Siddartha Institute of Science and Technology, puttur-517583
3
Assistant Professor, & Sri Venkatesa Perumal College of Engineering and Technology, puttur-517582
Email: laxmana018@gmail.com1, d.jayanaidu@gmail.com2, kmaheswari.k@gmail.com3

Abstract- Day by day the death rate of the floor and recover him. Within that time, he may be
construction workers at the construction site is expected to death.
increasing. But still there are no such remedies to
reduce this fatality rate. To provide continuous In India, Approximately 38 construction workers
monitoring of the workers and to prevent them die on construction sites every year. For example in
from any health hazards during working, this system 2017, there were 67 deaths, 2016 saw 55 deaths,
proposes a smart flexible helmet for the 2015 saw 62 deaths and 2014 saw 69 deaths, etc.
construction workers to provide security and
In order to provide continuous monitoring of the
rescue measures in case of any emergency
workers and to prevent them from any health hazards
conditions. The proposed system describes a smart
inexpensive helmet for the construction workers during working, this system proposes a smart flexible
made up of chromium embedded with helmet for the construction workers to provide security
Accelerometer and Gyroscope sensor. The and rescue measures in case of any emergency
Gyroscope sensor is used to indicate the rotation conditions.
and orientation of the person with respect to gravity II. LITERATURE SURVEY
whereas the Accelerometer sensor is used to
measure the linear acceleration or motion of the Kishor Shrestha et all proposed the "Hard Hat
worker. Both these sensors are used for fall Detection for Construction Safety Visualization". They
detection that may result from drowsiness, fatigue, used image processing techniques to check whether
etc. The helmet monitors the physical conditions the worker is wearing the helmet or not. This system is
of the construction workers and sends notification used to detect whether the worker is wearing the hat
to the Contractor via the Mobile. during working. But it does not provide any safety
Keywords- smart helmet, accelerometer and measures to overcome in case of any emergency
gyroscopic sensor, mobile app, GSM module. conditions.
I. INTRODUCTION S. Nandhini et all proposed "IOT based Smart
IOT, Internet of Thing, is a network of thing, which Helmet for ensuring Safety in Industries". This system
may be sensors, mobile devices, physical appliances, uses sensors to monitor the workplaces. This system is
etc. All these devices have unique identifier which particularly used for detecting safety at workplaces but
enables them to collect and exchange useful data. These not for the workers.
unique IDs are used to identify each and every worker S.R.Deokar et all proposed "Smart Helmet for Coal
working on the construction site .The Sensors are used Mines Safety Monitoring and Alerting" system. This
to sense the activity, orientation, movement of the system seems to be very efficient as it ensures safety
workers on the construction site. for both the workers and the workplace using wireless
The death rate of the construction workers at the sensor networks. It also includes fall detection, toxic
site has been increasing every year. If the worker gases emission from industry, etc.
working 5th or 10th floor of the large building gets severe Shruthi et all proposed "Smart Helmet for Coal
heart attack, it takes some amount of time to reach that Miners using Zigbee Technology". This system devises
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 125
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

a smart helmet using Zigbee technology for monitoring embedded inside a single chip. This chip is attached
the emission of hazardous gases, abnormal temperature with Helmet to detect the Acceleration, Axis and gravity
conditions, humidity levels etc. This system ensures of the Helmet. Both these sensors are used for fall
safety for workers at the mining area but this helmet is detection that may result from drowsiness, fatigue, etc.
not purposely provided for the safety of the workers. 2) Fall sensing phase:
III. PROPOSED SYSTEM Fall sensing phase is once the person can fall alert
The smart helmet is embedded with Arduino Uno message are sent through the contractor. Check The
kit to which the sensors like Heartbeat sensor, Workers Orientation And Motion. Once Trigger Is
Accelerometer and Gyroscope sensor are connected. Activated.
The helmet is also provided with a panic button to alarm 3) Location Tracking and Alert Message
others in case of any disaster. All these smart helmets
are worn by the construction workers at the time of GSM modem is a unique type of wireless modem
working. The civil engineer or the contractor receives accepts a SIM card. It operates similar to mobile phone
all the information about the worker provided by the with its own specific mobile number.
helmet with the use of the GSM module involved in it. C. Arduino Uno
Through this GSM module, alert message are sent
The Arduino Uno is designed with 14 digital input/
through SMS. DC- DC converter is used to regulate a
output pins and 6 analog input pins. This kit in this system
flow of current. The contractor or the civil engineer
is used as a microcontroller for controlling all the
monitors functions of all the workers provided by the
activities of all the modules involved in the process. The
helmet with the use of a mobile application specially
sensors are connected to this Arduino board. This kit
designed to serve this purpose.
is embedded inside the smart helmet during the
A. Methodology manufacturing process.
Buzzer
Acceleromete
Helmet Arduino
r and
Uno kit
Gyroscope GSM
sensor Module

SMS
Fig. 2 Arduino Uno
Fig. 1 System architecture. D. Accelerometer and Gyroscope sensor
B. Overview The gyroscope sensor is used to measure the angular
The proposed system is divided into three phases: velocity of the object. The 3 axis gyroscope sensor
can find the orientation and rotation of the person in all
1) Monitoring phase
three directions with respect to gravity. This provides
2) Detecting phase an angle value ? which is then used to indicate the
3) Fall Sensing phase position of the person during fall. An accelerometer
sensor is used to measure the acceleration or motion of
1) The Monitoring phase: the human body. A tri axial accelerometer measures
It is used to measure the angular velocity of the object the acceleration in all 3 axes x, y and z respectively.
and the acceleration or motion of the human body. The accelerometer sensor provides a parameter value
Continuously Monitor the Physical Condition of the for measuring the person motion. Both these sensors
Workers the accelerometer and the gyroscope are are used for Fall detection.
126 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. 5 GSM module and mobile app

Fig. 3 Accelerometer and gyroscope

E. Fall Detection Algorithm (example)


(1) if the parameter > threshold value of the parameter
then
Fig.6 Buzzer
(2) if?>thresholdvalueof?then
IV. EXPERIMENTAL RESULT
(3) return fall detection
(4) return no fall detection The smart helmet consists of accelerometer and
gyroscope sensor, dc-dc controller (step down), pulse
sensor, buzzer, Arduino Uno and a GSM module.
A. Hardware design
The project hardware setup is shown in figure
1. The helmet made with the Arduino Uno board,
accelerometer and gyroscope sensor, GSM module,
Fig. 4 axis and angular orientation Buzzer and Dc-Dc step down converter.
F. GSM Module and the Mobile App
It is used to describe the protocols for second-
generation (2G) digital cellular networks used by mobile
devices such as mobile phones and tablets. Alert
message are sent through GSM Module. All other
details can also be viewed in the mobile application. .
The contractor monitors and receives all the information
about the worker with use of this GSM facility. Fig. 7 Helmet design
G. Buzzer B. Mobile application
The helmet is also designed with panic button. This The mobile application is used by all workers as
button is used to alarm other workersworking at various well as the contractor. It consists of admin and employee
floors of the large building in case of any disaster or page. The admin page shows complete details about
emergency situations. It is designed primarily to intimate the workers and the site. The employee page shows
every other workers involved in the construction process the corresponding employee's name, ID, location and
instantly to avoid large disaster. It is an audio signaling designation.
device.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 127
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. 8 mobile application

C. Arduino output Fig. 10 Alert message

The output image of the Arduino Uno which is used E. Location Tracking
to identify the person condition. If the person condition Figure 11 shows the location of the particular worker
is critical and the trigger is activated through person in the construction place.
fall. It shows the figure 3.

Fig. 9 Arduino Output

D. Alert Message Fig.11 location tracking

The alert message is sent to the contractor, if the Advantages of Proposed System
contractor receives any SMS about the workers • Monitoring of workers health condition at the
condition he/she receive the worker easily. construction site.
• Fall detection of the workers due to fatigue,
drowsiness, etc.
• Alarming system provided in case of any natural
calamity.
• Prior intimation and notification of the workers
condition to the contractor.

128 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

• Reduction in death rate of construction workers. REFRENCES


• Quick location identification of the construction [1] MangalaNandhini.V, Padma Priya.G.V, Nandhini.S, K.Dinesh,
"IoT based Smart Helmet for Ensuring Safety in Industries",
workers in case of any emergency situation.
IJERT, 2018.
• Enhanced security to the workers working at some [2] S.R. Deokar, V.M. Kulkarni, J.S.Wakode, "Smart Helmet for Coal
highest floors for a large building. Mines Safety Monitoring and Alerting" Vol 6, Issue 7, July 2017.

• Inexpensive user-friendly hardest shield that could [3] Kiran Kishore V, E Narasimha, Y Shruthi, "Smart Helmet for
Coal Miners using Zigbee Technology" Issue 2, Volume 2, 067-
save the workers from all type of hazards. 069.
V. CONCLUSION [4] Kishor Shrestha, Dinesh Bajracharya, Pramen P. Shrestha, "Hard
Hat Detection for Construction Safety Visualization".
If this proposed system is implemented to ensure
[5] ArkhamZahriRakhman, LukitoNugroho, Widyawan,
the complete safety of the workers at the construction Kumianaingsih, "Fall Detection system using Accelerometer and
site. Through this smart helmet, the contractor can Gyroscope Based on Smartphone", ICITACEE, 2014.
continuously monitor the entire workers involved in [6] Adlian Jefiza, EkoPramunanato, Hanny, Mauridhy Heri
construction process and can also get notification about Purnomo "Fall Detection Based on Accelerometer and Gyroscope
the workers' physical condition and can immediately using Back Propagation", EECSI, 2017.

save the workers from any serious issues in case of [7] C. j. Behr, A. Kumar and G. P. Hancke, "A Smart Helmet for Air
Quality and Hazardous Event Detection for the Industry?, IEEE,
emergency. Hence we can reduce the death rate of the PP. 2028-2031, 2016.
construction workers and provides increased security
[8] Pranjal Hazarika, "implementation of safety helmet for coal mine
to them. workers", 1st IEEE International Conference on Power
Electronics Intelligent Control and Energy Systems, pp. 1-3,
2016.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 129
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Design of Low Power High Speed SRAM Architecture


using SK-LCT Technique
D. Jayanayudu1, C. Laxmanasudheer2
1
Associate Professor, & Siddartha Institute of Science and Technology, puttur-517583 2
2
Assistant Professor, & Siddartha Institute of Science and Technology, puttur-517583
Email: jayanaidu@gmail.com1, laxmana018@gmail.com2

Abstract- In many VLSI chips, Static Random [2]. Simultaneously, increase of power dissipation has
Access memory (SRAM) has become an important become the major obstacle against further development
part due to their large storage capacity and small of VLSI circuits. Power consumption due to memory
access time. Low power adequate memory design accesses in a computing system, often constitutes a
is one of the most challenging issues in SRAM dominant portion of the total power consumption [3].
architecture. As the technology node scaling down,
leakage power consumption has become a Static Random Access Memory (SRAM) is an
significant problem. There are various power gating important component in most of the VLSI chips; it often
schemes available in the literature such as sleep consumes a dominant portion of power in each chip.
technique, stack technique, sleepy stack By reducing the power of SRAM, the overall power of
technique, sleepy keeper technique, lector chips can be reduced. Due to the quadratic relation
technique, foot switch technique and double switch between power and supply voltage of transistors [4];
technique for leakage power reduction. In this
one of the most effective method to reduce the power
paper a novel power gating technique namely
sleepy keeper leakage control transistor technique
consumption is by decreasing the supply voltage. Due
(SK-LCT) is proposed for a low power SRAM to the strong demand of the SRAM memory in hand
architecture design. The SRAM architecture has held devices, System On-Chip (SoC) & high
two main components, namely SRAM cell and performance VLSI circuits, the reduction of power
sense amplifier. The proposed SK-LCT technique consumption is very important. Owing to high bit-line
is applied in both SRAM cell and sense amplifier swing requirement, the leakage power consumption of
for a new low power high speed SRAM architecture memory circuit during a write operation is high. Sleep
design. Simulation is done using Tanner EDA tool technique, Stack technique, Sleepy stack technique,
in 180nm technology and the results obtained show Sleepy keeper technique, LECTOR technique, Foot
a significant improvement in leakage power switch technique & Double switch technique are some
consumption and speed.
of the most commonly used power gating technique for
Keywords-SRAM, SK-LCT Technique, Tanner leakage power reduction. To overcome the
EDA, VLSI disadvantages of the above existing techniques, a novel
I. INTRODUCTION technique is proposed.
Very Large Scale Integration is the process of A novel power gating technique, namely SK-LCT
integrating a million of transistors within a single chip. Technique is used in the design of SRAM cell and sense
Rapid growth in VLSI fabrication process results in amplifier. The SRAM architecture using a SK-LCT
the increase of densities of the integrated circuit by technique has several advantages over the conventional
scaling down the technology [1]. With the advancement SRAM?s design with higher speed and less power
in technology that are happening in the world, the consumption.
demand for large storage of data is increasing in a way
that needs to be faster than the existing technologies

130 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

II. DESIGN OF SRAM ARCHITECTURE two stable states which are denoted as "1 & "0. During
SRAM Architecture consists of SRAM cell, sense read and write operation, two additional NMOS
amplifier, precharge circuit, row/ column decoder and transistors control the access to the storage cell. The
write driver circuit. Fig.1 shows the block diagram of conventional SRAM cell uses six MOSFET to store
SRAM Architecture. The decoder (row decoder/ data in memory as shown in Fig.2
column decoder) translates the binary address into
unary address exactly only one word in the array is
selected. The memory location within the memory
devices are selected by the address inputs of the
decoder. Based on the memory location found in the
memory device, the number of memory address input
pins is determined. The data I/O connection is the path A. Sense Amplifier
in which data are entered for storage and extracted for Sense amplifier is the part of read circuitry that is
reading. The bit lines (BL&BLB) are read by sense used to read the data from the SRAM Architecture; its
circuitry that sense the value of the bit lines; amplify it role is to sense the low power signals from the bit lines
to speed it up and restore the signal to the proper voltage (BL&BLB) and amplify the small voltage to
levels. decipherable logic levels so that the data obtained can
be interpreted properly in SRAM array. Fig.3 shows
Differential sense amplifier.

Fig.3: Differential Sense Amplifier

Fig.1: SRAM Architecture Precharge Circuit


SRAM is categorized as word oriented and bit Precharge circuit consists of three PMOS
oriented. In word oriented memory, each address transistors. Two upper transistors are used for
accesses a word of n bits whereas in bit oriented precharging and the lower one is used for equalization.
memory, each address accesses a single bit. Here, Before the read and write operation, precharge circuit
SRAM cells are arranged in an array of horizontal row is used to precharge both bit lines (BL & BLB) to VDD.
and vertical column. In array architecture, there are 2N Each column has a single precharge circuit in the
rows that are called as word lines and 2M columns memory array. The Fig.4 shows the Precharge circuit.
that are called as bit lines. So, the total number of
memory cells in the array is 2 (N+M). For fast read
and write operation separate write driver circuit and
sense amplifier dedicated to each column.
SRAM cell
Fig.4: Precharge circuit
The SRAM cell uses a bi-stable latching circuitry to
store one bit binary information. The memory cell has
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 131
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Write Driver Circuit LECTOR technique has two leakage control transistors
The write driver circuit is used to discharge any one (LCT1 &LCT2) which are inserted between the pull
of the bit lines (BL & BLB) from precharge level. It is up & pull down network. It has a very low leakage
enabled by a write enable (WE) circuitry. In the each power which results in a delay penalty [8]. The data
column of memory array, only one write driver circuit retention problem occurs in the circuit, which can be
is required. The WE signal is turned on; when the write minimized by placing sleep transistor [9]. There is a
operation is intended. Otherwise, the WE signal isolates need of a new power gating technique to overcome the
the bit lines from write drivers. disadvantages of the above existing techniques.

Decoder Power Gating in Sense Amplifier

In memory design, the decoder is used to decode Sense Amplifier is one of the critical parts in the
the given address and enable the particular row or memory. The performance of sense amplifier strongly
column of the memory array. Row and column decoder affects both memory access time and overall memory
is used to enable Word Line (WL) and Write Enable power dissipation. Improper design of the amplifier
(WE) of a SRAM array. Based on the address line, circuitry affects the robustness of the memory device.
particular memory cell is chosen and the data is read In order to reduce static power & delay of Sense
and written in the memory array. Amplifier; Latch- type Sense Amplifier is designed using
Foot switch Technique & Double switch Technique.
III. POWER GATING TECHNIQUES
The Footer Switch Voltage Latch Sense Amplifier
Power gating technique is most commonly used (FS- VLSA) senses the voltage difference (VBL)
integrated circuit design to reduce the leakage power, between bit line voltage (VBL) & bit line bar voltage
by shutting off the current to blocks of the circuit which (VBLB) and amplifies it to rail output voltages. The
are not in use. An externally switched power supply is Footer Switch Current Latch Sense Amplifier (FS-
used to achieve the static power reduction, which is CLSA) senses the current difference produced by
the basic form of power gating. VBL and amplifies it. By inserting an additional head
Power Gating in SRAM cell switch (i.e. Double Switch PMOS Access & Double
Switch NMOS Access) the invalid current paths in FS-
During standby mode, most of the power is wasted
VLSA can be removed which introducing a
in SRAM cell; because leakage power plays a
complementary sense enable signal. The sensing dead
predominant role in SRAM power consumption. The
zone can be completely removed using Double Switch
various power gating techniques are available in literature
Transmission Access-Voltage Latch Sense Amplifier
to shrink the static power of memory cell.
(DSTA-VLSA) [10].
In sleep technique, "sleep S" PMOS transistor is
IV. SLEEPY KEEPER LEAKAGE CONTROL
inserted between VDD & pull up network and "sleep
TRANSISTOR TECHNIQUE (SK-LCT
S BAR" NMOS transistor is inserted between the pull
TECHNIQUE) FOR LOW POWER HIGH
down network & ground. The wake up time of the
SPEED SRAM ARCHITECTURE
sleep technique has a considerable impact on the
competence of the circuit [5]. Stack technique is state The SK-LCT Technique is the combination of both
maintenance technique with the disadvantage of Sleepy Keeper and LECTOR Technique. The delay
increased delay and area [6]. The divided transistor of & power of the SRAM Architecture can be further
sleepy stack technique increases the delay drastically reduced and the data retention can be maintained using
& also limits the convenience of this technique [7]. In this novel technique.
Sleepy Keeper Technique parallel connected PMOS Fig.5 shows the SK-LCT Technique. Here, leakage
and NMOS transistor is placed between pull up control transistor (LCT-PMOS & LCT-NMOS) is
network & VDD and pull down network & ground.
132 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

placed in between pull up & pull down network. Both


PMOS and NMOS are tied up parallel to preserve the
stable retention in standby mode. LCT- PMOS gate is
connected to the drain of pull down network and LCT-
NMOS gate is connected to the drain of pull up
network. Here, the sleep PMOS(S) transistor is placed
below VDD and sleep NMOS (S BAR) transistor is
placed above ground. In sleep mode, parallel connected
NMOS is the only terminal between pull up network
& VDD and parallel connected PMOS is the only
terminal between pull down network & ground.

Fig.6: SRAM Architecture using SK-LCT Technique


Table I: Read and Write Operation of SRAM cell

WRITE
OPERATION READ OPERATION
Q=0, Q- Precharge both the
bar=1 Bit lines
WRITE Word REA Word line=1
„1? Line=1 D „1? Bit bar=0(discharges
Bit bar=0 to 0)
Fig.5: SK-LCT Technique
Bit =1 Bit=1
The SRAM cell and Sense Amplifier are the two Q=1, Q- Precharge both the
main peripheral components of SRAM Architecture; bar=0 Bit lines
WRITE Word REA Word line=1
by the optimized design of these two components using „0? Line=1 D „0? Bit bar=1
this SK- LCT technique low power & high speed Bit bar=1 Bit =0(discharges to
memory architecture can be obtained. Bit =0 0)
V. SRAM ARCHITECTURE USING SK- Table I show the read and write operation of SRAM
LCT TECHNIQUE cell. When Word Line (WL) and Write enable circuitry
Fig.6 shows the Block Diagram of SRAM (WE) is enabled, previous data is modified and new
Architecture using SK-LCT Technique. Initially, data is written in the memory cell. When either Word
precharge both the bit lines (BL & BLB) by using Line (WL) or Write enable circuitry (WE) is disabled,
Precharge circuit. By enabling the word line (WL) of the previous data is hold in the memory cell. No change
the SRAM cell, the data either "0” or "1” is stored. If in the memory cell takes place during hold operation.
data "1” is written in SRAM cell, BLB automatically
discharges to "0” & BL remains high and vice-versa.
Sense Amplifier boosts the data in SRAM cell and acts
as a read part circuitry. No change in the memory cell
takes place during hold operation.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 133
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Design of SRAM cell using SK-LCT Technique


SRAM cell is designed using SK-LCT Technique
to reduce the leakage power dissipation of memory.
Fig.7 shows SRAM cell using SK-LCT Technique.
When word line (WL) is asserted high, access
transistors are turned"ON” for write operation. This
connects the cell to two complementary bit lines columns
(BL &BLB) and the data either "1” or "0” is written in
the memory cell. When WL=0, SRAM cell is being Fig.8: Sense Amplifier using SK-LCT Technique
inaccessible from both bit lines; keeping it in standby
mode. This keeps prior stored value in the cell VI. SIMULATION RESULTS
unchanged. The low power high speed SRAM Architecture is
designed using Sleepy Keeper Leakage Control
Transistor Technique (SK-LCT Technique). The
complete work is carried using Tanner EDA 180nm
technology. The simulation result indicates the analysis
of different parameters like leakage power & delay.
Simulation Result for SRAM cell using SK-LCT
Technique
If WL=1 and bit lines BL=1 (remains high, i.e. "1”)
& BLB=0 (remains low, i.e. "0”), data "1” is written in
Fig.7: SRAM cell using SK-LCT Technique
the SRAM cell. If WL=1 & bit lines BLB=1(remains
high, i.e. "1”) & BL=0 (remains low, i.e. "0”), data "0”
Design of Sense Amplifier using SK-LCT is written in SRAM cell. Simulation waveform for
Technique SRAM cell using SK-LCT Technique is shown in Fig.9
The power and delay of the Voltage Latch Sense
Amplifier (VLSA) is reduced using SK-LCT
Technique. Here, additional transmission access W
L
transistor is inserted along with bit lines (BL & BLB).
During read mode, the PMOS sleep transistor is set to
"1” and the NMOS sleep transistor is set to "0”; thus
turning on the transmission gate and switching off the
PMOS transistor whereas in standby mode the
transmission gate is turned off and PMOS transistor B
L
B
turns on. Fig.8 shows latch type sense amplifier using
SK-LCT Technique.

Fig.9: Simulation waveform for SRAM cell using SK-LCT


Technique

B
L

134 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6

W
R
I
T
E
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table II: Performance Comparison of SRAM cell Table III. Performance Comparison of Sense Amplifier

SRAM CELL POWER DELAY SENSE AMPLIFIER POWER DELAY


WITHOUT POWER GATING 106.75nW 1.0934ns Without Differential Sense 0.9034W 4.2953ns
Sleep Technique 45.83nW 0.7924ns Power Amplifier
Stack Technique 95.86nW 0.9556ns Gating
Sleepy StackTechnique 68.58nW 1.0019ns Footer Switch- 0.1556W 0.25325ns
WITH Sleepy Keeper 89.18nW 1.0575ns VLSA
POWER Technique Footer Switch- 0.8592W 0.25328ns
GATI NG LECTOR Technique 57.04nW 0.7069ns With CLSA
SK-LCT Technique 45.33nW 0.6046ns Power DSPA -VLSA 0.1708W 0.25325ns
Gating DSNA -VLSA 0.6003W 0.25325ns
The above Table II shows the comparison of SRAM DSTA -VLSA 0.1401W 0.23605ns
cell with power gating technique and without power SK-LCT 0.0573W 0.20328ns
gating technique. By using existing technique the power Technique(VLSA)
and delay of the SRAM cell can be optimized. A new The above Table III shows the comparison of Sense
power gating technique namely SK-LCT Technique is Amplifier with power gating technique and without
proposed which save 57.53% of power and 44.70% power gating technique. By using existing technique the
of delay compared to SRAM cell without power gating. power and delay of the sense amplifier can be reduced.
Simulation Result for Voltage Latch Sense A novel technique, namely SK-LCT Technique is
Amplifier using SK-LCT Technique proposed which saves 93.65% of power and 95.26%
The voltage difference between both the bit lines of delay compared to Differential Sense Amplifier.
(BL&BLB) of Voltage Latch Sense Amplifier (VLSA) Simulation Result for SRAM Architecture using
is sensed and amplifies the small voltage signal in the bit SK-LCT Technique
lines to recognizable logic levels. The Simulation A 4 bit SRAM Architecture (2 columns × 2 rows)
waveform for SenseAmplifier using SK-LCT Technique using the proposed SK-LCT Technique shows the
as shown in Fig.10 considerable reduction in power and delay. Fig.11
shows the simulation waveform for 4 bit SRAM
BL
BLB
OUT
Architecture. Each column share a global output bu?er
and input data driver. Data written in the memory cell is
boosted by the sense part circuitry.

READ
WRITE
DATAIN

Fig.10: Simulation waveform for Sense Amplifier using SK-


LCT Technique

Fig.11: Simulation waveform for 4 bit SRAM Architecture


using SK-LCT Technique

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 135
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table IV: Performance Comparison of SRAM Architecture REFERENCES


SRAM Without PowerGating With Power Gating [1]. Andrea Calimera, Alberto Macii, Enrico Macii & Massimo
Architecture (SK-LCT Poncino (2012), "Design Techniques and Architectures for Low-
Technique) Leakage SRAMs", IEEE Transactions on Circuits and Systems,
Power Delay Power Delay Vol. 59, No. 9, Sep 2012, pp.1992-2007
1bit 23.064µ W 10.175ns 19.1622µW 6.2428ns
[2].Yeap G. K. et al (1998), "Practical Low Power Digital VLSI
4bit 38.796 µW 46.316ns 26.3210µW 21.732ns Design?, Kluwer Academic Publishers", Norwell, MA, ISBN:
The above Table IV shows the comparison of 1 bit 0792380096, pp-233.
& 4 bit SRAM Architecture. By using a novel Sleepy [3]. F. Catthoor, S. Wuytack, E.DeGreef (1998), "Custom Memory
Keeper Leakage Control Transistor Technique (SK- Management Methodology Exploration of Memory Organization
for Embedded Multimedia System Design", Kluer Acadamic
LCT Technique); the power and delay of the 1 bit & 4 Publishers, Boston.
bit SRAM Architecture can be reduced. [4]. J. M. Rabaey, A.P. Chandrakasan (2003), "Digital Integrated
VII. CONCLUSION Circuits: A Design Perspective", Upper Saddle River, NJ, USA:
Prentice-Hall.
A Low power and high speed SRAM architecture [5]. Hina Malviya and Sudha Nayar (2013), "A new Approach for
is designed using sleepy keeper leakage control Leakage Power Reduction Techniques in Deep Submicron
transistor technique (SK-LCT). The two main Technologies in CMOS circuit for VLSI Application", IEEE Int.
Solid State Circuits Conf. (ISSCC) Dig. Tech, Vol.3 Mar 2013,
components of the SRAM architecture are SRAM cell pp. 11-16.
and Sense Amplifier which are designed using SK-LCT [6]. Anu Tonk and Shilpa Goyal (2015), "A Literature Review on
technique for new low power high speed memory Leakage and Power Reduction Techniques in CMOS VLSI
architecture. SRAM cell design using the proposed SK- Design", International Journal of Advanced Research in Computer
and Communication Engineering, Vol.3, Issue.2, pp.554-558.
LCT technique saves 57.53% of power and 44.70%
of delay. Similarly, the sense amplifier design using the [7]. J. Park (2014), "Sleepy Stack: a New Approach to Low Power
VLSI and Memory", Ph.D. Dissertation, School of Electrical and
proposed SK-LCT technique saves 93.65% of power Computer Engineering, Georgia Institute of Technology, May
and 95.26% of delay compared to conventional method. 2014.
In the design of 1 bit SRAM architecture, SK-LCT [8]. Narender Hanchate (2011), "LECTOR: A Technique for Leakage
technique saves 23.54% of power and 38.64% of delay Reduction in CMOS Circuits", IEEE Transactions on Very Large
Scale Integration (VLSI) Systems, Vol.12, No. 2, Feb 2011,
& in the design of 4 bit SRAM architecture; SK-LCT pp.198-205
technique saves 32.15% of power and 53.07% of
[9]. M. Geetha Priya, Dr. K. Baskaran and D. Krishnaveni (2012),
delay. It is evident from the result that the novel SK- "Leakage Power Reduction Technique in Deep Submicron
LCT technique provides a low power high speed Technologies for VLSI Applications", Elsevier-Sciverse Science
SRAM architecture. Direct, Procedia Engineering, Vol. 30, Dec 2012, pp.1163-1170
[10]. Taehui Na, Seung-Han Woo, Jisu Kimg, Hanwool Jeon, and
VIII. FUTURE WORK Seong-Ook Jung(2013), "Comparative Study of Various Latch-
Type Sense Ampli?ers", IEEE Transactions on Very Large Scale
To design an efficient Address Decoder and 32 bit, Integration (VLSI) Systems, Vol. 12, No. 6, Sep 2013, pp.1-5
64 bit & 128 bit SRAM Architecture is designed using
SK-LCT Technique which can be used in various
application such as PC, Personal Communications,
Consumer Electronics and other fields.

136 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Heart Beat Monitoring and Heart Attack Detection


Using IoT
M. Tulasiram
Assistant Professor, Dept of ECE, Vemu Institute of Technology, Chittoor, Andhra Pradesh.
Email: tulasiram4b2@gmail.com

Abstract - This article reviews the emerging the health status of patients and give warnings about
research on the exploitation of heartbeat data as possible attacks in advance, which can make generalized
biometric for human identification. A variety of medical care more intelligent.
methods for acquiring heartbeat signatures have
been proposed and a variety of processing methods II. INTERNET OF THINGS
have been examined. The paper addresses the The Web of things (adapted Web of things or IoT)
problem of biometric identification and verification is the interconnection of physical gadgets, vehicles
by characterizing the three main factors that affect (additionally called "associated gadgets" and "brilliant
performance: individual variants, environmental
gadgets"), structures and different components,
variants and sensor variants. The ability to collect
and process the signal, exploit the data for coordinated with hardware, programming, sensors,
individual identification or verification and actuators and system network that permit these items
disseminate the information depends on these to gather and trade information. In 2013, the Global
three factors. Standards on Internet of Things Activity (IoT-GSI)
characterized IoT as "the data society framework". IoT
I. INTRODUCTION
permits items to be distinguished and/or controlled
The heart is the most important component of the distantly through existing system foundation, making
cardiovascular system. It weighs about 250-350 grams, open doors for more straightforward coordination of
that is, about the size of a fist. It hits about 2.5 billion the physical world into PC based frameworks and
times during a lifespan of 66-68 years. The heart is bringing about more prominent effectiveness, precision
electrically stimulated by a special unit called the Chinese and monetary advantage. When IoT is enlarged with
atrial node. This region produces a definite potential sensors and actuators, the innovation turns into an
and discharges slowly, thus sending an electrical impulse occasion of the broadest class of digital physical
through the atria. This electrical impulse is of a very frameworks, which likewise envelops advances, for
sequential nature and responsible for systole and example, savvy networks, keen homes, shrewd
diastole in the four chambers, respectively. Recent years transportation and brilliant urban areas. Each thing is
have seen a growing enthusiasm for portable sensors uniquely identifiable through its integrated computer
and today some devices are industrially accessible for system, but can interact within the existing Internet
individual human services, fitness and movement infrastructure. Experts estimate that IoT will consist of
attention. Despite the field of specialized recreational almost 50 billion objects by 2020. Generally, IoT is
fitness that flow and reflux devices take into account, expected to offer advanced connectivity of devices,
analysts have also considered the use sensors. systems and services that goes beyond machine-to-
This monitoring system meets the basic needs of machine (M2M) communications and covers a variety
generalized medical care for heart disease, also takes of protocols, domains and applications.
into account the cost to ensure that the general mode is The NSF Communitarian Industry/University
as economical as possible. In addition, it can also be Exploration Place for Intelligent Maintenance Systems
combined with real-time analysis algorithms to assess (IMS) at the University of Cincinnati has exhibited an

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 137
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

intelligent Ich case framework on a band saw machine utilized as PWM yields), 6 simple sources of info, a 16
at IMTS 2014 in Chicago. Band saw machines are not MHz clay resonator, a USB association, a force
really costly, yet the expenses of the band saw belt are connector, an ICSP header and a reset button. It
tremendous as they debase a lot quicker. Be that as it contains all things needed to help the microcontroller;
may, without intelligent discovery and examination, it essentially interface it to a PC with a USB link or turn it
must be dictated by experience when the band saw on with an AC to DC connector or a battery to begin.
belt will break. The created gauging framework will It is an open source physical figuring stage dependent
have the option to perceive and screen the corruption on a basic microcontroller board and an improvement
of the band saw belts, regardless of whether the domain for composing programming for the board. The
condition is changing, with the goal that clients know Arduino board is shown in Fig 1.
nearly progressively when the best an ideal opportunity
to supplant the band saw is this will fundamentally
improve client experience and administrator wellbeing
and spare costs by replacing belt saw belts before they
actually break. The analytical algorithm developed was
performed on a server in the cloud and made accessible
through the Internet and mobile devices. The system
will probably be an example of an event-based
architecture, from the bottom up (based on the context
of processes and operations, in real time) and will
consider any subsidiary level. Therefore, model-based
and functional approaches will coexist with new ones Fig 1: The Arduino Board

capable of dealing with exceptions and unusual process IV. PULSE SENSOR
evolution (multi-agent systems, BADSc, etc.).
A Heartbeat sensor is a monitoring device that allows
Combination with the Web suggests that the gadgets
one to measure their heart rate in real time or record
will utilize an IP address as a one of a kind identifier. Be
the heart rate for further study. It provides a simple
that as it may, because of the restricted IPv4 address
way to study cardiac function. This sensor Monitors
space (which permits billions of one of a kind locations),
blood flow through the International Journal of
questions in IoT should utilize IPv6 to oblige the
Engineering Science and Computing, April 2017 6665
amazingly huge
http://ijesc.org/ finger and is designed to give digital
Location space required. The articles in IoT won't output of the heartbeat when a finger is placed on it.
just be gadgets with tangible abilities, however will When the sensor is working, the beat LED flashes once
likewise give activation capacities (for instance, lights with each beat. This digital output can be connected to
or bolts constrained by the Web). To an enormous the microcontroller directly to measure the frequency
degree, the fate of the Web of things won't be of beats per minute (BPM). It works according to the
conceivable without the help of IPv6; and, thus, the principle of light modulation by blood flow through the
worldwide reception of IPv6 in the coming years will finger on each pulse. The pulse sensor, shown in Fig 2
be essential for the effective improvement of IoT later is a well-designed plug and play heart rate sensor for
on. Arduino. It also includes an open source monitoring
III. THE ARDUINO UNO BOARD application that graphs your pulse in real time.
The Arduino Uno is a microcontroller board
dependent on the ATmega 328 (information sheet). It
has 14 advanced info/yield pins (of which 6 can be

138 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig 2: Pulse Sensor

V. SYSTEM ARCHITECTURE
The general architecture of IoT applications can be Fig 3: System Architecture

divided into three layers: the detection layer, the VII. CONCLUSION
transport layer and the application layer. This type of
Nowadays we have a more prominent number of
architecture is clear and flexible enough for our
heart sicknesses, including an expanded danger of
monitoring system. Therefore, we design the system
respiratory failures. The client sensors of our proposed
architecture based on that general model. Figure 3
framework permit identifying the pulse of an individual
shows the architecture of the IoT-based monitoring
utilizing heartbeat identification regardless of whether
system for patients with heart disease.
the individual is at home. The sensor is associated with
VI. SYSTEM IMPLEMENTATION a microcontroller that permits you to confirm pulse
First, we need to connect the pulse sensor to any readings and send them over the Web. The client can
organ in the body where it can easily detect the pulse set the high and low degrees of heartbeat limit. In the
like a finger. Then, the pulse sensor will measure the wake of setting these limits, the framework starts to
change in blood volume, which occurs screen and when the patient's pulse surpasses a specific
breaking point, the framework sends an alarm to the
When each time the heart pumps blood to the body. regulator that at that point communicates it over the
This change in the volume of blood causes a change in Web and cautions specialists and intrigued clients.
the intensity of the light through that organ. The Arduino Furthermore, the framework cautions for lower pulses.
will convert this change into the heartbeat per minute Each time the user logs in to monitor, the system also
(BPM). The LED connected on pin 13 will also flash shows the patient's live heart rate. Therefore, those
according to Heart Beat. ESP8266 will communicate interested can monitor the heart rate and get a heart
with the Arduino and send the data to Thing Speak. attack alert for the patient immediately from anywhere
The ESP8266 will connect the network to the router and the person can be saved on time. In our proposed
and the user will provide the code and send the sensor research, we try to propose a complete document to
data online. This data in Thing Speak will be displayed detect heart attacks in two ways. However, we have a
on a chart that shows the previous readings as well and plan about this research. Time of India, a leading
can be accessed from anywhere via the Internet. The newspaper in India, published that "Researchers in the
connected LCD will also show you the BPM. United States, within the next decade, Microchip Heart
Microeconomic will be placed in a blood vessel of the
human body. The smartphone will collect data and send
us information." Researchers are trying to implement
Microchip requirements for uses of smartphone

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 139
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

technology We will try to use this technology in the future [5] Heartbeat monitoring and alert system using GSM technology,
UfaraohS.U,Oranugo C.O, International Journal of Engineering
If this technology is developed, our project can detect Research and General Science Volume 3, Issue 4, July-August,
heart block through this technology. 2015 ISSN 2091-2730

REFERENCES [6] Varshney U. Pervasive healthcare and wireless health monitoring.


Mobile Networks and Applications 2007; 12(2-3): 113-127.
[1] Internet of Things: internet of things, https:// en. wikipedia.org/
wiki/Internet_of_things. [7] Rofouei, M., Sinclair, M., Bittner, R., Blank, T., Heffron, J. A
non-invasive wearable neck-cuff system for real-time sleep
[2] Effective Ways to Use Internet of Things in the Field of Medical monitoring. Proceedings of International Conference on Body
and Smart Health Care: Kaleemullah,MunamaliShah,Sijingzhang, Sensor Networks, Dallas, TXm USA, 23- 25 May 2011.
IEEE Journal 2016
[8] MajdiBsoul, HlaingMinn, Lakshman Tamil. Apnea MedAssist:
[3] IReHMo: An Efficient IoT-Based Remote Health Monitoring real-time sleep apnea monitor using single-lead ECG. IEEE
System for Smart Regions, Ngo ManhKohi, Karan Mitra , 2015 Transactions on Information Technology in Biomedicine.
17th International Conference on E-health Networking,
Application & Services (HealthCom)
[4] Mobile based Horne Automation using Internet of Things(IoT),
Kumar Mandula, Ram parupalli, E.Magesh , 2015 International
Conference on Control, lnstrumentation, Communication and
Computational Technologies (lCCICCT)

140 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Automated EV Wireless Charging Bunk


Anand T1, Gagan B K2, Swaroop M R3, Vishal Nayak4
1,2,3,4
Electronics and Communication Engineering New Horizon College of Engineering Bengaluru, India
Email: anandhosahali@gmail.com1, gagansuchi100@gmail.com2,
swaroophegde44@gmail.com3,vishalnayak678@gmail.com4

Abstract-The main objective of wireless Wireless Power Transmission (WPT) is the efficient
inductive charging is to transfer power through transmission of electric power across small range of
inductive coupling by means of Faraday's Law of distances which varies from inches to feet through a
Electromagnetic Induction. The technology of vacuum or an atmosphere without the use of wire. This
wireless power transmission can eliminate the use
can be used for applications where either an
of the wires and their messy connection with the
vehicles, thus increasing the mobility, hygiene,
instantaneous amount or a continuous delivery of charge
convenience, and safety of an electronic vehicle is needed. There are two main standards in inductive
for all users. This technology can be adopted in charging namely Qi and Power Matters Alliance (PMA).
automotive industry, especially in Electric Vehicle. Operation of both the standards are similar but they
This paper deals with the implementation of differ in transmission frequencies and connection
wireless charging systems for electric vehicles protocols. Inductive charging is achieved using Qi
through a few automated parking slots for charging standard (driven by Wireless Power Consortium) during
along with the corresponding price. Thus, the whole implementation. Charging the battery of electric vehicles
system serves as a wireless charging bunk for by means of inductive coupling could be the next big
charging electric vehicles accommodated with thing.
automated sensory entry and exit gates.
II. FUNDAMENTAL BLOCK DIAGRAM
Keywords-Electric Vehicle (EV), Fuel Gauge,
Internet of Things (IOT), Radio Frequency
Identification (RFID), Wireless Power Transfer
(WPT).
I. INTRODUCTION
The depletion of non-renewable energy sources and
the current climatic conditions led the mankind to
explore alternative sources of energy. We evolved from
bullock carts to fuel engine based vehicles. But we
needed something more besides combustion engines in Fig 1. Block diagram of EV Bunk
automotive industry, with the continuous research and
The whole system consists of microcontrollers such
development we have modernized fuel-engine based
as STM32 L476RG and NodeMCUs which controls
vehicles to electric vehicles. Despite all these, we still
all the operations. The RFID modules are used to detect
rely on the classical and conventional wire system to
authorized users for letting in and out in the bunk.
charge our everyday electronic gadgets. The
Opening and closing of the gate will be controlled by
conventional wire system creates a mess when it comes
servo motors. Inductive charging is performed by WPT
to charging several electric vehicles simultaneously. It
charging module. Battery's state of charge, health and
also takes up lot of charging points and cables.
other parameters are monitored by battery fuel gauge
Moreover, connections have to be established manually
module. The Blynk IOT platform serves as a cloud,
by the user.
server and used to display real time data to the user.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 141
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

III. PRINCIPLE OF OPERATION Once the car is parked on the charging slot, the
A. Entry Section presence of the car is detected by sensors and the
charger will be turned ON automatically. Then
The actuators and sensors at the entrance of the alternating current passes through the primary coil which
bunk is monitored and controlled by the STM32 is installed in the slot. The moving charge carriers
Nucleo-64 Development Board with STM32L476RG generates a magnetic field which results in varying
MCU which is the main controller of the entrance magnetic field strength as the current amplitude is varying.
section. STM32 is programmed through Arduino IDE This fluctuating magnetic field induces an alternating
to perform the specific tasks as follows: electric current in the secondary coil which is installed
• STM32 monitors and fetches data from RFID reader. in the vehicle. Thus, wireless charging of battery of the
car is achieved through inductive coupling. The
• The RFID Tag in the car will be scanned by the RFID
secondary coil is connected to the receiver circuit of
reader present at the entrance section.
the charging module which is in turn connected to the
• The RFID reader fetches UID from the tag and STM battery babysitter module which monitors state of
compares it with pre-registered UIDs charge (in %) and update the same to the NodeMCU.
• If it is matched, the entrance gate will open using The NodeMCU which is in connection with the Blynk
servo and charging slot will be allotted once the slot cloud gets the data serially from the fuel gauge and
is checked whether it is empty or not with the help of publishes the data in the Blynk platform which can be
IR sensor. viewed by user through Blynk app/website.
• The above process will be displayed in LCD. When the battery of the car is charged to the desired
B. Electric Car design level as specified by the user, the fare will be calculated
according the percentage of charge level and will be
The electric car is implemented using 4WD car displayed in the Blynk platform. Then the user can pay
chassis with BO gear motors each of 125RPM speed the fare using Payment Link provided in the Blynk. The
and are single shaft gear motors which gives good torque user will be alerted with the email notification along with
and RPM at lower operating voltages. These motors payment invoice if the transaction is successful and
are driven through L298N driver module which is a payment status will be updated to the NodeMCU at
high-power motor driver for driving DC motor. This the exit section through Blynk Bridge connection.
module controls direction and speed of BO motors.
D. Exit section
The car is equipped with the NodeMCU as ECU,
battery fuel gauge and driver module. The NodeMCU Subsequent to the payment process, car reaches
is responsible for controlling the car, monitoring the the exit section. The UID of RFID tag will be once
battery status and publishing the data into the cloud. again scanned and payment status will be verified
The car is controlled remotely using Blynk app through through Bridge connection. If the payment is successful,
Joystick widget and slider widget for direction and the exit gate will open. Otherwise, the user will not be
speed control respectively. permitted to go out of the bunk.

C. Wireless Charging of an Electric Car


The wireless chargers are installed in the parking
slots and acquires almost same space as wired chargers
and provides equal efficiency. Besides, there is no human
effort required to constantly plug and unplug the charger
cables.

142 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IV. FLOW CHART problem. Wireless chargers solve the problem of messy
wires. The protected connection, corrosion-free and
spark-free nature of inductive charging provides eco-
friendly environment for charging stations. The
e1ectrification of transportation is underway and wireless
charging is playing a significant role, so WPT technology
provides convenient way for charging electric vehicles.
VII. FUTURE SCOPE
The implementation can be enhanced with more
advanced features such as fast charging methods can
be adopted, which is one of the main concerns in the
charging a battery. Transmission efficiency can be
improved to greater extent by increasing the number of
turns of coil or by adding coils of smaller thickness at
the transmitter end. Hybrid charging station can be
designed using solar panels along with the conventional
power supply as a source. Multiple charging slots can
be implemented in the bunk, if there is no slot available
station can be made to direct user to the nearby charging
station.
Fig 2. Flowchart ACKNOWLEDGMENT
V. RESULT AND DISCUSSION The satisfaction and euphoria that accompany the
successful completion of our project would be
All the interfaces and configurations are implemented
impossible without the set of people, whose guidance
gradually. Battery parameters such as state of charge,
and encouragement crowned our effort with success.
current, voltage, capacity, and health are monitored and
We have great pleasure in expressing our deep sense
displayed in real time. User interaction is achieved
of gratitude to Prof. Richard Lincoln Paulraj, Assistant
successfully by sending appropriate messages at right
Professor (2), Department of Electronics and
instance of time and receiving the inputs from the user
Communication, New Horizon College of Engineering
side and thereby responding accordingly from the
for constantly monitoring the development of the project
system.
and setting up precise deadline. His valuable suggestions
The charge current can be set to various ranges of were the key factors in the completion of project.
100mA, 500mA, 1A and 1.5A for charging the battery. REFERENCES
Batteries with higher C ratings can be used to reduce
[1] A. G. Akhil et al., "Coupled Wireless Charging system for Electric
the time of charging. Different payment gateways can Vehicles," 2021 Third International Conference on Intelligent
be interfaced for more secure transactions. Communication Technologies and Virtual Mobile Networks
(ICICV), 2021, pp. 475-479.
VI. CONCLUSION [2] G. Bekaroo and A. Seeam, "Improving wireless charging energy
As the electric cars are booming nowadays, and efficiency of mobile phones: Analysis of key practices," 2016
IEEE International Conference on Emerging Technologies and
the cost of petroleum products are increasing, people Innovative Business Practices for the Transformation of Societies
are gaining interest towards electric vehicles and (EmergiTech), 2016, pp. 357-360.
automation. Many questions will be arriving to the [3] G. Sharma, A. Goel and S. Agarwal, "Wireless charging system
people and one of them is the charging station. So, in using resonant coupling," 2017 International Conference on
Inventive Systems and Control (ICISC), 2017, pp. 1-5.
this paper a feasible solution is provided for that
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 143
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[4] M. Kesler, "Wireless Charging of Electric Vehicles," 2018 IEEE [7] W. Luo and L. Shen, "Design and Research of an Automatic
Wireless Power Transfer Conference (WPTC), 2018, pp. 1-4. Charging System for Electric Vehicles," 2020 15th IEEE
Conference on Industrial Electronics and Applications (ICIEA),
[5] S. R. Khutwad and S. Gaur, "Wireless charging system for electric
2020, pp. 1832-1836.
vehicle," 2016 International Conference on Signal Processing,
Communication, Power and Embedded System (SCOPES), 2016, [8] X. Lu, P. Wang, D. Niyato, D. I. Kim and Z. Han, "Wireless
pp. 441-445. Charging Technologies: Fundamentals, Standards, and Network
Applications" in IEEE Communications Surveys & Tutorials,
[6] S. Y. Hui, "Planar Wireless Charging Technology for Portable
2016,vol. 18, no. 2, pp. 1413-1452.
Electronic Products and Qi," in Proceedings of the IEEE, 2013,
vol. 101, no. 6, pp. 1290-1301.

144 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

A Survey on Image Fire Detection using Learning


Techniques
G. Elaiyaraja1, N. Kumaratharan2
1
Professor, Department of ECE, VEMU Institute of Technology, P. Kothakota, Chittoor-517112, Andhra Pradesh
2
Professor, Department of ECE, Sri Venkateswara College of Engineering, Sriperumbudur-602117, Tamilnadu
Email: elaiyarg@gmail.com1, kumaratharan@rediffmail.com2

Abstract- Fire detection tools based on images/ processing). In most fire scenes, flames and smog exist.
video can avoid many flaws in conventional Fire detection technology based on video images
methods and detect fires. To achieve this, various recognizes flames or smog in video images and then
learning techniques are used for fire detection. In implements real-time monitoring of fire scenes. This
this paper various learning techniques are analyzed noncontact technique requires a computer to process
and compared for better accuracy. Experiments
imagery and discriminates suspicious targets that appear
show that the RS-SVM classifier model gives
excellent reliability and stability, and enhances the
in the video images by studying and extracting visual
forecast accuracy of fires. The RS-SVM method features of flames or smog. To enhance the reliability
also reduces false fire-detection alarms and uses and stability of a fire detection system, various machine
fire feature selection in videos/ images compared and learning have been studied and developed for the
to other state art of methods.. field of fire detection. In this paper, various learning
Keywords- Deep CNN; SVM techniques are analyzed and compared for fire detection
using images/videos.
1. INTRODUCTION
2. ROUGH SET SUPPORT VECTOR
Accidental fire is a natural disaster that seriously MACHINE CLASSIFIER
threatens public safety. In recent years, accidental fire
has frequently occurred in many places, including
superstores, communities and forests, yielding huge
losses to production and human life. After several
decades of development, virtual reality technology has
matured quickly and has changed people's lifestyles by
being widely applied in many fields.
For example, VR technology has been used to
manage accidental fire in industry, agriculture, hospitals,
aviation, aerospace, and firefighting. Thus, virtual fire Fig.1 Block Diagram of RS-SVM Classifier.
environment technology has become integral to future
Rough set theory approximately describes uncertain
fire protection. Due to their detection principles or
and inaccurate knowledge compared to known
system structures, traditional fire detectors, which
knowledge within a database, works well in processing
include temperature detectors, smog detectors and
large amounts of data, and removes redundant
optical detectors, usually have inherent defects or
information. Therefore, this method investigates an image
application restrictions. Because flames and smog have
processing technology that uses both SVM and RS,
specific colors, textures, shapes and other image
and develops a fire flame image recognition method
features, people have begun to consider using computer
based on the RS-SVM classifier model. The block
visual features to improve the efficiency of fire detection
diagram of RS-SVM classifier as shown in Fig.1. The
(e.g., video flame detection technology based on image
contributions of this method include the following:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 145
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

a. The research background of fire detection technology In nonlinear problems, both the optimization object
and the development status of video fire detection function and the classification function only involve the
are presented, and the problems of conventional fire inner product (x · xi) between training samples. Assume
detection and recognition methods are discussed. that the nonlinear mapping : Rd → H maps the
b. RS is combined with SVM to create an RS-SVM samples in the input space into high-dimension feature
classification model. Dimension reduction on the input space H. When constructing the optimal hyper-plane
vectors is achieved, redundant information is in the feature space H, the training algorithm only uses
removed, and the reduced results are input into the the dot product in the space, i.e., (xi)· (xj), without
classifier model for classification. the appearance of (xi) alone. Thus, a function K is
c. The selection of kernel parameters strongly affects found to meet:
the classification and recognition ability of SVM, this
method investigates kernel parameter selection and
K(xi · xj) =(xi)· (xj) (1)
analyzes the impact of the model built by kernel Only the inner product computation is required in
parameter optimization method on the flame image high dimension space, and such an operation can be
recognition rate. realized with the function in the original space. According
d. This method solves the problems of traditional fire to related functional theories, the function corresponds
flame image detection methods and yields reliable and to the inner product of a certain transformation space
stable performance with improved fire prediction as long as one kind of kernel function K(xi·xj) satisfies
accuracy. the Mercer condition. Therefore, in the optimal hyper-
2.1 Standard SVM plane, the use of the proper inner product function K(xi
· xj) can achieve linear classification after a certain
SVM uses the principle of structural risk minimization nonlinear transform without increasing computational
as its theoretical foundation. This theory selects the complexity.
subset of the function and the discrimination function in
this subset to minimize risk and ensure that the small In summary, SVM maps the input vector into a high-
error classifier obtained by finite training samples yield dimension feature space using certain preselected
small test errors with independent test sets nonlinear mappings and then constructs the optimal
classification hyper-plane. The SVM classification
SVM operates as follows: function is similar to that of a neural network, and the
1a) in a linearly separable case, SVM searches for the output is the linear combination of the middle nodes
optimal classification hyper planes of two classes of and every middle node corresponds to a support vector.
samples in the original space;
For any a symmetric function k (x, x'), its sufficient
1b) in a linearly inseparable case, SVM adds a slack and necessary condition for inner product computation
variable to the analysis and maps the samples in a
low-dimension input space into a high-dimension
in a certain feature space is that for any ≠ 0 and
attribute space via nonlinear mapping to make it linear, (x)
making it possible to analyze the nonlinearity of
samples using linear algorithms and search for the (2)
optimal classification hyper-plane in this feature
space ; Thus, seeking the optimal classification plane in a
2) SVM then uses the principle of structured risk
high dimension space can transform the inner product
minimization to construct the optimal classification computation in a high-dimension space into the function
hyper-plane in the attribute space to make the operation in low-dimension space through the proper
classifier obtain the global optimum and the expected function K(xi·xj) to solve nonlinear classification
risk in the entire sample space meet a certain upper problems without affecting computational complexity.
bound at a certain probability. The equation is as follows:

146 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

2.4 S-Shaped Kernel Function


= (3)
(7)
The corresponding decision function to the optimal
classification plan Currently, the SVM algorithm is a multilayered
perception network that contains a hidden layer. The
weight and number of nodes in the hidden layer of the
network are automatically determined by the algorithm
k(xi xj) is the kernel function. Currently, the following instead of being determined by experience, as in
three types of kernel functions have been studied most. conventional perception networks. This algorithm does
not exhibit the local minimum problem that is common
2.2 Polynomial Kernel Function to neural networks. Among common kernel functions,
Polynomial kernel functions are a type of global the most frequently used are the polynomial and radial
kernel function that can map a low-dimension input basis kernel functions. Apart from these kernel functions,
space to a high dimension feature space and allow distant there are the exponential radial basis kernel function,
data points to affect the value of the kernel function. A the wavelet kernel function and other kernel functions,
larger parameter d yields a higher mapping dimension, which are less frequently used.
a lower deviation, and a higher variance. Additionally, 3. IMAGE ANOMALY DETECTION BASED
if over-fitting is more likely, the calculation will be more ON DEEP LEARNING
complex. Therefore, it is not suitable to select a
dimension that is too high, and the most suitable In order to solve the problem of low efficiency and
dimension must pass cross validation. Polynomial kernel poor stability of the existing power equipment operating
functions are suitable for orthogonal normalized (vector environment anomaly detection method in target
orthogonal and modulus 1) data: detection, based on the personnel and fire smoke in
the monitoring image of power equipment operating
(5) environment, this method proposes a multi-stream
where q is the degree of the polynomial, which yields CNN-based remote monitoring image personnel
a q-order polynomial classifier. detection algorithm and a deep smoke CNN based
fire smoke detection algorithm. In the aspect of
2.3 Radial basis function (rbf)
personnel anomaly detection, the scene recognition
CNN network is added to the traditional dual-stream
(6) CNN network model, which effectively improves the
learning ability of CNN for optical flow information.
The SVM obtained is a radial basis classifier, which The experimental evaluation results verify the
fundamentally differs from traditional radial basis function effectiveness of the method in the detection of human
methods as follows. The center of every basis function anomalies. In the case of fire smoke detection, a
corresponds to a support vector, which is automatically candidate smoke area is first determined from a video
determined by the algorithm along with the output frame. Then, a DCNN is used to extract fixed-length
weights [33]. The inner product function in the form of feature vectors from the smoke candidate region to
a radial basis is similar to the characteristics of human realize automatic extraction of smoke features. This
vision and is frequently used in practice. However, the effectively solves the problem of difficulty in
selection of a different S parameter value will result in characterizing the characteristics caused by the diversity
different corresponding classification planes. of smoke species. Finally, the obtained feature vector
is sent to the final classification layer to finally realize
smoke detection.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 147
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

3.1 Deep Convolutional Neural Network


(DCNN) related theory
There are two basic structures of CNN, namely
feature extraction and feature mapping. Feature
extraction is obtained by connecting neurons with the
local acceptance domain of the previous layer. The local
relationship between the local acceptance domain and
other features can be obtained while extracting local
features. The feature map constitutes the computing
layer of the network, and the neurons associated with
Fig. 2. Dual-flow CNN processing diagram.
each feature map share the same weight, which can
reduce the parameter size of the network. The activation In Fig. 2, the upper branch represents the processing
function used for feature mapping is a Sigmoid function, of the spatial CNN. The spatial CNN is consistent with
which makes the feature map have displacement the network model used for tasks such as object
invariance. CNN have several important aspects: detection and object classification. The network model
first performs pre-training on the dataset and then fine-
(1) Local perception
tunes it based on a specific behavioral dataset. Since
(2) Weight sharing and multi-convolution kernel the behavioral data set is composed of video, the model
(3) Down-sampling needs to predict each frame in the video during behavior
detection. With CNN's excellent learning ability, spatial
3.2 Multi-stream CNN-based vision monitoring CNN has surpassed traditional artificial features in data
image personnel detection algorithm sets. The following branch represents the processing
Vision anomaly detection models behavior in both of the time CNN. One of the problems faced by the
time and space domains. Since the optical flow field training time CNN model is that the amount of labelled
can provide the moving speed and moving direction of optical flow image data is small, which is determined
each pixel in the current image, it is widely used in the by the characteristics of the optical flow image. Firstly,
field of behavior detection. the optical image calculation takes much longer than
3.2.1 ORIGINAL DUAL-FLOW CNN the RGB image extraction. Secondly, the calibration of
the optical flow is not as clear as the RGB image
The personnel detection based on the dual-stream calibration. Many sports or behaviors have overlapping
CNN uses the learning ability of CNN to perform parts. The learning ability of the optical stream CNN is
feature extraction and classification on RGB images and affected by the length of the optical stream segment.
optical flow images respectively. The CNN network Therefore, methods such as key frame extraction and
established on the RGB image is the spatial CNN, and video segmentation can effectively improve the learning
the CNN established on the optical flow image is the ability of CNN for optical flow information.
time CNN. The architecture diagram of the original
dual-stream CNN is shown in Fig. 2. 3.2.2 SCENE RECOGNITION CNN
Scene recognition methods based on CNN
networks can be divided into two categories: scene
recognition methods based on object features and scene
recognition methods based on scene features. The first
type of method is a CNN network that relies on object
detection and recognition models. The second broad
class of methods is CNN networks based on scene

148 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

training data. This kind of network is better at learning obtained feature vector is sent to the final classification
scene information of images. layer to finally realize smoke detection.
3.2.3 PERSONNEL DETECTION BASED ON (1) Candidate area scaling
MULTI-FLOW CNN (2) Implicitly expanding candidate smoke areas
In this method, the scene recognition CNN network (3) Feature extraction and classification
is added to the traditional dual-Flow CNN network
model, and it is hoped that the number of misjudgments 4. EARLY FIRE DETECTION USING
of behavior recognition can be reduced by scene CONVOLUTIONAL NEURAL
recognition. The system structure is shown in Fig. 3. NETWORKS(CNN)
Early fire detection in the context of disaster
management systems during surveillance of public areas,
forests, and nuclear power plants, can result in saving
of ecological, economical, and social damages.
However, early detection is one of the challenging
problems due to varying lighting conditions, shadows,
and movement of fire-colored objects. Thus, there is a
need for such an algorithm which can achieve better
accuracy in the aforementioned scenarios while minimize
Fig. 3. Multi-Flow CNNs Based on Scene Recognition. the number of false alarms. To achieve this goal, we
As can be seen from the figure.3, the scene explored deep CNNs and devised a fine-tuned
recognition CNN is based on the video as the input architecture for early fire detection during surveillance
unit, and finally gives the prediction of the current video for effective disaster management systems. After
scene; for each video, the scene recognition divides successful fire detection, another desirable requirement
the video into single-frame images for prediction one is sending an immediate alert to disaster management
by one (see Fig. 6). system along with the representative key frames. To
this end, we devised an adaptive prioritization scheme
3.3 Fire smoke detection algorithm based on for the camera nodes of the surveillance system,
DCNN considering the contents they perceive. Finally, the data
3.3.1 Smoke characteristics of high-priority nodes is transmitted using a reliable
channel 4selected through our reliable channel selection
The characteristics of smoke are very rich. This
algorithm. The overall of this system is overviewed in
method mainly introduces color features, texture features
Fig. 4.
and shape irregularities.
3.3.2 Fire smoke detection algorithm
The fire smoke detection algorithm proposed in this
paper can be roughly divided into three steps. In the
first step, the candidate smoke area is determined from
the video frame. In the second step, a DCNN is used
to extract fixed-length feature vectors from the smoke
candidate region to realize automatic extraction of
smoke features. This effectively solves the problem of
difficulty in characterizing the characteristics caused by
the diversity of smoke species. In the third step, the Fig. 4: Early fire detection using CNN with reliable
communication for effective disaster management

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 149
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

5. RESULTS AND ANALYSIS OF RS-SVM


CLASSIFIER

(e) LOg Operator

(a)Original Fire Image

(f) Canny Operator


(b)SObel operator

(c) Prewitt Operator (g) RV-SVM-Fire Detected Image


Fig.5.Detection and Comparison of Fire image by the RS-SVM
Algorithm and Edge Detection Operators.

Fig.5 shows the experimental results of RS-SVM


algorithm and various edge detection operators, the RS-
SVM algorithm performs better than other operators.
The following equation represents the flame recognition
rate

(8)
(d) Roberts Operator

150 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table.1 Classification Results of Three Different Kernel


Functions.

Kernal TP(%) FN(%) TN(%) PN(%) R(%)


Function
Polynomial 94.3 4.6 70.5 29.2 83.67
RBF 91.8 7.3 85.9 13.6 91.32
Sigmoid 89.1 10.7 78.5 22.3 84.55

Table 1 shows that the polynomial kernel function


yields the highest TP, but its TN is low. Additionally,
the RBF kernel function yields a high TP and TN.
Overall, the RBF kernel function yields good
classification; thus, the RBF kernel function is chosen. (a)
The RBF function exhibits strong locality, which can
map a sample to a higher dimensional space. The kernel
function has better performance for both large and small
samples, and its parameters are lower than those of the
polynomial kernel function; thus, the RBF kernel
function is preferred in most cases. There are many
factors that affect the classification and recognition
performance of the SVM. This method has studied the
impact of kernel functions on classification and
recognition performance, which is also significantly
affected by the use of different kernel functions. A mixed
kernel function is also an important research topic; (b)

however, the selection, construction and parameter Fig.6. (a) Power equipment personnel image (b) Power
equipment fire smoke image
optimization of mixed kernel functions must still be
Table.2 Training and Testing Results of SVM, BP and
improved. Rui et.al (2019) for Fire Detection

6. RESULTS AND ANALYSIS OF IMAGE Training


Training Testing Testing
ANOMALY DETECTION BASED ON DEEP Method Set
Time(s) time(S) Accuracy
Accuracy
LEARNING 38 2.3 32.70(%) 26.50(%)
SVM
The data used in the this method comes from BP 3441 14.8 92.21(%) 90.11(%)
Rui.et.al
monitoring the image of the operating environment of (2019)
3231.6 12.7 97.36(%) 95.19(%)
the power equipment.
A small amount of data is used to verify the model.
There are two main types of data types, one is the The smoke detection model is compared with the
image of the personnel operating environment of the support vector machine model and the BP neural
power equipment, and the other is the image of the fire network model. The training and test results of the fire
smoke of the power equipment. An example of the smoke event detection model of the power equipment
image of two types of data is shown in Figure.6. operating environment are shown in Table 2.
In order to reasonably evaluate the results of the From the results of the above table, the support
target test, an evaluation index is proposed for the test vector machine model shows great advantages in
activity. The evaluation indicators are: Mean Absolute training time and test time, but the training set accuracy
Error (MAE), Accuracy (ACC), False Negative Rate and test set precision are very low, because the
(FNR) and Loss Positive Rate (FPR). traditional image feature extraction method relies heavily
on prior knowledge. In addition, this traditional machine
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 151
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

learning method is highly dependent on data and requires


a large amount of data to train the model. Compared
with the support vector machine method, the BP neural
network method has a significant improvement in
training set precision and test set precision. This is mainly
because the method of automatically extracting features
from the deep learning model is superior to the traditional
artificial feature extraction method, but the deep learning
model is highly dependent on the data itself. Compared
with the other two comparison methods, the fire smoke
detection method based DCNN has an absolute Fig. 7. Accuracy changes with the number of iterations.
advantage in training set accuracy and test set precision.
The training set accuracy is 97.36%, and the test set
accuracy is 95.19%. The training time of the method
proposed in this chapter is 3031.6 s, which shows no
obvious advantage in the model training time.
Experiments were carried out using the fire smoke
image data of large-scale power equipment operating
environment constructed in this paper. During the
experiment, 80% of the samples were randomly
selected as the training set, and the remaining 20% were
the verification set. Experiments were carried out using Fig. 8. MAE changes with the number of iterations.
support vector machine, BP neural network and the
fire smoke detection method proposed in this paper. 7. RESULTS AND ANALYSIS OF EARLY
As the number of training iterations increases, the FIRE DETECTION USING
performance changes of these three network models CONVOLUTIONAL NEURAL
are shown in Figs. 7 and 8. NETWORKS(CNN)

It can be seen from the results of Figs. 7 and 8 that In this method, all the experiments were performed
the number of iterations of the experimental setup is using a dataset of 68457 images, which are collected
10,000, and the test is performed every 1000 times, from different fire datasets of both images and videos.
and the test results are recorded. As the number of The Muhammad et.al(2018) method is compared with
iterations increases, the training of the three detection Figgia et.al(2015) method in Table 3. The existing
models gradually converges and tends to be stable. methods for comparison are selected carefully
After the iteration, the convergence rate of the fire smoke considering the underlying dataset, year of publication,
detection algorithm based on the DCNN is the highest, and used features. The Muhammad et.al(2018
reaching 0.98. The accuracy of the support vector proposed work inspired from deep features, reported
machine method is the lowest of the three. Similarly, in further improvement by increasing the accuracy from
terms of MAE, the fire detection algorithm based on 93.55% to 94.39% and reducing the false positives
DCNN proposed in this method has also achieved the from 11.67% to 9.07%. Although, our work also
best results. It is indicated that the fire anomaly detection resulted in false negatives of 2.13%, yet it sustained a
model proposed in this method can better cope with better balance between accuracy, false positives, and
such emergencies. false negatives, making our method more suitable for
early fire detection, which is of paramount interest to
disaster management systems.

152 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table 3. Comparison of Muhammad et.al(2018) and Figgia [9] S. S. Esfahlani, ''Mixed reality and remote sensing application of
et.al(2015) Methods unmanned aerial vehicle in fire and smoke detection,'' J. Ind. Inf.
False False- Integr., vol. 15, pp. 42-49, Sep. 2019.
Method Accuracy
Positives Negatives [10] A. Hackner, H. Oberpriller, A. Ohnesorge, V. Hechtenberg, and
Muhammad G. Müller, ''Heterogeneous sensor arrays: Merging cameras and
et.al(2018) gas sensors into innovative fire detection systems,'' Sens.
9.07% 2.13% 9 4.39%
after Fine Actuators B, Chem., vol. 231, pp. 497-505, Aug. 2016.
Tuning
[11] Z. Lin, F. Chen, Z. Niu, B. Li, B. Yu, H. Jia, and M. Zhang, ''An
Muhammad
active fire detection algorithm based on multi-temporal FengYun-
et.al(2018)
9.22% 10.65% 90.06% 3C VIRR data,'' Remote Sens. Environ., vol. 211, pp. 376-387,
Without after Jun. 2018.
Fine Tuning
Fig gia [12] K. Muhammad, J. Ahmad, and S. W. Baik, ''Early fire detection
11.67% 0% 93.55% using convolutional neural networks during surveillance for
et.al(2015)
effective disaster management,'' Neurocomputing, vol. 288, pp.
8. CONCLUSION 30-42, May 2018.
In this paper, the evaluation parameters of various [13] C. Filizzola, R. Corrado, F. Marchese, G. Mazzeo, R. Paciello,
learning schemes for fire detection are compared. The N. Pergola, and V. Tramutoli, ''RST-FIRES, an exportable
algorithm for early-fire detection and monitoring: Description,
experimental result of RS-SVM fire flame frame implementation, and field validation in the case of the MSG-
recognition method yields a high recognition rate, a fast SEVIRI sensor,'' Remote Sens. Environ., vol. 186, pp. 196-216,
recogotion speed, excellent robusrness, and a wide Dec. 2016.

range of application compared to other methods. [14] A. Koltunov, S. L. Ustin, B. Quayle, B. Schwind, V. G. Ambrosia,
and W. Li, ''The development and first validation of the GOES
REFERENCES early fire detection (GOES-EFD) algorithm,'' Remote Sens.
Environ., vol. 184, pp. 436-453, Oct. 2016.
[1] S. M. Nemalidinne and D. Gupta, ``Nonsubsampled contourlet
domain visible and infrared image fusion framework for fire [15] T. Zhang, M. J. Wooster, and W. Xu, ''Approaches for
detection using pulse coupled neural network and spatial fuzzy synergistically exploiting VIIRS I- and M-Band data in regional
clustering,'' Fire Saf. J., vol. 101, pp. 84_101, Oct. 2018. active fire detection and FRP assessment: A demonstration with
[2] Q.-X. Zhang, G.-H. Lin, Y.-M. Zhang, G. Xu, and J.-J. Wang, respect to agricultural residue burning in eastern China,'' Remote
``Wildland forest fire smoke detection based on faster R-CNN Sens. Environ., vol. 198, pp. 407-424, Sep. 2017.
using synthetic smoke images,'' Procedia Eng., vol. 211, pp. [16] H.-J. Zhang, N. Zhang, and N.-F. Xiao, ''Fire detection and
441_446, Jan. 2018. identification method based on visual attention mechanism,''
[3] P. Li and W. Zhao, ``Image fire detection algorithms based on Optik, vol. 126, no. 24, pp. 5011-5018, Dec. 2015.
convolutional neural networks,'' Case Stud. Thermal Eng., vol. [17] Y. Peng and Y. Wang, ''Real-time forest smoke detection using
19, Jun. 2020, Art. no. 100625. hand designed features and deep learning,'' Comput. Electron.
[4] P. Coppo, ``Simulation of fire detection by infrared imagers from Agricult., vol. 167, Dec. 2019, Art. no. 105029.
geostationary satellites,'' Remote Sens. Environ., vol. 162, pp.
[18] S. Garcia-Jimenez, A. Jurio, M. Pagola, L. De Miguel, E.
84_98, Jun. 2015.
Barrenechea, and H. Bustince, ''Forest fire detection: A fuzzy
[5] C. Singh, E. Walia, and K. P. Kaur, ``Enhancing color image retrieval system approach based on overlap indices,'' Appl. Soft Comput.,
performance with feature fusion and non-linear support vector vol. 52, pp. 834-842, Mar. 2017.
machine classifier,'' Optik, vol. 158, pp. 127_141, Apr. 2018.
[19] D. T. Gottuk, J. A. Lynch, S. L. Rose-Pehrsson, J. C. Owrutsky,
[6] Y. Sun, C. Xu, G. Li, W. Xu, J. Kong, D. Jiang, B. Tao, and D. and F. W. Williams, ''Video image fire detection for shipboard
Chen, ``Intelligent human computer interaction based on non use,'' Fire Saf. J., vol. 41, no. 4, pp. 321-326, Jun. 2006.
redundant EMG signal,'' Alexandria Eng. J., to be published.
[Online]. Available: https:// www.sciencedirect.com/science/ [20] G. Marbach, M. Loepfe, and T. Brupbacher, ''An image processing
article/pii/S1110016820300168, doi: 10.1016/j.aej.2020.01.015. technique for fire detection in video images,'' Fire Saf. J., vol. 41,
no. 4, pp. 285-289, Jun. 2006.
[7] R. Azhar, D. Tuwohingide, D. Kamudi, Sarimuddin, and N.
Suciati, ``Batik image classification using SIFT feature extraction, [21] T. X. Tung and J.-M. Kim, ''An effective four-stage smoke-
bag of features and support vector machine,'' Procedia Comput. detection algorithm using video images for early fire-alarm
Sci., vol. 72, no. 1, pp. 24_30, 2015. systems,'' Fire Saf. J., vol. 46, no. 5, pp. 276-282, Jul. 2011.
[8] R. Hou, M. Pan, Y. Zhao, and Y. Yang, ''Image anomaly detection [22] S. G. Kong, D. Jin, S. Li, and H. Kim, ''Fast fire flame detection
for IoT equipment based on deep learning,'' J. Vis. Commun. in surveillance video using logistic regression and temporal
Image Represent., vol. 64, Oct. 2019, Art. no. 102599. smoothing,'' Fire Saf. J., vol. 79, pp. 37-43, Jan. 2016

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 153
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[23] Q. Zheng, H. Li, B. Fan, S. Wu, and J. Xu, ''Integrating support [27] H. Anzid, G. L. Goic, A. Bekkari, A. Mansouri, and D. Mammass,
vector machine and graph cuts for medical image segmentation,'' ''Multimodal images classification using dense SURF,'' Spectral
J. Vis. Commun. Image Represent., vol. 55, pp. 157-165, Aug. Inf. Support Vector Mach., Procedia Comput. Sci., vol. 148, no.
2018. 1, pp. 107-115, 2019.
[24] Y. Ji, L. Sun, Y. Li, J. Li, S. Liu, X. Xie, and Y. Xu, ''Non- [28] G. Chen, R. Xu, and Z. Yang, ''Deep ranking structural support
destructive classification of defective potatoes based on vector machine for image tagging,'' Pattern Recognit. Lett., vol.
hyperspectral imaging and support vector machine,'' Infr. Phys. 105, pp. 30-38, Apr. 2018.
Technol., vol. 99, pp. 71-79, Jun. 2019.
[29] H. Cevikalp, M. Elmas, and S. Ozkan, ''Large-scale image retrieval
[25] M. Zhou, Q. Zhao, and Y. Chen, ''Endpoint prediction of BOF using transductive support vector machines,'' Comput. Vis. Image
by flame spectrum and furnace mouth image based on fuzzy Understand., vol. 173, pp. 2-12, Aug. 2018.
support vector machine,'' Optik, vol. 178, pp. 575-581, Feb.
[30] Z. Gu, Z. Zhang, J. Sun, and B. Li, ''Robust image recognition by
2019.
L1- norm twin-projection support vector machine,''
[26] Z. Huang, X. Xu, H. Zhu, and M. Zhou, ''An efficient group Neurocomputing, vol. 223, pp. 1-11, Feb. 2017
recommendation model with multiattention-based neural
networks,'' IEEE Trans. Neural Netw. Learn. Syst., early access,
Jan. 15, 2020, doi: 10.1109/ TNNLS.2019.2955567.

154 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Energy Efficient Reconfigurable Approximate Carry


Look Ahead Adder
Rizvana K Latheef1, Sindhu T V2, Ajeesh S3
1,2,3
M. Tech VLSI, Dept of ECE, IES Engg. College, Thrissur, Kerala
Email: rizvanaklatheef@gmail.com1, sindhugie@gmail.com2, ajeeshs@iesce.info3

Abstract- In this brief, we propose a fast yet To meet the power and speed design constraints, a
energy-efficient reconfigurable approximate carry variety of methods at different design abstraction levels
look-ahead adder (RAP-CLA). This adder has the have been suggested. Approximate computing which
ability of switching between the approximate and
is an emerging paradigm deals with demand
exact operating modes making it suitable for both
performance and power efficiency constraints for
error-resilient and exact applications. The
structure, which is more area and power efficient adders at the cost of reducing the computational
than state-of-the-art reconfigurable approximate accuracy of the result. This paradigm is especially
adders, is achieved by some modifications to the suitable for applications where the answer is not unique
conventional carry look ahead adder (CLA). The and a set of approximate answers are acceptable.
efficacy of the proposed RAP-CLA adder is Approximate arithmetic units are mainly based on
evaluated by comparing its characteristics to those
the simplification of the arithmetic units circuits. Different
of two state of-the-art reconfigurable approximate
adders as well as the conventional (exact) CLA.
structures for approximate adders have been proposed.
The results reveal that, in the approximate Most of the proposed adders are fully approximate and
operating mode, the proposed 8 bit adder provides may only be utilized in error resilient applications. At
better delay and power reductions compared to the same time, some of these structures have a constant
those of the exact CLA, respectively, at the cost level of deviation from the actual result, i.e., during the
of low error rate. It also provides lower delay and system operation their accuracies are not tunable.
power consumption, respectively.The proposed Runtime accuracy reconfigurability, however, may be
architecture of this paper analysis the delay and considered as a useful feature for a system providing
area using Xilinx 14.3. different levels of quality of service during operation.
Index Terms-Approximate computing, carry Here, by reducing the quality, the total computation time
look-ahead adder (CLA), quality of service, and/or power consumption of the unit are reduced
reconfigurable. resulting in higher energy efficiency. In addition, some
I. INTRODUCTION digital systems, such as general purpose processors,
may be utilized for both approximate and exact
Power consumption and performance are critical computing, necessitating the ability to dynamically switch
parameters in the design of digital circuit in general. In between exact and approximate operating modes. This
the case of digital processing systems (especially the feature may be obtained by adding a correction unit to
portable ones), owing to limited power budgets and the approximate circuit that would turn the approximate
reliability concerns, achieving a desired performance solution to an exact solution. The correction unit,
level can be challenging. Adders are key building blocks however, increases the delay, power, and area overhead
in arithmetic and logic units. Adders, which are utilized of the design. Also, the error correction procedure may
to perform other operations such as subtraction, require more than one clock cycle which could slow
multiplication, and division are among the most power down the processing.
hungry components in processors and are often hot-
spot locations.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 155
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

In this brief, we present a reconfigurable conventional approach. A CSLA based on the


approximate carry look-ahead adder (RAP-CLA) proposed scheme generate n-bit carry-words
which has two operating modes of exact and corresponding to input-carry '0' and'1', where nis the
approximate. The structure of the adder, which is based input bit-width. These carry words follow a specific
on the conventional carry look ahead adder (CLA), bit-pattern which can be used for logic optimization of
does not require an external correction unit for the exact carry-select unit. Fixed input bits of carry generator
add operation. While the delay and power consumption unit also can be used for logic optimization. Based on
of the proposed adder, this, an optimized design for carry-select unit and carry
In the exact mode, are about the same as those of generator unit are obtained. Using these optimized logic
the conventional CLA, they are considerably smaller in units, an efficient design is obtained for CSLA. The
approximate mode. This is because, in the approximate proposed CSLA design involves significantly less area
mode by exploiting the power gatizng technique, the and delay than the recently proposed CSLA-BEC. Due
power consumption is signi?cantly reduced. to small carry-output delay, the proposed CSLA design
is a good candidate for SQRT adder. We have derived
II. LITERATURE REVIEW architectures for SQRT-CSLA of bit-width 16,32, and
H. R. Mahdiani et al.[1]explains the full adder (FA) 64. Theoretical estimate shows that the proposed
gates of the least significant (LS) part of the adder have SQRT-CSLA involves nearly 16% less delay and 18%
been replaced by OR gates leading to smaller delay less area than the best of the existing SQRT-CSLA on
and power consumption at the cost of high error average for different bit-widths. ASIC synthesis result
distances (EDs).The conventional digital hardware shows that, best of the existing SQRT-CSLA design
computational blocks with different structures are involves 44% more area-delay-product (ADP) and
designed to compute the precise results of the assigned consumes 42% more energy than the proposed SQRT-
calculations. The main contribution of our proposed CSLA on average for different bit-widths.
Bio-inspired Imprecise Computational blocks (BICs) D. Shin et al.[2] an approximate adder which was
is that they are designed to provide an applicable based on a redesign technique which cut the critical
estimation of the result instead of its precise value at a path in the carry chain was suggested. Scaling CMOS
lower cost. These novel structures are more efficient in into nano-scale is decreasing yields. The concept of
terms of area, speed, and power consumption with error tolerance has been proposed to reverse this trend
respect to their precise rivals. Complete descriptions by developing new test techniques for chips used in
of sample BIC adder and multiplier structures as well many applications, such as audio, video, graphics,
as their error behaviors and synthesis results are games, and error-correcting codes for wireless
introduced in this paper. It is then shown that these BIC communication. In such chips, manufacturing defects
structures can be exploited to efficiently implement a that induce errors with severities within specified
three-layer face recognition neural network and the thresholds (determined via analysis of applications) are
hardware defuzzification block of a fuzzy process.An deemed acceptable. In this paper, we develop an
analysis on the logic operations involved in conventional approach to re-design datapath modules to exploit
carry select adder (CSLA)and CSLA based on binary acceptable errors to improve yield. Under the
to excess-1 converter (CSLA-BEC) to study the data- manufacturing yield model (Ym = Ypara * Yfunc),
dependency, and to find redundant logic operations. parametric yield (Ypara) improvement due to decrease
We have eliminated all the redundant logic operations in delay is more important than functional yield (Yfunc)
of conventional CSLA, and proposed a logic improvement due to decrease in area. So our re-
formulation for CSLA. In the proposed scheme, the designing technique mainly focuses on reducing delay
carry-select operation is scheduled before the of datapath modules to improve parametric yield. In
calculation of final-sum, which is different from the particular, we propose multiple approaches and apply

156 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

them to improve yield of a wide range of adder V. Gupta, D. Mohapatra et al.[5]was explained in
architectures by exploiting error tolerance in these this paper"Low-power digital signal processing using
applications. Experiment results show that even for approximate adders," Low power is an imperative
small thresholds on, we can obtain significant requirement for portable multimedia devices employing
improvements in manufacturing yield. various signal processing algorithms and architectures.
N. Zhu, W. L. Goh et al.[3] an error tolerant adder In most multimedia applications, human beings can
(ETA-I) which utilized a modified XOR gate instead of gather useful information from slightly erroneous outputs.
the FAs for the LS part of the adder was discussed. Therefore, we do not need to produce exactly correct
Note that the LS and most significant (MS) part of the numerical outputs. Previous research in this context
adder in this approach were independent from each exploits error resiliency primarily through voltage
other and the carry input of the MS part was zero. In overscaling, utilizing algorithmic and architectural
modern VLSI technology, the occurrence of all kinds techniques to mitigate the resulting errors. In this paper,
of errors has become inevitable. By adopting an we propose logic complexity reduction at the transistor
emerging concept in VLSI design and test, error level as an alternative approach to take advantage of
tolerance (ET), a novel error-tolerant adder (ETA) is the relaxation of numerical accuracy. We demonstrate
proposed. The ETA is able to ease the strict restriction this concept by proposing various imprecise or
on accuracy, and at the same time achieve tremendous approximate full adder cells with reduced complexity
improvements in both the power consumption and at the transistor level, and utilize them to design
speed performance. When compared to its conventional approximate multi-bit adders. In addition to the inherent
counterparts, the proposed ETA is able to attain more reduction in switched capacitance, our techniques result
than 65% improvement in the Power-Delay Product in significantly shorter critical paths, enabling voltage
(PDP). One important potential application of the scaling. We design architectures for video and image
proposed ETA is in digital signal processing systems compression algorithms using the proposed
that can tolerate certain amount of errors. approximate arithmetic units and evaluate them to
demonstrate the efficacy of our approach. We also
N. Zhu et al.[4]explains that the adder was divided derive simple mathematical models for error and power
to more than two segments where the input carry o consumption of these approximate adders.
f each segment was generated approximately by the Furthermore, we demonstrate the utility of these
previous segment. All the above approximate adders approximate adders in two digital signal processing
operated only in the approximate mode. The occurrence architectures (discrete cosine transform and finite
of errors are inevitable in modern VLSI technology and impulse response filter) with specific quality constraints.
to overcome all possible errors is an expensive task. It Simulation results indicate up to 69% power savings
not only consumes a lot of power but degrades the using the proposed approximate adders, when
speed performance. By adopting an emerging concept compared to existing implementations using accurate
in VLSI design and test-error-tolerance (ET), we adders.
managed to develop a novel error-tolerant adder which
we named the Type II (ETAII). The circuit to some A. B. Kahng et al.[6] where the proposed adder
extent is able to ease the strict restriction on accuracy operated in both accurate and approximate modes
to achieve tremendous improvements in both the power Approximation can increase performance or reduce
consumption and speed performance. When compared power consumption with a simplified or inaccurate
to its conventional counterparts, the proposed ETAII circuit in application contexts where strict requirements
is able to achieve more than 60% improvement in the are relaxed. For applications related to human senses,
power-delay product (PDP). The proposed ETAII is approximate arithmetic can be used to generate
an enhancement of our earlier design, the ETAI, which sufficient results rather than absolutely accurate results.
has problem adding small number. Approximate design exploits a tradeoff of accuracy in

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 157
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

computation versus performance and power. However, addition and subtraction are the basic operations
required accuracy varies according to applications, and whereas multiplication and division are the repeated
100% accurate results are still required in some addition and subtraction respectively.
situations.Because of its configurability, the ACA adder To perform these operations 'Adder circuits' are
can adaptively operate in both approximate (inaccurate) implemented using basic logic gates. Adder circuits are
mode and accurate mode. The proposed adder can evolved as Half-adder, Full-adder, Ripple-carry Adder,
achieve significant throughput improvement and total and Carry Look-ahead Adder. Among these Carry
power reduction over conventional adder designs. It Look-ahead Adder is the faster adder circuit. It reduces
can be used in accuracy-configurable applications, and the propagation delay, which occurs during addition,
improves the achievable tradeoff between performance/ by using more complex hardware circuitry. It is designed
power and quality. The ACA adder achieves by transforming the ripple-carry Adder circuit such that
approximately 30% power reduction versus the the carry logic of the adder is changed into two-level
conventional pipelined adder at the relaxed accuracy logic.
requirement,
A. Half Adder
J. Hu et al.[7] a segmented approximate adder
which enhanced by a carry speculation structure for The half adder adds two one-bit binary numbers A
increasing the accuracy was suggested. In addition, an and B. It has two outputs, S and C (the value
error reduction unit was used to reduce the error of the theoretically carried on to the next addition); the final
adder. The delay of this adder with and without the sum is 2C + S. The simplest half-adder design, pictured
error reduction unit was larger than the conventional on the right, incorporates an XOR gate for S and an
exact CLA. Note that by increasing the segment size,the AND gate for C. With the addition of an OR gate to
delay of this adder became considerably larger than combine their carry outputs, two half adders can be
that of the conventional CLA. combined to make a full adder.
Table 1. Truth Table Of Half Adder
M. Shafique et al.[8]a generalized model for
generating an ACA has been proposed where the
generated adders were called GeAr. Also, a
configurable error correction unit was discussed.The
error correction unit was a multicycle sequential unit
requiring up to k cycles to determine the exact value of
summation where k was the number of the subadders.
R. Ye, T.Wang et al.[9] "On reconfiguration oriented
approximate adder design and its application". The
structure was based on the ACA without supporting
the error correction mechanism. Compared to the above
approximate adders, our proposed reconfigurable
approximate adder operates in two modes of the exact
and approximate. Its delay and power are considerably
smaller (especially in the approximate mode) compared
to those of the exact CLA.
III.EXISTING SYSTEM
Fig 1. Circuit Diagrm Of Half Adder
A digital computer must contain circuits which can
perform arithmetic operations such as addition,
subtraction, multiplication, and division. Among these,
158 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

B. Full Adder
A full adder adds binary numbers and accounts for A full adder can be constructed from two half adders
values carried in as well as out. A onebit full adder adds by connecting A and B to the input of one half adder,
three one-bit numbers, often written as A, B, and Cin; connecting the sum from that to an input to the second
A and B are the operands, and Cin is a bit carried in adder, connecting Ci to the other input and OR the two
from the next less significant stage. The full-adder is carry outputs. Equivalently, S could be made the three-
usually a component in a cascade of adders, which add bit XOR of A, B, and Ci, and Cout could be made the
8, 16, 32, etc. binary numbers. A full adder can be three-bit majority function of A, B, and Ci.
implemented in many different ways such as with a C. Ripple carry adder
custom transistor-level circuit or composed of other
gates. One example implementation is with and It is possible to create a logical circuit using multiple
full adders to add N-bit numbers. Each full adder inputs
a Cin, which is the Cout of the previous adder. This
Table 2.Truth Table Of Full Adder kind of adder is a ripple carry adder, since each carry
bit "ripples" to the next full adder. Note that the first
(and only the first) full adder may be replaced by a half
adder. The layout of a ripple carry adder is simple,
which allows for fast design time; however, the ripple
carry adder is relatively slow, since each full adder must
wait for the carry bit.calculated from the previous full
adder. The gate delay can easily be calculated by
inspection of the full adder circuit.Each full adder
requires three levels of logic.
In a 32bit [ripple carry] adder, there are 32 full
adders, so the critical path (worst case) delay is 3 (from
input to carry in first adder) + 31 * 2 (for carry
propagation in later adders) = 65 gate delays. A design
with alternating carry polarities and optimized AND-
ORInvert gates can be about twice as fast.
Table 3. Truth Table Of Ripple Carry Adder

Fig 2. Circuit Diagram Of Full Adder

In this implementation, the final OR gate before the


carry-out output may be replaced by an XOR gate
without altering the resulting logic. Using only two types D. 4-Bit Carry Look-ahead Adder
of gates is convenient if the circuit is being implemented In parallel adders, carry output of each full adder is
using simple IC chips which contain only one gate type given as a carry input to the next higher-order state.
per chip. In this light, Cout can be implemented as . Hence, these adders it is not possible to produce carry

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 159
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

and sum outputs of any state unless a carry input is independent stages. Here the output of any stage is
available for that state. So, for computation to occur, dependent only on the bits which are added in the
the circuit has to wait until the carry bit propagated to previous stages and the carry input provided at the
all states. beginning stage. Hence, the circuit at any stage does
not have to wait for the generation of carry-bit from the
previous stage and carry bit can be evaluated at any
instant of time
For deriving the truth table of this adder, two new
terms are introduced - Carry generate and carry
propagate. Carry generate Gi =1 whenever there is a
carry Ci+1 generated. It depends on Ai and Bi inputs.
Gi is 1 when both Ai and Bi are 1. Hence, Gi is
calculated as Gi = Ai. Bi.Carry propagated Pi is
Fig 3:-4-bit-Ripple-CarryAdder
associated with the propagation of carry from Ci to
Ci+1. It is calculated as Pi = Ai ⊕ Bi. The truth table
Consider the 4-bit ripple carry adder circuit above. of this adder can be derived from modifying the truth
Here the sum S3 can be produced as soon as the inputs table of a full adder.
A3 and B3 are given. But carry C3 cannot be computed
until the carry bit C2 is applied whereas C2 depends Using the Gi and Pi terms the Sum Si and Carry
on C1. Therefore to produce final steady-state results, Ci+1 are given as below -
carry must propagate through all the states. This • Si = Pi ⊕ Gi.
increases the carry propagation delay of the circuit.
• Ci+1 = Ci.Pi +Gi.
The propagation delay of the adder is calculated as
"the propagation delay of each gate times the number Therefore, the carry bits C1, C2, C3, and C4 can
of stages in the circuit". For the computation of a large be calculated as
number of bits, more stages have to be added, which • C1 = C0.P0+G0.
makes the delay much worse. Hence, to solve this • C2 = C1.P1+G1 = ( C0.P0+G0).P1+G1.
situation, Carry Look-ahead Adder was introduced.To
understand the functioning of a Carry Look-ahead • C3 = C2.P2+G2 = (C1.P1+G1).P2+G2.
Adder, a 4-bit Carry Look-ahead Adder is described • C4 = C3.P3+G3 = C0.P0.P1.P2.P3 + P3.P2.P1.G0
below + P3.P2.G1 + G2.P3 + G3.
It can be observed from the equations that carry
Ci+1 only depends on the carry C0, not on the
intermediate carry bits.
Table 4.Carry-Look-ahead-Adder-Truth-Table

Fig 4. 4-bit-Carry-Look-ahead-Adder-Logic-Diagram

In this adder, the carry input at any stage of the adder


is independent of the carry bits generated at the
160 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The above equations are implemented using two- W, the first segment contains W MS terms of (1) while
level combinational circuits along with AND, OR gates, the other segment contains the remaining (LS) terms.
where gates are assumed to have multiple inputs. Hence, (1) may be rewritten as

(2)

where the left part is called approximate part and


the right part is called augmenting part. If both of these
parts are employed to calculate the carry output, the
generated Ci+1 is exact whereas if only the approximate
part is used, the generated Ci+1 is imprecise.
It is clear that computing imprecise Ci+1 is faster
and consumes less power compared to computing Ci+1
Fig 6.Carry-Output-Generation-Circuit-of-Carry-Look- precisely.Based on this segmentation, two exact and
ahead-Adder
approximate operating modes are realized for the
8-bit and 16-bit Carry Look-ahead Adder circuits proposed recon?gurable approximate adder. Thus,
can be designed by cascading the 4-bit adder circuit compared to the conventional CLA, only one multiplexer
with carry logic. The Carry Look-ahead Adder circuit is added in the circuitry for computing Ci+1. The inputs
for 4-bit is givenbelow. of this multiplexer are approximate and augmenting
carry outputs with the operating mode signal as the
selector. The operating mode signal determines the
generation of the carry output in the exact or
approximate mode. As an example, the gate-level netlist
of calculating C4 in the proposed structure which is
called RAP-CLA is shown in Fig.4.1. In order to
remove the power consumption of augmenting part
when the carry generation block is in the approximate
operating mode, this part is power gated using pMOS
headers.
If all carry generators of an adder are based on the
Fig 7. 4-bit-Carry-Look-ahead-Adder-Circuit-Diagram
proposed structure, and all the operating signals of these
units are controlled by only one signal for the operating
IV. PROPOSED SYSTEM mode, all output bits of the adder in the approximate
A. Reconfigurable Approximate CLA mode may be inaccurate. One may increase the
In the conventional CLA, the carry output of the ith accuracy of the approximate mode by exploiting the
stage is exact carry generator for the MS group of bits of the
adder similar to the approach suggested .In fact, the
technique may be utilized in designing CLAs with different
(1)
levels of accuracy. For structures with adjustable
where Cin is the input carry and Pi and Gi are the accuracy, the adder should be partitioned into some
propagate (Ai ⊕ Bi) and generate (AiBi) signals of the segments with their own operating mode signals. In this
ith stage, respectively. By increasing the width of CLA, brief, to compare the ef?cacy of the proposed structure
the delay, area usage and power consumption of the with those of the previous works, the two operating
carry generator units increase. In this brief, we propose modes of approximate and exact discussed before are
to split (1), into two segments. Given a window size of considered.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 161
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Supposing that we have two bits of storage per digit, of the exact CLA. In the case of GeAr, however, by
we can use a redundant binary representation, storing increasing the windows size to a larger value than 6,
the values 0, 1, 2, or 3 in each digit position. It is the delay (area) becomes larger than that of the exact
therefore obvious that one more binary number can be CLA. In addition, when the window size become larger
added to our carry-save result without overflowing our than 4, the delay of the proposed adder exceeds the
storage capacity. The key to success is that at the delay of the exact CLA. Also, for all the window sizes,
moment of each partial addition we add three bits: the power and area of the adder are larger than those
0 or 1, from the number we are adding. of the exact CLA. For the window sizes larger than 4,
the RAP-CLA outperforms the GeAr. The results also
- 0 if the digit in our store is 0 or 2, or 1 if it is 1 or 3.
show that, in the case of the lowest (highest) accuracy
- 0 if the digit to its right is 0 or 1, or 1 if it is 2 or 3 of W = 1(W = 6), the delay, power, area, energy and
EDP of our 8-bit proposed approximate adder are
about 73% (22%), 28% (3%), 30% (17%), 81%
(36%), and 95% (50%), respectively, lower compared
to those of the exact 8-bit CLA.
Table 5.Comparison of 8 bit

Fig 8. 8 Bit RAP CLA

To put it another way, we are taking a carry digit


from the position on our right, and passing a carry digit
to the left, just as in conventional addition; but the carry V. SIMULATION RESULTS
digit we pass to the left is the result of the previous
calculation and not the current one.In each clock cycle,
carries only have to move one step along, and not n
steps as in conventional addition.Because signals don't
have to move as far, the clock can tick much faster.
There is still a need to convert the result to binary at the
end of a calculation, which effectively just means letting
the carries travel all the way through the number just as
in a conventional adder. But if we have done 512
Fig 8.1:-Simulation Result Of Exact CLA
additions in the process of performing a 512-bit
multiplication, the cost of that final conversion is
effectively split across.
IV. RESULTS AND DISCUSSIONS
The results for the delay, area, power, energy, and
energydelay-product (EDP) of the 8-bit approximate
adders and the exact CLA have been reported in Table
5.1. As the figures indicate, by increasing the window
(segment) size, all the design parameters are increased.
In the case of the proposed adder in this brief, for all
Fig 9.Simulation Result of 4 bit RAP CLA
the window sizes, the parameters are smaller than those
162 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Papers, vol. 61, no. 2, pp. 407-419, Feb. 2014.


[5] R. Ye, T. Wang, F. Yuan, R. Kumar, and Q. Xu, "On
recon?gurationoriented approximate adder design and its
application," in Proc. IEEE/ACM Int. Conf. Comput.-Aided
Design (ICCAD), San Jose, CA, USA, 2013, pp. 48-54.
[6] A. K. Verma, P. Brisk, and P. Ienne, "Variable latency speculative
addition: A new paradigm for arithmetic circuit design," in Proc.
Design Autom. Test Europe (DATE), Munich, Germany, 2008,
pp. 1250-1255.
[7] H. R. Mahdiani, A. Ahmadi, S. M. Fakhraie, and C. Lucas, "Bio-
inspired imprecise computational blocks for ef?cient VLSI
implementation of soft-computing applications," IEEE Trans.
Circuits Syst. I, Reg. Papers, vol. 57, no. 4, pp. 850-862, Apr.
2010.
[8] D. Shin and S. K. Gupta, "A re-design technique for datapath
Fig 10. Simulation Result Of 8 bit RAP CLA modules in error tolerant applications," in Proc. 17th Asian Test
Symp. (ATS), Sapporo, Japan, 2008, pp. 431-437.
VI. CONCLUSION [9] N. Zhu, W. L. Goh, W. Zhang, K. S. Yeo, and Z. H. Kong, "Design
of low-power high-speed truncation-error-tolerant adder and its
In this project, a high-speed yet energy efficient application in digital signal processing," IEEE Trans. Very Large
reconfigurable approximate carry look ahead adder was Scale Integr. (VLSI) Syst., vol. 18, no. 8, pp. 1225-1229, Aug.
suggested. The adder enjoyed the ability of switching 2010.

between the approximate and exact operating modes [10] N. Zhu, W. L. Goh, and K. S. Yeo, "An enhanced low-power
highspeed adder for error-tolerant application," in Proc. Int.
making it suitable for both error-resilient and exact Symp. Integr. Circuits (ISIC), Singapore, 2009, pp. 69-72.
applications. The structure of the proposed adder was [11] A. B. Kahng and S. Kang, "Accuracy-con?gurable adder for
based on some modifications to the structure of the approximate arithmetic designs," in Proc. 49th ACM/EDAC/
IEEE Design Autom. Conf. (DAC), San Francisco, CA, USA,
conventional CLA. To assess the efficacy of the 2012, pp. 820-825.
proposed structure, its design parameters were [12] V. Gupta, D. Mohapatra, A. Raghunathan, and K. Roy, "Low-
compared to those of 4 bit reconfigurable approximate power digital signal processing using approximate adders," IEEE
CLA adders. The parameters which included delay, Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 32, no.
1, pp. 124-137, Jan. 2013.
power, energy energy-delay-product, and area were
[13] M. Sha?que, W. Ahmad, R. Ha?z, and J. Henkel, "A low latency
evaluated at a 15nm technology. The results showed generic accuracy con?gurable adder," in Proc. 52nd ACM/EDAC/
up to 49% and 19% lower delay and power IEEE Design Autom. Conf. (DAC), San Francisco, CA, USA,
consumption, respectively, compared to the those of 2015, pp. 1-6.
the approximate adders at the price of up to an error [14] J. Hu and W. Qian, "A new approximate adder with low relative
error and correct sign calculation," in Proc. Design Autom. Test
rate of 35.16% Europe Conf. Exhibit. (DATE), Grenoble, France, 2015, pp.
1449-1454.
REFERENCES
[15] C. Efstathiou, Z. Owda, and Y. Tsiatouhas, "New high-speed
[1] B. K. Mohanty and S. K. Patel, "Area-delay-power ef?cient multioutput carry look-ahead adders," IEEE Trans. Circuits Syst.
carryselect adder," IEEE Trans. Circuits Syst. II, Exp. Briefs, II, Exp. Briefs, vol. 60, no. 10, pp. 667-671, Oct. 2013.
vol. 61, no. 6, pp. 418-422, Jun. 2014. [16] J. Liang, J. Han, and F. Lombardi, "New metrics for the reliability
[2] B. Shao and P. Li, "Array-based approximate arithmetic of approximate and probabilistic adders," IEEE Trans. Comput.,
computing: A general model and applications to multiplier and vol. 62, no. 9, pp. 1760-1771, Sep. 2013.
squarer design," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. [17] NanGate-The Standard Cell Library Optimization Company.
62, no. 4, pp. 1081-1090, Apr. 2015. (2016). [Online]. Available: http://www.nangate.com/
[3] A. Raha, H. Jayakumar, and V. Raghunathan, "Input-based [18] M. S. K. Lau, K.-V. Ling, and Y.-C. Chu, "Energy-aware
dynamic recon?guration of approximate arithmetic units for video probabilistic multiplier: Design and analysis," in Proc. Int. Conf.
encoding," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Compilers Archit. Synthesis Embedded Syst., Grenoble, France,
vol. 24, no. 3, pp. 846-857, Mar. 2016. 2009, pp. 281-290.
[4] M. S. Khairy, A. Khajeh, A. M. Eltawil, and F. J. Kurdahi, [19] H. R. Myler and A. R. Weeks, The Pocket Handbook of Image
"Equinoise: A statistical model that combines embedded memory Processing Algorithms in C. Upper Saddle River, NJ, USA:
failures and channel noise," IEEE Trans. Circuits Syst. I, Reg. Prentice-Hall, 2009.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 163
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Design of Very Fast, High Performance 5:2 and 7:2


Compressors for Rapid Parallel Accumulations
P. H. Chandra Mouli1, K. Munisimha Deepak2
1
Associate Professor, Dept of ECE, Vemu Institute of Technology, P Kothakota
2
UG Student, Dept of ECE, Vemu Institute of Technology, P Kothakota
Email: deepakkamaatam107@gmail.com2

Abstract: In most of the CPUs, the multiplier two remaining rows will be added by means of, for
lies in the critical path for signal propagation which example, a carry propagation adder.At the second stage
leads to the delay and complexity of systems. So, and after generation of PPs, a partial product reduction
in order to decrease the delay and complexity of tree (PPRT) is often employed for efficient summation
systems, compressors are used. A compressor
of the products. Considering the full adder (FA)as the
reduces the delay and carry relay problem by
introducing the Carry Selective MUX instead of
main building block in various multiplication
Full-Adders. For the carry rippling problem "n-2 configurations, this block constitutes the basis for many
compressors" has been developed which improves different architectures.
the speed performance and efficiency of the circuit. However, the main drawback of FA-based
With the help of introduced procedure, the gate- configurations, which limits their usage in today's parallel
level delay has been reduced considerably when
multiplier design, is the propagation latency for the
compared with the previous designs, while the total
transistor and gate count remain in a reasonable
cascaded cells. Moreover, the most important concern
range. Moreover, for a fair comparative conclusion, in the design process of a parallel multiplier is the circuit
the best-reported circuits have been redesigned, size and power consumption, which is directly related
and their parasitic elements were extracted utilizing to the number of employed gates used in the various
the same technology employed for the synthesis parts of the architecture. An efficient solution to
of the proposed circuits. Finally, a typical multiplier overcome the drawbacks is to utilize a compressor that
has been implemented to investigatethe efficiency has to reduce carry repelling problem that the most
of the designed compressor block. significant part of the total delay and power dissipation
Keywords: Integrate design environment (IDE), will belong to the network instead of FA trees, especially
Look up table (LUT), Full adder (FA), Register in the PPRT.Therefore, the performance enhancement
transfer logic (RTL), Electronic design of this stage can significantly improve the speed and
environment (EDA). lower the power dissipations of the whole system.
I. 1.INTRODUCTION N- 2 COMPRESSOR:
Compressor refer to the "compressing of full-adders As a universal principle, an n-2 compressor modifies
by "n-2". The basic idea of Compressors used for the interconnection of the adjacent cells in the
accumulating and reducing partial products by reduction accumulation stage by means of one or more horizontal
of n operands to 2. For example, an 5:2 compressor paths defined as Cout1, Cout2, etc. These paths will
requires 5-2 full-adders i.e., 3-full-adder's.In a parallel transmit their logic value to the adjoining compressor
multiplier, the multiplication process is divided into three as Cin1, Cin2, etc. for the latter compressor.
steps. Considering the above, the focus in this article is to
improve the speed performance of n - 2 compressors
At first, the partial products (PPs) are generated.
by bringing up the carry rippling problem as a new design
Then these products are summed, and the process
consideration. Also, the fact that power and active area
continues until two rows remain. The final stage, the
164 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

on-chip should be comparable to the best-reported Table 1: Truth table for 4:2 compressor

designs is focused.
• Finally, for high performance and overall goal of power
minimization is to reduce system cost and ensure long-
term circuit reliability. These different requirements
impact how power optimization is addressed and how
much the designer is willing to sacrifice in cost or
performance to obtain lower power dissipation.
• Both critical path and power delay product can be
minimized by using the compressor techniques.
• Compressor technique also helps to reduce in the
number of required logic gates, which leads to the
efficient area. The optimized design of an exact 4:2compressor
2. LITERATURESURVEY based on the so-called XOR-XNOR gates; a XOR-
XNOR gate simultaneously generates the XOR and
D. Balobas and N. Konofaos, "Low-power high-
XNOR output signals. The design of consists of three
performance CMOS 5-2 compressor with 58
XORXNOR (denoted by XOR*) gates, one XOR and
transistorscomponents in the partial product reduction
two 2-1 MUX's. The critical path of this design has a
stage of CMOS multipliers. Simulation results show that
delay of 3, where is the unitary delay through any
the proposed 5:2 compressor has significantly improved
gate in the design.4:2 compressors are capable of
power-delay performance compared to previously
adding 4 bits and one carry, in turn producing a 3-bit
proposed approach.
output.
P. Saha, P. Samanta, and D. Kumar, "4:2 and 5:2
The common implementation of a 4:2 compressor
decimal compressors, having improved design and
is accomplished by utilizing two full-adder (FA) To add
architectures of 4:2 and 5:2 high speed compressor
binary numbers cells4:2 compressor is composed of
offered ~38% improvement in speed compared with
two serially connected full adders as shown in Fig.1With
the best reported architecture so far for 5:2 compressor.
minimal carry propagation delay of the circuits. We use
3. EXISTINGMETHOD: compressor adder instead of another adder.
4:2 COMPRESSOR: Compressor is a digital modern circuit for high speed
with minimum gates requires designing technique.
The common implementation of a 4:2 compressor
is accomplished by utilizing two full-adder (FA) cells.
Different designs have been proposed in the literature
for 4:2 compressor.

Fig.1.: -4:2 Compressor

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 165
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

ALGORITHM STEPS OF 5:2


COMPRESSOR:
• It has Five primary inputs I1, I2, I3, I4, I5 are given to
the logic circuit.
• Two output bits Sum and Carry along with carry input
bits, Cin1 and Cinand carry output bits, Cout1 and
Cout2 are generated
The output obtained is governed by the following
equation:
I1+I2+I3+I4+I5+Cin1+Cin2 = sum +
2[carry+Cout1+Cout2]
Fig.2.:Multiplier using 4:2 compressor where,
A multiplier is composed of modules: sum=I1 I2 I3 I4 I5 Cin1 Cin2
• Partial product generation Cout1 = (I1+I2) I3 + I1 I2
• A Carry Save Adder (CSA) tree to reduce the partial Cout2 =(I4+I5) Cin1+I4 I5
products' matrix to an addition of only two operands.
carry = ((I1 I2 I3) + (I4 I5 Cin1)) Cin2 +(I1 I2 I3)
Algorithm steps of 4:2 compressor:
(I4 I5 Cin1)
• Five primary inputs I1, I2, I3, I4, I5 and carry input
Cin are given to the logic circuit.
PROPOSED 7:2COMPRESSOR:

• Two output bits Sum and Carry along with carry input The architecture for the 7:2 compressor has been
Cin, and carry output bits, Cout are generated. proposed to higher speed performance when compared
with the previous designs, the carry rippling between
• The output obtained is governed by the following adjacent blocks has been reduced by one stage.The
equation:
designed scheme, in which the latency from inputs to
I1+I2+I3+I4+Cin=Sum+2(Carry+Cout) outputs is reduced to less than four XOR logic
4. PROPOSED METHOD: gates.Also, driving problems are decreased
considerably by use of logic gates with no Threshold
PROPOSED 5:2 COMPRESSOR: problems.

Fig.3.: -5:2 Compressor

The newly proposed circuit for 5:2 compressor has


better realization of the latency in different paths from
inputs to the outputs, two neighbour 5:2 compressor
cells must be connected together as the carry rippling
finishes in the second compressor block. Fig.4.:-7:2 Compressor

166 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

If each four TGs is considered as one multiplexer


cell (according to the pass transistor logics) the total
gate count of our work reaches to 14 logic gates. Also,
the sizes of NMOS and PMOS transistors of TGs are
considered the same, while initial TGs are considered
a little greater in size to avoid driving problems.
ALGORITHM STEPS OF 5:2
COMPRESSOR:
• Seven primary inputs I1, I2, I3, I4, I5, I6, I7 are given
to the logic Circuit
• Two output bits Sum, Carry and Cout1, Cout2 output
bits are generated
Fig.5.:-Approximate multiplier
• Three carry outputs as C1, C2, C4 and sum outputs
The design environment was based on a serial
as S3, S4
multiplication structure so that the propagation latency
• The output obtained by the 7:2 compressor is governed for the generation of all output bits can be
by the following equation: achieved.Xilinx's Embedded Developer's Kit (EDK)
Where, supports the embedded PowerPC 405 and 440 cores
(in Virtex-II Pro and some Virtex-4 and -5 chips) and
C1 = (I3+I4) I1+I2 I4
the Micro blaze core. Xilinx's System Generator for
C2 = (I6+I7) I5+I6 I7,C4 = (s4+I7) s3+s4 I1 = DSP implements DSP designs on Xilinx FPGAs.
((I5 I6 I7)+I1) (I2 I3 I4)+(I5 I6 I7) I1
XILINX ISE :
PROPOSED MULTIPLIER
Xilinx ISE (Integrated Synthesis Environment)
In the proposed architecture the PPs are produced enables the developer to synthesize ("compile") their
in general form using AND gates. Then, with the help designs, perform timing analysis, examine RTL diagrams,
of a two-step process, the PPs will be reduced into simulate a design's reaction to different stimuli, and
two rows. configure the target device with the programmer. Other
Finally, a 32-bit carry-lookahead adder (CLA), has components shipped with the Xilinx ISE include the
been employed to obtain the final result. For a fair Embedded Development Kit (EDK), a Software
comparative analysis redesigned by utilizing the Development Kit (SDK) and Chip Scope Pro.
previously reported works for 5:2 and 7:2 structures. • The Xilinx ISE is primarily used for circuit synthesis
Based on new arithmetic unit, the proposed and design, while ISIM or the Model Sim logic
simulator is used for system-level testing, commonly
architecture is reached to an area efficiency and is
practiced in the commercial electronic design
constructed of only 124 transistors. Post layout automation sector,
simulations are performed based on TSMC 0.18 m
CMOS technology and 1.8 supply voltage by • Xilinx ISE is tightly-coupled to the architecture of
HSPICE.Each input is driven by buffered signals and Xilinx's own chips (the internals of which are highly
proprietary) and cannot be used with FPGA products
each output is loaded with buffers.
from other vendors.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 167
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

5.RESULTS SIMULATION RESULTS OF PROPOSED


SYNTHESIS RESULTS OF PROPOSED METHOD (POWER):
MULTIPLIER (AREA):

Fig9: simulation resultofProposed Method

Fig 6:AreareportofProposedMethod
PERFORMANCE PARAMETERS:
SYNTHESIS REPORT OF PROPOSED
MULTIPLIER(DELAY):

Fig 10: Performance parameters

Fig 7: Delay report of Proposed Method


ADVANTAGESOFPROPOSEDMETHOD
RTL SCHEMATIC OF PROPOSED • Number of LUT'S are less which makes more
MULTIPLIER: efficient in area
• Low power consumption
• Critical path delay is more efficient compared to
previous multiplier.
• Power Delay Product is reduced.
• Increases performance by reducing the critical path
delay.
6. CONCLUSION
Fig 8: RTL schematic of Proposed Method
The various performance parameters also indicated
that the proposed algorithm provides better results by
improving certain parameters such as critical path delay,
power delay product and power consumption. The
result was the implementation of high speed 5:2 and

168 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

7:2 compressors. The main advantage of the designed [4] J.HanandM.Orshansky,"Approximatecomputing: an emerging
paradigm for energy-efficient design,"in Proc.18th IEEE European
structures is the considerably lower delay in comparison Test Symposium, 2013.
with previously reported works. Thus, the proposed
[5] S. Venkataramani, S. Chakradhar, K. Roy and A. Raghunathan,
approach is significant for high speed improvement and "Approximate computing and the quest for computing efficiency,"
area efficiency in circuits. in Proc. 52nd Annual Design Automation Conference (DAC),
2015.Q. Xu, N. S. Kim and T.Mytkowicz, "Approximate
REFERENCES computing: asurvey," IEEE Design and Test, vol.33, no.1, pp.8-
22, 2016.
[1] D. Balobas and N. Konofaos, "Low-power high-performance
CMOS 5-2 compressor with 58 transistors components in the [6]G. Zervakis, K. Tsoumanis, S. Xydis, D. Soudris and K.Pekmestzi
partial product reduction stage of CMOS multipliers. Simulation ,"Design-efficient approximate multiplication circuits through
results show that the proposed 5:2 compressor has significantly partial product perforation, "2016.
improved power-delay performance compared to previously
[7] H.Jiang, J.Han.F.Qiao,.F.Lombardi, "Approximate radix-8 Booth
proposed approach.
multipliers for low-power and high performance operation," IEEE
[2] P. Saha, P. Samanta, and D. Kumar, "4:2 and 5:2 decimal Trans. Computers, vol. 65, pp. 2638-2644, Aug. 2016.
compressors, having improved design and architectures of 4:2
[8] W. Liu, L. Qian, C. Wang, H. Jiang, J. Han and F.Lombardi,
and 5:2 high speed compressor offered ~38% improvement in
"Design of approximate radix-4 booth multipliers for error-tolerant
speed compared with the best reported architecture so far for 5:2
computing," Aug. 2017.
compressor
[9] Y.Wang,H.Li,X.Li,"Real-timemeetsapproximate compureting: An
[3] N.Maheshwari,Z.Yang,J.HananF.Lombardi, "A design approach
elastic CNN inferenceaccelerator with adaptive trade-off be-
for compressor based approximate multipliers,"2015.
tween QoS and QoR," in Proc. 54th Annual Design Automation
Conference (DAC), 2017.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 169
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

An AES-Based Privacy Preserving for Secure Image


Retrieval and Sharing in Cloud Computing
Ms.Y.Neha1, Ms.N.Reena2, Ms.V. Jyoshna Priya3, Mr.V. Jayaprakash4
1,2,3,4
UG Student, Dept. of ECE, Vemu IT, P.Kothakota
Email: nehayaalamuri@gmail.com1, reenanoogula@gmail.com2

Abstract - Every day social multimedia massive amounts of images. According to Instagram,
applications generate millions of images. To handle more than 100 million images are posted per day. Due
such huge amount of images, an optimal solution to the high storage costs, social service providers prefer
is using the public cloud, since it has powerful to outsource such massive number of images to public
storage capability. Images usually contain a wealth
cloud platforms such as Amazon Cloud. Images usually
of sensitive information, therefore social service
providers need not only to provide services such
contain sensitive information that could reveal personal
as retrieval and sharing but also to protect the privacies, and encryption is an effective method to
privacies of the images. A privacy-preserving protect privacy. Based on cryptography, a number of
scheme is proposed for content-based image privacy-preserving schemes that support remote image
retrieval and sharing in social multimedia retrieval and sharing have been proposed. The scheme
applications. First, the users extract visual features allows the image owners to outsource images to the
from the images, and perform locality-sensitive public cloud server, and outsource secure index to the
hashing functions on visual features to generate social service provider.
image problem vectors. The retrieval on the images
is then model as the equality search on the image A. Cloud Computing
problem vectors. To enable accurate and efficient Cloud computing is the on-demand availability
retrieval, the secure index structure is designed of computer system resources, especially data storage
based on cuckoo hashing, which has constant
(cloud storage) and computing power, without direct
lookup time. To meet the requirements of dynamic
active management by the user. The term is generally
image updating, this service is enriched with image
insertion and deletion. In order to reduce the key used to describe data centres available to many users
management overhead and the access control over the Internet. Large clouds, predominant today,
overhead in social applications, keys are processed often have functions distributed over multiple locations
using secret sharing techniques to enable the users from central servers. If the connection to the user is
holding similar images to query and decrypt images relatively close, it may be designated an edge server.
independently. Finally the prototype of the Clouds may be limited to a single organization (enterprise
proposed scheme is implemented, and perform clouds), or be available to multiple organizations (public
experiments over encrypted image databases. cloud).
Index Terms - image retrieval, cloud computing, B. Multimedia Cloud Computing
privacy preserving, secure AES.
Due to the invention of cloud computing, nowadays
I. INTRODUCTION
users can easily access the multimedia content over the
Due to the popularity of mobile devices with internet at any time. Here the user can efficiently store
cameras, such as mobile phones, tablets, sensors, and the multimedia content of any type and of any size in
etc., the number of images has grown tremendously. the cloud after subscribing it with no difficulties. Not
Specially, social multi-media applications, that provide only storing the media content like Audio, Video and
platforms to post and share multimedia, generate Image, but can process them within the cloud since the
170 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

computation time for processing media data is more in transmission. Security of data becomes a large concern
complex hardware. After processing the processed data to insure various attribute like integrity, confidentiality,
can be easily received from the cloud through a client authentication etc. cryptography techniques like DES,
without any need of installing complex hardware. Thus 3DES plays a major roles in protecting the data in those
Multimedia cloud computing is the processing, accessing application which are running in a network environment.
and storing of multimedia contents like audio, video and Many organisations and people store their important
image using the services and applications available in data on cloud and data is also accessed by many
the cloud without physically acquiring them. persons, so it is very important to secure the data from
II. LITERATURE REVIEW intruders.

X. Yuan, X. Wang, C. Wang, A. C. Squicciarini, Q. Zou, J. Wang, J. Ye, J. Shen, and X. Chen,
and K. Ren,toward privacy-preserving and practical efficient and secure encrypted image search in mobile
image-centric social discovery (2018): Images are cloud computing (2017): Mobile could computing
becoming one of the key enablers of user connectivity (MCC) is the availability of cloud computing services
in social media applications. Many of them are directly in the mobile ecosystem. MCC integrates the cloud
exploring image content to suggest new friends with computing into the mobile environment and has been
similar interests. To handle the explosive volumes of introduced to be a potential technology for mobile
images, one common trend is to leverage the public devices. Although mobile devices brought us lots of
cloud as their robust service backend. Despite the convenience, it is still difficult or impossible to perform
convenience, exposing content-rich images to the cloud some expensive tasks due to the limited resources such
inevitably raises acute privacy concerns. In this paper, as computing abilities, battery lifetime, processing
we propose a privacy-preserving architecture for abilities, and storage capacity. Therefore, many
image-centric social discovery services, designed to researchers focus on designing applications which could
function over encrypted images. We first adopt the run on mobile devices in mobile cloud computing.
effective Bag-of-Words model to extract the 'visual Among them, secure encrypted image search has
content' of users' images into respective image profile attracted considerable interest recently. However, it also
vectors. We then model the core problem as similarity suffers from some challenges such as privacy of images,
retrieval of encrypted high-dimensional vectors. To and distance matching over cipher texts. In this paper,
achieve scalable services over millions of encrypted we introduce a novel encryption search scheme for
images, we design a secure and efficient index structure, content-based image retrieval using comparable
which enables practical and accurate social discovery encryption and order-preserving encryption technology.
from the cloud, without revealing any image profile or Because of avoiding the usage of the homomorphic
image content. For completeness, we further enrich our encryption, our construction greatly reduces
service with secure updates, facilitating user's image computation overhead on client side and improves the
update. Our implementation is deployed at an Android precision of fuzzy search compared with previous
phone and Amazon Cloud, and extensive experiments solutions.
are conducted on a large Flickr image dataset which III. EXISTING METHOD
demonstrates the desired quality of services. Nowadays visual data is responsible for one of the
Tushar J Raval, Karishma A Choudhary, Pulatsya largest shares of global Internet traffic in both corporate
Kanasagara, review on Data Encryption Algorithm in and personal use scenarios. The amount of images,
Cloud Computing (2017): Cloud computing provides graphics, and photos being generated and shared every
an illusion to the customers of using infinite computing day is growing at an ever increasing rate. The storage
resources that are available from anywhere, any time needs for such large amounts of data has been a driving
on demand. Cloud computing provide secure data factor for data outsourcing services such as the ones

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 171
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

leveraging Cloud Storage and Computing solutions. vectors. Then model the retrieval on the images as the
Such services (e.g. Instagram and Flickr) have been equality search on the image problem vectors. To enable
reported to be among the largest growing internet accurate and efficient retrieval, we design the secure
services. Additionally, the availability of large amounts index structure based on cuckoo hashing, which has
of images in public and private repositories naturally constant lookup time. To meet the requirements of
leads to the need for content-based image retrieval dynamic image updating, the service is enriched with
(CBIR) solutions. Content-based means that the search image insertion and deletion. In order to reduce the
analyses the contents of the image rather than the key management overhead and the access control
metadata such as keywords, tags, or descriptions overhead in social applications, the keys are processed
associated with the image. The term content in this using secret sharing techniques to enable the users
context might refer to colours, shapes, textures, or any holding similar images to query and decrypt images
other information that can be derived from the image independently.
itself. CBIR is desirable because searches that rely The contributions of this method can be summarized
purely on metadata are dependent on annotation quality as follows
and completeness. The most common method for
comparing two images in content-based image retrieval • A privacy-preserving content-based image retrieval
(typically an example image and an image from the and sharing scheme for social multimedia applications.
database) is using an image distance measure. An image The scheme allows the image owners to out- source
images to the public cloud server, and outsource secure
distance measure compares the similarity of two images
index to the social service provider.
in various dimensions such as colour, texture, shape,
and others. • The scheme is constructed under a stronger and more
realistic threat model that the social service provider
The proposals that support outsourced storage, is not a completely trusted entity. The social service
search and retrieval of images in the encrypted domain provider is allowed to acquire a part of the users'
can be broadly divided in two classes: Searchable information, but it cannot be trusted to store the keys.
Symmetric Encryption (SSE) based approaches and
• The scheme greatly simplifies access control and key
Public-Key partially-Homomorphic approaches
management in multi-user social applications. The
(PKHE). SSE has been widely used in the past by the users holding similar images are allowed to submit
research community, both for text and image search/ the retrieval queries, and decrypt the query results
retrieval. In SSE-based solutions, clients process and on their own.
encrypt their data before outsourcing it to the Cloud.
• A secure index is designed that provides efficient
From this processing, an index is created, encrypted,
retrieval service for large image set. The index
and stored in the outsourced infrastructure, which allows
requires constant lookup time and supports dynamic
clients to search their data efficiently and in a secure image updating.
way. Data is typically encrypted with a probabilistic
symmetric-key encryption scheme, while the index is
protected through a combination of probabilistic and
deterministic (or even order-preserving) encryption.
IV. PROPOSED METHOD
A privacy-preserving scheme is proposed for
content-based image retrieval and sharing in social
applications. First, the users extract visual features from
the images, and perform locality-sensitive hashing
functions on visual features to generate image problem

172 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

V. SYSTEM ARCHITECTURE widely adopted symmetric encryption algorithm likely


to be encountered nowadays is the Advanced
Encryption Standard (AES). It is found at least six time
faster than triple DES. A replacement for DES was
needed as its key size was too small. With increasing
computing power, it was considered vulnerable against
exhaustive key search attack. AES is a block cipher
that operates on 128-bit blocks. It is designed to be
used with keys that are 128, 192, or 256 bits long,
yielding ciphers known as AES-128, AES-192, and
AES-256.

Fig.1 Overall System Diagram.

Module Description
Data owner: • Data Owner have to register first. •
Login the correct username and password. • Upload
the files to the cloud in encrypted format with file private
and trapdoor key by using fuzzy logic for key generation
and AES algorithm for encryption & decryption. View
user request then accept and reject. • Manage the file.
• Logout
Data user: • Register their own details. • Login Fig. 2AES Bit Diagram.

their correct user name and password. • Search Files, VII. CONCLUSION
User can view the all image in decrypted format, then
A privacy- preserving content-based image retrieval
sends the request to the Data owner. • View Request
and sharing scheme is proposed and implemented,
Status Waiting or Accept.• Download Files by using
which can be used for friend recommendation in social
the file private & trapdoor key, user can download the
multimedia applications. The image similarity is measured
files in decrypted format. • Logout
through image visual features. To reduce the
Cloud: •View all registered Data Owners. • View dimensionality of visual features the leash is used and
all registered Data Users. •View all Data owner accept realize similarity search on visual features. The index is
file then, key send to user mail id. • Result- Generate designed based on cuckoo hashing to speed up the
the result based on the file request counts. • Throughput similarity search. Based on secret sharing, the user is
Result- calculate the throughput of all the image allowed to query and recover images on his own, which
Download to the cloud. • Logout eliminates key management overhead and access control
VI. ALGORITHM USING ADVANCED overhead compared with other schemes. Finally, a
ENCRYPTION STANDARD(AES) prototype is implemented to evaluate the efficiency of
the proposed scheme. The results showed that this
In 1997, the U.S. National Institute for Standards scheme achieves practical performance under the UK
and Technology (NIST) put out a public call for a Bench database. In future the plan is to explicitly address
replacement to DES. It narrowed down the list of orthogonal issues in our design, such as key sharing,
submissions to five finalists, and ultimately chose an user access control, and reliability issues. Also the plan
algorithm that is now known as the Advanced is to investigate the applicability of this methodology -
Encryption Standard (AES). The more popular and
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 173
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

i.e., the separation of information contexts when [7] X. Yuan, X. Wang, C. Wang, A. C. Squicciarini, and K. Ren,
``Towards privacypreserving and practical image-centric social
processing data (colour and texture in this paper) - in discovery,'' IEEE Trans. Dependable Secure Comput., vol. 15,
other domains beyond image data. no. 5, pp. 868_882, Sep. 2018.

REFERENCES [8] K. W. Ahmed, M. Z. Hasan, and N. Mohammed, ``Image-centric


social discovery using neural network under anonymity
[1] Zongye Zhang, Fucai Zhou, Shiyue Qin, Qiang Jia, "Privacy constraint,'' in Proc. IEEE Int. Conf. Cloud Eng. (ICE), Apr.
Preserving Image Sharing and Retrieval in Social Media 2017, pp. 238_244.
Applications," IEEE Transactions on Computing Services, 2020.
[9] W. Pieters and Q. Tang, ``Data is key: Introducing the data-based
[2] Rajamohan Parthasarathy, Haw Wai Yee, Seow Soon Loong, access control paradigm,'' in Proc. IFIP Annu. Conf. Data Appl.
Preethi Ayappan, "Implementation of RSA Algorithm to secure Secur. Privacy. Berlin, Germany: Springer, 2009, pp. 240_251.
data," IJISET, vol. 6, no. 2, Issue 4, April 2019.
[10]Boldyreva, T. Tang, and B. Warinschi, ``Masking fuzzy-
[3] Tushar J Raval, Karishma A Choudhary, Pulatsya Kanasagara, searchable public databases,'' in Proc. Int. Conf. Appl.
"A Review on Data Encryption Algorithm in Cloud Computing," Cryptography Netw. Secur. Cham, Switzerland: Springer, 2019,
IJARIIE-ISSN(O)-2395-4396, vol-3, Issue-5, 2017. pp. 571_591.
[4] Wei Li, Kaiping Xue, Yingjie Xue, and Jianan Hong. Tmacs, "A [11]P. Indyk and R. Motwani, ``Approximate nearest neighbors:
robust and verifiable threshold multi-authority access control Towards removing the curse of dimensionality,'' in Proc. 13th
system in public cloud storage," IEEE Transactions on parallel Annu. ACM Symp. Theory Comput. (STOC), 1998, pp.
and distributed systems, 27(5):1484-1496, 2016. 604_613.
[5] E. Rublee, V. Rabaud, K. Konolige, and G. Bradski, "ORB: An [12]W. Dong, Z. Wang, W. Josephson, M. Charikar, and K. Li,
efficient alternative to SIFT or SURF," in Proc. Int. Conf. ``Modeling LSH for performance tuning,'' in Proc. 17th
Comput. Vis., Nov. 2011, pp. 2564_2571. ACMConf. Inf. Knowl. Mining (CIKM), 2008, pp. 669_678.
[6] D. Xiaoding Song, D. Wagner, and A. Perrig, ``Practical techniques [13]Q. Lv,W. Josephson, Z.Wang, M. Charikar, and K. Li, ``Multi-
for searches on encrypted data,'' in Proc. IEEE Symp. Secur. probe ISN: Ef_cient indexing for high-dimensional similarity
Privacy., May 2000, pp. 44_55. search,'' in Proc. 33rd Int. Conf. Very Large Data Bases, 2007,
pp. 950_961.

174 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Synthesis and Simulation of Double Precision


Floating Point Arithmetic Unit- CRATE 2021
Ms C. Bhagya1, Mr.P.Chandu Prasad Reddy2, N.Sirisha3
1,2,3
Electronics and Communication Engineering, VEMU Institute of Technology, P. Kothakota
Email: bhagya.c1994@gmail.com1, chandureddy3920@gmail.com2, Shirishareddy430@gmail.com3

Abstract-A floating-point unit (FPU) is a math 1) Sign, 2) Exponent, and 3) Significand. Sign Bit : A
coprocessor, a part of a computer system specially positive number is denoted by "0" a negative number is
designed to carry out operations on floating point denoted by "1". By changing the value of this bit, change
numbers. The term floating point refers to the fact the sign of the number. Exponent Field : Positive and
that the radix point can "float"; that is, it can placed
Negative both the numbers are represented by the
anywhere with respect to the significant digits of
the number. Double precision floating point, also
exponent field. For doing this, a bias is added to the
known as double, is a commonly used format on actual exponent in order to get a stored exponent. The
PCs due to its wider range over single precision in exponent field is 8 bits wide according to the 32-bit
spite of its performance and bandwidth cost. This floating point unit and is of 11 bit wide according to the
paper aims at developing the double precision 64-bit floating point unit. This field contain an
floating point core designed to meet the IEEE 754 exponential with a base of 2 for binary and 10 for
standard .This standard defines a double as sign decimal. The Significand Bit: The significand, is also
bit, exponent and mantissa. The aim is to build an called as mantissa, represent the precision bits of the
efficient FPU that performs basic functions with number. It contained the fraction bits and an implicit
reduced complexity of the logic used and also leading bit. The significand needs to be normalized in
reduces the memory requirement as far as possible.
order to attain the form of 1.xxx, so that MSB is always
Key words:
"1". IEEE-754 Layout for Single & Double Precision
Keywords- FPU, Double precision floating point Floating Point Values
I. INTRODUCTION 2. Representation of a Number into Floating
An Arithmetic circuit has multiple applications in Point Number:
digital coprocessors, microprocessors and in For an example, how would the number 3.5 be in a
application specific circuits because they performs the double precision floating point format?
digital arithmetic operations. In modern era as the size
of chip is decreasing and density increasing power and
speed are the most significant parameters for any VLSI
design. IEEE -754 Floating-Point Standard through
which the floating point operations carried out efficiently
with modest storage requirements is the most popular
code introduced in 1990, for representing the floating
point numbers. Here Double Precision arithmetic units
• Here the given number is positive so the sign bit will
are designed in which 64- bit is given as input and by
be '0' (63- bit will be 0)
using this Double Precision accuracy of the system will
be increased. • In next step 3.5 can be converted as (1.75) * 2^(1).
The exponent offset is 1023, so you add 1023 + 1 to
1. Floating-Point Numerical Representation: calculate the value for the exponent field. Therefore,
The floating-point number consists of three parts: bits 62-52 will be "1000000000".

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 175
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The mantissa corresponds to the 1.75, which is requires whose bits may be represented as numbered
multiplied by the power of 2 (2^1) to get 3.5. The from 0 to 63, left to right. Pipelining concept also
leading '1' is implied in the mantissa but not actually introduced in the proposed method for transfer of
included in the 64-bit format. So .75 is represented by information.
the mantissa. Bit 51, the highest bit of the mantissa,
corresponds to 2^(-1). Bit 50 corresponds to 2^(-2),
and this continues down to Bit 0 which corresponds

Fig 2: Basic Block Diagram of Double Precision Floating


Point Arithmetic Unit
to 2^(-52). To represent .75, bits 51 and 50 are
1's, and the rest of the bits are 0's. So 3.5 as a double- a. Double Precision Adder/subtractor
precision floating point number is: The main steps in the calculation of the sum or
3. CONCEPTUAL OVERVIEW OF difference R of two floating-point numbers A and B are
FLOATING POINT UNIT: as follows. First, calculate the absolute value of the
difference of the two exponents, i.e. |EA-EB| and set
the exponent ER of the result to the value of the larger
of the two exponents. Then, shift right the significand
which corresponds to the smaller exponent by |EA-
EB| places. Add or subtract the two significands SA
and SB, according to the effective operation, and make
the result positive if it is negative. Normalise SR,
adjusting ER as appropriate, and round SR, which may
require ER to be readjusted. Clearly, this procedure is
quite generic and various modifications exist. Because
Fig 1: Basic block diagram of floating point unit addition is most frequent in scientific computations, our
II. EXISTING METHOD circuit aims at a low implementation cost combined with
a low latency.The circuit is not pipelined, so that key
In, existing method single precision ALU unit is used.
components may be reused, with a fixed latency of three
A 32 bit word is required for the IEEE single precision
clock cycles. Its overall organisation is shown in Figure.
floating point standard representation requires whose
In the first cycle, the operands A and B are unpacked
bits may be represented as numbered from 0 to 31, left
and checks for zero, infinity or NaN are performed.
to right.
For now we can assume that neither operand is infinity
31 30 22 0 or NaN. Based on the sign bits sA and sB and the
Sign Exponent Mantissa original operation, the effective operation when both
operands are made positive is determined, e.g. (-|A|)-
(-|B|) becomes -(|A|-|B|), which results in the same
effective operation but with a sign inversion of the result.
III.HIERARCHY OF PROPOSED METHOD: From this point, it can be assumed that both A and B
are positive. The absolute difference |EA-EB| is
In, Proposed method Double precision ALU unit is
calculated using two cascaded adders and a multiplexer.
implemented. A 64 bit word is required for the IEEE
Both adders are fast ripple-carry adders, using the
double precision floating point standard representation
dedicated carry logic of the device (here, "fast ripple-
176 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

carry" will always refer to such adders). Implicit in this normalised. More specifically, setting aside SR=0, there
is also the identification of the larger of the two are three cases: (a) SR is normalised (b) SR is
exponents, and this provisionally becomes the exponent subnormal and requires a left shift by one or more places
ER of the result. The relation between the two operands and (c) SR is supernormal and requires a right shift by
A and B is determined based on the relation between just one place. For the first two cases, a leading-1
EA and EB and by comparing the significands SA and detection component examines SR and calculates the
SB, which is required if EA=EB. This significand appropriate normalisation shift size, equal to the number
comparison deviates from the generic algorithm given of 0 bits that are above the leading-1. Figure 2 shows a
earlier but has certain advantages, as will be seen. The straightforward design for a leading-1 detector. The 56-
significand comparator was implemented using seven bit leading-1 detector is comprised of seven 8-bit
8- bit comparators that operate in parallel and an components and some simple connecting logic.
additional 8-bit comparator which processes their For the final normalisation case, i.e. a supernormal
outputs. All the comparators employ the fast carry logic SR in the range [2,4), the output of the leading-1
of the device. If B>A then the significands SA and SB detector is overridden. This case is easily detected by
are swapped Both significands are then extended to monitoring the carry-out of the significand adder. Finally,
56 bits, i.e. by the G, R and S bits as discussed earlier, if SR=0
and are stored in registers. Swapping SA and SB is
A B
equivalent to swapping A and B and making an Operation
Unpack
adjustment to the sign sR. This swapping requires only sA
sB EA EB SA SB
multiplexers. In the second cycle, the significand
EB>EA
alignment shift is performed and the effective operation Effective
Operation
ExponentSwap
Difference
EB=EA Logic
is carried out. The advantage of swapping the ER |EA–EB|
B=A B>A
significands is that it is always SB which will undergo
Sign Logic Swap
the alignment shift. Hence, only the SB path needs a
sR
shifter. A modified 6-stage barrel shifter wired for Align

alignment shifts performs the alignment. Each stage in


the barrel shifter can clear the bits which rotate back Significand
Add/Subtract
from the MSB to achieve the alignment. Also, each stage
calculates the OR of the bits that are shifted out and Leading 1
Detection SR
cleared. This allows the sticky bit S to be calculated as
the OR of these six "partial" sticky bits along with the Exponent
Normalise

Adjust
value that is in the sticky bit position of the output pattern. ER
Rounding
The barrel shifter is organised so that the 32-bit stage Control SR

is followed by the 16-bit stage and so on, so that the


Round
large ORs do not become a significant factor with with Exponent
Adjust
respect to the speed of the shifter. The shifteroutput is ER
SR
the 56-bit significand SB, aligned and with the correct
Pack
values in the G, R and S positions. A fast ripple-carry
Fig3:Architecture of Double Precision Adder/Subtractor
adder then calculates either SA+SB or SA-SB
according to the effective operation. The advantage of Then normalisation is, obviously, inapplicable. In this
the significand comparison earlier is that the result of case, the leading-1 detector produces a zero shift size
this operation will never be negative, since SA ≥SB after and SR is treated as a normalised significand. The
alignment. The result of this operation is the provisional normalisation of SR takes place in the third and final
significand SR of the result and is routed back to the cycle of the operation. SR is normalised by the alignment
SB path. It is clear that SR will not necessarily be barrel shifter, which is wired for right shifts. If SR is
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 177
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

normalised, then it passes straight through the shifter Calculate the exponent of the result as ER=EA+EB-
unmodified Ebias. Multiply SA and SB to obtain the significand SR
If SR is subnormal, it is shifted right and rotated by of the result. Normalise SR, adjusting ER as
the appropriate number of places so that the appropriate, and round SR, which may require ER to
normalisation left shift can be achieved. If SR is be readjusted. After addition and subtraction,
supernormal, it is right shifted by one place, feeding a 1 multiplication is the most frequent operation in scientific
at the MSB, and the sticky bit S is recalculated. The computing. Thus, our double precision floating-point
output of the shifter is the normalised 56-bit SR with multiplier aims at a low implementation cost while
the correct values in the G, R and S positions. Then, maintaining a low latency, relative to the scale of the
rounding is performed as discussed earlier. The rounding significand multiplication involved. The circuit is not
addition is performed by the significand adder, with SR pipelined and with a latency of ten cycles. Unlike the
on the SB path The normalised and rounded SR is given floating-point adder which operates on a single clock,
by the top 53 bits of the result, i.e. MSB down to the L this circuit operates on two clocks; a primary clock
bit, of which MSB will become hidden during packing. (CLK1), to which the ten cycle latency corresponds,
A complication that could arise is the rounding addition and an internal secondary clock (CLK2), which is twice
producing the significand SR=10.000…000. However, as fast as the primary clock and is used by the
no actual normalisation takes place because the bits significand multiplier. Figure 3 shows the overall
MSB-1 down to L already represent the correct fraction organisation of this circuit.The first CLK1 cycle, the
fR for packing. Each time SR requires normalisation, operands A and B are unpacked and checks are
the exponent ER needs to be adjusted. This relies on performed for zero, infinity or NaN operands. For now
the same hardware used for the processing of EA and we can assume that neither operand is zero, infinity or
EB in the first cycle. One adder performs the adjustment NaN. The sign sR of the result is easily determined as
arising from the normalisation of SR. If SR is normalised, the XOR of the signs sA and sB. From this point, A
ER passes through unmodified. and B can be considered positive. As the first step in
the calculation of ER, the sum EA+EB is calculated
If SR is subnormal, ER is reduced by the left shift using a fast ripple- carry adder.
amount required for the SR normalisation. If SR is
supernormal, ER is incremented by 1. The second In the second CLK1 cycle, the excess bias is
cascaded adder increments this result by 1. The two removed from EA+EB using the same adder that was
results are multiplexed. If the rounded SR is used for the exponent processing of the previous cycle.
supernormal then the result of the second adder is the This completes the calculation of ER. The significand
correct ER. Otherwise, the result of the first adder is multiplication also begins in the second CLK1 cycle.
the correct ER. The calculation of the sign SR is Since both SA and SB are 53-bit normalised numbers,
performed in the first cycle and is trivial, requiring only SR will initially be 106 bits long and in the range [1,4).
a few logic gates. Checks are also performed on the The significand multiplier is based on the Modified
final ER to detect an overflow or underflow, whereby Booth's 2-bit parallel multiplier recoding method and
R is forced to the appropriate patterns before packing. has been implemented using a serial carry-save adder
Another check that is performed is for an effective array and a fast ripple-carry adder for the assimilation
subtraction with A=B, whereby R is set to a positive of the final carry bits into the final sum bits.
zero, according the IEEE standard. Finally, infinity or
NaN operands result in an infinity or NaN value for R
according to a set of rules.
b. Multiplication
The most significant steps in the calculation of the
product R of two numbers A and B are as follows.
178 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

y54y55y56y57+. If y1=1, SR and requires a 1-bit right


shift for normalisation, and the final 56-bit SR for
rounding is given by y1.y2y3y4… y53y54y55y56+,
where y56+ is the OR of y56 and y57+. The
normalisation of a supernormal SR is achieved using
multiplexers switched by y1. If SR is supernormal, ER
is adjusted, i.e. incremented by 1, using the same adder
that was previously used for the exponent processing.
This adjustment does take place after it is determined
that SR is supernormal but performed at the beginning
of this cycle and then the adjusted ER either replaces
the old ER or is discarded.. The rounding decision is
also made in the ninth CLK1 cycle and without waiting
for the final carry assimilation to finish.
Fig 4: Architecture of Double Precision Multiplier That is, a rounding decision is reached for both a
With respect to the carry-save array, this contains normal and a supernormal SR. Then, the correct
two cascaded carry-save adders, which retire four sum decision is chosen once y1 has been calculated. In the
and two carry bits in each CLK2 cycle. For the 53-bit tenth and final CLK1 cycle, the rounding of SR is
SA and SB, 14 CLK2 cycles are required to produce performed using the same fast ripple-carry adder that
all the sum and carry bits, i.e. until the end of the eighth is used by the significand multiplier. The result of this
CLK1 cycle. Alongside the carry-save array, a 4-bit addition is the final normalised and rounded 53-bit
fast ripple-carry adder performs a "partial assimilation", significand SR. As for the adder of the previous section,
i.e. processes the four sum and two carry bits produced the complication that might arise is a supernormal SR
in the previous carry-save addition cycle, taking a carry- after rounding. As before, no actual normalisation is
in from the previous partial assimilation. Taking into needed because it would not change the fraction fR for
account the logic levels associated with the generation packing The exponent ER, however, is adjusted, i.e.
of the partial products required by Booth's method and incremented by 1, using the same exponent processing
the carry-save additions, the latency of this component adder. This adjustment is performed at the beginning of
is so small that it has no effect on the clocking of the this cycle and then the correct ER is chosen between
carry-save array, while it greatly accelerates the speed the previous ER or the adjusted ER based on the final
of the subsequent carry-propagate addition. The results SR. Checks are also performed on the final ER to detect
of these partial assimilations need not be stored; all that an overflow or underflow, whereby R is forced to the
needs to be stored is their OR, since they would correct bit patterns before packing. Finally, zero, infinity
eventually have been ORed into the sticky bit S. In the or a NaN operands result to a zero, infinity or NaN
ninth CLK1 cycle, the final sum and carry bits produced value for R according to a simple set of rules.
by the carry-save array are added together, taking a c. Division
carry-in form the last partial assimilation. Since SR is in
In general, division is a much less frequent than the
the range [1,4), it can be written as y1y2. y3y4y5…
previous operations. The most significant steps in the
y104y105y106. Bits y1 to y56 are produced by this
calculation of the quotient R of two numbers A (the
final carry assimilation. Bits y57 to y106 don't exist as
dividend) and B (the divisor) are as follows. Calculate
such; all we have is their OR, which we can write as
the exponent of the result as ER=EA-EB+Ebias. Divide
y57+, calculated during the partial assimilations of the
SA by SB to obtain the significand SR. Normalise SR,
previous cycles. Now, if y1=0, then SR is normalised
adjusting ER as appropriate, and round SR, which may
and the 56-bit SR for rounding is given by y2.y3y4y5…
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 179
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

require ER to be readjusted. Our double precision place. The divisor SB is subtracted from the remainder
floating-point divider Exponent Subtract EA EB Add for the calculation of MSB-1 and so on. The significand
Bias Significand Divide SA SB Sign Logic sA sB EA- divider calculates one SR bit per cycle and its main
EB ER SR Normalise Exponent Adjust ER SR components are two registers for the remainder and
Exponent Adjust SR Rounding Control Round ER s A, the divisor, a fast ripple-carry adder, and a shift register
B = 0 , R ∞ , NaN Unpack Pack A B R Figure 4. for SR. The divider operates for 55 cycles, i.e. during
Floating- pointdivider aims solely at a low the cycles 2 to 56, and produces a 55-bit SR, the two
implementation cost. A non-pipelined design is adopted, least significant bits being the G and R bits. In cycle 57,
incorporating an economic significand divider, with a the sticky bit S is calculated as the OR of all the bits of
fixed latency of 60 clock cycles. Figure 4 shows the the final remainder. Since both SA and SB are
overall organisation of this circuit. In the first cycle, the normalised, SR will be in the range (0.5,2), i.e. if not
operands A and B are unpacked For now, we can already normalised, it will require a left shift by just one
assume that neither operand is zero, infinity or NaN. place. This normalisation is also performed in cycle 57.
The sign sR of the result is the XOR of sA and sB,. As No additional hardware is required, since SR is already
the first step in the calculation of ER, the difference stored in a shift register. If SR requires normalisation,
EA-EB is calculated using a fast ripple-carry adder. In the exponent ER is incremented by 1 in cycle 5. This
the second cycle, the bias is added to EA-EB, using exponent adjustment is performed using the same adder
the same exponent processing adder of the previous that is used for the exponent processing of the previous
cycle. This completes the calculation of ER. The cycles. Also in cycle 58, SR is transferred to the divisor
significand division also begins in the second cycle. The register, which is connected to the adder of the
division algorithm employed here is the simple non- significand divider. In cycle 59, the 56-bit SR is rounded
performing sequential algorithm and the division to 53 bits using the significand divider adder. For a
proceeds as follows. First, the remainder of the division supernormal SR after rounding no normalisation is
is set to the value of the dividend SA. The divisor SB is actually required but the exponent ER is incremented
subtracted from the remainder. by 1 and this takes place in cycle 60 and using the
same adder that is used for the exponent processing of
the previous cycles. Checks are also performed on ER
for an overflow or underflow, whereby the result R is
appropriately set before packing. As for zero, infinity
and NaN operands, R will also be zero, infinity or NaN
according to a simple set of rules.
IV. SIMULATION RESULTS

Fig 5: Architecture of Double Precision Divider


Fig 6: Simulation Results for Addition
If the result is positive or zero, the MSB of the
quotient SR is 1 and this result replaces the remainder.
Otherwise, the MSB of SR is 0 and the remainder is
not replaced.The remainder is then shifted left by one
180 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

precision format in which a given precision can be


chosen for a single operation by selecting a specific
number of bits for significand and exponent in the
floating-point representation.
V. REFERENCES
1. Paschalakis, S., Lee, P., "Double Precision Floating-Point
Arithmetic on FPGAs", In Proc. 2003 2nd IEEE International
Conference on Field Programmable Technology (FPT '03), Tokyo,
Fig 7: Simulation Results for Subtraction Japan, Dec. 15-17, pp. 352-358.
2. Prof. Yadagiri Karri ,Prof. Rajesh Misra, "Volume Implementation
of 32 Bit Floating Point MAC Unit to Feed Weighted Inputs to
Neural Networks Volume II, Issue IV, April 2015 IJRSI ,ISSN
2321 - 2705.
3. A. Dhananjaya, Dr.Deepali Koppad " Design Of High Speed
Floating Point Mac Using Vedic Multiplier And Parallel Prefix
Adder" International Journal of Engineering Research &
Technology (IJERT)ISSN: 2278-0181 Vol. 2 Issue 6, June - 2013..
4. Shirazi, N., Walters, A., Athanas, P., "Quantitative Analysis of
Fig 8: Simulation Results for Multiplication Floating Point Arithmetic on FPGA Based Custom Computing
Machines", In Proc. IEEE Symposium on FPGAs for Custom
Computing Machines, 1995, pp. 155- 162.
5. Loucas, L., Cook, T.A., Johnson, W.H., "Implementation of IEEE
Single Precision Floating Point Addition and Multiplication on
FPGAs", In Proc. IEEE Symposium on FPGAs for Custom
Computing Machines, 1996,pp. 107- 116.

Fig 9: Simulation Results for Division

V. CONCLUSION AND FUTURE WORK


1. CONCLUSION
The implementation of double precision floating point
adder/subtractor and multiplier. The whole design was
captured in Hardware description language (HDL),
tested in simulation using Isim, from Xilinx. The
proposed VLSI design of the Double Precision adder/
subtractor increases the precision over the Single
Precision arithmetic unit and also throughput and delay
in producing the output.
2. FUTURE WORK
If Tunable Floating-Point (TFP) precision is
implemented in Double Precision Arithmetic Floating
Unit we may get even better Accuracy. TFP is a variable
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 181
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

High Speed with Reduced Delay Han-Carlson Adder


(HC3A)
Ms.V.Bharathi1, Ms.S.Mahalakshmi2
1
Assistant Professor, VEMU Institute of Technology
2
B.Tech, VEMU Institute of Technology
Email- honey.bharathi76@gmail1, mahalakshmi2000@gmail.com2

Abstract - Three-operand binary adder is the II. RELATED WORK/LITERATURE


basic functional unit to perform the modular SURVEY
arithmetic in various cryptography and
pseudorandom bit generator (PRBG) algorithms. A.M. M. Islam, M. S. Hossain, M. K. Hasan, M.
A high speed area efficient adder technique is Shahjalal, and Y. M. Jang, "FPGA implementation of
proposed to perform the three operand binary high-speed area-efficient processor for elliptic curve
addition that is Han-Carlson adder. The Han- point multiplication over prime field," IEEE Access, vol.
Carlson (HCA) adder for three-operand addition 7, pp. 178811-178826, 2019.
it significantly reduces the critical path delay. It
consumes substantially less area, low power and Developing a High-Speed Elliptic Curve
drastically reduces the adder delay. The proposed Cryptographic (ECC) processor that performs fast point
architecture is implemented on the FPGA device multiplication with low hardware utilization is a crucial
for functional validation and also synthesized with demand in the fields of cryptography and network
the commercially available 32nm CMOS security.
technology library. The proposed adder achieves
This paper presents Field-programmable Gate Array
the lowest ADP and PDP than the existing three-
operand adder techniques. (FPGA) implementation of a high-speed, low-area,
Side-channel Attacks (SCAs) resistant ECC processor
Index Terms - pseudorandom bit generator over a prime field. The implemented design is time-
(PRBG), The Han-Carlson (HCA)
area-efficient as it offers fast scalar multiplication with
I. INTRODUCTION low hardware utilization without compromising the
To achieve optimal system performance while security level.
maintaining physical security, it is necessary to implement B.Z. Liu, J.GroBschadl, Z.Hu, K.Jarvinen, H.Wang,
the cryptography algorithms on hardware. Modular and I. Verbauwhede, "Elliptic curve cryptography with
arithmetic such as modular exponentiation, modular efficiently computable endomorphism's and its
multiplication and modular addition is frequently used hardware implementations for the Internet of Things,"
for the arithmetic operations in various cryptography IEEE Trans. Compute., vol. 66, no. 5, pp. 773-785,
algorithms. The three-operand binary addition can be May 2017.
carried out either by using two two-operand adders or
III. EXISTING METHOD
one three-operand adder. Carry-save adder (CS3A)
is the widely adopted technique to perform the three- The three-operand binary addition can be carried
operand binary addition. In order to shorten the critical out either using two two-operand adders or one three-
path delay, Han-Carlson (HCA) adder can also be used operand adder. Carry-Save Adder (CS3A) is the
for three-operand binary addition, It reduces the critical widely adopted technique to perform the three-operand
path delay. binary addition in the modular arithmetic used in
cryptography algorithms.

182 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

However, the longer carry propagation delay in the The Han-Carlson adder provides a reasonably good
ripple-carry stage of CS3A seriously influences the speed at low gate complexity as compared to other
performance cryptography architectures. existing techniques. It has the lowest area delay product
It computes the addition of three operands in two (ADP) and power-delay product (PDP) among all.
stages. The first stage is the array of full adders. Each Thus, the three-operand addition can be performed
full adder computes "carry" bit and "sum" bit using Han-Carlson adder (HCA).The proposed VLSI
concurrently from three binary input ai, bi and ci. The architecture of the three-operand binary adder and its
second stage is the ripple-carry adder that computes internal structure is shown in Fig. 2. The new adder
the final n-bit size "sum" and one-bit size "carry-out" technique performs the addition of three n-bit binary
signals at the output of three-operand addition. The inputs in four different stages. They are. Bit addition
"carry-out" signal is propagated through the n number logic, Base logic, PG (propagate and generate) logic.
of full adders in the ripple-carry stage. Therefore, the Sum logic.
delay increases linearly with the increase of bit length.
The architecture of the three-operand carry-save adder
is shown in Fig. 3 and the critical path delay is highlighted
with a dashed line. It shows that the critical path delay
depends on the carry propagation delay of ripple carry
stage.
In this work, we study the computation of this
operation on a twisted Edwards curve with an efficiently
computable endomorphism, which allows reducing the
number of point doublings by approximately 50 percent
compared to a conventional implementation.

Figure 1. Three-operand carry save adder (CS3A). Figure 2. Proposed three-operand adder; (a) First order VLSI
architecture, (b) Logical diagram of bit addition, base logic,
DISADVANTAGE OF EXISTING METHOD sum logic, black-cell and grey-cell.

1. More area and critical path delay In the first stage (bit-addition logic), the bitwise
addition of three n-bit binary input operands. Array of
2. Delay increases linearly full adders, and each full adder computes "sum" and
3. Less performance. "carry" signals. The logical diagram of bit addition logic
IV. PROPOSED METHOD is shown in Fig. 2(b).The first stage output signal "sum"
bit of current full adder and the output signal "carry" bit
In order to shorten the critical path delay, The Han- of its right-adjacent full adder are used together to
Carlson (HCA) Adder can be used for three-operand compute the generate and propagate signals in the
binary addition. second stage (base logic).
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 183
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The computation of generate and propagate signals B. BASE LOGIC


are represented by the "squared saltier-cell". The
external carry-input signal (Cin) is also taken into
consideration for three-
Operand addition in the proposed adder technique.
The logical diagram of black and grey cell is shown in
Fig. 2(b). This additional carry-input signal (Cin) is taken
as input to base logic while computing the first saltire-
cell of the base logic. The third stage is the carry
computation stage called "generate and propagate logic"
(PG) to pre-compute the carry bit and is the
combination of black and grey cell logics. The logical
diagram of black and grey cell is shown in Fig. 2(b).
The final stage is represented as sum logic in which the
"sum bits are computed from the carry generate and
propagate bits. The carryout signal (Cout) is directly
obtained from the carry generate bit. FIGURE 5. SCHEMATIC DIAGRAM OF BASE LOGIC
VI. RESULT
A. CARRY SAVE ADDER

FIGURE 6.SIMULATION DIAGRAM OF BASE LOGIC

C. BIT LOGIC ADDITION

FIGURE 3: SCHEMATIC DIAGRAM OF CSA

FIGURE 7. BIT LOGIC ADDITION

FIGURE 4.SIMULATION DIAGRAM OF CSA

184 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

FIGURE 8. SIMULATION OF BIT ADDITION LOGIC

D. PG LOGIC

FIGURE 11 SIMULATION DIAGRAM OF PG LOGIC

6.5 PROPOSED THREE OPERAND BINARY

FIGURE 9. SCHEMATIC DIAGRAM THREE OPERAND

FIGURE 12 SIMULATION DIAGRAM OF PROPOSED


TECHNIQUE

ADVANTAGE OF PROPOSED METHOD


FIGURE 10. SCHEMATIC DIAGRAM OF PG LOGIC • Lesser area
• Lower power dissipation
• Smaller delay
• More performance.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 185
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES
[1] M. M. Islam, M. S. Hossain, M. K. Hasan, M. Shahjalal, and Y.
M. Jang, "FPGA implementation of high-speed area-efficient
processor for elliptic curve point multiplication over prime field,"
IEEE Access, vol. 7, pp. 178811-178826, 2019.
[2] Z. Liu, J. GroBschadl, Z. Hu, K. Jarvinen, H. Wang, and I.
Verbauwhede, "Elliptic curve cryptography with efficiently
computable endomorphisms and its hardware implementations
for the Internet of Things," IEEE Trans. Compute., vol. 66, no.
5, pp. 773-785, May 2017.
[3] Z. Liu, D. Liu, and X. Zou, "An efficient and flexible hardware
implementation of the dual-field elliptic curve cryptographic
processor," IEEE Trans. Ind. Electron., vol. 64, no. 3, pp. 2353-
2362, Mar. 2017.
[4] B. Parhami, Computer Arithmetic: Algorithms and Hardware
FIGURE 13 SCHEMATIC DIAGRAM OF PROPOSED Design. New York, NY, USA: Oxford Univ. Press, 2000.
TECHNIQUE
[5] P. L. Montgomery, "Modular multiplication without trial
VII. PARAMETER ANALYSIS division," Math. Comput, vol. 44, no. 170, pp. 519-521, Apr.
1985.
TABLE 1: PARAMETER ANALYSIS
[6] S.-R. Kaung, K.-Y. Wu, and R.-Y. Lu, "Low-cost high-performance
TECHNIQUE AREA DELAY VLSI architecture for Montgomery modular
EXISTING(CSA) 2600 5.4 ns
PROPOSED(USING HAN 2426 3 ns
CARLSON ADDER)
VIII. CONCLUSION
In this project, a high-speed area-efficient adder
technique and its VLSI architecture is proposed to
perform the three-operand binary addition for efficient
computation of modular arithmetic used in cryptography
and PRBG applications. The proposed three-operand
adder technique is a parallel prefix adder that uses four-
stage structures to compute the addition of three input
operands.
IX. FUTURE WORK
In the future work, to improve the performance by
reducing the delay of present work, we have to
investigate for the selective type of adder like
Speculative Han-Carlson adder. Prepositional phrases.

186 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Early-Stage Prediction of Lung Cancer Using Logistic


Regression
C. Manikanta
Department of Electronics and Communication Engineering, VEMU Institute of Technology, P. Kothakota, Chittoor
Email: cmanikanta@vemu.org

Abstract- Researchers have widely used Fuzzy deep learning [3],and SVM [5]. Wender et al.
statistical and machine learning techniques to [3] reported that lung cancer as a serious killer disease
construct prediction models inseveral domains in the world mainly in America and East Asia.
such as prediction of software faults, spamdetection, Moreover, the authors presented that lung cancer
disease diagnosis, and financial fraud identification.
patients are 25% higher than patients of other cancer
The prediction of patients prone to lung cancer can
help doctors in their decision making regarding types such as breast cancer and blood cancer. The
their treatments. In this regard, this research paper tumor movements are divided into two parts intra-
attempts to evaluate the discriminative power of fractional variation and inter-fractional variation. Intra-
several predictors in the study to increase the fractional works in single treatmentsessions and inter-
efficiency of lung cancer detection through fractional arises between different sessions.
theirsymptoms. A number of classifiers including Consequently, we evaluate the discriminative power of
Support Vector Machine (SVM), C4.5 Decision certain predictors used to improve the accuracy of the
tree, Multi-Layer Perceptron,Neural Network, and prediction model. The layout of an ensemble-based
Naïve Bayes (NB) are evaluated on a bench mark approach is shown inFigure 1.
dataset obtained from UCI repository. The
performance is also compared with well-known The dataset was retrieved from the UCI repository.
ensembles such as Random Forest and Majority Firstly, the effectiveness of Naïve Bayes(NB), Random
Voting. Based on performance evaluations, it is Forrest(RF), Support Vector Machine (SVM), and
observed that Gradient-boostedTree outperformed MLP is assessed in terms of accuracy and f-measure.
all other individual as well as ensemble classifiers Secondly, a majority voting based ensemble of top-3
and achieved 90% accuracy. best performing classifiers is constructed to predict lung
Keywords: Machine Learning, Prediction, cancer.
Performance, Ensembles
Research Contributions:
1. INTRODUCTION
The major contributions of this research areas follows
In 2012, a survey was conducted, which reports
• Identification of well-known classifiers and ensemble
[1] 1.6 milliondeaths and 1.8 million new cases of lung approaches utilized for lung cancer prediction
cancer patients. Lungcancer is common in both gender
of US and reported as moredangerous as compared • Computation of results over benchmark dataset
to other types of cancer. Only 15% of cases are obtained from UCI repository
detected at the early stage. The most common symptom, • Proposed a majority voting based ensemble based on
i.e. smoking, is reported for lung cancer patients but top-3 best performing individual classifiers
not all patients involve this symptom. However, several • Comparison and evaluation of results which show that
symptoms of lung cancer patients such as their smoking Gradient-boosted Tree outperformed all another
ratecan help to detect the lung cancer patient at the individual as well as ensemble classifiers
early stage.Though,the research community has used
certain machine learning techniques such as GEP [2], • Achieved 90% accuracy for lung cancer identification

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 187
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The remaining part of the study is structured in four authors proposed a model for the diagnosis of lung
sections. In the second section, we present related cancer from microarray data. In GEP model,SVM and
work. The third section presents the experimental Neural network models were used to predict lung
procedure whereas the results are discussed in the fourth cancer and effective results were produced.
section. Finally, in the fifth section, we present Wender et al. [6] used fuzzy deep learning to predict
conclusions of our work. tumor movements which helped to increase the delivery,
reduce and accurate application of the radiation and
less damage to the healthy tissues during the
radiography[7-8]. Karakachetal.
[9] suggest micro array analysis as a tool to diagnose
diseases. This tool becomes functional by implementing
SVM. Due to variations in lung cancer symptoms, its
treatment becomes difficult for patients. Data mining or
machine learning tool can be more effective to use when
these symptoms are utilized as features andpredict lung
cancer patients in the early stage[10].
It is evident from the state of the art literature review
that lung cancer has achieved much attention from the
researcher community. A number of approaches have
been proposed which need to evaluated and compared
Figure1:Overview of Ensemble-based Approach for lung cancer prediction [11-14]. This research is
2. RELATED WORK focused on assessing such approaches in order to
conclude the best methodology for lung cancer
Like other domains, researchers have successfully detection.
implemented the machine and statistical learning
techniques to construct prediction models in the context 3. PROPOSED METHODOLOGY
of certain diseases such as lungs cancer. The proposed methodology starts with data
For diagnosing lung cancer, authors [2] performed acquisition whichis followed by pre-processing. The
some testson DNA and proteins to identify a tumor in selected classifiers are thentrained and tested on the
earlier stages. In this study, the author reports the best benchmark dataset using standard 10-fold cross-
results of GEP as compared to other classifiers. Li et validation approach. The results are computed
al. [4] reported that lung cancer may affect one or both andevaluated to identify the best methodology for lung
lungs. Moreover, the authors listthe symptoms of lung cancerdetection. An overview of the proposed
cancer as chest pain, chronic cough, difficulty breathing approach is given in Figure 2.
and sudden weight loss. These symptomscan be 3.1 DataAcquisition
diagnosed in an early stage. If treatment can be started
In this paper, we used a dataset namely Lung
in a nearly stage, it can help patients recover. Like other
Cancer which isretrieved from the UCI online
studies, Kourou et al. [5] also investigated that lung
repository. The dataset has 32instances and 57
cancer is an important reason for cancer-related deaths
attributes, 1 class attribute, and 56 predictive attributes.
around the world. If it is identified in the early stage
then patients can be treated effectively. Subsequently,
authors reported that Micro array technology is the best
way to diagnose the lung cancer. In this regard, the

188 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

3.3 MajorityVotingbasedEnsemblemethod
We constructour approach via theuseof awidely use
ensemble technique namely majority voting. The voting
ensemble technique is a common example of the multi-
expert approach, which helps to combine the classifiers
in a parallel fashion. Subsequently, each classifier trained
on all data and contributes to a decision. Finally, the
voting technique helps to generate the final solution[13,
14].
4. RESULTS, EVALUATION, AND
DISCUSSION
Figure2:Overviewofthe Proposed Approach
Firstly, we compare the performance of base-level
The main objective of our proposed study is to classifiers to each other. The outcomes are shown in
investigate and measure the effectiveness of different Table1.
base level predictors and well-known ensemble
methods such as Random Forest and Majority Voting. 4.1 Performance and Validation measures
In this study, Rapid Miner tool was utilized to perform In this paper, we perform 10-fold cross-validation
experiments with base level classifiers namely Naïve and used performance measures such as Precision,
Bayes (NB), Support Vector Machine(SVM), Neural Recall, F-measure, and Accuracy to determine the
Networks, Multi-Layer Perceptron, Decision Tree and effectiveness of the proposed approach.
Gradient-boosted DecisionTree. Random Forest and
4.2 Workflow
Majority Voting based ensembles are also evaluated
using the same tool. We performed several experiments. However, work
flow of experiments is generalized and can be shown
3.2 BaselevelClassifier/Predictors
through the following steps
The selection of these base-level classifiers depends
Step-1: Extraction of datasets through an online
on certain aspects, such as they're widely used in the
repository.
context of disease prediction. The short description of
base level classifiers namely Naïve Bayes (NB), C4.5 Step-2:Application of pre-processing for data
Decision Tree, and Support Vector Machine (SVM) cleaning.
[11,12] is as follows. Step-3: Standard 10-fold cross validation is applied
• Naïve Bayes (NB): NB classifier is based on the for training and testing.
Naïve Bayes theorem and works according to the Step-4: Computation of results for all individual
probability of events. The core assumption of NB is classifiers.
that all attributes are independent.
Step-5: Select top-3 classifiers based on the
• Support Vector Machine (SVM): SVM is a
performance measure such as accuracy and compose
classifier which constructs a decision area beside a
margin via the nearest data points. majority voting based ensemble.

• C4.5 Decision Tree: It produces a set of rules. Step-6: Compute results for Random Forest and
Classification decisions can be functional via these Majority Voting based ensemble.
rules. This classifier utilizes the concept of information Step-7: Performance comparison is conducted for
entropy. all individual as well as ensemble classifiers in order to
identify the best classifier for lung cancer detection.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 189
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table1:Results and Performance Evaluation REFERENCES


Predictors Acc. Prec. Rec. F-M. [1] Cabrera, J., Dionisio, A., & Solano, G. (2015, July). Lungcancer
% % % % classification tool using microarray data and supportvector
KNN 66.6 75 50 75 machines. In Information, Intelligence, Systems,
Logistic Regression 98.08 98.17 96.5 100 andApplications(IISA), 2015

The results indicate that SVM and C4.5 Decision [2] Yu,Z.,Chen,X.Z.,Cui,L.H.,Si,H.Z.,Lu,H.J.,&Liu,S. H.(2014).
Prediction of lung cancer based on serum bio markers by gene
Tree is out performed with a minor difference interms expression programming methods. Asian Pacific Journal of Cancer
of F-measure. Similarly, interms of accuracy, SVM out Prevention, 15(21), 9367-9373.
performed the rest of predictors. [3] Wender, R., Sharpe, K. B., Westmaas, J. L., & Patel, A. V.(2016).
The American Cancer Society's approach to addressing the cancer
Subsequently, to achieve our research aim and burden in the LGBT community, 3(1),15-18.
investigate the performance of ensemble methods in the
[4] Li,Y.,Qiu,C.,Tu,J.,Geng,B.,Yang,J.,Jiang,T.,&Cui, Q.(2013).
context of lungs cancer prediction, the results are HMDDv2.0:a database for experimentally supported human
computed for Random Forest and Majority Voting micro RNA and disease associations. Nucleic acids research,
based ensemble. The results indicate that the majority 42(D1), D1070-D1074.

voting based ensemble out performed all other [5] Kourou,K.,Exarchos,T.P.,Exarchos,K.P.,Karamouzis, M.V.,&
Fotiadis,D.I.(2015). Machine learning applications in cancer
classifiers except Gradient Boosted Tree which prognosis and prediction. Computational and structural
performed best overall to achieve 90% accuracy. biotechnology journal,13,8-17.

In this research, we also found some threats. The [6] Wender, R., Sharpe, K. B., Westmaas, J. L., & Patel, A. V.(2016).
The American Cancer Society's approach to addressing the cancer
first threatis related to a generalization of results since burden in the LGBT community. LGBT health, 3(1),15-18.
we performed our experiments on a single dataset.
[7] Hussain.S, Keung.J, Khan.A.A., Performance evaluation of
Consequently, the result may vary if we consider several ensemble methods for software fault prediction, An experiment,
experiments with different datasets. The secondly Proceeding of ASWEC,2015.
related threat to the selection of one ensemble [8] Hussain.S, Asghar. Z, Ahmad. B, Ahmad. S., A step towards
technique. We report the results according to the software corrective maintenance using RCM model, International
Journal of Computer Science and Information Security, 4(1),2009.
functionality of the majority voting method.
[9] Karakach,T.K., Flight, R.M., Douglas,S.E., &Wentzell, P. D.
5. CONCLUSIONSANDFUTUREWORK (2010). An introduction to DNA microarrays for gene expression
analysis. Chemo metrics and Intelligent Laboratory
The focus of this research is an evaluation of machine Systems,104(1),28-52.
learning classifiers as well as ensembles for lung cancer [10]Marusyk,A.,Almendro,V., &Polyak,K.(2012).Intra-tumour
detection. For this purpose, individual classifiers heterogeneity: a looking glass for cancer?. Nature Reviews-Cancer,
including MLP, Neural Network, Decision Tree, Naïve 12(5),323.
Bayes, Gradient Boosted Tree, and SVM are assessed. [11]Hussain. S, Saqib. S. M., Ahmad. B, Ahmad. S., Mapping of
Random forest and majority voting based ensembles SOA and RUP : DOA as case study, Journal of Computing,
2(1),2010.
are also analyzed for lung cancer prediction. It i
[12]Hussain. S, Threshold analysis of design metrics to detect design
sobserved that Gradient Boosted Tree out performed flaws, Proceeding ofACMSAC, 2016.
all other individual and ensemble classifiers. In the future,
[13]Zeng,X., Zhang,X., & Zou,Q.(2015). Integrative approaches for
we plan to evaluateother lung cancer and different predicting micro RNA function and prioritizing disease-related
disease datasets. Similarly, other ensemble technique micro RNA using biological interaction networks. Briefings in
like Stacking, A daboost, and Bagging will be analyzed. bio informatics, 17(2), 193-203.
[14]Yu, H. L., Gao, S., Qin, B., & Zhao, J. (2012). Multi class micro
array data classification based on confidence evaluation. Genetics
and molecular research: GMR, 11(2),1357-1369.

190 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Detection of Kidney Artifacts in Ultrasound Images


Using Support Vector Machine Classifier
P. Vemaiah1, Kolla Malleswari2
1,2
Department of ECE, VEMU Institute of Technology, Chittoor
Email: pvemumtech@gmail.com1, malliswarikolla@gmail.com2

Abstract- Ultrasound imaging is one of the Machine (SVM) algorithm of machine learning with a
available imaging techniques used for diagnosis of kernel function.
kidney abnormalities like change in shape and
position, swelling of limb and formation of stones. Limitations of Ultrasound Images:
One of the major downsides of involving ultrasound Even though, ultrasound imaging plays an important
images in medical analysis is the prevalence of role to detect and locate the position of the kidney stone
speckle noises. This challenge is overcome by as primary diagnosis technique. Apart from that, it is
employing suitable image processing techniques
widely used because of its low cost as well as it is
using a SVM classifier. The algorithm is designed
by employing the MATLAB image processing tool. radiation free, safe and manageable diagnosis
The percentage accuracy of the proposed algorithm assistance. Moreover, it is also necessary to identify
is 94.12 percent. The accuracy of artifacts detection the exact and precise location of kidney stone during
and less complex procedure of operation makes surgical processes. So, there is need of superior image
this algorithm a prominent contender for various quality to extract related features. But entry of noise
health applications related to ultrasound imaging. into these images as well as having low contrast and
This research provides an understanding of the other artifacts generate various problems. Moreover,
detection of kidney stones in ultrasound images there are three types of noises as (a) Impulsive noise,
with the help of a SVM classifier. also called salt and paper noise, which is caused by
Keywords - Ultrasound imaging, Image error in data transmission, memory location problem
processing or error in timing for digitization, (b) Additive Noise
I. INTRODUCTION (Gaussian noise) is arising from electronic noise in the
image acquisition system, (c) Multiplicative noise
Ultrasound imaging technique has been extensively (Speckle) is unsystematic in nature and it is main issue
used in the field of medical imaging and the diagnosis of in ultrasound images. The proper balance between noise
various diseases. The main drawback of medical reduction and image quality enhancement should be
ultrasonography is its average quality of images that are made so that essential features are not affected.
prone to be affected by speckle noises. Since the
underlying structures of Kidney are usually too small to Speckle Noise:
be resolved by such large ultrasound wavelengths, the Speckle noise is an unsystematic and multiplicative
presence of such noises is highly undesirable as it in nature as well as it is a signal dependent noise which
deteriorates the image and thus makes the tasks of degrades the original image. To degrade the image, this
human interpretation and diagnosis a tougher one. This noise changes some pixels of the original image with
work divides into two portions. In the rudimentary new pixels. These new pixels contain luminance values
portion, Image pre-processing and segmentation have which are almost equal to the minimum or maximum of
been applied to reduce noise and exaggerate the image. the allowable dynamic luminance range. Speckle noise
In the second portion, we extract the involved features removes significant information from image as edge,
to classify the stones with the help of the Support Vector shape, intensity value and may lead to the identification
problem for the doctors. Moreover, speckle noise can
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 191
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

reduce the human interpretation of ultrasound images II. METHOD


and create problem for segmentation. In the Proposed method, Ultrasound (US) imaging
This research provides an understanding of used for analysis of neck, heart, liver, abdominal cavity,
automation which could be embedded with the chest prostate, and kidney due to its non-invasiveness,
ultrasound system resulting in identifying artefacts during secure and practicability in real-time. The ultrasound
ultrasound imaging itself. The algorithm is developed imaging is a non- invasive methodological technique
by employing MATLAB image processing tool and which is frequently employed for diagnosing purpose
ultrasound images are then analysed through this in the medical domain. Study and analyzing of an
algorithm which accurately detects the artefacts present evolving fetus, heart, blood vessels, muscles, tendons,
in them. Thus, this software-based application is found abdominal and pelvic organs done by employing
to be promising for lifesaver diagnosis & disease ultrasound imaging. This paper provides an
management. understanding of automation which could be embedded
Related Work: with the ultrasound system resulting in identifying
artefacts during ultrasound imaging itself. But here we
Some works focused on only some basic image are analysis the kidney artifices by using Image
processing techniques for the identification of kidney Processing Techniques based on the Machine Learning.
stones. M. P. Pawar & A. N. Mulla proposed a method The Proposed algorithm obtain the result to detect and
on Design and Analysis Performance of Kidney Cyst classification of data depend upon the requirement.
Detection from Ultrasound Images. Mainly this research
was based on normal kidney or cystic one. Gaussian
low pass filter technique and histogram equalization
method were used to sort the problem of speckle noise
and low contrast of image. Gradient Vector Flow was
used for segmentation and region of interest was
identified on pre-processed image. 22 features were
extracted and trained by feed forward ANN to identify
the class of kidney as normal or cyst one.
Another technique was proposed by J. Verma, M.
Nath, P. Tripathi, & K. K. Saini on Analysis and
identification of kidney stone using Kth nearest neighbor
(KNN) and support vector machine (SVM)
classification techniques, Pattern Recognition and Image
Analysis. In this research, Gaussian filter, Median filter
and un-sharp masking were used in enhancement of
US image. Moreover, Principal Component
Analysis method was used for feature reduction to
get more accurate features as well as morphological
operations like dilation and erosion were performed.
After this, study used entropy-based segmentation
methods and SVM and KNN classification techniques
to analysis the ultrasound image of kidney.

Figure 1: Flow chart of proposed algorithm

192 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Dataset: recover the lost information in images. Due to


The input used is the database of 42 real time ultra magnification and resizing images, some images may
sound kidney images. The samples of kidney images lose information. To prevent this problem, we use
are used to analyze the features and characteristics of Adaptive Histogram Equalization and enhance the
kidney stones to enable computer vision. In the dataset, contrast of each image.
the size of the images is of 1024 × 768 pixel dimension. Adaptive histogram equalization (AHE) is a vision
Pre-Processing: processing approach used to enhance contrast in
images. Here, we use an extension of AHE called
The idea behind the preprocessing stage is to contrast limited adaptive histogram equalization
normalize the local intensity in order to get rid of (CLAHE). CLAHE diverges from conventional AHE
background noise which is usually characterized by in its contrast limiting. A user-defined value called clip
lower order frequency of the image. In order to remove limit where CLAHE limits the augmentation by clipping
the reflections, it is needed to mask those slices of the histogram. The amount of clamor in the histogram
images. The preprocessing of the work particularly depends on the clipping level. Also, the smoothness
attempts to fix the non-Gaussian and multiplicative- and enhancement of contrast rely on this clipping level
speckle noise thereby enhancing the quality of the input too.
image that shows significant improvements in the feature
extraction and the classification eventually detects the A modification of the limited contrast technique called
presence of stone with improved accuracy. With the adaptive histogram clip (AHC) can also be applied.
intention of improving the speed and accuracy of AHC dynamically calibrates the clipping level and
classification process further, the region of interest balanced over- enhancement of a background area of
(ROI) has been determined by selecting only the kidney images. Here, we use one of the AHC called the
area and neglecting unwanted details like patient and Rayleigh distribution that forms a normal histogram.
scan information. In the proposed work, the Homomorphic Filtering:
morphological operations such as dilation and erosion Homomorphic filtering is used for both signal and
were done to eliminate the undesired and irrelevant image processing. This filtering is used for image
parts of the image. Smaller bright intensities were left enhancement also. Homomorphic filtering maintains the
out to make subsequent holes that can be re-filled by brightness of an image and increases contrast. In order
performing the erosion and dilation operations to improve the appearance of grey scale image
simultaneously. homomorphic filtering is used. Here homomorphic
To ensure that every unwanted pixel in the image filtering is used to remove multiplicative noise.
gets processed, the image is subdivided with 80 × 80 Illumination and reflectance are not separable, but their
sections with focus as center since the kidney has been approximate locations in the frequency domain may be
usually found almost at the focus of the image in the located. Since illumination and reflectance combine
training cases. Finally, a rectangular ROI of range 256 multiplicatively, the components are made additive by
× 256 pixels has been automatically generated by taking the logarithm of the image intensity, so that these
creating a small pattern called structuring element multiplicative components of the image can be separated
translated over the image. Only the regions that intersect linearly in the frequency domain.
with this window will be remaining as seed point Illumination variations can be thought of as a
candidates, and the rest will be deleted. multiplicative noise, and can be reduced by filtering in
Histogram Equalization: the log domain. It is also used for non-uniform
In order to improve the image's quality, contrast illumination in image & images become clearer. For
enhancement is an essential technique. It contributes to better image illumination, the high-frequency
components are increases & low- frequency
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 193
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

components are decreases. The reflectance in the scene newImage(x,y) = exp(n(x,y))


is assumed to represent the high frequency components Gaussian Convolution:
& illumination in the scene represents the low-frequency
components. After high pass filter gaussian convolution is applied
on high pass filtered image. It is also called gaussian
Operation:
blur or gaussian smoothing. Gaussian convolution is
Homomorphic filtering can be used for improving used for blur images to remove noise & unwanted details
the appearance of a grayscale image by simultaneous in an image. It works as mean filter, but it uses different
intensity range compression (illumination) and contrast kernel. Contour is applied on convoluted image.
enhancement (reflection). Contour is used to highlight the boundary of an image.
m(x,y) = i(x,y)*r(x,y) Where, Contour also called snake. Contour widely used for
recognition of shape, segmentation, tracking of object,
m = image, edge detection and stereo matching.
i = illumination, r = reflectance Mathematically, applying a Gaussian blur to an image
We have to transform the equation into frequency is the same as convolving the image with a Gaussian
domain in order to apply high pass filter. However, it's function. This is also known as a two-dimensional
very difficult to do calculation after applying Fourier Weierstrass transform. By contrast, convolving by a
transformation to this equation because it's not a product circle (i.e., a circular box blur) would more accurately
equation anymore. Therefore, we use 'log' to help reproduce the bokeh effect.
solving this problem.
Since the Fourier transform of a Gaussian is another
ln(m(x,y) = ln(i(x,y) + ln(r(x,y)) Then, applying Gaussian, applying a Gaussian blur has the effect of
Fourier transformation reducing the image's high-frequency components; a
F(ln(m(x,y)) = F(ln(i(x,y)) + F(ln(r(x,y)) Or M(u,v) Gaussian blur is thus a low pass filter.
= I(u,v) + R(u,v) The Gaussian blur is a type of image-blurring filter
High Pass Filtering: that uses a Gaussian function (which also expresses the
normal distribution in statistics) for calculating the
To suppress low frequencies and amplify high
transformation to apply to each pixel in the image.
frequencies, in the log-intensity domain, high pass filter
is used. A high pass filter also known as low cut off Feature Extraction:
filter. This filter used to make an image appear sharper. Feature extraction is a process of capturing visual
High pass filter attenuates the low frequency signals and contents of images for the purpose of simplifying the
passes high frequency signals. High pass filter is used amount of resources required. In the proposed method,
to amplify the noise. When high pass filter is applied on gray level co- occurrence matrix (GLCM) is used to
homomorphic filtered image then the edges in the image extract statistical texture features using statistical
become sharper and other area become dimmer. distributions of intensities values combinations at different
N(u,v) = H(u,v)*M(u,v) positions relative to each other in an image. Texture
features are important low level features used to
Where
describe the contents of image such as to quantify the
H = any high-pass filter perceived texture of an image. Texture features contain
N = filtered image in frequency domain information about structural arrangement of surfaces and
their relationships with surrounding.
N(x,y) = invF(N(u,v))
Finally, using exponential function to eliminate the
log we used at the beginning to get the enhanced image
194 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table 1: GLCM Features Figure 2: Support Vector Machine (Discovering


the optimal hyperplane and the separation of classes
for optimal hyperplane)
Margin:
Margin is the gap between two non-overlapping
classes separated by hyperplanes. It mainly indicates
the gap between data points and the dividing line. For
the optimal hyperplane, we required the maximum
margin.
Support Vector Machine: Kernel:
Support vector machine (SVM) is a supervised The functions used by SVM algorithm to classify
machine learning algorithm used in many classification the objects are mainly known as the kernel function.
problems for its higher accuracy rate. It aims to construct They mainly transform the inputs into a required form
a hyperplane between different classes with a margin to construct the hyperplane easily. There are many
to classify objects. The hyperplane can be constructed kernels used in SVM such as linear, polynomial
in a multidimensional axis to partitioned the data points. (homogeneous and heterogeneous), gaussian, fisher,
Some common terms related to SVM are mentioned graph, string, tree, etc. The linear kernel is one of the
below: most used and straightforward kernel functions used
for the linearly separable data points. There are many
Optimal Hyperplane:
application areas where SVM usually outperforms any
The boundary that distinguishes two classes with the other classifier with high accuracy. It is mainly designed
maximum margin is the optimal hyperplane. It is an N- for the binary classification problem that we have
1 dimensional subset of N-dimensional surface that addressed here. The SVM is trained using feature
distinguishes the classes on that surface. In two training datasets for robust performance in the test
dimensions, the hyperplane is a line. With the increasing dataset. For performance analysis, we need to evaluate
number of dimensions, the hyperplane's dimension is some metrics shown in the experimental
increased. evaluationsection.
Support Vectors: Training of SVM Classifier:
Data points that are more adjacent to the hyperplane Step 1:Each image is refined through the serialization
and influence the positioning of the hyperplane are of mentioned image processing techniques such as
known as support vectors. The more similar points adaptive histogram equalization, and covert RGB color
between the two classes become the support vectors. space to L*a*b color space.
These points avail in the establishment of SVM. Step 2: K-means clustering technique is applied for
the image segmentation and identifies two types of
feature vectors, namely co-occurrence matrix features
and statistical features, respectively.
Step 3: Exploit these feature vectors to SVM for
further processing.
Testing of SVM Classifier:
Step 1: An input of any ultrasound is supplied into
the system, then the image is refined through the
serialization of image processing techniques.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 195
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Step 2: Apprehended two types of feature vectors


by the K- means clustering technique in terms of image
segmentation.
Step 3: From the feature extractor, the feature
vectors are fed for the trained SVM model.
Step 4: Finally, the outcome is a label of an input
image to classify the specific category as normal or
abnormal kidney.
PERFORMANCE EVALUATION METRICS:
We appraise the appearance of our trained SVM
model based on several metrics. For predicting new
data or images, we use a confusion matrix to envision RESULTS AND DISCUSSION
our model's performance. A confusion matrix comprises The algorithm first acquires the ultrasound images
four building blocks, namely True Positive (TP), True than processes it further by utilizing homomorphic
Negative (TN), False Positive (FP), and False Negative filtering. The images are then filtered through high pass
(FN). TP and TN refer to the cases where the and Gaussian convolution filter. The iteration process
predictions are true and negative. FP refers to the is then executed and the affected areas which have
positively false predictions, and FN indicates negatively prominent artifacts are highlighted within a circle.
false predictions. We compute more distinct metrics to Figure 3(a) depicts the ultrasound image taken for
evaluate our model from the confusion matrix. These analysis. The enhanced format of the image which is
precise metrics are Accuracy, Precision, Recall or obtained after processing through homomorphic, high
Sensitivity, Specificity, and F1 score, and those are pass and Gaussian convolution filter is illustrated in figure
calculated by applying the formulas below. 3(b). Figure 3(c) demonstrates the resultant image
Accuracy: The measure of consistency with reliable which is obtained after iteration process. The area
information in a spatial point with data on the classified highlighted within the circle shows the affected area in
image is known as accuracy. the ultrasound images. It gives useful diagnosis and hints
towards the presence of stones/calcification/disorders
in the region.

196 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

CONCLUSION
This project is primarily concerned with the
application of the SVM in order to considerably
improve the prediction capacity for the detection of
kidney stones. The proposed methodology possesses
the highest accuracy of over 94.12% that makes it
Figure: 3(a) Ultrasound image (b) Enhanced processed image readily usable after the clinical observations. Even
(c) Resultant image
though, the parameter values had been fine-tuned so
Similarly, the process for analyzing the other is image that the classifier exhibits a better accuracy only limited
shown in figure 4. Figure 4(a) shows the other for the trained dataset, in real time applications, the
ultrasound images and its processed version is shown classifier may undergo processing real time acquired
in figure 4(b). Figure 4(c) illustrates the resultant image subjects that are not trained and are naturally dynamic
which is obtained after iteration process. The algorithm as well. This demands a fast and effective SVM
was tested with approximate ten different ultrasound parameter optimization method.
images depicting disorders in abdominal/pelvic regions
like kidney, gallbladder etc. It was found to be accurate FUTURE SCOPE
in highlighting the artifacts with great precision. In future, local features such as LBP, SURF and
Hence, the proposed algorithm provides a mean SIFT features will be considered and experimented with
which may prove to be helpful for the doctors to some advanced classifiers like Deep Learning. Also,
concentrate only on the area of interest and artifacts in the works will also be carried out to translate these
the ultra sound images. The accuracy and complexity algorithms into a software toolbox that could finally be
of the algorithm is optimum which can be improved distributed among physicians for their fieldwork and
further. feedbacks.
REFERENCES
[1] Manjunath, S.Pande, & Raveesh, "Computer aided system for
diagnosis of kidney stones using neural networks", International
journal of current engineering and scientific research (ijcesr), Vol.4,
pp. 22-27, 2017.
[2] Aadhirai S and Najumnissa Jamal D, "Feature Extraction and
Analysis of Renal Abnormalities using Fuzzy Clustering
Segmentation and SIFT Method", International Conference on
Biosignals, Images and Instrumentation (ICBSII), 978-1-5090-
4980-6, 2017.
[3] R. Vasanthselvakumar, M. Balasubramanian, & S.Palanivel,
"Pattern analysis of kidney diseases for detection and
classification using ultrasound b- mode images", Int J Pure Appl
Math , vol. 117, no. 15, pp. 635-653, 2017.
[4] J. Verma, M. Nath, P. Tripathi, & K. K. Saini, "Analysis and
identification of kidney stone using Kth nearest neighbour (KNN)
and support vector machine (SVM) classification techniques,
Pattern Recognition and Image Analysis", vol. 27, no. 3, pp.
574-580, 2017.
[5] N. A. Shaharuddin, W. Mahani, & H. Wan, "Development of
computer aided diagnosis system (CAD) for detection of kidney
ultrasound images", International Conference on Engineering
Technology and Technopreneurship (ICE2T), pp. 18-20, IEEE,
2017.
Figure: 4(a) Ultrasound image (b) Enhanced processed image
(c) Resultant image

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 197
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[6] M. P. Pawar & A. N. Mulla, "Design and Analysis Performance [9] Ranjitha, "Extraction and Dimensionality reduction of features
of Kidney Cyst Detection from Ultrasound Images", for renal calculi detection and artifact differentiation from
International Journal of Engineering Development and Research, segmented ultrasound kidney images", 3rd International
vol. 5, no. 4, pp. 911-917, 2017. Conference on Computing for Sustainable Global Development
(INDIACom), pp. 5- 10, IEEE, 2016.
[7] M. Pathak, H. Sadawarti & S. Singh, "Features extraction and
classification for detection of kidney stone region in ultrasound [10]P. T. Akkasalgar & S. S. Karakalmani, "Abnormality detection in
images", International Journal of Multidisciplinary Research and kidney ultrasound imaging", International Journal of Engineering
Development, Volume 3, no.5, pp. 81-83, 2016. and Computer Science, vol. 4, no. 7, pp. 13151-13155, 2015.
[8] P. Vaish, R. Bharath, P. Rajalakshmi & U. B. Desai, "Smartphone [11]Soumya & Narayanan, "Classification Of Kidney Disorders From
based automatic abnormality detection of kidney in ultrasound Ultrasound Images Using Adaptive Neuro-Fuzzy Inference
images", IEEE 18th International Conference on e-Health System", International Journal of Scientific Engineering and
Networking, Applications and Services (Healthcom), pp. 1- 6, Applied Science (IJSEAS), Volume-1, no. 3, pp. 298-305, 2015.
IEEE, 2016.

198 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Design of Low Power Carry Speculative Block Based


Approximate Adder
P. H. Chandra mouli1, N. Suma hrudaya2
1
Associate Professor, Dept of ECE, Vemu Institute of Technology, P Kothakota
2
UG Student, Dept of ECE, Vemu Institute of Technology, P Kothakota
Email: mouli003@gmail.com1, sumahrudaya898@gmail.com2

Abstract: The low power consumption block- approximate accelerator, imprecise logic or arithmetic
based carry speculative approximate adder is unit and approximate Instruction Set Architecture (ISA).
proposed. Its structure is based on partitioning the
adder into some non-overlapped summation blocks In this project, we deal with approximate adders
whose structures may be selected from both the which are utilized as the basic operator in performing
carry propagate and parallel-prefix adders. Here, other arithmetic operations such as subtraction,
the carry output of each block is speculated based multiplication, and division. Approximate adders have
on the input operands of the block itself and those been received many attention by the designers. In the
of the next block. In this adder, the length of the state-of-the-art approximate adders, where most of
carry chain is reduced to two blocks (worst case), them are based on the carry propagate structures, the
where in most cases only one block is employed to energy and speed gains have been achieved by
calculate the carry output leading to a lower average
hardware manipulation, logic simplification, and voltage
delay. In addition, to increase the accuracy and
over scaling. While some of the adders were based on
reduce the output error rate, an error detection
and recovery mechanism is proposed. The configurable output accuracy, others had a fixed
effectiveness of the proposed approximate adder accuracy level. The accuracy configurability imposed
is compared with state-of-the art approximate some overheads in terms of delay, area, and power
adders using a cost function based on the energy, which could limit their use in some applications where
delay, area, and output quality. The results indicate such re-configurability is not needed.
an average of 50% reduction in terms of the cost
APPROXIMATE ADDER
function compared to other approximate adders.
The power consumption reduction and speed
I. INTRODUCTION
improvement are the key goal in the design of digital
In current digital systems, one of the key constraints circuit is general. One of the approaches to improve
is the Thermal Design Power (TDP) could limit the both the power and speed is to approximate adders.
performance of digital systems. One of the techniques Approximate adders have been received many
which may help to obtain the most out of this constraint attentions by the designers. Adder blocks, which are
is the use of the approximate computing technique. It the main components in arithmetic units of DSP systems,
may be used for application domains such as multimedia are power hungry and often from hotspots locations on
and image processing, digital signal processing, wireless the die. Prior researches on approximate adders have
communication, machine learning, and data mining taken two general approaches of focusing on error
which are inherently error-resilient. The technique may weight and error probability reduction. For these adders,
be used to attain more energy reduction and/or reducing the error probability of the summation as well
performance at the cost of some accuracy loss. In recent as reducing the power and delay is the key design
years, various approximate computing techniques at criteria. They may also accompany by an error
different software/hardware levels have been proposed. correction unit which has time, power and area
Examples include thread fusion and tunable kernels, overheads. Approximate arithmetic units are mainly

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 199
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

based on the simplification of the arithmetic unit's 3. EXISTINGMETHOD:


circuits. Different structures for approximate adders are Reconfigurable approximate carry look-ahead
fully approximate and only be utilized in error re silent adder:
applications. Here, by reducing the quality, the total
computation time and/or power consumption of the unit Reconfigurable approximate carry look-ahead adder
are reduced resulting in higher energy degradation. The (RAP-CLA), which is an approximate adder designed
main reason behind this is that in binary arithmetic, adders based on the exact carry look ahead adder, was
are the main component to perform mathematical proposed, this adder was able to switch between the
operations. Besides arithmetic operations, adders are exact and approximate operating modes during the
used to perform increment, decrement, and many similar runtime. In RAP-CLA, fixed-size overlapped sub-
operations. Therefore, being the most widely used blocks (windows) were used to calculate the carry
fundamental data operators, adders have attracted a output and sum bits. Some multiplexers were used to
noteworthy attention for approximation. Since delay and provide accuracy re-configurability which resulted in
power of adders increase rapidly with bit-width (N), higher delay, power, and area in the exact operating
for a marginal improvement in delay/power, we have mode compared to those of a pure exact CLA.
to sacrifice an immense amount of power/delay.
Consequently, at a micro architecture level of
abstraction, adders have become the key delay/power
bottleneck of digital systems. One possible way to
overcome this situation is to approximate adders, that
is, to sacrifice accuracy for delay and/or power. In some
applications such as image processing or audio/video
compression, the required accuracy might vary during
run time. To meet the need for runtime accuracy Figure 1: Block diagram of RAPCLA

adjustment, a series of designs are developed to In the conventional CLA, the carry output of the ith
implement accuracy-configurable approximation, which stage is determined from
could be reconfigured online to save more power.
2. LITERATURE SURVEY Ci+1 =Gi + Gi-1Pi +···+ G0 + Cin

• H. Jiang, C. Liu, L. Liu, F. Lombardi and J. Han, "A Where Cin is the input carry and Pi and Gi are the
review, classification and comparative evaluation of propagate (Ai ⊕ Bi) and generate (AiBi) signals of the
approximate arithmetic circuits," ACM JETCAS, vol. ith stage, respectively. By increasing the width of CLA,
13, no. 4, Article no. 60, 2017. The authors said that it the delay, and power consumption of the carry generator
plays a major role in speed and power consumption units increase. In this brief, we propose to split into
of a digital signal processing system. two segments. Given a window size of W, the first
• M.Pashaeifar, M. Kamal, A. Afzali-Kusha, and M. segment contains W MS terms while the other segment
Pedram, "Approximate Reverse Carry Propagate contains the remaining (LS) terms. Hence it may be
Adder for Energy-Efficient DSP Applications," IEEE rewritten as
TVLSI, vol. 26, no. 11, pp. 2530-2541, 2018.
M.Pashaeifar with his team proposed a technique of
=
Approximate Reverse Carry Propagate Adder for
energy-efficient DSP Applications
Where the left part is called approximate part and
the right part is called augmenting part. If both of these
parts are employed to calculate the carry output, the
generated Ci+1 is exact whereas if only the
200 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

approximate part is used, the generated Ci+1 is


imprecise. It is clear that computing imprecise Ci+1 is
faster and consumes less power compared to
computing Ci+1 precisely. Based on this segmentation,
two exact and approximate operating modes are realized
for the proposed reconfigurable approximate adder.
Thus, compared to the conventional CLA, only one
multiplexer is added in the circuitry for computingCi+1.
The inputs of this multiplexer are approximate and
augmenting carry outputs with the operating mode signal
as the selector. The operating mode signal determines
Figure 2: Ripple Carry Adder
the generation of the carry output in the exact or
approximate mode. As an example, the gate-level net Consider the above 4-bit ripple carry adder. The
list of calculating C4 in the proposed structure which is sum is produced by the corresponding full adder as
called RAP-CLA. In order to remove the power soon as the input signals are applied to it. But the carry
consumption of augmenting part when the carry input is not available on its final steady state value until
generation block is in the approximate operating mode, carry is available at its steady state value. Similarly
this part is power gated using pMOS headers. depends on and on . Therefore, though the carry must
If all carry generators of an adder are based on the propagate to all the stages in order that output and carry
proposed structure, and all the operating signals of these settle their final steady-state value.
units are controlled by only one signal for the operating The propagation time is equal to the propagation
mode, all output bits of the adder in the approximate delay of each adder block, multiplied by the number of
mode may be inaccurate. One may increase the adder blocks in the circuit. For example, if each full
accuracy of the approximate mode by exploiting the adder stage has a propagation delay of 20 nanoseconds,
exact carry generator for the MS group of bits of the then will reach its final correct value after 60 (20 × 3)
adder similar to the approach suggested. In fact, the nanoseconds. The situation gets worse, if we extend
technique may be utilized in designing CLAs with different the number of stages for adding a greater number of
levels of accuracy. For structures with adjustable bits.
accuracy, the adder should be partitioned into some A carry look-ahead adder reduces the propagation
segments with their own operating mode signals. In this delay by introducing more complex hardware. In this
brief, to compare the efficiency of the proposed design, the ripple carry design is suitably transformed
structure with those of the previous works, the two such that the carry logic over fixed groups of bits of the
operating modes of approximate and exact discussed adder is reduced to two-level logic. Let us discuss the
before are considered. design in detail.
CARRY LOOK AHEAD ADDER:
In ripple carry adders, for each adder block, the
two bits that are to be added are available instantly.
However, each adder block waits for the carry to arrive
from its previous block. So, it is not possible to generate
the sum and carry of any block until the input carry is
known. The block waits for the block to produce its
carry. So, there will be a considerable time delay which
is carry propagation delay. Figure 3: Carry Lookahed Adder

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 201
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Consider the full adder circuit shown below with C4 = G3 + P3C3 = G3 + P3G2 + P3P2G1 +
corresponding truth table. P3P2P1P0Cin
We define two variables as 'carry generate' and 'carry From the above Boolean equations we can observe
propagate' then, that C_ {4} does not have to wait for C_ {3} and C_
Pi= Ai ⊕ Bi {2} to propagate but actually C_ {4} is propagated at
the same time as C_ {3} and C_ {2}. Since the Boolean
Gi = Ai*Bi
expression for each carry output is the sum of products
Table 1: Truth table for carry lookahed adder
so these can be implemented with one level of AND
gates followed by an OR gate.
The implementations of three Boolean functions for
each carry output (C_ {2}, C_ {3} and C_ {4}) for a
carry look-ahead carry generator shown in below
figure.

The sum output and carry output can be expressed


in terms of carry generate G_{I} and carry propagate Figure 4: Implementation of Carry Lookahed Adder for Three
Boolen Functions
P_{I} as
4. PROPOSED METHOD:
Si =Pi ⊕ Ci
In electronics, addition of the binary numbers in
Ci+1 =Gi + PiCi
various computers and other types of processors are
where G_{i} produces the carry when both A_{i}, performed by the adders. Adder circuits are used in
B_{i} are 1 regardless of the input carry. P_{i} is various processors for calculating increment or
associated with the propagation of carry from C_{i} decrement operations, table indices, addresses etc.
to C_ {i + 1}
SPECULATIVE CARRY SELECT ADDER
The carry output Boolean function of each stage in
a 4 stage carry look-ahead adder can be expressed as Carry chain in the addition process is observed for
the design of Speculative Carry Select Addition
C1 = G0 + P0Cin (SCSA). The carry chain is observed because the long
C2 = G1 + P1C1 = G1 + P1G0 + P1P0Cin carry chain is rarely activated in the block adders. To
C3 = G2 + P2C2 = G2 + P2G1+ P2P1G0+ overcome this problem, in SCSA the input bits are
P2P1P0Cin divided into two parts of equal sizes. Group of

202 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

consecutive input bits are given as a input to a single energy consumption. In this case, the dependencies
block adder. A block adder is known as the window, between the blocks are cut at the cost of some accuracy
the number of consecutive input bits is known as window loss. Thus, the accuracy of the add operation depends
size and it is denoted by K. number of windows to be on the accuracy of the Carry Predictor unit, and also,
used is found by M=N/K where, n is the total number the policy of the carry output signal selection. In our
of input bits. proposed structure, in the worst-case, the length of a
SYSTEM MODEL carry chain is equal to two blocks (i.e., 2l).

Figure 6: Internal structure of the adder

Figure 5: Block diagram of Carry Speculative Adder In most of the state-of-the-art approximate adders,
The different formats like XS-3, binary coded faster the carry input of each block is chosen only based on
but the possibility of occurrence of error is increased. the input signals of the previous block. In this work,
The proposed speculative adder can be able to however, we propose a speculative approximate adder
complete the addition process quickly when compared that the carry input of its ith block is determined based
to the existing technique speculative sum bit is calculated on some input signals of the current block and those of
by the carry out bit of the window. By this prediction the next one. As we will show, this approach results in
technique, the addition Consider two inputs A and B. a considerable accuracy improvement compared to the
A=01, B=10. other approximate adders. In BCSA, the carry output
of the I th summation block (COi) is obtained from
First cycle: Addition is done without carry.
Second cycle: addition is done with Carry
Speculative adder. where the is the output signal of the
INTERNAL STRUCTURE OF THE SYSTEM Select (Carry Predictor) unit. Also, is the carry
output of the sub-adder of the ith summation block
The general architecture of an n-bit speculative assuming that the carry input of the block is zero.
approximate adder enhanced by a carry predictor unit
is illustrated below. The add operation is performed by
[n/l} l-bit summation blocks working in parallel where
l is the bit-length of each summation block. Each
summation block includes an l-bit sub-adder, a Carry
Predictor unit, and a Select unit. In this structure, the
carry input of the ith sub-adder, is chosen by (i-1)th
Select unit from the carry signal generated by the (i-
1)st Carry Predictor unit and the one generated by the
(i-1)th sub-adder. Selecting the carry output of the Carry
Predictor unit leads to a shorter critical path and lower

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 203
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

ADDER WITH ERROR RECOVERY UNIT In the third case, although the carry input of the block
(ERU): is killed and is not propagated, the carry input is
employed to determine the first summation bit of the
block. Therefore, if the carry input in this case is wrong,
it impacts on the output accuracy of the summation.
Hence, for improving the accuracy of the proposed
adder, we suggest an error recovery unit which
generates the first summation bit of the ith block S0 by
S0 i+1 = (K0 i+1 .CAddi) + (P0 i+1 ⊕ Cini+1)
Note that P0 i+1 ⊕ Cini+1(Cini+1 = CPrdti)is the
Figure 7: Adder with error recovery unit approximate summation output in the first bit of the
In the first case ( = 0 and = 0), since (i+1)th block denoted as A in Fig. 2. Since the ERU is
=0, the P( ) and P are 2/3 and 1/3, not on the critical path of adder, using the Error
respectively. P(x) denotes the probability of the signal Recovery Unit (ERU) leads to improving the accuracy
x. Thus, the may be incorrect. In addition, when without increasing the delay of the proposed adder
= 0, the P( ) and P( ) are 2/3 and 1/3, structure. Fig. 4.5 shows the functionality of the
respectively. Note that theseprobabilities have been proposed speculative approximate adder with ERU.
obtained by assuming that the distribution of the 1 and The ERU imposes only about 3% and 2% power and
0 in the input operands bits are uniform. Therefore, the area overheads, respectively.
carry input of the (i+1)th block may be propagated to
its most significant bits. Hence, to reduce the probability
of the error propagation in the proposed adder, in this
case, the Select unit circuit, chooses the whose
error probability is smaller than .
In the second case ( = 0 and = 1), because
is 1, the speculated carry is correct.
Therefore, for this case, the is selected as the
.
In the third case ( = 1 and = 0), because
is 1, independent from the accuracy of the carry
input of the (i+1)th block, the carry input is not
propagated. Therefore, for shortening the critical path,
we suggest to select as the carry output of the i th Figure 8: An example of functionality of the proposed
approximate adder, (a) without ERU(BCSAW/OERU), and
block. (b)with ERU.

In the fourth case ( =1 and = 1), similar to XILINX ISE :


the second case, since is 1, the predicated carry Xilinx was founded and incorporated in California
is the same as the exact carry output of the block. in February 1984. In April 1990, the Company
Therefore, in the proposed approach, is selected reincorporated in Delaware. Xilinx offers an exhaustive
as the . multi-hub portfolio to address prerequisites over a wide
Among these cases, only in the first case, the carry arrangement of utilizations. Regardless of whether you
is propagated in two blocks. Therefore, on average, are planning a best in class, superior systems
the length of the carry propagation is close to one block. administration application requiring the most astounding
204 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

limit, transfer speed, and execution, or searching for a by this release, and also the group of CPLDs, which
minimal effort, FPGA takes to a product characterized means small designers and instructive establishments,
innovation to the following dimension. have no overheads from the expense of advancement
Notwithstanding its programmable stages, Xilinx programming.
gives configuration administrations, client preparing, field The ISE software controls all aspects of the design
designing and specialized support. License enrolment flow. Through the Project Navigator interface, you can
is required to utilize the Web Edition of Xilinx ISE, which access all of the design entry and design implementation
is free and can be re-established a boundless number tools. You can also access the files and documents
of times. Xilinx ISE (coordinated programming associated with your project.
condition) controls all parts of the improvement stream.
Project Navigator is a graphical interface for users to
access software tools and relevant files associated with
the project. It is divided into four sub windows:
1. Source's window (top left): hierarchically displays the
files included in the project
2. Processes window (middle left): displays available
processes for the source file currently selected.
3. Transcript window (bottom): displays status
messages, errors, and warnings
4. Workplace window (top right): contains multiple
document windows (such as HDL code, report,
schematic, and so on) for viewing and editing
Figure 9 : Project Navigator
The Xilinx ISE Web-PACK is a complete FPGA/
By default, the Project Navigator interface is divided
CPLD programmable logic design suite providing:
into four panel sub-windows, as seen in Figure 5-1.
• Specification of programmable logic via schematic On the top left are the Start, Design, Files, and Libraries
capture or Verilog/VHDL panels, which include display and access to the source
• Synthesis and Place & Route of specified logic for files in the project as well as access to running processes
various Xilinx FPGAs and CPLDs for the currently selected source.
• Functional (Behavioural) and Timing (post-Place & 4. RESULTS
Route) simulation SYNTHESIS RESULTS OF PROPOSED BCSA
• Download of configuration data into target device via (AREA):
communications cable
Xilinx currently claims that its FPGAs, due to their
ability to be customized for different workloads,
accelerate processing by 40 times for machine-learning
inference, 10 times for video and image processing,
and 100 times for genomics, with respect to CPU-or
GPU-based frameworks.
Xilinx FPGAs provide you with system integration
while optimizing for performance/watt. The minimal
Figure 10: Area report of Proposed Method
effort Spartan group of FPGAs is completely upheld
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 205
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

SYNTHESIS REPORT OF PROPOSED BCSA


(DELAY):

Figure 15: RTL schematic

Figure 11: Delay report of Proposed Method

RTL SCHEMATIC OF PROPOSED


MULTIPLIER:

Figure 16: Technology schematic

SIMULATION RESULTS OF PROPOSED


Figure 12 : Top Level Hierarchy of the arrangement
METHOD (POWER):

Figure 13 : Realize logic by the Xilinx ISE for the verilog code

Figure 16: Stimulation output

Figure 14: Block Diagram

206 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

5. PERFORMANCE PARAMETERS: • Lower accuracy loss.


1 • An error detection and recovery mechanism to reduce
the output error rate.
0.8
6. CONCLUSION
0.6 BCSA
0.4 BCSA with ERU
The various performance factors also indicate that
the proposed algorithm provides better result by
0.2 RAP_CLA
improving certain parameters such as mean, MSE,
0 PSNR, accuracy, sensitivity, specificity, and dice
(32,4) (32,8) (16,4) (16,8) coefficient.Our experimental results show that the
proposed approach can aid in the accurate and timely
Figure 17 : Delay (nano sec)
detection of brain tumor along with the identification of
300 its exact location. Thus, the proposed approach is
significant for brain tumor detection from MR images.
250
7. REFERENCES
200
BCSA [1]. H. Jiang, C. Liu, L. Liu, F. Lombardi and J. Han, "A review,
150 classification and comparative evaluation of approximate
BCSA withERU arithmetic circuits," ACM JETCAS, vol. 13, no. 4, Article no.
100 60, 2017.
RAP_CLA
50 [2]. M. Samadi, J. Lee, D. A. Jamshidi, A. Hormati and S. Mahlke.
SAGE: self-tuning approximation for graphics engines. In Proc.
0 Micro, 2013, pp.13-24. H. Esmaeilzadeh, A. Sampson, L. Ceze,
(32,4) (32,8) (16,4) (16,8) and D.Burger. "Neural Acceleration for General-purpose
Approximate Programs," In Proc. of Micro, pp.105-115, 2012.
Figure 18 : Area (square micrometers) [3]. B. K. Mohanty, S. K. Patel, "Area-delay-power efficient carry
select adder", IEEE TCAS-II, vol. 61, no. 6, pp. 418- 422, Jun.
250 2014.
[4]. M. Bilal, S. Masud, and S. Athar, "FPGA Design for Statistics-
200 Inspired Approximate Sum- of- Squared- Error Computation in
Multimedia Applications," IEEE TCAS-II, vol. 59, no. 8, pp.
150 506-510, 2012.
BCSA
[5]. M. Kamal, A. Ghasemazar, A. Afzali-Kusha, and M. Pedram,
100 BCSA with ERU "Improving efficiency of extensible processors by using
RAP_CLA approximate custom instructions," in Proc. DATE, 2014.
50
[6]. O. Akbari, M. Kamal, A. Afzali-Kusha, and M. Pedram, "RAP-
CLA: A reconfigurable approximate carry look- ahead adder,"
0 IEEE TCAS-II, vol. 65, no. 8, pp. 1089-1093, 2018.
(32,4) (32,8) (16,4) (16,8) [7]. Y. Kim, Y. Zhang, and P. Li. "An energy efficient approximate
adder with carry skip for error resilient neuromorphic VLSI
Figure 19: Power (micro watts) systems," In Proc. ICCAD, 2013, pp. 130-137.

ADVANTAGES OF PROPOSED METHOD : [8]. A. B. Kahng, S. Kang, "Accuracy-configurable adder for


approximate arithmetic designs," In Proc. DAC, 2012, pp.820-
• Uses low energy. 825.

• Has less delay time. [9]. J. Hu and W. Qian, "A new approximate adder with low relative
error and correct sign calculation," In Proc. IEEE DATE, pp.
• Size is small. 1449-1454, 2015.
[10]. W. Xu, S. S. Sapatnekar, and J. Hu. "A Simple Yet Efficient
• Functioning speed is high. Accuracy Configurable Adder Design," In Proc. ISLPED, 2017.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 207
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

An Error Analysis of Discrete Cosine Transfrom Using


Algorithm Based Fault Tolerance Technique
R. Narayana Rao
Department of Electronics and Communication Engineering, VEMU Institute of Technology, P. Kothakota, Chittoor
Email: josephrevalla@gmail.com

Abstract- The discrete cosine transform (DCT) type of radiation is primarily formed by high-energy
is a key building block for many applications in protons and electrons. Finally, solar radiation includes
communications and signal processing. Likewise, a variety of sources such as protons, ions, neutrons,
it is also popular in space applications such as those gamma rays, and so on.
that perform audio or image compression. The
problem with space applications is that they usually In all cases, solutions to mitigate this problem have
have to work in a high radiation environment that been difficult to implement, mainly due to the hard
affects electronic components and distorts their constraints on area and power consumption of the space
correct functionality. Therefore, it is usual to devise applications. Among all the solutions, a first possibility
alternative implementation of the designs that can is to physically shield the electronic components. This
detect the presence of errors and discard the is, most of the times, unfeasible due to the heavy weight
affected samples. In this brief, we explore the use of the shielding materials. Besides, not all particles can
of algorithmic-based fault tolerance (ABFT)
be easily deflected with standard shielding, thus not
techniques, which exploit certain algorithmic
properties to detect errors. In particular, an ABFT solving the problem entirely [1]. Another solution is to
technique for the Arai DCT is proposed and fabricate circuits with a technology that can support
compared to standard protection schemes based higher doses of radiation, something known as rad- hard
on modular redundancy. Experimental results show components. This infers a couple of problems. Rad-
that important savings in terms of resource hard technologies require a much more expensive
overhead can be obtained with our approach while fabrication process, since runs are usually limited and
still maintaining the error detection rate at a not all the facilities can provide this technology. This
reasonable level. usually leads to hefty cost overheads, sometimes of an
Index Terms- Configuration memory, discrete order of magnitude with respect to the commercial off-
cosine trans- form (DCT), field-programmable gate the- shelf counterpart designs. Moreover, rad-hard
array (FPGA), image compression, soft error. components usually provide lower functionality than
I. INTRODUCTION standard components, which may limit the scope of the
mission [3]. Finally, another approach is to produce
Since the beginning of space exploration, radiation components protected by design. In this case, the
has posed serious problems to the electronics onboard technology is the same as in the commercial case, but
satellites and other spacecraft [1]. From temporary the actual circuit is designed with extra redundancy in
failures to permanent damages in instruments, particle order to provide error-handling capabilities. An example
strikes have jeopardized missions, limiting func- tionality of this are error-correction codes (e.g., Hamming) to
and efficiency [1], [2]. The sources of this problem are protect memories [4]. Other examples to detect and
diverse and may be classified into three categories: correct errors are dual modular redundancy (DMR)
radiation induced by cosmic rays, radiation trapped in and triple modular redundancy (TMR) schemes [5].
the Earth's magnetic field, and solar radiation. The first These techniques usually incur area and power
one consists of protons and heavy ions and usually tends consumption overheads, thus creating difficulties to
to present a continuous low intensity [2]. The second space missions in which small satellites are used (e.g.,
208 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

CubeSats). Therefore, in order to reduce these power consumption of the DCT architecture. In [17],
overheads, other approaches not based on massive the voltage scaling versus robustness tradeoff is studied
redundancy are usually followed by hardware designers. with a soft N-modular redundancy scheme, while in
One of these approaches is the so-called algorithmic- [18], the voltage scaling versus delay error resiliency is
based fault tolerance (ABFT) [6]. This approach can analyzed. From the reliability point of view, there are
be applied to circuits with certain algorithmic properties. publications that explore properties of fast unitary
If one of these properties exists, it can be used to check transforms, a family that comprises DCT and other
the correctness of each output with respect to its similar transforms [19]. In this brief, we explore the
corresponding input, usually with a lower overhead than ABFT properties of the Arai 1-D DCT imple-
DMR. One of the most paradigmatic cases of ABFT is mentation but with an approach different from [17],
the Parseval's check in signal processing [7]. [18]. Specifically, the reliability versus resource
In this brief, we have focused on the discrete overhead tradeoff is analyzed, since this is an important
cosine trans- form (DCT) and have managed to protect issue in space applications. Section II introduces the
it with the previously mentioned ABFT approach. The mathematical properties of the DCT as well as the
choice of the DCT as the design to protect corresponds hardware implementation studied in this brief. In Section
to two reasons. The first one is its ubiquitous uti- lization III, the proposed protection technique for the DCT is
in many signal-processing systems [8]. The second one explained. The experimental setup and the results
is that it is a basic building block for image-processing obtained after the fault injection campaigns are presented
hardware onboard satellites [9] and therefore very in Sections IV and V. Finally, the shortcomings of the
sensitive to the aforementioned effects of radiation. proposed technique are discussed in Section VI, and
There are several briefs that study DCT implementations Section VII concludes this brief.
from different points of view. One approach is to try to II. DISCRETE COSINE TRANSFORM
optimize the mathematical foundation to come up with The amount of memory space required to store raw
a simpler circuit (less area and power consumption) images can be restrictive in terms of cost and power
[10]. DCT area-efficient implementations have also consumption in space applications. As mentioned in
been researched [11]. Efficiency, specifically in video Section I, the DCT is widely used in image- or video-
coding applications, is usually a primary target. A processing systems for data compression. The main
common approach is to use hardware acceleration and reason for this is the energy compaction property of
parallelism [12]. The research of alternative the DCT, which is very close to the Karhunen-Loève
implementation is also usual, so that the DCT can save transform [20]. For example, in a lossy image
computational cycles and resources [13]. Another compression process (e.g., JPEG) the image is
approach is to use hardware-software co-design to processed in blocks of 8×8 pixels to express them as a
reach a tradeoff between performance and used sum of cosine functions oscillating at different frequencies.
resources [14]. Reconfigurable architectures for DCT In order to do that in hardware, each region of 8 × 8
are also a recent target, especially to deal with variable pixels is decomposed into a cascade of 8 × 1 1-D DCTs
transform size due to video resolution changes. Field- that are applied on the eight rows. Then, this intermediate
programmable gate arrays (FPGAs) are a popular result is transposed, and the 1-D DCTs are applied
alternative to support this reconfig- urable functionality again but this time on the eight columns. Different
[15]. For top performance, DCT implementation on variants of the 1-D DCT can be applied in these steps,
multicore architectures is sometimes proposed, which being the type-II DCT the most commonly used form
usually increases the power consumption. Efforts to [21]. This variant is usually referred to as "the DCT"
keep consumption within reasonable limits without and is defined by
jeopardizing efficiency are also present in the literature
[16]. There are also articles devoted to reduce the (1)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 209
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

where fn are the input pixels of the original image


and Fk are the output pixels after the DCT.
The implementation of (1) in hardware requires
intensive com- putation, which makes it unfeasible for
real-time applications. For this reason, several
algorithms such as the Leoffler [22] or the Arai [23]
have been proposed over the years to reduce the
hardware complexity of the DCT computation. In
particular, the Arai algorithm for the eight-point DCT is
widely popular in hardware due to its low arithmetic
complexity. This is because the Arai scheme only needs
five multiplications and 29 additions, so its resource
usage and power consumption is reduced. The block
diagram of this architecture is illustrated in Fig. 1. Fig. 1. Block diagram of ABFT Technique [23].
In this figure, the subtraction of pixel values is Step 1:
represented by placing a negation symbol before the
a11 = f0 + f7 a15 = f3- f4
addition block. The values of the fixed multipliers are
given by a12 = f1 + f6 a16 = f2 - f5
(2) a13 = f2 + f5 a17 = f1 - f6
a14 = f3 + f4 a18 = f0 - f7 (3)
In Section III, the proposed error-detection Step 2:
technique for the eight- point Arai 1-D DCT architecture a21 = a11 + a14 a 25 = a15 + a16
presented previously is explained in detail.
a22 = a12 + a13 a26 = a16 + a17
III. PROPOSED TECHNIQUE FOR THE
ARAI DCT a23 = a12 - a13 a27 = a17 + a18
The algorithmic property of the Arai DCT used to a24 = a11- a14. (4)
create the proposed ABFT technique has been inferred Step 3:
by dividing the block diagram shown in Fig. 1 into five
a31 = a21 + a22 a33 = (a23 + a24) ·m1
sequential steps. This way, the outcomes of the adders
of each step can be expressed using simple addition or a32 = a21 - a22 a34 = (a25 - a27) · m2 (5)
subtraction equations. These equations are as follows: Step 4:
a41 = - a33 · m1 + a24
a42 = a33 · m1 + a24
a43 = a25 · m3 + a34 · m2
a44 = - a26 · m1 + a18
a45 = a34 · m2 + a27 · m4
a46 = a26 · m1 + a18. (6)

210 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Step 5: F7 = m1 · ( f2 - f5 + f1 - f6) + ( f0 - f7)


a51 = - a43 + a44 a53 = - a45 + a46 +{m4 · ( f1 - f6 + f0 - f7)
a52 = a43 + a44 a54 = a45 + a46. (7) +[m2 · ( f3 - f4 + f2 - f5 - f1 + f6 - f0 + f7)]}.
Output: (9)

F0 = a31 F1 = a32 F2 = a41 F3 = a42 Finally, if the sum of the Fk outputs is performed,
the following can be obtained:
F4 = a51 F5 = a52 F6 = a53 F7 = a54 (8)
(10)
where aij represents the outcome of adder j of step
i . In each step, the adders are enumerated from top to This algorithmic property of the Arai DCT has been
bottom. For example, adder a25 is the fifth adder of used to create the ABFT protection scheme illustrated
step 2, which is the adder just before the multiplier m3. in Fig. 2.
In this figure, the sum of the outputs of the DCT
module is compared to the f0 input multiplied by 8 to
enable an error-detection capability in the 8-point Arai
1-D DCT. It should be mentioned that this multiplication
by 8 has been performed by concatenating three zeros
to the right to mimic a 3-bit left-shifting operation. In
Section IV, the proposed error-detection scheme
presented in Fig. 2 has been evaluated and compared
Fig. 2. Proposed protection technique for the eight-point Arai to the classic DMR implementation and the unprotected
1-D DCT architecture.
version of the Arai DCT.
Using these equations, the Fk output values of the
Arai DCT can be expressed as a function of the fn input IV. EXPERIMENTAL SETUP
values as follows: In order to assess the error-detection capabilities
F0 = f0 + f1 + f2 + f3 + f4 + f5 + f6 + f7 of the proposed protection technique, three fault
injection campaigns have been conducted. In particular,
F1 = f0 - f1 - f2 + f3 + f4 - f5 - f6 + f7 the unprotected DCT (see Fig. 1), the DCT protected
F2 = f0 + f7 - f3 - f4 with a DMR scheme, and the proposed technique (see
-[m1 · ( f1 + f6 - f2 - f5 + f0 + f7 - f3 - f4)] Fig. 2) have been evaluated. The first implementation
provides no protection and minimal FPGA resources.
F3 = f0 + f7 - f3 - f4 The second one provides the upper bound protection
+[m1 · ( f1 + f6 - f2 - f5 + f0 + f7 - f3 - f4)] (in terms of error detection) and a significant area
F4 = ( f0 - f7) - [m1 · ( f2 - f5 + f1 - f6)] overhead. Therefore, both of them will be compared
with our proposed technique (third implementation) to
-[m3 · ( f3 - f4 + f2 - f5)
evaluate the protection and area tradeoff. All designs
+m2 · ( f3 - f4 + f2 - f5 - f1 + f6 - f0 + f7)] have been implemented in a Digilent Nexys 4 double
F5 = ( f0 - f7) - [m1 · ( f2 - f5 + f1 - f6)] data rate (DDR) Artix-7 FPGA together with the Xilinx
+[m3 · ( f3 - f4 + f2 - f5) soft error mitigation (SEM) intellectual property (IP)
Controller [24], which has been used to perform the
+m2 · ( f3 - f4 + f2 - f5 - f1 + f6 - f0 + f7)] fault injection campaigns. In these experiments, the
F6 = m1 · ( f2 - f5 + f1 - f6) + ( f0 - f7) FPGA failure model has been followed. This means
-{m4 · ( f1 - f6 + f0 - f7) that the errors have been injected in the configuration
memory of the device and not in the user logic. This is
+[m2 · ( f3 - f4 + f2 - f5 - f1 + f6 - f0 + f7)]}
a usual approach for FPGAs, since in a real scenario,
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 211
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

most errors would happen in the aforementioned in the configuration memory does translate into an error
configuration memory, given that it has a much higher at the output, but this error is detected by the protection
cross section compared to the user logic storage logic added to the design. This is a positive outcome
elements (user flip-flops, registers, and so on). It is since the error does not propagate outside the circuit.
worth mentioning that the FPGA failure model produces A third possibility is when an error injected in the
more complex and unpredictable effects than the regular configuration memory translates into an error at the
application-specific integrated circuit (ASIC) failure output and that error is undetected by the protection
model. While the latter usually produces errors in the logic. This is the worst scenario, since the error
data path that propagate (or are masked) toward the propagates as silent data corruption. From the point of
output, the former may also produce transformations view of the reliability, the percentage of undetected
in the actual structure of the design and its routing [25]. errors will be used as the figure of merit to compare the
Since most of the errors that happen in a real scenario fault-tolerant capabilities of the different
are isolated, single-error fault injection campaigns have implementations. The reliability results are depicted in
been conducted. First, an error is injected with the SEM Table I.
IP in one of the essential bits of the design. These are First, an exhaustive fault injection campaign was
the configuration bits that may produce an error in the conducted on the unprotected version. A total of 21
design, depending on whether the bit is critical or not 932 errors were injected in all the essential bits. Of
[26]. The circuit is exercised and the output is compared these, 15 474 did not produce any error at the output
with the previously calculated golden (error-free) output. of the design. This phenomenon is common in FPGAs
The behavior of the circuit is logged and the previously since the bit flip can be performed in a bit that does not
injected error is removed. Then, a new error is injected create a malfunction in the design (i.e., noncritical bit).
in a different essential bit of the design, and the process From the rest that actually produced an error at the
is repeated. The campaign ends when all the essential output (6458), all of them were undetected, which
bits of the design are injected and tested, performing represents a 29.4% of the performed injections.
an exhaustive fault injection campaign. Since all the TABLE I
essential bits are targeted, each implementation has RELIABILITY COMPARISON
received a different number of injections. In other
words, more injections have been performed in the
DMR version than in the unprotected version. This is
reasonable, since in a real scenario, a larger circuit
would receive a higher number of events than a smaller
one. In any case, all versions of the DCT (unprotected,
DMR, and proposed) have been fully characterized.
The results are presented and discussed in Section V.
V. EXPERIMENTAL RESULTS
It makes sense that none of the errors that
In terms of reliability, different outcomes may arise propagated to the output was detected, since the
when errors are injected. A first possibility is when an unprotected version does not contain any fault-tolerant
error injected in the configuration memory does not technique. The FPGA resources needed by this design
translate into an error at the output of the circuit. This were 378 LUTs and 96 flip-flops (see Table II).
may happen when the affected resource in the FPGA
Then, another injection campaign was conducted in
does not interact with the actual data processing, e.g.,
the DMR version of the circuit. In this case, a total of
an unused lookup table (LUT) entry, a logical masking,
47 643 injections were performed. Of this, 33 260 did
and so on. A second possibility is when an error injected
not produce any error at the output. From the rest, 12
212 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

842 errors were detected by the DMR scheme, and reliability is still in a reasonable range, much better than
1541 were undetected, which represents 3.2% of the the one offered by the unprotected version. The same
total injections. This is of course lower than the 29.4% applies to power consumption. In this case, the
of the unprotected version. It is worth noticing that the proposed technique has a consumption overhead in the
DMR scheme did not detect 100% of the errors. Errors same range as the unprotected design, which represents
in the routing can produce a small percentage of errors half of the overhead incurred by DMR. This is very
that go undetected at the output. To achieve this important in the case of small space missions (e.g.,
reliability, the FPGA resources needed were 732 LUTs CubeSats), since the power budget is typically the worst
and 193 flip-flops, which represent an overhead of 94% constraint in these types of scenarios. Finally, regarding
and 101%, respectively, compared to the unprotected the frequency, it can be seen that the proposed technique
case. So, as expected, the area approximately doubles has a delay that is around 10% worse than DMR. If
in order to reduce the percentage of undetected errors this is a hard constraint in the application, a possible
to 3.2%. solution would be to pipeline the design in order to
Finally, an error injection campaign was also increase the throughput.
conducted in the proposed ABFT-based design in order SHORTCOMINGS OF THE PROPOSED
to evaluate the error detection rate and the resource TECHNIQUE
overhead. A total of 30 190 errors were injected in this As presented in Section V, the proposed technique
design, of which 17 354 did not produce any error at has 11.1% of undetected errors, whereas DMR only
the output. Considering the rest that did produce an has 3.2%. The reason is that the ABFT strategy used is
error, 9471 were detected and 3365 were undetected, not valid in all cases as the equality still holds when the
which represents 11.1% of the total number of error affects some parts of the circuit. This is due to
injections. This means that although the proposed compensation effects between branches.
technique is eight percentage points higher than DMR
in terms of undetected errors, it manages to reduce Let us consider, for example, that there is an error
around two-thirds of the percentage of undetected in a43 from (6) in step 4. This error propagates to a51
errors produced in the unprotected version. and a52 in step 5 correspond to F4 and F5 in the output.
When the outputs are summed up in the presented
Although it is not the goal of this brief, it is interesting
algorithm, a43 is canceled as F4 + F5 = a51 + a52 = -
to point out that the behavior of the DMR and the
a43+ a44 a43 a44 ·2 a44. The same occurs with
proposed technique when single-event upsets (SEUs)
a45, a33, and other signals.
affect the user logic (i.e., flip-flops) is similar. The reason
is that the intermediate steps are not registered. This approach has given a solution with a slightly
Consequently, if only the last stage is registered, all the worse reliability but with significant savings in the area
bit flips in the flip-flops would be detected if the overhead with respect to DMR. It is possible to explore
protection technique is applied to the registered outputs. additional techniques to provide a higher protection
However, an error in the registers after comparison (e.g., by using a selective DMR), but the overhead
would not be detected in either case. would also increase. The bottom line is that there are
Next, the FPGA overheads of the different no solutions better than others, since those that excel in
techniques have been analyzed (see Table II). Our reliability would offer worse overheads and vice versa.
protection technique only needs 476 LUTs and 120 The important aspect is to have a variety of protection
flip-flops, which represent an overhead of 26% and techniques, with a wide range of the reliability versus
25%, respectively, compared to the unprotected design. overhead tradeoffs. Then, it would be up to the designer
This infers important savings compared to the resources to choosethe one that fits better the application
consumed by the DMR scheme (which doubles the area requirements, meeting the expected reliability constraint
of the unprotected design). Besides, the obtained while minimizing the incurred overhead.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 213
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

VI. CONCLUSION [6] K.-H. Huang and J. A. Abraham, "Algorithm-based fault tolerance
for matrix operations," IEEE Trans. Comput., vol. C-33, no. 6,
In this brief, a new protection technique for the DCT pp. 518-528, Jun. 1984.
implemented in an FPGA has been presented. It is [7] S.-J. Wang and N. Jha, "Algorithm-based fault tolerance for FFT
based on an algorithmic property, which states that the networks," IEEE Trans. Comput., vol. 43, no. 7, pp. 849-854,
Jul. 1994.
addition of the DCT outputs is equal to eight times the
least significant input. Using this, a checker has been [8] S. Bouguezel, M. Ahmad, and M. Swamy, "A new class of
reciprocal- orthogonal parametric transforms," IEEE Trans.
designed to reduce the number of undetected errors of Circuits Syst. I, Reg. Papers, vol. 56, no. 4, pp. 795-805, Apr.
the unprotected DCT. Due to the circuit structure, not 2009.
all the errors can be detected, since some wrong outputs [9] S. Vijay and D. Anchit, "Low power implementation of DCT for
still meet the previous algorithmic property. However, on- board satellite image processing systems," in Proc. 52nd IEEE
Int. Midwest Symp. Circuits Syst., Cancun, Mexico, Aug. 2009,
the percentage of undetected errors is close to that of pp. 774-777.
DMR and much better than the results offered by the
[10]D. F. Chiper and L. T. Cotorobai, "A unified VLSI architecture
unprotected DCT. Besides, the FPGA resource for 1D IDCT and IDST based on pseudo-band correlations," in
overhead that our technique incurs is very limited Proc. 10th Int. Conf. Electron., Comput. Artif. Intell. (ECAI),
compared to DMR (which doubles this overhead). In Iasi, Romania, Jun. 2018, pp. 1-5.
summary, the reliability versus area ratio in our technique [11]M. Masera, G. Masera, and M. Martina, "An area-efficient
variable-size fixed-point DCT architecture for HEVC encoding,"
outperforms the DMR solution, since the area of the IEEE Trans. Circuits Syst. Video Technol., vol. 30, no. 1, pp.
former is quite limited. The reduction in area and power 232-242, Jan. 2020.
consumption is especially important in small-satellite [12]S. Nouri, R. Ghaznavi-Youvalari, and J. Nurmi, "Design and
applications. The loss of reliability in respect to DMR implemen- tation of multi-purpose DCT/DST-specific accelerator
can be acceptable in applications that can allow a on heterogeneous multicore architecture," in Proc. IEEE Nordic
Circuits Syst. Conf. (NORCAS) Int. Symp. System-Chip (SoC),
percentage of wrong outputs without compromising the Tallinn, Estonia, Oct. 2018, pp. 1-10.
expected functionality (e.g., vision applications). In
[13]P. Dahiya and P. Jain, "Realization of recursive algorithm for
future studies, the protection of other DCT one- dimensional discrete cosine transform and its inverse," in
implementations, such as the Leoffler algorithm, will be Advances in System Optimization and Control (Lecture Notes
explored to keep on demonstrating the convenience of in Electrical Engi- neering), vol. 509, S. Singh, F. Wen, M. Jain,
Eds. Singapore: Springer, 2019.B. Chan Jia Ching, A. A.-H. Ab
the ABFT approach. Rahman, and N. Ahmad, "Implementa- tion of an 8 8 discrete
cosine transform on programmable system-on- chip," J. Phys.,
REFERENCES Conf. Ser., vol. 1049, Jul. 2018, Art. no. 012084.
[1] J. W. Howard and D. M. Hardage, "Spacecraft environments [14]M. Zheng, J. Zheng, Z. Chen, L. Wu, X. Yang, and N. Ling, "A
interac- tions: Space radiation and its effects on electronic reconfig- urable architecture for discrete cosine transform in video
systems," NASA, Washington, DC, USA, NASA Tech. Rep. coding," IEEE Trans. Circuits Syst. Video Technol., to be
TP-1999-209373, 1999. published.
[2] A. Holmes-Siedle and L. Adams, Handbook of Radiation Effects. [15]R. Radhika and N. Partheeban, "Improving power efficiency in
New York, NY, USA: Oxford Univ. Press, 2002, pp. 80-85. the implementation of discrete cosine transform in multicore
[3] I. Mcloughlin, V. Gupta, G. Sandhu, S. Lim, and T. Bretschneider, architecture," J. Comput. Theor. Nanosci., vol. 15, no. 8, pp.
"Fault tolerance through redundant COTS components for satellite 2597-2603, Aug. 2018.
processing applications," in Proc. 4th Int. Conf. Inf., Commun. [16]E. P. Kim and N. R. Shanbhag, "Soft N-modular redundancy,"
Signal Process. Joint 4th Pacific Rim Conf. Multimedia, Jul. IEEE Trans. Comput., vol. 61, no. 3, pp. 323-336, Mar. 2012.
2004, pp. 296-299.
[17]G. Karakonstantis, N. Banerjee, and K. Roy, "Process-variation
[4] C. L. Chen and M. Y. Hsiao, "Error-correcting codes for resilient and voltage-scalable DCT architecture for robust low-
semiconductor memory applications: A state-of-the-art review," power computing," IEEE Trans. Very Large Scale Integr. (VLSI)
IBM J. Res. Develop., vol. 28, no. 2, pp. 124-134, 1984. Syst., vol. 18, no. 10, pp. 1461-1470, Oct. 2010.
[5] Techniques for Radiation Effects Mitigation in ASICs and FPGAs [18]S.-H. Hu and J. A. Abraham, "Quality aware error detection in 2-
Hand- book, Standard ECSS-Q-HB-60-02A, ECSS Secretariat D separable linear transformation," in Proc. IEEE 25th Asian
ESA-ESTEC Requirements & Standards Division, Noordwijk, Test Symp. (ATS), Hiroshima, Japan, Nov. 2016, pp. 257-262.
The Netherlands, 2016.

214 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[19]A. Edirisuriya, A. Madanayake, V. S. Dimitrov, R. J. Cintra, and [22]Y. Arai, T. Agui, and M. Nakajima, "A fast DCT-SQ scheme for
J. Adikari, "VLSI architecture for 8-point AI-based Arai DCT images," IEICE Trans., vol. E71, no. 11, pp. 1095-1097, 1988.
having low area-time complexity and power at improved accu-
[23]Soft Error Mitigation Controller Logicore IP Product Guide
racy," J. Low Power Electron. Appl., vol. 2, no. 2, pp. 127-142,
(PG036), Xilinx, San Jose, CA, USA, Sep. 2015.
Mar. 2012.
[24]B. Du and L. Sterpone, "Online monitoring soft errors in
[20]N. Ahmed, T. Natarajan, and K. R. Rao, "Discrete cosine trans-
reconfigurable FPGA during radiation test," in Proc. IEEE Int.
form," IEEE Trans. Comput., vol. C-100, no. 1, pp. 90-93,
Instrum. Meas. Technol. Conf. (I2MTC), Turin, Italy, May
Jan. 1974.
2017, pp. 1-5.
[21]D. F. G. Coelho, S. Nimmalapalli, V. S. Dimitrov, A. Madanayake,
[25]C. D. Patterson, P. Sundararajan, B. J. Blodget, and S. P.
R. J. Cintra, and A. Tisserand, "Computation of 2D 8 8 DCT
McMillan, "Method and system for identifying essential
based on the Loeffler factorization using algebraic integer
configuration bits," U.S. Patent 7 406 673, Jul. 29, 2008.
encoding," IEEE Trans. Comput., vol. 67, no. 12, pp. 1692-
1702, Dec. 2018.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 215
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Multiresolution Fusion Techniques for Analysis of


Medical Images
Mr. N. Kiran Kumar1, Mrs. A .Mounika2, V. Nagendra Kumar3
1
Associate Professor, Dept. of ECE, Vemu Institute of Technology, P Kothakota, Tirupathi
2,3
Assistant Professor, Dept. of ECE, SVCE, Tirupathi
Email: 1kirankumarece@vemu.org1, Surendra.kr@svcolleges.edu.in2, nagendrakumar.v1@svcolleges.edu.in3

Abstract: In severe situations like accidents various dimensions of data like at flag, pixel, highlight,
occur, majority of registered cases are for bone or emblematic dimension, and so on. The combination of
head injury. For proper diagnosis, both CT scan pictures at pixel level demonstrates best for restorative
and MRI scan are required to study the damage picture preparing. It experiences the way toward
occurred for skull as well as for the internal organ
building up a composite picture from various information
injury of brain for the development of any brain
tumors. If a combination of both images is present
pictures. Different applications where the picture
in a single image, then diagnosing the patient would combination is utilized are the combination of pictures
be easier. Image Fusion is a method used to from an airborne sensor stage to assist a pilot with
combine two input images to generate a combined navigating in poor climate conditions or dimness, i.e.,
complementary information contained image. For to meld forward looking infrared (FLIR) and low light
medical image processing, the resultant image is obvious pictures (LLTV).
required to be highly reliable, low cost in terms of
In pixel-level picture combination, the essential
storage cost, uncertainty, etc. Also the information
in both CT scan and MRI scan must be retained in requirements are that the combination procedure should
the fused image for reliable study and assessment safeguard all significant data of the info symbolism in
for diagnosis. This paper deals with pixel level the composite picture called as example protection, it
fusion methods and their generic multiresolution ought not present any ancient rarities or irregularities
fusion scheme. This scheme utilizes the low pass which would divert the human spectator or following
residuals and high pass residuals to segregate the handling stages, the combination procedure ought to
information of two input images that are to be fused. be move and rotational invariant, for example the
The linear and nonlinear methods are used to combination result ought not rely upon the area or
develop the fused image. The fused image is introduction of an article the information symbolism,
evaluated in terms of fusion metrics such as
consolidating out-of-center pictures, remote detecting,
standard deviation, entropy, fusion mutual
and so on.
information, etc. The methods like laplacian
pyramid, ratio pyramid, principal component Be that as it may, for the instance of picture
analysis, average methods prove to be better arrangement combination, the extra issue of worldly
options for medical image fusion. steadiness and consistency emerge. Transient solidness
Keywords: Image Fusion, PCA, LUT, FPGA, alludes to the graylevel changes in the melded
Optimal filter, etc. succession brought about by graylevel changes in the
1. INTRODUCTION information groupings which must not be presented by
the combination plot. Transient consistency alludes to
With the appearance of imaging sensors state in graylevel changes happening in the information
restorative applications, the combination of various successions that must be available in the melded
pictures caught from various sources are important to arrangement immediately or differentiate change. These
build up a significant picture for appropriate are caused because of human visual framework which
determination. The caught pictures can be combined at is delicate to moving light boosts, so when antiques
216 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

move or time depended differentiate changes, the weighting coefficients, concerning data substance and
combination procedure will be profoundly diverting to repetition evacuation, can be dictated by a central part
the human eyewitness. examination (PCA) of all information forces. By playing
In therapeutic imaging for finding, significantly two out a PCA of the covariance grid of info forces, the
outputs are utilized to acquire the fundamental sweep weightings for each information outline are gotten from
information of malady influenced zones. They are CT the eigenvector relating to the biggest eigen value.
(Computed Tomography) picture and MRI (Magnetic Nonlinear Methods are produced dependent on
Resonance Imaging) picture. In situations where mind basic nonlinear administrator, for example, max or min.
related pictures are to be examined these two pictures In the event that in all information pictures the splendid
are considered for appraisal. In the event that there items are of intrigue, a great decision is to register the
exists an answer for consolidation these two subtleties combined picture by a pixel-by-pixel utilization of the
absent much misfortune, it would assist specialist with most extreme administrator. Essentially these utilization
assessing the phase of ailment accurately and push him morphological administrators, for example, opening or
to legitimately analyze the patient to propose drug or shutting, the genuine combination process is performed
elective medical procedure. The CT check is utilized by the use of restrictive disintegration and expansion
to watch the bone wounds though MRI Scan is utilized administrators. In abnormal state arithmetical expansion
to watch the mind tumors. The mix of these two is of picture morphology, the fundamental sorts
assessed for complete mind analysis, particularly when characterized in picture polynomial math are esteem
an individual has been harmed in a mishap. sets, arrange sets which permit the coordination of
This paper manages the strategies utilized for various goals and decorations, pictures and formats.
therapeutic picture combination dependent on pixel level For every fundamental kind double and unary activities
combination. The measurements utilized for contrasting are characterized which reach from the essential set
combined pictures are standard deviation, entropy, tasks to progressively complex ones for the activities
PSNR, SNR and Mutual Information. These on pictures and layouts. Picture variable based math
measurements demonstrate whether the data in melded has been utilized conventionally to consolidate
picture is right to use or not. multisensor pictures.

2. EXISTING METHODS Counterfeit Neural Networks are utilized to


intertwine distinctive sensor motions in natural
There exist a few ways to deal with the pixel level frameworks. For instance, Rattlesnakes (and the general
combination [1-7] of spatially enrolled info pictures, group of pit snakes) have supposed pit organs which
larger part of them are produced for the combination are touchy to warm radiation through a thick system of
of stationary information pictures. Because of the static nerve filaments. The yield of these pit organs is bolstered
idea of the information, transient angles emerging in the to the optical tectum, where it is joined with the nerve
combination procedure of picture groupings, for signals acquired from the eyes. Newman and Hartline
example soundness and consistency require not tended recognized six unique sorts of bimodal neurons blending
to. The picture combination techniques can contain the two signs dependent on a modern mix of
direct superposition, nonlinear strategies, improvement concealment and upgrade.
approaches, fake neural systems, picture pyramids,
wavelet change, conventional multiresolution Improvement Approaches utilize bayesian
combination plot, and so on. streamlining issue. Utilizing the multisensor picture
information and an a-prori model of the combination
Direct Superposition Method speaks to the clear result, the objective is to locate the intertwined picture
technique to assemble a melded picture of a few info which augments the a-posteriori likelihood. Because
outlines is playing out the combination as a weighted of the way that this issue can't be unraveled as a rule, a
superposition of all information outlines. The ideal
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 217
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

few improvements are presented: All info pictures are - the inclination pyramid - results, if the info picture is
demonstrated as markov irregular fields to characterize decayed into its directional edge portrayal utilizing
a vitality work which portrays the combination directional subordinate channelsWavelet Transform is
objective. Because of the equality of gibbs irregular fields a flag examination strategy like picture pyramids, called
and markov arbitrary fields, this vitality capacity can as discrete wavelet change. The principle contrast is
be communicated as an entirety of purported coterie that while picture pyramids lead to an overcomplete
possibilities, where just pixels in a predefined set of change coefficients, the wavelet change results in
neighborhood influence the real pixel. The combination a nonredundant picture portrayal. The discrete 2-
assignment at that point comprises of an amplification diminish wavelet change is figured by the recursive
of the vitality work. Since this vitality capacity will be utilization of lowpass and highpass channels toward
non-curved as a rule, regularly stochastic improvement every path of the information picture (for example lines
systems, for example, mimicked tempering or changes and segments) trailed by subsampling. One noteworthy
like iterated contingent modes will be utilized. disadvantage of the wavelet change when connected
Picture pyramids have been at first portrayed for to picture combination is its notable move reliance, for
multiresolution picture examination [8-10] and as a example a straightforward move of the info flag may
model for the binocular combination in human vision. A prompt total distinctive change coefficients. This
conventional picture pyramid is an arrangement of outcomes in conflicting intertwined pictures when
pictures where each picture is built by lowpass conjured in picture arrangement combination.
separating and subsampling from its antecedent. To beat the move reliance of the wavelet
Because of inspecting, the picture estimate is split in combination plot, the information pictures must be
both spatial ways at each dimension of the deterioration decayed into a move invariant portrayal. There are a
procedure, accordingly prompting a multiresolution flag few different ways to accomplish this: The direct path
portrayal. The distinction between the information is to register the wavelet change for all conceivable round
picture and the separated picture is important to permit movements of the info flag. For this situation, not all
a correct remaking from the pyramidal portrayal. The movements are vital and it is conceivable to build up a
picture pyramid approach accordingly prompts a flag proficient calculation plot for the subsequent wavelet
portrayal with two pyramids: The smoothing pyramid portrayal. Another straightforward methodology is to
containing the arrived at the midpoint of pixel esteems, drop the subsampling in the decay procedure and rather
and the distinction pyramid containing the pixel adjust the channels at every deterioration level, bringing
contrasts, for example the edges. So the distinction about a very repetitive flag portrayal.
pyramid can be seen as a multiresolution edge portrayal 3. PROPOSED METHODS
of the info picture. The genuine combination process
can be portrayed by a nonexclusive multiresolution The Generic Multiresolution Fusion Scheme builds
combination conspire which is material both to picture up a neighborhood differentiate change i.e., at edges
pyramids and the wavelet approach. as both picture pyramids and the wavelet change result
in a multiresolution edge portrayal. The information
There are a few alterations of this nonexclusive pictures are decayed into their multiscale edge portrayal,
pyramid development strategy portrayed previously. A utilizing either any picture pyramid or any wavelet
few creators propose the calculation of nonlinear change. The multiscale fearless pictures are joined
pyramids, for example, the proportion and difference utilizing the high pass residuals and low pass residuals
pyramid, where the multiscale edge portrayal is by utilizing wavelets by the procedure of pixel-by-pixel
registered by a pixel-by-pixel division of neighboring choice of the coefficients with greatest size. At last the
goals. A further change is to substitute the direct channels melded picture is registered by an utilization of the fitting
by morphological nonlinear channels, bringing about the remaking plan. The comparing figure is appeared in
morphological pyramid. Another sort of picture pyramid figure 1.
218 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

diagnosis, both CT scan and MRI scan are required to


study the damage occurred for skull as well as for the
internal organ injury of brain for the development of
any brain tumors. If a combination of both images is
present in a single image, then diagnosing the patient
would be easier. Hence a generic mutliresolution fusion
scheme is used to evaluate the fused image by various
linear and nonlinear techniques. Among them contrast
or morphological pyramid prove to be better methods
if good SNR and PSNR are required respectively. Also
Ratio or Laplacian Pyramid for standard deviation,
Average method for Entropy and by Principal
Figure 1: Generic Multiresolution Fusion Scheme Component Analysis or Select Maximum Method for
The measurements used to assess the melded picture Mutual Information proved to be better choices. Hence
can be founded on whether a reference picture is based on the requirement i.e., the choice of features
accessible or not. On the off chance that the reference like similarity, contrast, rich information and better
picture is accessible, the SNR and PSNR can be quality of fused images, the choice of fusion method
utilized. Where SNR is flag to clamor proportion and can be done to assess medical images for proper
is utilized to gauge the proportion among data and immediate diagnosis.
commotion of the intertwined picture and PSNR is Peak 5. ACKNOWLEDGEMENTS
Signal to Noise Ratio and it speaks to the quantity of
This paper is dedicated to our Parents, Colleagues
dark dimensions in the picture partitioned by the relating
and Friends for their support without which the
pixels in the reference and the melded pictures. The
successful completion of this paper is not possible.
higher qualities comparing to these measurements speak
to the comparability of reference picture and combined 6. REFERENCES
picture and predominant combination of pictures [1] S. M. Nemalidinne and D. Gupta, ``Nonsubsampled contourlet
separately. domain visible and infrared image fusion framework for fire
detection using pulse coupled neural network and spatial fuzzy
In the event that just the intertwined picture is clustering,'' Fire Saf. J., vol. 101, pp. 84_101, Oct. 2018.
accessible, the measurements utilized for assessment [2] Q.-X. Zhang, G.-H. Lin, Y.-M. Zhang, G. Xu, and J.-J. Wang,
are Standard deviation, entropy, combination shared ``Wildland forest fire smoke detection based on faster R-CNN
using synthetic smoke images,'' Procedia Eng., vol. 211, pp.
data, and so forth. The standard deviation is utilized to 441_446, Jan. 2018.
quantify the difference in the intertwined picture, a high
[3] P. Li and W. Zhao, ``Image fire detection algorithms based on
esteem demonstrates high complexity combined picture. convolutional neural networks,'' Case Stud. Thermal Eng., vol.
Entropy is utilized to quantify the data substance of a 19, Jun. 2020, Art. no. 100625.
combined picture; a high entropy esteem demonstrates [4] P. Coppo, ``Simulation of fire detection by infrared imagers from
the intertwined picture as rich data content. Combination geostationary satellites,'' Remote Sens. Environ., vol. 162, pp.
84_98, Jun. 2015.
Mutual Information is utilized to register the level of
reliance between the information pictures and [5] C. Singh, E. Walia, and K. P. Kaur, ``Enhancing color image retrieval
performance with feature fusion and non-linear support vector
intertwined picture, a vast esteem shows a superior machine classifier,'' Optik, vol. 158, pp. 127_141, Apr. 2018.
nature of melded picture.
4. CONCLUSION
In severe situations like accidents occur, majority of
registered cases are for bone or head injury. For proper

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 219
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

CNN Technique for Deblurring and Super-Resolution of


Image
Ms. K. Deepika1, Ms. M. Navya Sree2, Mr. E. Kalyan Kumar3, Mr. B. Balaji4
1,2,3,4
UG Student, Dept.of ECE, VEMU IT, P.Kothakota
Email: deepikareddy2468@gmail.com1, eruvaramchandu99@gmail.com3

Abstract - Recently multiple high-performance divided into two kinds: internal methods and external
algorithms have been developed to infer high- example-based methods.
resolution images from low-resolution image input
using deep learning algorithms. The related The pipeline of most external example-based
problem of super-resolution from blurred or approaches is shared, where the focus is on learning
corrupted low-resolution images has however and optimizing the dictionaries or learning mapping
received much less attention. In this work, I functions. Despite some similarities convolutional neural
propose a new deep learning approach that networks (CNNs) based technique are different
simultaneously addresses deblurring and super- because they attempt to learn an end-to-end mapping
resolution from blurred low- resolution images. I function between LR and HR images without addressing
evaluate the state-of-the-art super-resolution explicitly the problem of selection and composition of
convolutional neural network (SRCNN)
dictionaries and manifolds. Currently, the majority of
architecture proposed for the blurred
the best performing state-of-the-art methods for SR
reconstruction scenario and propose a revised
deeper architecture that proves its superiority are based on deep neural networks. The pioneering
experimentally both when the levels of blur are SRCNN model of Dong et al. introduced a simple yet
known and unknown a prior architecture of SRCNN efficient deep architecture for SR.
corresponds to a relatively small network that All these algorithms assume that a constant amount
contains 8,032 parameters and is composed of 2
of noising or blurring is applied to all training and testing
hidden layers: added to the input and the output
images. In this study I address an additional factor of
layers there are 4 layers in total. The objective is
to learn a mapping function F performing three unknown amount of blurring applied to images that are
tasks: patch extraction, non-linear mapping, and received by the SR pipeline.
reconstruction. II. LITERATURE REVIEW
Index Terms - deep learning, SRCNN, patch M. Agrawal et-al, presented a technique for
extraction. enhancing resolution of images by interpolating high
I. INTRODUCTION frequency sub-bands generated using lifting wavelet
As, Single image super-resolution (SR) is an essential transform (LWT) and spatial information of input low
application in computer vision that proves useful in resolution (LR) image. Stationary wavelet transform
multiple areas such as remote sensing image processing, (SWT) is used at intermediate stage for edge
security systems, medical imaging, etc. The SR task is enhancement. The input image is decomposed using
an ill-posed problem, where one LR image has many LWT in order to generate high frequency (HF) sub
solutions for HR image. The topic of image super bands. The generated HF sub bands are interpolated
resolution for the first time. Since then the problem has further. Different high frequency sub-bands obtained
received a lot of attention, and typical state-of-the-art through SWT are added to correct the estimated HF
methods perform as example-based approaches where sub bands. The input LR image is interpolated in parallel.
learned prior information alleviates the problem of All these sub-bands and estimated LR image are
multiple solutions. The example-based methods are reconstructed by inverse lifting wavelet transformation
220 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

(ILWT) to produce high resolution image. The complex high- dimensional mapping given massive
qualitative, quantitative and visual images of the raw data.
described technique show the superiority of the • The perspective of DL, although many other
proposed method over conventional and state-of-the techniques such as data pre -processing and model
art methods. training techniques are also quite important
combination of DL and domain knowledge in SISR is
Y. Sun Et-al, presented an observation for medical
usually the key to success and is often reflected in
imaging and astronomical, high-resolution (HR) images
the innovations of neural network architectures and
are urgently desired and required. In recent years, many optimization objectives for SISR.
researchers have proposed various ways to achieve
the goal of image super-resolution (SR). ranging from • For each category, a baseline is first established, and
simple linear interpolation schemes to nonlinear complex several critical limitations of the baseline are
summarized. Then, representative works on
methods. In this paper, we deal with the SR
overcoming these limitations are presented based on
reconstruction problem based on the theory of their original content, as well as our critical exposition
compressive sensing, which uses a redundant dictionary and analyses, and relevant comparisons are conducted
instead of a conventional orthogonal basis. We further from a variety of perspectives.
demonstrate better results on true images in terms of
peak signal-to-noise ratio (PSNR) and root mean- It is well known that an image is clear if I can perceive
square error (RMSE) and give several important the shape of all its objects correctly. For example, a
improvements, compared with other methods. face image is clear if I can recognize lips, eyes, nose,
etc. The shapes of contained objects are recognized
Jian-Feng Cai, Hui Ji, Chaoqiang Liu, and Zuowei from its edges. By contrast, blurring means reducing
Shen proposed a new optimization approach to remove the edge content and making the transition from one
complex motion blurring from a single image by color to another very smooth think that zooming is one
introducing new sparsity-based regularization terms on type of blurring. Actually, if an image is zoomed using
both images and motion-blur kernels. Based on the pixel replication and large zooming factor, the resulting
assumption that the motion-blur kernel can be image is a blurred image. However, the difference
approximated by a smooth function with the support between zooming and blurring is that the number of
close to a continuous "thin" curve, we proposed mixed pixels in the zoomed image is larger than the number of
regularization strategy for the blur kernel. The framelet pixels in the original image, but the number of pixels in
system proposed by A.Ron and Z.Shen's analysis the original image and blurred one is the same. Blurring
operator and I. Daubechies, B. Han, A. Ron, and Z. can be thought of as applying some filter to an image.
Shen, "Framelets: MRA-based constructions of There are many kind of filters that can be used to
wavelet frames," is used to represent both original perform blurring, such as average filter, weighted
images and motion-blur kernels for its implementation average filter, Gaussian filter and motion filter. The
simplicity and computational efficiency to provide a average filter has three properties: it is odd ordered,
powerful algorithm for uniform motion deblurring. the sum of all its elements equal 1, and all its elements
III. EXISTING METHOD are the same. The amount of the blurring is increased
when the size of the kernel is increased. That is because
• Single image super-resolution (SISR) is a notoriously
a large number of pixels are included and one smooth
challenging ill-posed problem because a specific low-
resolution (LR) input can correspond to a crop of
transition is defined. The weighted average filter gives
possible high- resolution (HR) images. more weight to the center value. As a result, the
contribution of the center pixel becomes more than the
• one is the unclear definition of the mapping that I aim rest of the pixels.
to develop between the LR space and the HR space,
and the other is the inefficiency of establishing a

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 221
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IV. PROPOSED METHOD V. SYSTEM ARCHITECTURE


• Presented a novel deep learning approach for single
image super-resolution (SR). That conventional
sparse-coding-based SR methods can be 12
reformulated into a deep convolutional neural
network.
• The proposed approach, SRCNN, learns an end-to-
end mapping between low- and high-resolution images,
with little extra pre/post-processing beyond the
optimization.
• I conjecture that additional performance can be
further gained by exploring more filters and different Fig.1 System Architecture.
training strategies. The proposed network aims to learn an end-to-end
• The proposed structure, with its advantages of mapping F, which takes the blurred LR image x as input,
simplicity and robustness, could be applied to other and directly provides the deblurred HR reconstruction
low-level vision problems, such as image deblurring F(x). Our architecture includes four convolutional layers
or simultaneous SR+denoising. in addition to a concatenation layer as demonstrated.
The proposed network aims to learn an end-to-end The first layer is feature extraction to compute the low
mapping F, which takes the blurred LR image x as input, level features and contains 32-feature maps (32 filters)
and directly provides the deblurred HR reconstruction with filter size 9 × 9. The second layer is a feature
F(x). The architecture includes four convolutional layers enhancement layer which provides enhanced features
in addition to a concatenation layer as demonstrated. from the output of the first layer, and contains 32-features
The first layer is feature extraction to compute the low maps with filters of size 5 × 5. The third layer
level features and contains 32-feature maps (32 filters) concatenates features from the first two layers creating
with filter size 9 × 9. The second layer is a feature a merged vector with low-level and enhanced features.
enhancement layer which provides enhanced features This layer contains 64-features maps or 32-features
from the output of the first layer, and contains 32-features maps depending on the operation defining the merger
maps with filters of size 5×5. The third layer procedure. Such operations include summation,
concatenates features from the first two layers creating maximum, subtraction, averaging, multiplication,
a merged vector with low-level and enhanced features. concatenation. All these operations except the last one
take the same size of inputs and return the same shape.
This layer contains 64-features maps or 32-features Concatenation allows inputs of different sizes. We have
maps depending on the operation defining the merger empirically observed the best performance associated
procedure. Such operations include summation, with the concatenation operation. The fourth layer
maximum, subtraction, averaging, multiplication, performs the second-order mapping. The final fifth layer
concatenation. All these operations except the last one reconstructs the output HR image. F(x) is the
take the same size of inputs and return the same shape. reconstructed output image which has the same size as
Concatenation allows inputs of different sizes. I have the input image. The activation functions used are ReLU.
empirically observed the best performance associated Mean Squared Error (MSE) is used as the cost
with the concatenation operation. The fourth layer function, and the cost function is minimized using Adam
performs the second-order mapping. The final fifth layer optimization.
reconstructs the output HR image.

222 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

VI. RESULTS additional performance can be further gained by


BLUR IMAGE: exploring more filters and different training strategies.
Besides, the proposed structure, with its advantages of
simplicity and robustness, could be applied to other
low-level vision problems, such as image deblurring or
simultaneous SR+denoising. One could also investigate
a network to cope with different upscaling factors.
REFERENCES
[1] C. Dong, C. Loy, K. He, and X. Tang, "Image superresolution
using deep convolutionalnetworks," IEEE transactions on pattern
analysis and machine intelligence, vol. 38, no. 2, pp.295-307,
2016.
LOW RESOLUTION: [2] R. Tsai, "Multiframe image restoration and registration," Advances
in Computer Visionand Image Processing., vol. 1, no. 2, pp. 317-
339, 1984.
[3] C. Yang, C. Ma, and M. Yang, "Single-image superresolution: A
benchmark," in Proc.ECCV. Springer, 2014, pp. 372-386.
[4] D. Glasner, S. Bagon, and M. Irani, "Super-resolution from a
single image," in Proc. ICCV.
[5] IEEE, 2009, pp. 349-356.

HIGH RESOLUTION: [6] [5] Z. Cui, H. Chang, S. Shan, B. Zhong, and X. Chen, "Deep
network cascade for imagesuper-resolution," in Proc. ECCV.
Springer, 2014, pp. 49-64.
[7] J. Huang, A. Singh, and N. Ahuja, "Single image superresolution
from transformed selfexemplars,"in Proc. CVPR, 2015, pp. 5197-
5206.
[8] J. Yang, J. Wright, T. S. Huang, and Y. Ma, "Image super-resolution
via sparserepresentation," IEEE Trans. Image Process., vol. 19,
no. 11, pp. 2861-2873, 2010.

VII. CONCLUSION [9] M. Bevilacqua, A. Roumy, C. Guillemot, and M. Alberi- Morel,


"Low-complexity singleimagesuper-resolution based on
I have presented a novel deep learning approach nonnegative neighbor embedding," in Proc. BMVC.
for single image super-resolution (SR).I show that [10]J. Yang, Z. Wang, Z. Lin, S. Cohen, and T. Huang, "Coupled
conventional sparse-coding-based SR methods can be dictionary training for imagesuperresolution," IEEE Trans. Image
Process., vol. 21, no. 8, pp. 3467-3478, 2012.
12 reformulated into a deep convolutional neural
[11]R. Timofte, V. De Smet, and L. Van Gool, "Anchored
network. The proposed approach, SRCNN, learns an neighbourhood regressionfor fastexample-based superresolution,"
end-to-end mapping between low- and high-resolution in Proc. ICCV, 2013, pp. 1920-1927.
images, with little extra pre/post-processing beyond the [12]R. Timofte, V. De Smet, and L. Van Gool, "A+: Adjusted anchored
optimization. With a lightweight structure, the SRCNN neighbourhood regression for fast superresolution," in Proc.
has achieved superior performance than the state-of- ACCV. Springer, 2014, pp. 111- 126.

the-art methods. I have proposed a new architecture [13]S. Schulter, C. Leistner, and H. Bischof, "Fast and accurate image
upscaling withsuper- resolution forests," in Proc. CVPR, 2015,
DBSRCNN that enhances the reconstruction by pp. 3791-3799. [13] C. Dong, C. Loy, K. He,and X. Tang,
boosting the relevant features that were originally lost "Learning a deep convolutional network for image super-
in the SRCNN pipeline. Our experimental study with resolution," in Proc.ECCV. Springer, 2014, pp. 184-199.
different levels of Gaussian blur demonstrates that our
revised deeper architecture performs better in both blind
and non-blind testing scenarios. Icon injecture that
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 223
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Raspberry Pi Based Vehicle Anti-Theft Face


Recognition System
P. Subbarayudu1, S. Mohammed Sharif2, S. Noor Mohammed3
1
Assistant Professor, Department of ECE, K.S.R.M.C.E.(Autonomous), Kadapa, A.P, India.
2,3
UG Student, Department of ECE, K.S.R.M.C.E.(Autonomous), Kadapa, A.P, India.
Email: subbarayudu@ksrmce.ac.in1, shaiknoormohammed10@gmail.com2, Shaiksharif208@gmail.com3

Abstract- Today, it is not difficult to make to the database the system will stop immediately. All
duplicates of vehicle keys and using such keys the process here is controlled by programmed
increases the risk of robbery.For such problems, Raspberry Pi.
we hereby propose an efficient andeliablesolution.
Our system uses a face recognition system to A. EXISTINGMETHOD
identify the authorized users of the vehicles and 1) Intheexisting system of car securities, various sensors
only authorized users are allowed to use the vehicle. are Used door sensors, engine sensors, light sensors,
This allows for a fast easy to use the authentication etc.
system. The system uses a Raspberry Pi circuit, it
also consists of a camera. When we turn on the 2) Where the door sensors are used for locking and
system authority provided by 3 options that are unlocking The car doors through suitable key, when
registration, Start, and clear data, while registering, any duplicate key is Inserted it sends some signals to
it first scans the Owner's face. After successful the controller, however
registration, the owner can startthe vehicle. If an 3)When key is made suitable as the original one the sensor
unauthorized user tries to use the car, the systems Might not be able to differentiate the changes in the
cans the person's face and checks whether face system.
matches with the authorized face, if it does not
4) Hence resulting in the car theft.
match the system denies. In this way, the system
helps to secure such intelligent vehicles. II. LITERATURE CONCERN TO VEHICLE
IndexTerms -Raspberry Pi, vehiclekeys, THEFT
authentication. This paper aims to deploy a network that consists a
I. INTRODUCTION group of computers connected with a micro computer
with a camera.
With the new modern era development of new
technologies is amust be it in the management sector or The system takes images of people, analyze, detect
in the technical sector. improvements are necessary for and recognize human faces using image processing
every field. regarding the project chosen in the field of algorithms.The system can serve as a security system
vehicle security. various techniques have been improved in public places like Malls, Universities, and airports. It
such as biometrics, retinal scanning, image processing. can detect and recognize a human face in different
Apart from all the improvised techniques the theft of situations and scenarios. This system implements
vehicle still remains high in order to maintain the car "Boosted Cascade of Simple Features algorithm" to
security the system needs to be efficient, robust and detect human faces. "Local Binary Pattern algorithm"
highly reliable soin this paper, the security system to recognize these faces. Raspberry Pi is the main
involving face detection using Raspberry Pi, FRS component connected to a camera for image capturing.
algorithm along with database which consist of images All needed programs were written in python. Tests and
uploaded by theowner of vehicle. If the newly scanned performance analysis were done to verify the
image does not matchwith the image uploaded earlier efficiencyof this system. The Automatic Face

224 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Recognition system is widely applied in new WORKING


technologies. This system works beyond the ability of • Step 1: Our system uses a face recognition system
human vision. The limited vision ofhuman eye in to identify the authorized users of the vehicles and
identifying vast number of human faces isovercome by only the authorized users are allowed to use the
the automatic face recognition with many vehicle.
moreadvantages. The basic purpose of face recognition
• Step 2: The system uses a raspberry pi circuit, it
system is to compare the image video which is stored
consists of LCD display, a motor & a buzzer alarm, it
in a database with the image video in realtime variation. also consists of a camera.
Many techniques have been used in face recognition
system. This paper presents asurvey of several • Step 3: When we turn on the system authority
techniques used in face recognition system,an approach provided by 3 options that are registration, start, and
to the detection and identification of human face. clear data, while registering, it first scans the owner's
face.
III. FACE RECOGNITION ALGORITHM
• Step 4: After successful registration, the owner can
The face recognition algorithm is programmed in such start the vehicle.
a way, such that it identifies the faces by retrieving facial
• Step 5: If an unauthorized user tries to use thecar,
data fromthe digital image of a person. The earlier the system scans the person's face, and checks
system used simplegeometric models, but in this era, whether the face matches with the authorized face,
the face recognition processhas evolved into if it doesnot match the system denies and the buzzer
sophisticated representations and identifyingprocesses. starts.
FRS is in high demand in the commercial market andhas
• Step6: In this way system helps to secure such
received great attention in the research field of
intelligent vehicles.
biometricsand computer vision. FRS uses still images
for recognition. i. HARDWAREREQUIREMENTS
IV. PROPOSED METHOD • RPS
• LCDDISPLAY
• BUZZER
• WEBCAM
• DCMOTOR
• SWITCH
• WIRES
Fig:1Blockdiagram
ii. SOFTWAREREQUIREMENTS
Figure shows theblockdiagram representationof the
• Python
vehicle security system The central processing unit here
is the Raspberry Pi system .it controls the , camera, • OS:Linux
DC motor, Buzzerand operations related to the V. RASPBERRY PI
database. When an unauthorized image is detected by
the programmed algorithm, the controllertakes the The Raspberry Pi is a credit-card sized computer
information in the hold and stops the working of a motor that plugs into your TV and a keyboard. It is a capable
which then informs the authorized user. little computer which can be used in electronics projects,
and

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 225
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig:2 RaspberryPi

for many of the things that your desktop PC does,


like spreadsheets, word-processing and games. It also
playshigh-definition video. We want to see it being used Fig:4ARecognised face

bykids all over the world to learn how computers


work,how to manipulate the electronic world around
them, andhow to program. The Raspberry Pi is a low
cost, credit-card sized computer that plugs into a
computer monitoror TV, and uses a standard keyboard
and mouse. It is acapable little device that enables
people of all ages to explore computing, and to learn
how to program in languages like Scratch and Python. Fig:5An unknown face
It's capable of doing everything you'd expect a desktop VII. CONCLSION
computer to do, from browsing the internet and playing
high-definition video, to making spreadsheets, word- The proposed system is a novel idea that enables
processing, and playing games. the manufacturer of a vehicle toembed the security
system inside the vehicle at the time of manufacturing.
VI. RESULTS Here it is illustrated how face recognition can be used
The program for face detection is coded using in the detection of vehicle theft. By using this particular
pythonlanguage. This program is run in the Raspberry system, we can increase and maintain the safety of the
Pi. Theimage of the person is captured immediately by vehicle by providing special programmed functions to
the USBCAM and stored in data base. It can be seen it. If any unauthorized user tries to use or stole the car
in VNC viewer. This is then cropped to obtain the face. the buzzer will ring otherwise the engine will on.
This facedetection procedures shown below in which VIII. FUTURESCOPE
the face is cropped by the square generated by the Har
Cascade Classifier. This detected image is then Preventing the frauds at ATMs in India. A database
compared with the predefined images of the owner of allcustomers with ATM cards in India can be created
stored in the database. Ifthe image will match the dc and facialrecognition systems can be installed. So,
motor will on otherwise buzzer will ring continuously. whenever user willenter in ATM his photograph will be
taken to permit theaccess after it is being matched with
stored photo from thedatabase. Reporting duplicate
voters in India. Passport and visa verification can also
bed one using this technology.

Fig:3Proposdestructure

226 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES [5] J.-G.Lu,"Title of paper with only the first word capitalized," J.
Name Stand. Abbrev., inpress.
[1] M. King and B. Zhu, "Gaming strategies," in Path Planningto the
West, vol. II, S. Tang and M. King, Eds. Xian: Jiaoda Press,1998, [6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa,
pp.158-176.. "Electronspectroscopy studies on magneto-optical media and
plastic substrate interface," Translated J. Magn. Japan, vol. 2,
[2] H. Simpson, Dumb Robots, 3rd ed., Springfield: UOS pp.740-741, August 1987 [Digest 9th Annual Conf. Magnetics
Press,2004,pp.6-9. Japan, p.301,1982].
[3] M. King, B. Zhu, and S. Tang, "Optimal path planning,"Mobile [7] M. Young, The Technical Writer's Handbook, Mill
Robots,vol.8,no. 2,pp. 520-531,March 2001. Valley,CA:University Science, 1989.
[4] B.Simpson,etal, "Title of paper goes here if known,"unpublished.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 227
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

AI Vision for Spy


Rachana Veerabommala1, S. Murali Mohan2, Bhargav Jonnagadla3
1
PG Scholar, Dept. of ECE, Indira Gandhi Delhi Technical University for Women, Delhi, India
2
Professor, Dept. of ECE, Vemu Institute of Technology, P. Kothakota
3
UG Scholar, Dept. of ECE, Mother Theresa Institute of Engineering and Technology, Palamaner, India
Email: rachana.veerabommala@gmail.com1, bhargavjonnagadla@gmail.com3

Abstract- Most of the people who have seen common home computer software applications. This
the glasses, but may not allowed speaking publicly; system is working throughout the world as an artificial
a major feature of the glasses was the location brain. .It is related to the similar task of using computers
information. Google will be able to capture images
to understand human intelligence.
to its computers and augmented reality information
returns to the person wearing them through the II. CLASSIFICATION OFARTIFICIAL
camera already built-in on the glasses. For moment, INTELLIGENCE
if a person looking at a landmark then he could
see historical and detailed information. Also
Under such a system ,an AI can perform more
comments about it that their friend's left. If it's facial human-like functions with equivalent levels of proficiency
recognition software becomes moderate and will be considered as a more evolved type of AI. Based
accurate enough, the glasses could remind a wearer on this criterion, there are two ways in which AI is
and also tells us when and how he met the foggy generally classified. (i)strong AI and (ii) is weak AI.
familiar person standing in front of him at a function
A. STRONG AI
or party. A computer which is spectacle based
operated directly through your eyes rather than Strong AI is term used to describe a certain mind
your pouch or pocket. A gifted technology for all set of AI development. Strong AI's goal to develop AI
kinds of Handicapped/disabled people. to the point where the machine's intellectual capability
Keywords- Virtual reality, Augmented Reality, is functionally equally to a human's. It is theoretical form
Eye-Tap. of machine intelligence that is equal to human intelligence.
Key characteristics of Strong AI include the ability to
I. INTRODUCTION
reason, solve puzzles ,make judgements, plan, learn and
Now a days the people are inventing so many communicate. It should also have consciousness,
technologies, one of the technology is artificial objective thoughts, self-awareness, sentience and
intelligence. Artificial intelligence is defined as intelligence sapience. It is also called True intelligence or Artificial
exhibited by an artificial entity. Such a system is generally general intelligence.
assumed to be a computer. Although AI has a strong
B. WEAK AI
science fiction connotation, it forms a vital branch of
computer science dealing with intelligent behaviour, Weak AI or narrow AI is a machine intelligence that
learning and adaption in machines. Research in AI is is limited to a specific or narrow area. Weak AI simulates
concerned with producing machines to automate tasks human cognition and benefits mankind by automating
requiring intelligent behaviour. Examples include control, time-consuming tasks and by analysing data in ways
planning and scheduling the ability to answer diagnostic that humans sometimes can't. Weak AI lacks human
and consumer questions, speech and facial recognition. consciousness, though it may be able to simulate it.
As such it has become a scientific discipline, focused Narrow or weak AI system don't have general
on providing solutions to real life problems. AI systems intelligence; they have specific intelligence. Weak AI
are now in routine use in economics, medicine, helps turn big data into usable information by detecting
engineering and military as well as being built into many patterns and mankind predictions. Examples include
228 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

news feed, purchases some products online and IV. FUNCTIONING


answers users spoken questions. A. BLOCK DIAGRAM
III. METHODOLOGY
We are using the idea of weak AI in vision platform.
Vision is an enterprise-grade, software as-a-service
platform that enables you to manage your mobile assets
fast and effectively ,with no software to install to get
started. A complete supply chain control tower
experience at your fingertips. Vision systems are being
increasingly used in a variety of industrial situations to
monitor and inspect manufacturing process,
components and equipment. This paper describes a
hybrid vision system combining feature extraction with
artificial intelligence for piece part recognition,
orientation, tracking and inspection. And it all begins
with computer vision. Computer vision for augmented
reality enables computers to obtain, process, analyse Fig.,2.BLOCK DIAGRAM

and understand digital videos and images. By looking Here input can be taken from both voice commands
at an object and its appearance, location and the or through visual information.
settings, it identifies what the object is.
• Input through visual information.:
For any information that has to be taken from visual
needs camera module
i. CAMERA Camera Module
The Raspberry Pi camera module is capable of taking
full HD 1080p photo and video and can be controlled
programmatically.
• Connecting the camera
Fig.,1. AI VISION The flex cable inserts into the connector situated
Whereas, virtual reality is the name for computer between the Ethernet and HDMI ports, with the silver
technology that makes a person feel like they are connectors facing the HDMI port.
somewhere else. It uses software to produce images The camera may come with a small piece of
,sounds and other sensations to create a different place, translucent blue plastic film covering the lens. This is
so that a user feels like he or she is really part of this only present to protect the lens while it is being mailed
other place. These two things plays a major role in the to you, and needs to be removed by gently peeling it
vision platform. off.
The camera may come with a small piece of
translucent blue plastic film covering the lens. This is
only present to protect the lens while it is being mailed
to you, and needs to be removed by gently peeling it
off.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 229
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

ii. IMAGE RECOGNITION


OpenCV (Open Source Computer Vision) is a
popular computer vision library started by Intel in 1999.
The cross-platform library sets its focus on real-time
image processing and includes patent-free
implementations of the latest computer vision algorithms.
In 2008 Willow Garage took over support and
OpenCV 2.3.1 now comes with a programming
interface to C, C++, Python and Android. OpenCV is
Fig.1. HEADSET
released under a BSD license so it is used in academic
projects and commercial products alike. a) Output through voice :
• Input through voice commands: In order to tak output through voice a speaker is an
audio device is used similar as giving input through voice
Using headset :Sound can be a little challenging on
the Raspberry Pi when also connecting certain b) Output through display(visual):
hardware. The Raspberry Pi has no dedicated sound If the user wants to take output through visual then
hardware, but uses the 2 available PWM (Pulse Width he or she can just able to access the required content
Modulation) channels to generate an audio signal for through screen provided which is same as taken input
the 3.5mm audio output socket. through visual.
iii. Amazon voice service :
Amazon allows developers to build and publish skills
for Alexa using the Alexa Skills Kit known as Alexa
Skills. Amazon allows device manufacturers to integrate
Alexa voice capabilities into their own connected
products by using the Alexa Voice Service (AVS), a
cloud-based service that provides APIs to interface with Fig.,4.SCREEN

Alexa. For the entire system to make functional we need


iv. Intelligent user interface(IUI) : power source which is equivalent to rating of power
bank
An intelligent user interface (Intelligent UI, IUI, or
sometimes Interface Agent) is a user interface (UI) that
involves some aspect of artificial intelligence (AI or
computational intelligence).
Generally, an IUI involves the computer-side having
sophisticated knowledge of the domain and/or a model
of the user. These allow the interface to better understand
the user's needs and personalize or guide the interaction.
Fig.,5.power bank
These are the two means of giving input commands
.Whatever may be the commands either through voice V. RESULT ANALYSIS
or visual must be given to raspberry pi which works We here by propose a design model as "AI VISION
with suitable OS. As there are two ways to take input FOR SPY" which is used as a wearable device. It can
similarly there are two ways that an user can get output shows the navigation ,it responds to all the queries. All
i.e. through voice or visual. the objectives had been fulfilled successfully and thus

230 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

we are able to design this wearable device. It is designed


with spectacles, camera, USB mic ,speakers and
ALEXA. The device is capable of identifying the objects
and it explains the information needs. The camera
module helps to capture the images. The output will be
displayed in the display. There is a USB mic which is
connected with the raspberry pi to give the input through
the voice command. Thus the designed device is helpful
to operate through the voice commands . Fig 8. Display connected to the device

The output of the display will be shown in fig 9. It


shows the information on the display. This gave aid in
easy way to operate. This device will help to quickly
manner in short span of time without any delay. This
device is very easy to use and handle. It can easily
control by giving commands from voice and visual form.
As we have designed in portable, it is easy to use in
different needs.
Fig., 6.AI VISION FOR SPY

With the help of the voice commands was also put


under test by giving different commands. And also check
with the different objects through the camera and the
information displayed on the display.The output such
as responding, ready to use can be monitored through
the VNC viewer in the following figure

Fig.,9.Output in display

VI. APPLICATIONS
• Education
• Remote teaching

Fig 7., output is responding on pc


• Medical field
The above figure shows that it is ready to respond • Public services
to the queries. After it shows that we can give the voice • Industry
command or visual input .If the input is voice command
the output through the amazon voice service (ALEXA) • Military
then we will listen through the speakers.. If the input is VII. CONCLUSION
in the visual form then the output will be displayed in We have implemented voice assisted text reading
the display .The display connected to the device in the system using raspberry pi. The experimental results are
fig 8. verified successfully and the output of hardware is also

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 231
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

verified using different capturing images. Our REFERENCES


methodology processed the captured image and reads [1] Oliver J. Muensterer, Martin Lacher, Christoph Zoeller,
out it clearly. The device output is in the form voice and Matthew Bronstein, and Joachim Kbler, "Google glass in pediatric
as well as visual form .So, it can be easily hear by surgery: An exploratory study," International Journal of Surgery,
vol. 12, no. 4, pp. 281 - 289, 2014.
normal people & visually impaired people. This system
[2] R. Klette, Concise Computer Vision: Springer, 2014.
is an efficient device as well as economically helpful for
the blind people. This paper describes an application [3] Gabriel C., "Compilation of the dielectric properties of body
tissues at RF and microwave frequencies", Report prepared for
developed for accessing an existing system in order to the NRPB by Microwave Consultants Ltd, 1995.
retrieve medical images. Despite the limited evaluation [4] Musale, Sandeep & Ghiye, Vikram. (2018). Smart reader for
the system is exploring shortcomings but also the visually impaired. 339-342. 10.1109/ICISC.2018.8399091.
potential of using Glass for accessing medical information [5] Liambas, Christos & Saratzidis, Miltiadis. (2016). Autonomous
in clinical situations, taking advantage of the built-in OCR dictating system for blind people. 172-179. 10.1109/
camera and the possibility to obtain information on the GHTC.2016.7857276
prism in a non-disruptive way.

232 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Sharp-Witted Control SystemWith RFID And GSM


Using IOT
K. Swapna1, Jagadeesh Nandivargam2
1
Assistant Professor, 2UGStudent
1,2
Dept. of ECE, SVR Engineering College, Nandyal
Email: Swapna.ece@svrec.ac.in1, 218am5a0404@svrec.ac.in2

Abstract: Internet of Things (IoT) finds community services [1]. Data is at the heart ofthe IoT,
applications across many fields like health care, but to make it trustworthy enough for wide spread
industries, smart homes, safety and government acceptance, the security and privacy of that data must
sectors through their unique flexibility and ability be protected. It is atthis focus thing of demand for
to be suitable for any environment. Within this
innovation andthe requirements for acceptable data
context, building automation plays an important
securityand privacy[2].
role in maintaining living standard of people by
providing a secure and convenient environment. The smart home is one of the most prominent
The objective of our work is todevelop an automatic applications in the paradigm of the IoT. While it has
control of air conditioner(AC) and intruder added a level of comfort and convenience to users'
detection system for smartbuildings. The system everyday lives, it also brings a unique security challenge
automatically controls the compressor cycle of AC of mitigating insider threats posed by legitimate users.
based on the values of temperature sensor and
Such threats primarily arise due to the sharing of IoT
motion sensor obtained using the micro controller.
Once the motion is detected, temperature sensor devices and the presence of complex social and trust
senses the room temperature and if relationships among users. State-of-the-art home IoT
thetemperature goes above a threshold value, AC platforms manage access control by deploying various
will be turned on and set in to a predefined value. multi factor authentication mechanisms. Nevertheless,
Additionally, only authorized person can enter in such hard security measures are in adequate to defend
to the house with help of RFID tagat entrance and against insider threats, and there is a growing need to
got message to mobile using GSM. If any integrate userbehavior and environmental context in
unauthorized person tries toenter it will not allow, order to make intelligent authorization decisions[3].
this can be achievedusing RFID Module it has a
unique id in it anditisregistered with micro Some of the leading home IoT platforms that have
controller. emerged over the past few years are Samsung's Smart
Things, Apple's Home Kit, and Google's Android
I. INTRODUCTION
Things. These platforms are energy efficient, connect
A smart city is a future trend solution that uses heterogeneous devices and protocols, allow remote
various electronic Internet of Things (IoT) sensors to control and actuation, and support third-party
collect data. Insights obtained from that data are application development[4].
subsequently used to manage assets, resources, and
The popularity of smart home appliances is causing
services efficiently; assuch, the data is used to improve
the increasing development of the IoT. For example,
operationsacross the city. It includes data collected
most smart home devices-such as smart televisions,
fromcitizens, devices, buildings, and assets that are
fridges, dishwashers,cooling systems, and heating
processed and analyzed to monitor and manage traffic
machines, amongothers-are connected to the Internet
and transportation systems, power plants, utilities, water
to make people's lives more comfortable and easier.
supply networks, waste, crime detection, information
Nowadays, the ability of smart home management to
systems, universities, libraries, hospitals, and other
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 233
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

combine and control deviceshas increased and II. POWERSUPPLY


developed significantly. A smart home is like a be spoke Block Diagram
home based onpersonalpreferencesandindividual
specifications. It can regulate and control theinternal/
external features of a house, such as lighting,
temperature, doors, and windows. Smart home
management can be used to setthe brightness and
warmth of a room, adjust background music, and even FigurePower Supply
schedule TV programs to be recorded and played, all III. HARDWARE
depending on the home owner's taste and decisions.
With the use of a smartphone, it isalso possible to check 3.1 Node MCU
a home's current status remotely. Further more, settings IntroductiontoNodeMCU
can be adjusted when away from the house. For
Introduction
example, air conditioners that use temperaturesensors
and remote-controlled lighting systems can be Node MCU is an open source LUA based firmware
controlled, and the television can be switched on to developed for ESP8266 wifi chip. By exploring
make it look as though the owner is at home[5-8]. With functionality with ESP8266 chip, Node MCU firmware
the aid of specific smart devices, smart home comes with ESP8266 Development board/kiti.e.
applications and services offer living convenience with NodeMCUDevelopment board.
consideration of the home owner's living pattern, living Node MCU Development Board/kitv0.9
style, and various other preferences. In other words, a (Version1)
home owner can control and monitor areas oftheir home
with the use of a smartphone [9-11]. As such, the Since Node MCU is open source platform, their
intelligence and versatility of a smart home service make hardware design is open for edit/modify/build. Node
it possible for users to manage their houses regardless MCU Dev Kit/board consist of ESP8266 wifi enabled
of where they are and what they are doing, through the chip. The ESP8266 is a low-cost Wi-Fi chip developed
use of a smartphone. However, although the system is by Espress if Systems with TCP/IP protocol. For more
convenient and efficient, it can be vulnerable and open information about ESP8266, you can refer ESP8266
to security threats. Unlike smartphones, which have a WiFi Module.
decent level of security technology due to their various There is Version 2(V2) available for Node MCU
uses (such as business communications, family phone DevKiti.e. Node MCU Development Board v1.0
calls, text messaging, and internet surfing), smart home (Version 2), which usually comes in black colored PCB.
appliances have weak security technology so they are
exposed to various attacks [11-13].
This article introduces a private security frame work
for smart devices, which can be applied to smart home
devices as well as smartphones. The suggested security
framework uses SHA-256 technology, which protects
against several threats/actions, including infiltrating
codes. Additionally, this article also explains module
functions, which are limited by access control in order
to protect the modules of home tools in smart homes.

Node MCU Development Board/kit v1.0 (Version 2)

234 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

3.1 Liquid Cristal Display 16x2 Alphanumeric LCD Module


A liquid crystal display (LCD) is a thin, flat display Specifications:
device made up of any number of color or monochrome
pixels arrayed in front of a light source or reflector. Each
pixel consists of a column of liquid crystal molecules
suspended between two transparent electrodes, and
two polarizing filters, the axes of polarity of which are
perpendicular to each other. Without the liquid crystals
between them, light passing through one would be
blocked by the other. The liquid crystal twistst he
polarization of light entering one filter to allow it to pass
through the other.
A program must interact with the outside world using
input and output devices that communicate directly with
a human being.One of the most common devices
attached toan controller is an LCD display. Some of
the most common LCDs connected to the contollers
are 16X1, 16x2 and 20x2 displays. This means 16
FEATURES:
characters per line by 1 line 16 characters per line by 2
lines and 20 characters per line by2 lines, respectively. • 5x8 dots with cursor
3.2 Schematic Diagram • Built-in controller (ks 0066 or equivalent)
• + 5v power supply (also available for +3v)
• 1/16 Duty cycle
• B/L To Be Driven By Pin 1, Pin 2 Or Pin 15, Pin 16
or A.k (led)
• N.v.optional for +3v power Supply
Data can be placed at any location on the LCD.
For 16×1 LCD, the address locations are:
16x2 Alphanumeric LCD Module Features:
• Intelligent, with built-in Hitachi HD44780 compatible
LCD controller and RAM providing simple inter
facing
• 61 x 15.8 mm viewing area Figure Address locations for a 1x16 lineLCD
• 5 x 7 dot matrix format for 2.96 x 5.56mm characters, 3.3 CONTROL LINES:
plus cursor line
EN: Line is called "Enable." This control line is used
• Can display 224 different symbols
to tell the LCD that you are sending it data. To send
• Low power consumption (1m A typical) data to the LCD, your program should make sure this
• Powerful command set and user-produced characters line is low (0)and then set the other two control lines
• TTL and CMOS compatible and/orput data on the data bus. When the other lines
are completely ready, bring EN high (1) and wait for
• Connector for standard 0.1-pitch pin headers
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 235
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

the minimum amount of time required by the LCD data 3) Set data to data lines (if it is writing)
sheet (this varies from LCD toLCD), and end by 4) Set E line to high
bringing it low(0) again.
5) Set E line to low
RS: Line is the "Register Select" line. When RS is
low (0), the data is to be treated as a command or Entering Text:
special instruction (such as clear screen, position cursor, First, a little tip: it is manually a lot easier to enter
etc.). When RS is high(1), the data being sent is text characters and commands in hexadecimal rather than
data which should be displayed on the screen. For binary (although, of course, you will need to translate
example, to display the letter "T" on the screen you commands from binary couple of sub-miniature
would set RS high. hexadecimal rotary switches is as imple matter, although
RW: Line is the "Read/Write" control line. When a little bit into hex so that you knowwhich bits you are
RW is low (0), the information on the data bus is being setting). Replacing the d.i.l.switch pack with a of re-
written to the LCD. When RW is high(1), the program wiring is necessary.
is effectively querying (or reading) the LCD. Only one LCD Commands:
instruction ("Get LCD status") is a read command. All
There are some present commands instructions in
others are write commands, soRW will almost always
LCD, which we need to send to LCD through some
be low. Finally, thedata bus consists of 4 or 8 lines
microcontroller. Some important command instructions
(depending onthe mode of operation selected by the
are given below:
user). In the case of an 8-bit data bus, the lines are
referred to as DB0, DB1, DB2, DB3, DB4, DB5, DB6, Table 3.5 Commands

and DB7.
Logic status on control lines:
• E-0 Access to LCDdisabled
- 1 Access to LCDenabled
• R/W-0 Writingdatato LCD
- 1 Readingdata fromLCD
• RS -0Instructions
- 1Character
Writing data to the LCD:
1) Set R/Wbit tolow
2) Set RS bit to logic 0 or 1(instruction or character)
3.4 Relays
3) Set data to data lines (if it is writing)
A relay is an electrically operated switch. These are
4) Set E line to high
remote control electrical switches that are controlled
5) Set E line to low by another switch,such as a horn switch or a computer
Read data from data lines (if it is reading) on as in a power train control module, devices in industries,
LCD: home based applications. Relays allow a small current
pin, 4-pin, 5-pin, and 6-pin, single switch or dual
1) Set R/W bit to high switches. Relays are used throughout the automobile.
2) Set RS bit to logic 0 or 1 (instruction or character) Relays which come in as sorted sizes, ratings, and
236 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

applications, are used as remote control switches. A


typical vehicle can have 20 relays or more.

Relay Circuit

IV. RESULTS
4.1 BLOCK DIAGRAM

Relay

3.5 RC 522 RFID Module

4.2 FLOW CHART


RC522 RFID Module

RFID Module Pin out

Application using PIR Sensor - Automatic Door


Opening System
Opening and closing of doors is always at edious
job, especially in places like shopping malls, hotels and
theatres where a person is always required to open the
door for visitors

Working
R fid tag 1 acess grant wifi message otherwisemotor
off rfid tag 2 acess denied wifi message then motor off.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 237
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

motion sensor sends message to the wifi module 7. Shrouf, F.; Ordieres, J.; Miragliotta,G. Smart factories in Industry
4.0: A review ofthe concept and of energy management approached
temperature is greater than 35 then message sends to in productionbasedontheInternetofThingsparadigm. In
the wifi module. Proceedings of the 2014 IEEE International Conference on
Industrial Engineering and Engineering Management(IEEM),
V. CONCLUSION Selangor Darul Ehsan, Malaysia, 9-12 December 2014;pp. 697-
701.
Numerous IoT techniques have been installed in
smarthomes to improve home owners' quality of life. In 8. Bandyopadhyay, D.; Sen, J. Internet of Things: Applications
and Challenges in Technology and Standardization.Wir
this context, an excellent asset for a smart home is el.Pers.Commun.2011,58,49-69.[CrossRef]
proposed in this study. We have designed and 9. International Energy Agency(IEA). Global Energy & CO2 Status
implemented a system to control the home, which has Report.2019. Available online:https://www.iea.org/geco/(accessed
three parts: hardware, a server with high security,and a on 27 September 2019).
web application. The IoT node hardware was designed
for real-life testing, and to receive IoT information from
any device. A server was designed and implemented to
control the IoT nodes in the system. Finally, an
application for use anytime or anywhere on a
smartphone or web browser via a Wi-Fi communication
connection link was built to control the IoT smart system
in real time. This application permits both automatic
and manual functional control, which is flexible for the
user.
REFERENCES
1. Stearns, P.N. Reconceptualizing the Industrial Revolution.J.
Interdiscip. Hist.2011, 42, 442-443.
2. Mokyr, J.The second industrial revolution, 1870-1914. In
Storiadell' Economia Mondiale; Citeseer; 1998; pp.219-
245.Available online:http://citeseerx.ist.psu.edu/view doc/
download?doi=10.1.1.481.2996&rep=rep1&type=pdf (accessed
on16 January2020).
3. Jensen, M. The Modern Industrial Revolution, Exit, and the
Failure of Interna lControl Systems. J.Financ.1993, 48,831-880.
4. Kagermann, H.; Helbig, J.; Hellinger,A.;Wahlster, W. Recommend
tions for Implementing the Strategic Initiative Industrie4.0:
Securing the Future of German Manufacturing Industry; Final
Report of the Industrie 4.0 Working Group; Forschungs union:
Frankfurt/Main,Germany,2013.
5. Witchalls, C.;Chambers, J. The Internet of Things Business Index:
A Quiet Revolution Gathers Pace; The Economist Intelligence
Unit: London,UK, 2013;pp.58-66.
6. Datta, S.K.; Bonnet, C. MEC and IoTBased Automatic Agen t
Reconfiguration in Industry 4.0. In Proceedings of the 2018 IEEE
International Conference on Advanced Networks and
Telecommunications Systems (ANTS), Indore, India, 16-19
December 2018; pp. 1-5.

238 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Covid-19 Identification and Alerting System


K. K. Gouse1, C. Ahalya2, M.Jayalakshmime Surname3
1
Assistant Professor, Department of ECE, Gates Institute of Technology, Gooty, A.P, India
2,3
Associate Professor, Department of ECE, Ravindra College of Engineering for Womenne Kurnool,AP,India
Email: ghouse.git@gmail.com1, ahalyatdp@gmail.com2, Jayaraju15kumar@gmail.com3

Abstract- In this paper we are going to the virus before the appearance of the first
presented an IOT based notification system for symptoms.Like other known viruses and disease,
identification of covid-19 symptoms at initial stages scientists and researchers have identified some
to avoid the spreading of this virus. symptoms that may describe a person as infected with
Keywords- temperature sensor, esp8266 IOT a coronavirus. The most common symptoms of
board. COVID-19 are fever, dry cough, and fatigue. Other
I. INTRODUCTION less common symptoms, like wheezing and pain, nasal
congestion, headache, arthritis, sore throat, diarrhea,
Coronavirus is a large group of viruses that can be loss of taste or smell and rash or discoloration of the
pathogenic in animals or humans. The novel coronavirus fingers or toes, may be observed in some cases. These
that was recently discovered is responsible for the symptoms, appearing gradually, are usually mild.
coronavirus disease 2019 (COVID-19), which is a However, some patients experience very cautious
contagious illness caused by the last discovered type symptoms. As we can see, scientists are still unable to
of coronavirus, SARS-CoV-2. This new virus and the declare exact and definitive symptoms for detection of
disease were not known before the outbreak in Wuhan, the coronavirus.Considering all these factors related to
China, in December 2019 . According to the Centers the difficulty in the diagnosis of the coronavirus and the
for Disease Control and Prevention (CDC), at least difficulty in its treatment due to its contactless spread in
seven different human coronaviruses are known so far the patient's environment, it is highly desirable to devise
and this number may increase in the future. As of now, a solution for detecting the presence of coronavirus in
COVID-19 epidemic has resulted in about 2.6 million a patient using non-invasive and remote methods with
deaths as well as 117 million cases so far world- minimum involvement of the medical staff. Current
wide.COVID-19 is transmitted through respiratory solutions focus on taking blood samples or patient's
droplets expelled from the nose or mouth when a sick saliva using a swab test or using X-rays of the lungs.
person coughs, sneezes, or talks. These drops are Because of the immediate risk of infections, it is highly
relatively heavy and do not cover large distances. Rather, desirable to develop contactless, remote solutions for
they fall quickly on the ground. COVID-19 can be coronavirus detection. One of the solutions is to use
contracted if these droplets are inhaled. For this reason, cheap medical devices that can be distributed in the
it is so important that we stay at least one meter away community and can be discarded after its use to avoid
from others. These droplets can be found on objects potential spread of the virus from person-to-person. In
or surfaces (tables, door handles, ramps, etc.) around the related work, we identify some efforts in this
a sick person. COVID-19 can then be contracted if direction, and in the continuity of the previous such
one touches these objects or surfaces and then touches efforts, we devise an improved screening mechanism
their eyes, nose, or mouth. The incubation time of utilizing the latest findings of the disease.
COVID- 19 coronavirus, which is the period between
contamination and the onset of the first symptoms, II DETECTION OF COVID-19 USING
ranges generally from three to five days. However, in WEARABLE DEVICES
some cases it may extend to fourteen days. During this The idea of using sensors for screening or detection
period, a person may be contagious: they may carry of COVID-19 is not new, but many of the existing
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 239
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

solutions propose proprietary devices and the focus monitoring system. The goal was to improve outdoor
has been mainly on making ventilators and safety. The system consists of two layers: one is used
personalprotective equipment 3D-printed medical to collect user data, and the other to aggregate the
equipment , nanotechnology-enabled solutions, etc. In collected data over the Internet. Wearable devices were
the market, many smart- phones and wearable devices used to collect safety indicators from the surrounding
also offer some sensors for monitoring heartbeat, environment, and health signs from the user [9].Hamidi
respiratory rate, sleep quality, etc. and some of them studied authentication of IoT smart health data to ensure
also have API's for accessing their data in third-party privacy and security of health information. The work
apps. However, due to privacy issues with such devices proposed a biometric-based authentication technology
and given that the proprietary solutions do not provide [10].Rath and Pattanayak proposed a smart healthcare
any flexibility and extensibility, we chose to develop hospital in urban areas using IoT devices, inspired by
our solution using open-source components. As such the literature. Issues such as safety, security and timely
the concept of using Free and Open Source scientific treatment of patients in VANET zone were discussed.
and medical Hardware (FOSH) has led to some efforts Evaluation of the proposed system was conducted using
in combining sensors for the treatment of coronavirus. simulators such as NS2 and NetSim [11].Darwish et
Novel Contributions of this Work al. proposed a CloudIoT-Health paradigm, which
integrates cloud computing with IoT in the health area,
Similar to some of the previous approaches, we based on the relevant literature. The paper presented
propose a framework for screeningof COVID-19 the challenges of integration, as well as new trends in
remotely, with the help of wearable sensorial devices. CloudIoT-Health. These challenges are classified at
However, unlike existing approaches, our proposed three levels: technology, communication and networking,
solution has several novel features. First, the and intelligence [12].Zhong and Li studied the
sensorsutilized in our approach are cheaper, available monitoring of college students during their physical
off- the-shelf, and can be easily integratedto detect activities. The paper focused on a Physical Activity
various symptoms, as described above. Each sensor Recognition and Monitoring (PARM) model, which
used in our device costs only a few dollars. The involves data pre- processing. Several classifiers, such
advantage is a device can easily be discarded if it is as decision tree, neural networks, and SVM, were
found to be contaminated. Since the sensors are generic, tested and discussed [13].Din and Paul proposed an
they can be replaced or recomposed into an improved IoT-based smart health monitoring and management
device in the future. Second, the novelty of our approach architecture. The architecture is composed of three
is that the test can be carried out by experts and non- layers: (1) data generation from battery-operated
experts and the results obtained can be inferred by medical sensors andprocessing, (2) Hadoop
anyone. All the processing is done by the sensors and processing, and (3) application layers. Because of the
the accompanying framework. Third, the results can limited capacity of batteries to power the sensors, the
be monitored and analyzed remotely. work employed an energy-harvesting approach using
III. LITERATURE REVIEW piezoelectric devices attached to the human body
[14].Otoom et al. developed an IoT-based prototype
There is considerable work in the literature regarding
for real-time blood sugar control. ARIMA and Markov-
the use of the Internet of Things (IoT) to deliver health
based statistical models were used to determine the
services. Usak et al. conducted a systematic literature
appropriate insulin dose. Alshraideh et al. proposed an
review of the use of IoT in health care systems. That
IoT-based system for Cardiovascular Disease detection.
work also included a discussion of the main challenges
Several machine learning algorithms were used for CVD
of using IoT to deliver health services, and a
detection.Nguyen presented a survey of Artificial
classification of the reviewed work in the literature
intelligence (AI) methods being used in the research of
[8].Wu et al. proposed a hybrid IoT safety and health
COVID-19. This work classified these methods into
240 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

several categories, including the use of IoT. Maghdid - No headache and pains.
proposed the use of sensors available on smartphones - No comorbidities.
to collect health data, such as temperature.Rao and
Vazquez proposed the use of machine learning • Class 1: Mild symptoms
algorithms to identify possible COVID-19 cases. The - SpO2 95%;
learning is done on collected data from the user through
- Heartbeat Rate100 bpm;
web survey accessed from smartphones. Allam and
Jones discussed the need to develop standard protocols - 36 0C Temperature 38 0C;
to share information between smart cities in pandemics, - No shortness of breath.
motivated by the outbreak of COVID-19. For instance,
AI methods can be applied to data collected from - No comorbidities
thermal cameras installed in smart cities, to identify • Class 2: Moderate clinical symptoms
possible COVID-19 cases. Fatima et al. proposed an
- 93% SpO2 94%;
IoT-based approach to identify coronavirus cases. The
approach is based on a fuzzy inference system [19]. - Heartbeat Rate > 100 bpm;
Peeri et al. conducted a comparison between MERS, - Temperature ≥ 38 0C.
SARS, and COVID-19, using the available literature.
They suggested the use of IoT in mapping the spread • Class 3: Serious clinical symptoms
of the infection. - SpO2 92%;
IV. PROPOSED METHOD - Heartbeat Rate > 120 bpm;
We consulted two experts specialized in infectious - Temperature > 38 0C
disease. The consulted doctors identified that SpO2
• While the sensors are useful for detection of vital
measurement is a key and essential determinant of
signs, we have also additional parameters of shortness
COVID-19. If the SpO2 is > 95% with a normal of breath, headache, and occurrence of any
temperature, the patient does not present any sign of comorbidity (diabetes, heart disease, hypertension,
disease and the test will be negative and the patient etc.) in our rules. At the moment these parameters
should not go to the COVID-19 center. However, if are assessed from visual inspection and through
the SpO2 is between 93% and 94% with enough high question-answering. In the current version, and for
temperature (>38), then it is important to get one tested screen- ing purposes, it is sufficient to have the
for COVID-19. In addition, we also extracted some confirmation from the patient. In the diagnosis stage,
rules from the existing literature as discussed in Section further devices can be used to determine these
2.This allowed us to define four classes of screening symptoms. For example, the expert or physician can
carry out measurement of glucose level, blood
results. Each class meets a specific set of rules. A patient
pressure, or performing an ECG for a conclusive
is evaluated against the rules and is assigned a class
outcome. This will only be needed in the case of serious
based on the conditions stated in each class. These clinical symp- toms (class 3). For screening purposes,
classes as defined as below. verbal confirmation of a patient may require several
V. SIMULATION AND RESULT additional questions depending upon the regional
guidelines [60] for COVID-19 screening
• Class 0: Non-symptomatic
- SpO2 95%;
- Heartbeat Rate100 bpm;
- Temperature 37.2 0C;

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 241
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

is screened to be positive, the device may be discarded


altogether.

REAL-TIME SCREENING: ANALYSIS AND VISUALIZATION For IoT solutions, we have used the blynk IoT
We illustrate the working of our prototype medical platform that is designed with the objective of rapid
device using the following scenario.A person is development of IoT-based solutions. The platform
suspected of COVID-19 and needs to be screened. supports streaming of data from sensors and mobile
The person is instructed to obtain a device from a devices, which is then analyzed in real-time. A variety
designated place and wear it according to the directions of visualization techniques are available to visualize the
given by a health worker or professional through some data in real-time. Figure shows the interface of our
distance. Once a person feels comfortable in wearing system displaying the data obtained from a patient's
the device, it is activated through a mobile interface device. This interface is important to consolidate the
that starts reading through all the sensors. As each data obtained from a number of patients. Through
sensor completes its reading, the data is immediately advanced analytics, we will be able to carry out statistical
sent to the IoT platform through the Wi-Fi module of analysis, identifying the need for enforcing special
Arduino. The data is sent in streams. To be able to precautions in an area infected with coronavirus,
detect the cough, the patient is required to wear the etc.However, these features will be integrated in the
device for at least two minutes while the data is being near future. In addition, we have also developed a
streamed and stored at the cloud, and subsequently, dedicated smartphone interface, that is locally
visualized at the dashboard. As soon as all the sensors connected to the medical device and displays the data
finish collecting the data, a signal is sent to the mobile in real-time
device indicating to the health worker to stop the VI. CONCLUSIONS AND FUTURE SCOPE
measurement process. A final snapshot is also shown
The COVID-19 virus has been around for almost a
on the mobile screen as it receives data from the IoT
year now and the medical com- munity, scientists, and
platform. The patient is instructed to remove the device
researchers are trying their best to identify a cure for
and put it back at a designated place. In case, the patient
the disease. At the same time, people around the world
242 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

are facing issues in determining the state of an individual 3. New York Post . 2020. The Most Promising Coronavirus
Breakthroughs so Far, from Vaccines to Treatments.https://
as healthy or affected by the virus. The state-of-the-art nypost.com/2020/04/08/coronavirus-breakthroughs-how-close-
solutions require visiting a hospital or a healthcare facility are-we-to-a-vaccine/ April 8. [Google Scholar]
to perform COVID-19 diagnosis. Considering the 4. Kelly M.P. Digital technologies and disease prevention. Am. J.
numerous difficulties and the associated dangers in its Prev. Med. 2016;51(5):861-866. doi: 10.1016/
diagnosis, it is preferable to be able to perform the j.amepre.2016.06.012. [PubMed] [CrossRef] [Google Scholar]

disease detection using wearable devices.This article 5. Hlaing P.M., Nopparatjamjomras T.R., Nopparatjamjomras S.
Digital technology for preventative health care in Myanmar.
proposed a framework for remote screening of the virus Digital Medicine. 2018;4(3):117-121. doi: 10.4103/
using standards- based practice identified in the digm.digm_25_18. [CrossRef] [Google Scholar]
literature. The framework utilizes sensors combined in 6. Cerina L., Notargiacomo S., Paccanit M.G., Santambrogio M.D.
the form of a wearable device that can be worn by any IEEE 3rd International Forum on Research and Technologies for
individual to know in a few seconds whether the person Society and Industry (RTSI) 2017. A fog-computing architecture
for preventive healthcare and assisted living in smart ambients;
is healthy or is doubtful of carrying the disease.The pp. 1-6. Modena. [CrossRef] [Google Scholar]
framework requires testing on a large population and 7. Dinesen B., Nonnecke B., Lindeman D. Personalized telehealth
at the same time the data obtained through testing can in the future: a global research agenda. J. Med. Internet Res.
be used for advanced analytics such as outbreak 2016;18(3):e53. doi: 10.2196/jmir.5257. [PMC free article]
[PubMed] [CrossRef] [Google Scholar].
prediction and prevention, population segmenting, as
well as helping the government and decision- makers 8. Usak M., Kubiatko M., Shabbir M.S., Dudnik O.V.,
Jermsittiparsert K., Rajabion L. Health care service delivery based
to take appropriate measures. As a future work and on the Internet of things: a systematic and comprehensive study.
due to unavailability of the required data, we will test Int. J. Commun. Syst. 2020;33(2) [Google Scholar]
our device using data in order to establish its 9. Wu F., Wu T., Yuce M.R. An internet-of-things (IoT) network
performance.In the Covid 19 pandemic, attempts and system for connected safety and health monitoring applications.
uses of smart technologies to manage the pandemic has Sensors. 2019;19(1):21. [PMC free article] [PubMed] [Google
Scholar]
been started. The Chinese and Japanese used robots
10. Hamidi H. An approach to develop the smart health using Internet
for surveillance. Countries like Qatar, Indonesia, and of Things and authentication based on biometric technology.
Jordan also use drones to monitor the isolation process. Future Gen. Comput. Syst. 2019;91:434-449. [Google Scholar]
New applications related to remote temperature checks 11. Rath M., Pattanayak B. Technological improvement in modern
and thermal monitoring cameras have also emerged to health care applications using Internet of Things (IoT) and
identify injuries in public places. In addition to that, proposal of novel health care approach. Int. J. Hum. Rights
Healthcare. 2019;12(2):148-162. doi: 10.1108/IJHRH-01-2018-
locator and tracker applications through smart phones 0007. [CrossRef] [Google Scholar]
have been used. Smart robots can be used in hospitals, 12. Darwish A., Hassanien A.E., Elhoseny M., Sangaiah A.K.,
mobile clinics and smart medical rooms. Although many Muhammad K. The impact of the hybrid platform of internet of
researches in AI have been started, the most attention things and cloud computing on healthcare systems: opportunities,
challenges, and open problems. J. Ambient Intell. Hum. Comput.
must be given to smart simulation that focus on future 2019;10(10):4151-4166. [Google Scholar]
prediction.
13. Zhong C.-L., Li Y.-L. Internet of things sensors assisted physical
REFERENCES activity recognition and health monitoring of college students.
Measurement. 2020;159 [Google Scholar]
1. World Health Organization; 2020. Coronavirus COVID-19 Global
Cases by the Center for Systems Science and Engineering (CSSE) 14. Din S., Paul A. Erratum to "Smart health monitoring and
at Johns Hopkins University (JHU)https://coronavirus.jhu.edu/ management system: toward autonomous wearable sensing for
map.html Accessed 21 July. [Google Scholar] Internet of Things using big data analytics. Future Gener. Comput.
Syst. 2019;91:611-619. [Google Scholar].
2. 2020.WHODirector-General's Opening Remarks at the media
Briefing on COVID-19 11 March.https://www.who.int/dg/
speeches/detail/who-director-general-s-opening-remarks-at-the-
media- briefing-on-covid-19-.11-march-2020 Accessed 11 March
2020. [Google Scholar]

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 243
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Smart Card Payment Solution for Campus Using


Mifare Card
Mrs. C.Munikantha1, Ms.B.Lakshmi Prasanna2
1
Assistant Professor, Dept. of ECE, Sri Venkateswara Engineering College, Tirupati-517 507
2
UG Student, Dept.of ECE, Sri Venkateswara Engineering College, Tirupati-517 507
Email: munikantha.2004@gmail.com1, prasannalakshmi331@gmail.com2

Abstract: Smart Card Payment Software is a to user.The data will be stored in database for further
RFID Based Payment Solution for Colleges, usage.
Hospitals, Public Parks, Gym's etc., to Register,
Validate, Perform and Monitor Real Time Smart Card:
transactions Using Smart Card as an ID card. Smart-Card is a secure portable storage device
Member/Student/User or Staff registers in the which is used in various applications requiring controlled
College using Smart card Payment Software at the
access to sensitive information. It is in the size of a credit/
time of registration Smart card will be encoded with
User details, balance will be pre-loaded in to the
debit card, incorporated with one or more integrated
Smart Id Card and printing User details can be done circuit chips.
after Issuing the card to the Card Holder on It functions as a microprocessor, memory and
verification and enabling to use the card with-in provides an input-output interface. The International
the Campus. Either Admin/Staff can do registration, Organization for Standardization (ISO) specifies certain
Recharge, Canteen and Game Deductions Based
voluntary international standards in many scientific and
on the Privileges. Smart card Payment Software
Functions: Staff Registration with pin generation
technological fields. However, till to date, ISO has not
and card encoding for login. Member/Student defined any standards for the devices termed as "Smart
Registration handles with pin generation, card Cards."
encoding and Amount loading in smart card.
Keywords: XAMPP Software, My SQL,
CSS,HTML & PHP.
1. INTRODUCTION
In colleges, schools or Inside an University campus
canteen facility is provided. Students, college staff or
university staff uses this facility. In this canteens students
or employees pay their bills by cash. In existing system, Fig. 1 Smart Card
cash payment is the only option for making the Smart Card Architecture:
payment.The main draw back of cash payment system
is that user always needs to carry the cash with him/ A Smart Card's architecture basically consists of
her. And tendering exact change might become an three elements. They are:I/O System,Central Processing
issue.Maintaining paper based records(of income) can Unit (CPU) and Memory
get spoiled or damaged and data of student account
might get lost. To overcome these problem smart cards
are used.The objective of this project is to develop
smart card payments using Mifare, to use in campus
for manipulation of data and to provide better services

244 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The memories used in Smart Card's microcomputers


are manufactured from semiconductor materials.
Semiconductor memories consist of matrices of cells
formed by transistors to store information.

Fig . 3. Types of Smart Card


Fig.2. Smart Card Architecture
Contact Smart Card:
I/O (Input/ Output) System: In a Smart-Card with contact-type interface, the pins
Smart Cards must have certain components to of the card reader's connector must physically touch
perform Input/output (I/O) functions. It has internal logic the contact pad on the Smart-Card during data transfer.
circuitry which works in conjunction with the Contactless Smart Card:
microprocessor that controls the timing and flow of data
transferred into and out of the smart card's memories. A Smart-Card with a non-contact type interface
It has a physical structure through which it can interface does not require a physical connection for data transfer.
to a smart-card reader device, which is connected to This type of interface may be implemented using
host computers for the exchange of data. capacitive plates placed inside or on the surface of the
card and the communication occurs via radio frequency
The categories of physical interfaces depends on signals.
the type of smart cards i.e. the contact type and the
contactless type. Interface of a Contact Smart-Card is WORKING OF SMART CARD:
a contact pad beneath which lies a chip module and the
interface of a contactless type card includes a chip
module and an antenna to communicate using radio
waves.
Central Processing Unit (CPU):
The CPU or the microprocessor is the component
which distinguishes the smart cards from other cards
which are designed to simply store data. The micro
processor in association with the operating system To access the computer system, a user must insert
enables the smart-card to "make its own decisions" his/ her Smart-Card into a Smart-Card Reader and
concerning where the data is stored in its memories enter his unique PIN by means of a card reader's
and under what circumstances it should transfer keypad. When the contact pad on the smart-card
information through its input/output interface. comes in contact with the electrical connectors of the
reader, the smart card's microcomputer chip performs
The microprocessor consists of three major the one-way transformation on the entered PIN and
components: the arithmetic logic unit (ALU), the control compares it with the stored PIN.
unit, and the bus.
If the two PINs match, then the information is
exchanged between the smart-card and the host
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 245
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

computer, which determines the user's identity and the from the tag. The reader then passes the information in
information which the user is entitled to access. digital form to a computer system. Once a link is
Chip Model: established with a unique ID on an item, then automation
of an assortment of processes ensures.

Fig : 5 RFID components and their interaction

MIFARE CARD (1K)

Fig: 4. Chip Model on Smart Card


It has 1024 bytes Organized as blocks and
sectors16 sectors (0 to 15) 4 blocks in a sector 16
MIFARE 1K:
bytes in each block Each sector is secured with "sector
trailer block" that are meant to store access rights.2
keys in each sector Key A/B Cannot read without
Authentication.
2. EXISTING SYSTEM:
Currently, all the canteen transactions and entering
the data into system and other calculations is done
manually by the staff. All this work can be done
automatically using smart cards with the help of various
MIFARE is the NXP Semiconductors-owned
technologies like RFID, barcode technology, QR code.
trademark of a series of integrated circuit (IC) chips
Smart cards here can be used in canteens too, students
used in contactless smart cards and proximity cards.
can get their smart cards recharged from the canteen
and office previously and then later canteen bills can be
paid directly using smart card number without having
the need to carry cash. Also, payments can be made in
office related works too using smart cards such as exam
fees, form fees, any kind of fine etc.But the main problem
with using these techniques is security, and these cards
cannot store any data. And the RFID cards are easy to
clone and provide less amount of storage compared to
MIFARE cards.

MIFARE CARD READER:


A typical reader is a device that has one or more
antennas that emit radio waves and receive signals back

246 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

BLOCK DIAGRAM: EXPERIMENTAL RESULTS :


Admin Login:
Centralized Server (Smart card
Payment Software, MySQL
Database, Apache Server)

wireless
LAPTOP/PC with
Browser
USB

High Frequency (13.56)MHZ RFID


Reader with Smart Card(Mi-fare
1kb) Home Page:

Fig. 6 Blcok digram of existing system

3. PROPOSED SYSTEM:
APPLICATION FLOW GRAPH

Staff Registration:

Fig.7. Block diagram of Proposed method.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 247
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Encoding Card with Provided Data: Member Registration Page:

Making Canteen Payments Using Mifare Card:

Preview of Mifare Card:

RESULTS & DISCUSSION:


The customers and canteen management team are
provided with the application deployed in the cloud
which is accessible through a browser thus optimizes
the old, time consuming and paper based, process of
the canteen business by digitalizing the complete process.
The canteen management have the benefit of avoiding
paper usage, there is no need of extra man power in
bill counter and they can manage the old data easily
which will be useful for future. This method can be easily
scaled according to the requirement.
4. CONCLUSION&FUTURE SCOPE:
CONCLUSION:
This model can be easily scaled according to the
requirement. Smart card technique is a booming
technology. This system is very effective. In billing
technique, for canteen management device indicates
canteen admin will give a RFID to their customers which
248 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

can be either students or staffs and in case of an [9]. New XAMPP with MariaDB apachefriends.org. 19 October
2015. Archived from the original on 2015-11-19. Retrieved 19
organisation. It is very much useful for the people who November 2015.
go to canteen regularly, may be daily. The major
[10]. PHP - history of PHP presentation by Rasmus Lerdorf given at
downside in cash payment system is that user seems to the MYSQL Conference in Santa Clara, California.
pay correct sum else there might be issues in providing
the balance money. To overcome this, we are using
cashless payment system. In this Cashless payment, they
do not have to bring the cash with them anymore. Each
and every registered customer will get a card and person
can do recharge with whatever amount he/she wishes
to have. This is done by reducing the paper work and
costs. This model can be easily scaled according to the
requirement.
FUTURE SCOPE:
Future development strategies of smart card
application are as follows. It is used to develop services
upon the activities for students and staff on campus;
applications for specific locations such as libraries,
stationary, gymnasiums, games, document uploading.
REFERENCES:
[1].Ashalatha R, Jayashree Agarkhed - Evaluation of Auto scaling
and Load balancing features in cloud - International Journal of
Computer Applications (0975 8887) Volume 117 No. 6, May
2015 from P.D.A College of Engineering, Kalaburagi, India.
[2]. Student Card System using Smart Card Technology - Information
Technology Based Higher Education and Training, 2004. ITHET
2004. Proceedings of the Fifth International Conference in January
2004 from the University of New South Wales UNSW, Sydney,
NSW 2052, Australia.
[3]. MIFARE (Card) Coil Design GuideApplication note, BU- ID
Document number 0177
[4]. MIFARE Type Identification ProcedureApplication note, BU-
Document number 0184
[5]. Contactless smart card module specification MOA4Delivery
Type Description, BU - Document number 0823
[6]. S.B. Patil, Srikantha Rao, P.S. Patil 2001 'Canteen Management
Design Principles' Proceedings of the International Conference
& workshop on trades in Technology, pp. 765-766, viewed 7
October 2001.
[7]. Lavina Mall, Nihal Shaikh - "Canteen management system using
RFID Technology based on cloud computing ", International
journal of engineering science & research Technology volume:
173, April - 2017 from Rizvi College of Engineering, India.
[8]. Prashant Sharma, Bibin Mathew, "RFID based canteen cashier
system". International Journal for Research in Engineering
application and management volume: 03, Issue: 04, May -2017.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 249
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Automatic Detection of Diabetic Retinopathy in Retinal


Images by Using Machine Learning
Mrs.R.Sindhu1, Ms.N.Gayathri2
1
Assistant Professor, Dept of ECE, Vemu Institute of Technology, P Kothakota, Chittoor-517112.
2
UG Student, Dept of ECE, Vemu Institute of Technology, P Kothakota, Chittoor-517112.
Email: sindhuadithya2012@gmail.com1, ngayathri460@gmail.com2

Abstract - Low contrast and non-uniform continuous progress in the areas of X-ray, Ultrasound,
illumination in retinal images hinders the process CT, MRI, Nuclear and other imaging modalities. Since,
of accurate lesion detection. Machine learning has medical images are affected with poor illumination, local
been of significant importance with its ability to luminosity and contrast variability, and noise arising from
correct the contrast and illumination problems. In
the process of acquisition it becomes necessary to
this paper, in our proposed system, by applying
ensemble of machine learning classifying algorithms
enhance the images for accurate diagnosis. One of the
on features extracted from output of different many areas where medical image enhancement has been
retinal image processing algorithms, like diameter put to clinical use is retinal image analysis. Fundus
of optic disk, lesion specific (micro aneurysms, photography is the most common method to image an
exudates), image level (pre-screening, AM/FM, eye and is thus used for screening large scale population
quality assessment). Decision making for for Diabetic Retinopathy (DR), Glaucoma, and Age-
predicting the presence of diabetic retinopathy was Related Macular Degeneration. In order to analyze the
performed using Random Forest. Here GLCM extent of degradation of an image, different image quality
(Gray Level Co-Occurrence Matrix) is used for metrics have been developed. These image quality
feature extraction. Fuzzy C-Means (FCM) is used metrics also track unperceived errors and can be used
for image segmentation. Here we will get the high
to compare image enhancement algorithms. If an image
Accuracy compared to all other existing methods
classification. Processing time is very less
without any kind of distortion or minimal distortion is
compared to Neural Network methods. present, it is called a reference image. This image is
Experimental results obtained the better then used to measure the quality of other images using
performance when compared to other techniques. parameters like mean squared error, peak signal-to-
noise ratio and structured similarity index. If a reference
INDEXTERMS: BRISQUE,CLAHE,DOTHE,
ETHE, Histogram, Lesions image is not available, the quality of image is then
calculated based on the expected image statistics.
I. INTRODUCTION
II. LITERATURE REVIEW
Medical image as one of the pioneers in the field of
scientific images with the use advance medical K. Wisaeng, and W. Sa-Ngiamvibool, "Exudates
equipment allowing better image reconstruction and Detection using Morphology Mean Shift Algorithm in
easier diagnosis. One of the many areas where medical Retinal Images," IEEE Access, vol.7,pp.11946-11958,
image enhancement as been put to clinical using retinal Jan. 2019, doi: 10.1109/ACCESS.2018.2890426.
image analysis.Many high disease as well as which T.Selcuk, and A. Alkan, "Detection of Micro
systemic diseases manifest on the retinal itself. aneurysms using Ant Colony optimization Algorithm in
Medical imaging has clearly established itself as one the early detection of Diabetic Retinopathy," Med.
of the pioneers in the field of scientific imaging, with the Hypotheses, vol. 129, Aug. 2019, doi: 10.1016/
use of advance medical equipment allowing better image j.mehy.2019.10924
reconstruction and easier diagnosis. There has been

250 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

III. EXISTING METHOD applying a threshold to the image. Edges having a value
Medical imaging has clearly established itself as one greater than threshold are dominant edges (threshold is
of the pioneers in the field of scientific imaging, with the set to 1). Once the dominant edges have been
use of advance medical equipment allowing better image highlighted, maximum () and minimum () grey level
reconstruction and easier diagnosis. There has been values in the NXN neighborhood (N is set to 3) are
continuous progress in the areas of X-ray, Ultrasound, identified. Then the histogram is computed for all the
CT, MRI, Nuclear and other imaging modalities. Since, values in this range. The histogram computed is
medical images are affected with poor illumination, local extended to the entire image for enhancement. A total
luminosity and contrast variability, and noise arising from of 644 images across four different databases have been
the process of acquisition it becomes necessary to used.
enhance the images for accurate diagnosis. One of the (i) STARE Database contains 397 images with average
many areas where medical image enhancement has been image quality score 29.5658.
put to clinical use is retinal image analysis. Many eye (ii) DIARET DB1 Database contains 89 images with
diseases as well as systemic diseases manifest on the average image quality score 40.8554.
retina itself. Fundus photography is the most common (iii)DIARET DB0 Database contains 130 images with
method to image an eye and is thus used for screening average image quality score 40.6831.
large scale population for Diabetic Retinopathy (DR),
Glaucoma, and Age-Related Macular Degeneration. (iv)CHASE Database contains 28 images with average
image quality score 48.4418.
Optical Coherence Tomography (OCT) is another
imaging technique for diagnosis of inflammatory retinal Image Quality Parameter Evaluation BRISQUE
diseases. In order to analyze the extent of degradation model is used to calculate the image quality score before
of an image, different image quality metrics have been and after the application of image enhancement
developed. These image quality metrics also track techniques. It is highly efficient as it does not require
unperceived errors and can be used to compare image transformation to calculate its features. The features for
enhancement algorithms. If an image without any kind image quality are obtained by fitting mean subtracted
of distortion or minimal distortion is present, it is called contrast normalized coefficients (MSCN) to the
a reference image. This image is then used to measure generalized Gaussian distribution (GDD) and the
the quality of other images using parameters like mean pairwise products to the asymmetrical generalized
squared error, peak signal-to-noise ratio and structured Gaussian distribution (AGGD) .
similarity index. If a reference image is not available, Supervised learning method is used in the most of
the quality of image is then calculated based on the the application of the system. The disadvantage of this
expected image statistics. method is the segmented image is compared to the
In the existing method, the Diabetic Retinopathy original reference image. Hence large time is needed.
images will be identified using some techniques based Supervised learning can be separated into two types
on the ETHE, even though the images will be classified, of problems regarding to classification and regression:
the accuracy and precision will be comparatively less.
• Classification uses an algorithm to accurately assign
Edge-based Texture Histogram Equalization (ETHE) test data into specific categories. It recognizes specific
technique has been proposed to enhance the image entities within the dataset and attempts to draw some
quality. A textured area is characterized by the presence conclusions on how those entities should bedefined.
ofdensity edges in a particular region. In ETHE, the Common classification algorithms are linear
pixels present in the nontextured areas are suppressed classifiers, support vector machines (SVM), decision
and stress is placed on the textured regions. In this trees, k-nearest neighbour, and random forest, which
method, the significant edges are identified using the are described in more detail below.
Sobel edge detector. An edge-map is created by
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 251
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

• Regression is used to understand the relationship


Datasets
between dependent and independent variables. It is
commonly used to make projections, such as for sales
revenue for a given business, logistical regression, Gaussian
Pre-Processing
and polynomial regression are popular regression Filter
algorithms.
FCM Image Segmentation

DWT and
Feature Extraction
GLCM

Random
Classification
Forest

Performance Analysis
Fig. 1: Block Diagram of Existing Method.
Fig 2 : Block diagram of proposed method
DRAWBACKS
• Poor illumination condition. Algorithm of Proposed Method:
• Noisy texture background. • Step 1 : Select the image from data set.
• Less Performance. • Step 2 : Perform preprocessing using Gaussian filter.
• Low pixel intensity. • Step 3: Segmentation is done using FCM.
• Accuracy is less. • Step 4: Feature extraction using DWT & GCLM.
• Supervised technique is applied. • Step 5: Classification is performed using Random
• Precision value is also less. Forest.
IV. PROPOSED METHOD POSSIBLE OUTCOMES OF RANDOM
In proposed system, by applying ensemble of FOREST CLASSIFIERS
machine learning classifying algorithms on features Input Image Output of The System
extracted from output of different retinal image Original Image Tampered Image
Normal True Positive (TP) False Negative (FN)
processing algorithms, like diameter of optic disk, lesion Abnormal False Positive (FP) True Negative (TN)
specific (micro aneurysms, exudates), image level (pre-
Table 1: Possible Outcomes of RFC
screening, AM/FM, quality assessment). Decision
making for predicting the presence of diabetic PERFORMANCE PARAMETERS OF
retinopathy was performed using Random Forest. Here PROPOSED METHOD:
GLCM (Gray Level Co-Occurrence Matrix) is used The performance of the proposed system is
for feature extraction. Fuzzy C-Means (FCM) is used evaluated in terms of following parameters
for image segmentation.Here we will get the high
• Accuracy=(TP+TN)/(TP+TN+FP+FN)
Accuracy compared to all other existing methods of
classification.Processing time is very less compared to • Sensitivity=(TP)/(TP+FN)
Neural Network methods. We reviewed the both • Specificity=(TN)/(TN+FP)
sequential and parallel algorithms and proposed a new
method inspired on some techniques presented. Through • TN = True positive, TP = True negative
Our algorithm we expect to achieve a significant increase FP = Flase positive, FN = Flase Negative
on the performance.

252 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

V. EXPERIMENTAL RESULTS COMPARISON BETWEEN EISTING


METHOD & PROPOSED METHOD:
Performance Existed Method Proposed Method
Parameters using ETHE using Machine
ACCURACY No t calculated 88 .57%
SENSITIVITY No t calculated 1
SPECIFICITY No t calculated 93 .10%
Time 1.71s Not calculated
Table 2: Comparison of parameters of Existing & proposed
Methods

VI. CONCLUSION AND FUTURE SCOPE


Fig(a): The microaneurysms is mild stage CONCLUSION: The performance factor indicates
that the proposed method provide better result by
improving the accuracy. Our experimental result shows
that the proposed approach can accurate and detection
of diabetics by using retinal image.Thus the proposed
method is significant for diabetics disease detection by
using machine learning.
FUTURE SCOPE: In Future work by using the
concept of Deep Learning the accuracy of classification
of the present work will be improve.
Fig(b): The microaneurysms is moderate stage
VII. REFERENCES
1. Zhou, L., Zhao, Y., Yang, J., Yu, Q., & Xu, X. (2017). " Deep
multiple instance learning for automatic detection of diabetic
retinopathy in retinal images". IET Image Processing, 12(4), 563-
571.
2. Retinal Image Analysis, Kingston University London. Nov. 2019.
[Online].
3. V. Deepa, C. S. Kumar, and S. S. Andrews, "Automated Detection
of Microaneurysms using Stockwell Transform and Statistical
Features," IET Image Process., vol. 13, no. 8, pp. 1341-1348,
Fig(c): The microaneurysms is strong stage Jun. 2019, doi: 10.1049/iet-ipr.2018.5672.
4. T. Selcuk, and A. Alkan, "Detetion of Microaneurysms using
Ant Colony optimization Algorithm in the early detection of
Diabetic Retinopathy," Med. Hypotheses, vol. 129, Aug. 2019,
doi:10.1016/j.mehy.2019.109242.

Fig(d): The microaneurysms is not present stage

SOFTWARE TOOLS REQUIREMENTS


• Simulation Tools : MATLAB R2019a
• Operating System : Windows 10
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 253
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Home Automation Using IoT And Security System


Using Image Based Authentication
Mr.B.Malakonda Reddy1, SK.Roshni2, S.Bhanu Prakash3, R.Vani4, P.Venkateswarlu5
1
Associate Professor
1,2,3,4,5
Department of ECE, Narayana Engineering College, Gudur
Email: bmalakondareddy1@gmail.com1, roshnishaik495@gmail.com2

Abstract: The security system now is being high, enabling everyday objects that uses embedded circuits
still people are facing many problems due to to interact and communicate with one another utilizing
robberies. So, to improve the security a prototype the present Internetinfrastructure.
Three Level Security System is implemented.
Three Level Security System helps in decreasing This project is implemented using face recognition,
of robberies. This system can be used anywhere, in this prototype it has three levels like Level-I is used
and easy to implement and maintain. The prototype for when a person comes near to a room which consists
is designed with many sensors like magnetic locker the authenticator gets a notification through the
sensor, vibration sensor, motion sensor. The app. The software can be used for both laptops and
System also consists of an application especially mobiles, in this the notification system is given to know
designed for users to get notification. So, before the status of the thief and also in Level-II the admin
the robbery takes place the user gets cautious
gets a notification when a person enters into a room the
when he/she gets a notification. Three Level
image of a person is captured through camera which is
Security System consists of three levels. Level-I
is designed to get a notification when a person placed inside the room and in Level-III it sends the
comes near to room and the image of person is notification of person movements captured by motion
sent to the admin/user. Level-II is the motions of sensor and complete motions are sent as notification to
person is detected and notification is sent to the user.
admin/user. Level-III sends the notification to user We came up with this idea of developing an easier,
when the locker isbroken.
multipurpose, cost-effective design to regulate the on-
Keywords- Internet of Things, WIFI module, off mechanism of assorted devices within the field via
Sensors,Security, Notification short message service or SMS. The project is more
I. INTRODUCTION helpful just in case of crisis, true being the absence of
the supervisor at the work place so he/she is unable to
IOT or Internet of Things refers to the network of
observe in the flesh for the aim of safety.
connected physical objects that may communicate and
exchange data among themselves without the necessity Aim
of any human intervention. It's been formally defined as The major aim of the project is to provide high
an "Infrastructure of data Society", because IOT allows security system for the users. This system consists of
us to gather information from all quite mediums like an app from which user gets a notification when a
humans, animals, vehicles, kitchen appliances. Thus, any person enters in to locker room of home. This system
object within the physical world which might be supplied can be used both in laptops and mobiles. The objective
with an IP address to enable data transmission over a of the Three Level Security System is to provide high
network is made a part of IOT system by embedding security system for the admins and users. The user gets
them with electronic hardware like sensors, software an alert message when the person tries to break the
and networking gear. IOT is different than Internet as door using vibration sensor, the message is sent to the
during a way it transcends Internet connectivity by admin through the app.

254 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Domain option. They are in no factor to check the safety


The internet of things may well be a system of reputation of Internet cafe or enterprise middle
interrelated devices which have ability to transfer data machines, and as no opportunity to typing the pass-
over a network without requiring human-computer word. We don't forget whether or not it's miles viable
interactions. Applied science emphasis development of to go into records to confuse adware assumed to be
intelligence machines, thinking and dealing like humans. walking at the system in question. The problem of
Some applications of applied science include expert mounting a collusion attack on an unmarried password
systems, communication processing, and speech makes the hassle greater tractable than it would appear.
recognition and machine vision. It has been formally This hassle of password protection may be stepped
defined as an "Infrastructure of knowledge society", forward through biometric primarily based totally
because IOT allows us to collect information from all authentication and graphical authentication, but
quite mediums like humans, animals, vehicles, kitchen availability and value of biometric authentication is
appliances. Thus, any object within the physical world sizable hassle. In this paper, we gift an opportunity person
which could be equipped an IP address to enable data authentication primarily based totally on Images this is
transmission over a network are often made part of immune to key logger spywares. We have de- signal
IOT system by embedding them with electronic and applied a technique that makes use of a reinforced
hardware like sensors, software and networking cryptographic hash feature to compute fast and secure
gear.IOT is different than Internet as in a very way it passwords for arbitrarily many accounts while requiring.
transcends Internet connectivity by enabling everyday The J. Thorpe et al. (2004) describes, the major
objects that uses embedded circuits to interact and issue in bankingis the authenticityof the client. Due toun
communicate with each other utilizing this Internet avoidable hackingof the data bases on thecyber space,
infrastructure. it is always quite hard to confide the data on the cyber
Scope spaces when increasingsecurityisanissuetext-
basedpasswordsarenotedoughtto buffet such problem.
The main aim of people now a day is to provide The necessitate for something more secure along with
high security with low cost and easy maintain. It is also being user affable is required. This is where Image Based
easy to install and we can go through it whenever Authentication (IBA) comesintoplay. It provides clients
required and this can be done using the app which a completely unique and secured authentication tool to
connects to the authenticator mail and app installed in work on. IBA enhances the protective layer in an
anynumber of phones and laptops. This provides high exceptionally user affable way. This paper is a
security for an individual and also for an organization. worldwide study on the subject of using images as the
II. LITERATURE REVIEW password set. This tool provides a secure
communication channel between the communicating
Security device has constantly been a difficulty and
entities. The categorization of image set as client
lots of them furnished their nice prototypes to improvise
password aimatthwarting Brute Force attempts,
the safety and this task is mainly designed for domestic
Shoulder attempt, and Tempest attempt the client side
as it has 3 tiers through which thief may be stuck without
while the attempts at the server side can be headed off
problems and this additionallyhas an app in which the
by placing into the practice Kerberos protocol.
admin gets a notification every time the new entry
comes. The M. N. Doja et al. (2006) describes,
theseflawshave however, contributed to the growing
The I. Jermy net al. (1999) describes, the hassle of
research interest in the development and use of graphical
getting into touchy records, consisting of pass- words,
authentication systems as alternatives to text-based
from an untrusted system, is glaringly undesirable, but
systems. Graphical passwords or graphical
roaming customers usually don't have any different
authentication systems are password systems that use
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 255
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

images rather than characters or numbers in user internet. The utility is a front end which gives the
authentication. Inspite of the growing acceptance of consumer with a listing of gadgets to have interaction
graphical passwords, empirical studies have shown that with. Forthis, we've got arise to graphical authentication
graphical authentication systems have also inherited schemes. There are strategies in graphical authentication
some of the flaws of text-based passwords. These flaws i.e., consultation password authentication and photo
include predictability, vulnerability to observational primarily based totally authentication. Session
attacks and the inability of systems to efficiently combine passwords may be used handiest as soon as and on
security with usability. Hence, there is continued quest every occasion brand new password is generated.
to find a system that has both strong usability and strong Image password can clean to remember.
security. This paper is a detailed view of the current The Lee et al. (2017) describes, of their paper the
state of research into graphical authentication systems. net of bodily items is internet of things which includes
The paper considers in difficult to confide the records the embedded era assisting in growing device to device
a tour online world so whilst growing safety is a problem or guy to device communication. This paper presents a
textual content primarily based totally passwords aren't dynamic records sheet approximately the town
sufficient to buffer such problem. The necessitate for surrounding parameter taken from the stand -on my
something greater stable alongside being own gadget.
consumeraffable is required. This is in which Image The Chou et al. (2017) describes of their paper a
Based Authentication (IBA)comes into play. It gives domestic automatic gadget has faraway managed
customers a very particular and secured authentication operation. This paper discusses approximately the
device to paintings on. IBA complements the protective problem on their installation locating out the diverse
layerina really consumer affable way. This paper is an answers via one of a kind community technology and
international have a look at as regards to the usage of looking to optimize the usage of both gadgets. The home
pin because the password set.This device gives a stable automation system[HAS] calls for heterogeneous, an
communication channel among the speaking entities. The everlasting and distributive computing surrounding's
categorization of image set as customer password cautious examine to broaden the suitable HAS.
pursuits at thwarting Brute Forcetries, Shoulder strives,
and Tempest strive on the customer aspect at the same The Kamal et al. (2017) describes of their paper
time as the tries on the server aspect may be headed how this paper used Raspberry Pi as the network
off with the aid of using putting into the exercise gateway. This paper make use of MQTT [Message
Kerberos protocol. Queuing Telemetry Transport] protocol for sending and
receiving the records. All the sensors used on this paper
The Christian Reinischet al. (2007) describes, has been managed via way of means of net web page
password safety is important trouble in safety. There is enforcing the access control list [ACL] for imparting
one-of-a-kind manner for hacking password alongwith encryption technique for the secure transaction of the
adwareand key logger your computer sports are reveal records. This paper makes use of diverse sensors,
through the adware. Spyware similar to malware, it stressed and wireless, are linked with the Raspberry
collects non-public data which websites are visited Pi.
through consumer and for away long. Spyware has
numerous approaches of infection. A not unusual place Drawbacks of existing model
techniqueis through "piggy-banking" on software High installation cost, one level notification system,
program downloads. Another is key-logger; a key- Security level is low.
logger is essentially adware. As indicated through its
III. ROPOSED SYSTEM
call's sake, its" logs"or facts your keystrokes.
Keystrokes are gathered in a brief file, that is then By utilizing the sensors like magnetic sensor,vibration
periodically uploaded to the authors region over the sensor, Motion sensor and Arduino the system is
256 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

designed. The model helps in sending notifications to this concept of level-oping a less complicated,
the user if the following actions takes place and the multipurpose, cost-effective design to regulate the on-
actions are divided in to three levels.InLevel- off mechanism of varied devices within the field via short
Iisdesignedtogetanotificationwhenapersoncomes near to message service or SMS. The project is more helpful
room and the image of person is sent to the admin and just in case of crisis, things being the absence of the
user. So, that the person confirms that the person is not super- visor at the work place so he/she is unable to
a family or known person. In Level-II the motions of observe in the flesh for the aim of safety. The images of
person is detected and notification is sent to the admin relatives, friends etc. details where trained in a model
and user and that admin makes sure that the person and if unknown faces detected in the main gate means
has come for locker. In Level-III sends the notification the user can get that notification.
to user when the locker is broken. The main advantage Flowchart
of the system is identifying and capturing of image of
that person. First, we will scan the images of the house
members and save in the file. So, whenever the person
image is captured, the owner gets a name of the person
if already there, Else it notifies unknownperson.
System specifications
Hardware: Magneticsensor, Vibration sensor,
Motion sensor, WI-FI module, Buzzer, Relays
Software: Arduino IDE, Embedded C
Block diagram

Fig: Flowchart for three level security system for home

The flowchart shows that the program will import


all the files from the library, giving input image for
Fig: Block diagram of three level security system for home comparison with the database, grey scale conversion
of each image, the image comparison is done in
The above block diagram contains WIFI module,
Haaralgorithm, decision taking after comparison
Buzzer, Relays and Sensors like vibration sensor,
whether authorized or unauthorized, end of flow.
magnetic sensor and motion sensor.
Advantages
The objective of the Three Level Security System is
to supply high security system for the admins and users. Provide highsecurity, Notificationsystem, Tri level
The user gets an alert message when the person tries to indication before action takingplace, Used for industrial
interrupt the door using vibration sensor, the message and households.
is distributed to the admin through the app. The image
is distributed to admin or user as a notification. With

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 257
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IV. IMPLEMENTATION of it or not using module interface testing and the


Implementation is that the phase of the venture when modules and libraries fitted in implementation. Unit
the hypothetical plan is transformed out into a working testing focuses verification effort on the smallest unit of
framework. Along these lines it alright is also viewed software design, the module we have created
because the simplest stage in accomplishing a fruitful independently to verify that Data flow is correct and all
new framework and in giving the client, certainty that conditions are exercised to check their validity. All loops
the new framework will work and be effective. The are executed on their boundaries. This code results in
execution arrange includes cautious arranging, working and visual way output with sounds, mailing and
examination of this framework and its requirements on other services with result in visual results. This type of
usage, planning of techniques to accomplish changeover testing is used to test the functionality of product. It
and assessment of changeoverstrategies. compares the actual and expected outputs using
input.We have used functional testing to check
The software can be used for both laptops and messaging module and cloudstorage.
mobiles, in this the notification system is given to know
the status of the thief and also in Level-II the admin V. RESULT
gets a notification when a person enters in to a room At present a high security is developing all over the
the image of a person is captured through camera which world but the process is not sufficient and still they need
is placed inside the room and in Level-III it sends the more. Planned prototype has a Three Level Security
notification of person movements captured by motion System in which the face recognition plays a key role
sensor and complete motions are sent as notification and also another keyfactor is notification system of the
touser.The output is generated in form of SMS, mail person's name, motions of a person in a locker room.
and cloud services. The device is fitted with all the The more interesting is the levels for high security planned
possible emergency services helps to make the admin in a lowbudget and easy installation process and number
more secure. Admin can hear the alarm with alert of authentications is unlimited and the power required
message. All the data will be stored in cloud in a secure to maintain islow.
log in to measure the details of thief with respect totime. Comparison
A method for framework trying out consists of At the point we are isolated with security guards, cc
framework experiments and shape structure systems cameras but even we have cc cameras we are facing
into an all-around arranged arrangement of steps that the issues. So, to avoid these circumstances these
outcomes within the effective development of graphical multilevel security system helps in identifying the person
portrayal. The testing procedure must co- work test at the entrance and sending the notification to the admin.
arranging, experiment configuration, test execution, and This helps in more protection and control of robberies.It
also the resultant information assortment and acts an indicator for the authenticator before robbery
assessment. A technique for programming testing must taking place another advantage is he gets a notification
suit low-level tests that are important to test that a touch even when the vibration is occurred and even the small
ASCII text file section has been accurately actualized disturbance will create the sense and notification is sent
even as elevated level tests that approve significant touser. The advantages of proposed method are,
framework capacities against client prerequisites. Testing provide highsecurity, notificationsystem, tri level
speaks to an intriguing peculiarity for the examination indication before action takingplace, used for industrial
framework. Consequently, a progression of testing is and households.
performed for the proposed framework before the
framework is ready for clientacknowledgment testing.
It is checked whether the information is properly
flowingin to the program unit and properly happen out

258 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES
[1]I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter, and A.D. Rubin,
"The design and analysis of graphical passwords", Proceedings
of the Eighth USENIX Security Symposium, pp. 1-14, 1999.
[2] J. Thorpe, and P.C. Oorschot, "Towards secure design choices
for implementing graphical passwords", ACSAC '04: Proceedings
of the 20th Annual Computer Security Applications Conference
(ACSAC'04), Washington, DC, USA, Vol. 3, pp. 664 -666, 2004.
[3] M. N. Doja and Naveen Kumar, "Image Authentication Schemes
Against Key-logger Spyware", Ninth ACIS International
Conference on Software Engineering, Artificial Intelligence,
Networking, and Parallel/Distributed Computing 2008 IEEE DOI
10.1109/SNPD.2006.166.
Fig: Notifications
[4] Christian Reinisch, "Wireless Communication in Home and
VI. CONCLUSION Building Automation", Master thesis, Viennia university of
technology, Feb 2007.
The sensors placed on the door informs the house
owner as soon because the door is opened by sending [5] S. Lee, N. Lee, J. Ahn, J. Kim, B. Moon, S.h.Jung, and D.
Han,"Construction of an indoor positioning system for home
a Push notification. The user will get this notification IOT applications", May 2017.
regardless of whether the phone is locked or unlocked
[6] P. H. Chou, Y.L. Hsu, W.L. Lee, Y.C. Kuo, C.C. Chang, Y. S.
or maybe if the other app is opened at the instant. This Cheng, H.C. Chang, S. L. Lin, S.C. Yang, and H.H. Lee,
was the most objective of the project, which is that the "Development of a smart home system based on multi sensor
data fusion technology" May 2017
user feels safe and not worry about any intrusion or
break-ins when he's aloof from home. Thissetup can [7] M.S. Kamal, S. Parvin, K. Saleem, H. Al-Hamadi, and
A.Gawanmeh," Efficientlow-cost supervisory system for internet
even be utilized in commercial offices where some areas of things enabled smart home", May 2017
are restricted for sure personnel, such a system will
[8] Kiruthika.M and Nithya.p," Development of Home Security
immediately inform the administrator of any unauthorized System Using GSM Module, International Journal of Science,
personnel trying to access such a section. Therefore, Technology andManagement",July, 2015.
the extensibility and applicability of such a system is [9] Hasan, R. and Khan, M.M.," Microcontroller Based Home
merely limited only by the imagination. Another Security System with GSM Technology, Open Journal of Safety
Science and Technology", November2015
important component of the project is that the
connectivity between the ESP8266 (Wi-Fimodule) and [10] Vishal Jain," IOTBases Smart Security and Home Automatsion
System," October 2017
therefore the Blynk server.The system successfully
[11] SudipanSaha, SutasomBhaumik, "SMS Based Wireless Global
connectedto the Blynk server using the authentication Range Automation Security System", December2017
token and therefore the Blynk libraries. As a result, we
[12]Oluyemi Adetoyi," Residential Area Security Network and
had been capable of get the notification on our clever Remote Home Security System", January2018
telephones as quickly as there become any alternate
[13]Mahler, M," A Home Security System Based on Smartphone
inside the popularity of the reed module sensor. Also, Sensors", July 2018
the extra ability to manage the alarm remotely is [14]AnitaA, "HomeSecurity System Using Internet of Things",
incredibly beneficial and maybe very useful in some January 2020.
unforeseen circumstances. It had been also observed
that the Blynk app worked smoothly and administrated
all communication between the hardware and therefore
the app very accurately.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 259
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Compact Ultra-wide Band Microstrip Antenna For Iot


Application
R. Kalyan1, S. Vidyarani2, A. Mounika3, K. S. Deveswari4, P. H. Chandramouli5
1,2,3,4
Assistant Professor, Department of ECE, Annamacharya Institute of Technology and Sciences-Tirupati, A.P., India
5
Assistant Professor, Department of ECE, Vemu institute of Technology and Sciences P.Kothakota, A.P.,India
Email: r.kalyanreddy@gmail.com1, vidyasvr4942gmail.com2, mounikaaluru194@gmail.com3, karthekdevi2gmail.com4,
mouli003@gmail.com5

Abstract - In the recent years, wireless personal UWB antenna design is attaining the wide impedance
area network (WPAN) has been fascinating bandwidth while still upholding high radiation efficiency.
substantial attention and experiencing hasty Planar monopole antennas have been shown to exhibit
expansion worldwide. In recent years, fast wireless a relatively wide impedance bandwidth and good
connections between portable devices, computers radiation pattern characteristics over entire UWB range
and consumer electronics within a short range are
of frequencies [11]-[20]. This planner antenna is
provided by WPAN. In future WPAN provide
stream less operation among home or business
appropriate for wireless communication because of its
devices and systems and also provide fast data ease of fabrication, simple structure, omnidirectional
storage and exchange among all these devices. radiation characteristic, low profile, and lightweight.
This demands a data rate which is much higher than Usually, the antenna is able to achieve low bandwidth
what has been achieved in currently existing at VSWR below 2. In order to enhance the impedance
wireless technologies so the demand for high data bandwidth, some methods have been suggested. Initially,
rate is continually increasing. Antenna is an the shape of the antenna may be varied viz. Square,
essential part for all communication systems. To Rectangle, Circle, Trapezoidal, Pentagon and Triangular
cover various bands an ultra-wide band (UWB) etc. A number of techniques have been used to create
antenna from 3.1 GHz to 10.6 GHz are preferred. single or multiband stop band UWB antennas[21]-[23].
As wireless devices are becoming more compact,
A typical multiband antenna, which is a composite
increasing effort has been put to miniaturize the
UWB antennas, which is becoming a new challenge
structure of narrow band resonant components, has a
for antenna designers. This communication great difficulty in design because of the sophisticated
enlightens design, simulation, fabrication and structure and extremely sensitive impedance bandwidth.
testing of a novel compact ultra-wide band (UWB) Another technique for a multiband design is to create
U-Shaped patch antenna. The planned antenna an ultra-wideband antenna having responsive part
contains U-Shaped patch with partial ground plane. (became radiator) to specific band of frequencies of
This compact antenna is effective and useful for interests and non-responsive (resonator) to undesired
short areas and can be easily incorporated in small band of frequencies. So, we initiated with simple
devices. The results show that the antenna is planner monopole structure of antenna. There are many
having a band width from 2.77GHz to 13GHz. This different shapes or types of planar monopole antennas
antenna gains a worthy harmony between the
that are being considered for UWB applications. It is
simulated results and measured results.
very much need to design compact UWB antennas for
Keywords:UWB, FCC,U-Shaped patch. wireless communication applications.
I. INTRODUCTION II. RECTANGULAR ANTENNA FOR UWB
There are plentiful understandings on planner type WITH PARTIAL GROUND PLANE
of antenna which have been prevailing in the literature Small and compact size of an Ultra-Wide Band
[1]-[10] and antenna engineer's emphasis on the planar (UWB) antenna is highly desirable due to their ease of
monopole design of antenna since the main challenge in
260 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

integration into space-limited systems. Figure 1shows 10 mm and 11 mm respectively parametric analysis is
the Structure of a rectangular antenna in different views. carried for the feed gap. It is observed that the -10dB
(return loss) band width is varied remarkably with the
variation of gap between feed line and ground plane.
When the gap is increased from 0.2mm to 1.4 mm there
is increase in bandwidth from 2.5 to 6.6 GHz. The
optimized feed gap is found at 1.4 mm where the band
width starts from 3.4 GHz and ends at 10 GHz.
Table 1.Parametric study for gap between feed line and
ground plane

Ga p (g) (mm) f l (GHz) fh (GHz) BW (GHz)


Figure 1: Structure of a rectangular antenna (a) Top view (b) 0.2 4 6.5 2.5
Bottom view (c) Side view. (L=30mm, W=30mm, Gl=14mm, 0.6 3.7 7.5 3.8
h=1.6mm, Fl=15mm, Fw=3mm, Pl=14mm, Pw=13mm, 1.0 3.5 8 4.5
g=1.4mm).
1.4 3.4 10 6.6
Proposed rectangular antenna is fabricated on a FR4
It is well known that frequency and bandwidth are
substrate of relative permittivity (r) 4.4, loss tangent
directly proportional to each other. Also, it is known
(tan ) 0.02 and thickness (h) 1.6mm. W and L
that frequency and coupling capacitance are inversely
represents the Width and length of the substrate, Pw
proportional to each other. As gap increases the
and Pl represents the width and length of the patch
coupling capacitance decreases hence frequency
respectively. Patch is connected to a SMA connector
increases which intern increases the bandwidth. So,
with a feed line of length Fl and width Fw. Gl represents
bandwidth and gap are directly proportional to each
the length of partial ground plane.
other. Later the parametric analysis is carried for the
As per simulations the performance of the antenna patch width by keeping feed gap as 1.4 mm and feed
depends on gap between feed line, ground plane and length as 11 mm fixed as shown in Table 2. By varying
also on patch of the antenna keeping ground plane the patch width from 10 mm to 13 mm the lower cutoff
constant. The designed antenna uses the concept of frequency is constant at 3.4 GHz whereas upper cutoff
multiple resonance because ground plane of the frequency is increased from 10 to 11.1GHz which
proposed antenna is also a part of the radiating increases the bandwidth. The optimum patch width is
configuration and current distribution on the ground found at 13 mm where the bandwidth is 7.7 GHz.
plane affects the characteristics of the antenna. It is to Table 2. Parametric study for rectangular patch width(Pw).
be noted that the radiation patch, the gap and the ground
Patch width fl fh BW
plane form an equivalent dipole antenna with (Pw) (mm) (GHz) (GHz) (GHz)
fundamental resonance, mainly determined by the length 10 3.4 10 6.6
of the antenna. It is worth mentioning that closely spaced 11 3.4 10.5 7.1
12 3.4 10.7 7.3
multiple resonances which are harmonics of fundamental
13 3.4 11.1 7.7
resonance overlap, resulting in ultrawide bandwidth. The
simulation analysis has been carried out by varying the Finally, the parametric analysis is carried for the
feed gap, patch width and patch length of the antenna. length of the patch by keeping the feed gap as 1.4mm
First parametric analysis is carried out for gap between and patch width as 13 mm constant as shown in Table
the patch and ground plane which act as a coupling 3. By varying the patch length from 11 mm to 14 mm
capacitance and plays important role to obtain ultra- the band width of the antenna is increased from 7.7 to
wide band width. The simulated return loss values for 8.7 GHz. It is also observed that lower cutoff frequency
gap (g) between feed line and ground plane is shown in is reduced and upper cutoff frequency is increased while
Table1. keeping the patch width and patch length as varying the patch length.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 261
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table 3. Parametric study for rectangular patch length (Pl).

Patch length fl fh BW
(Pl) (mm) (GHz) (GHz) (GHz)
11 3.4 11.1 7.7
12 3.3 11.4 8.1
13 3.2 11.6 8.4
14 3.1 11.8 8.7
We can conclude that to increase the bandwidth of
the antenna the gap between the patch and feed line,
patch width and patch length should be increased. The
optimum values to increase the band width is found at
feed gap as 1.4 mm, patch width as 13 mm and patch
length as 14 mm with a bandwidth of 8.7 GHz.
III. MODIFIED RECTANGULAR Figure 3:simulated return loss curve for the
COMPACT ANTENNA CONFIGURATIONS rectangular antenna without slot and with optimum slot
In modern communication the antenna system is length and width.
integral part which is desired. To achieve compactness, To analyze the performance of the antenna
etching slots on the patch is simple and easy method as parametric analysis is carried for the slot dimensions.
shown in Figure 2. This starts with simple rectangular First parametric analysis is carried for slot width by
slot with length Sl and width Sw near the edge of the keeping length as 4 mm constant. By varying width from
feed line since there is no change in the antenna 2 mm to 8 mm it is observed that the size reduction of
characteristics because of low current density. Further 17.6 percentage is achieved at the center frequency of
the slot dimensions are increased to get the compact 7.8 GHz. Similarly, the parametric study has been carried
antenna. Figure 2(c) shows the fabricated photograph over by keeping the width constant at 8mm and varying
of the U-shaped antenna. the length from 4mm to 12 mm.The detail parametric
study by keeping length constant and varying the width
the lower cutoff frequency, upper cutoff frequency,
bandwidth along with size reduction has been given in
Table 4.
Table 4. Parametric study for slot width by keeping
length constant, the lower cutoff frequency, upper cutoff
frequency, bandwidth along with size reduction.
Slot width Area fl fh BW (%) Size
Figure2:Various rectangular compact antenna (Sw ) (mm) (mm2 ) (GHz) (GHz) (GHz) reduction
configurations (a) Rectangular antenna with rectangular 2 174 3.3 11.8 8.5 4.4
slot (Sw=8mm, Sl=4mm) (b) U shaped antenna 4 166 3.3 11.9 8.6 8.8
6 158 3.4 12 8.6 13.2
(Sw=8mm, Sl=12mm) (c) Fabricated Photograph of 8 150 3.28 12.3 9.07 17.6
the U-shaped antenna.
By varying the length and keeping the width constant
The simulated return loss curve for the rectangular the lower cutoff frequency, upper cutoff frequency,
patch without slot and with optimum slot length and bandwidth along with size reduction has been given in
width is shown in Figure.3. From Figure 3 it can be Table 5. It is observed that width at 8mm, length at 12
seen that there is a large variation in bandwidth with mm the size reduction is over 52.7 percentage with
significance reduction in the size. bandwidth of 9.4 GHz. The optimum U-shaped antenna

262 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

is fabricated on FR4 substrate of dielectric constant


4.4, loss tangent 0.02 and thickness of 1.6 mm.
Table 5. Parametric study for slot length by keeping
width constant, the lower cutoff frequency, upper cutoff
frequency, bandwidth along with size reduction.
Slot length Area fl fh BW (%) Size
(Sl) (mm) (mm2) (GHz) (GHz) (GHz) reduction
4 150 3.28 12.3 9.07 21.3
6 134 3.3 12.5 9.2 26.4
8 118 3.3 12.7 9.4 35.2
10 102 3.22 12.9 9.74 44.0
12 86 3.1 12.4 9.3 52.7

IV. RESULTS AND DISCUSSION


The simulated results of optimum U-shaped antenna
have been compared with the measured results as Figure 5:Simulated and measured VSWR curve for U-shaped
antenna.
shown in Figure 4. The simulated and measured VSWR
also observed which is shown in Figure 5. for VSWR Table 6. Comparison of simulated and measured values for U-
shaped antenna configurations
less than 2 the bandwidth is approximately 9.3 GHz.
Simulated (GHz) Measured (GHz)
Antenna
fl fh BW fl fh BW
U-shaped 3.1 12.4
3.1 12.4 9.3 9.3
antenna
For the U-shaped antenna the gain has been
simulated and measured over the UWB which is shown
in Figure 6.

Figure 4: Simulated return loss curve for the


rectangular antenna without slot and with optimum slot
length and width.
The simulated and measured results of U-shaped
antenna is shown in Table 6. which are in agreement.

Figur e 6:Simulated and measured gain curve for U-shaped


antenna.

It is observed that the maximum gain over the band


of frequency is 5 dBi. The gains provided in the entire
thesis are realized gains. Simulated radiation efficiency
is shown Figure 7. The radiation efficiency is about 90
percent for UWB range of frequency.The simulated and
measured radiation pattern of the U-shaped antenna at

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 263
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

5 GHz is shown in Figure 8. The E-plane pattern is


simulated at theta values from 0 to 360 degrees and
phi = 0 degrees. And H-plane is simulated at theta = 0
to 360 degrees and phi =90 degrees. The proposed
antenna is placed in Y direction hence the E field is in
Y-Z plane and H field is in X-Z plane.

Figure 9:E-Plane and H-Plane view of 3-D Radiation pattern

V. CONCLUSION
The partial ground plane rectangular antenna is
studied which achieve ultra-wide bandwidth. To reduce
the size of the antenna an additional rectangular slot is
introduced on the non-radiating area of the patch and
the length of the slot is increased until U-shaped patch
is formed. The study shows that operating bandwidth
and impedance matching of the antenna critically
dependent on the feed gap but not on the slot. The
area of the antenna for this case is 86 mm2 with a
Figure 7:Simulated radiation efficiency of U-shaped antenna. bandwidth of 9.3 GHz. The U-shaped patch area has
It is observed that the radiation pattern in E-Plane a compactness of 52.7 percent compared to rectangular
(Y-Z plane) is directional whereas the radiational patch.Wide investigation on all of the above proposed
patterns in H-Plane (X-Z plane) is isotropic which is antennas in frequency domain is done. Based on the
the property of monopole antenna. Figure 9. Shows result of analysis, the antenna is developed for all the
the three-dimensional radiation pattern of the proposed cases. The antennas are fabricated with FR4 substrate
antenna. of thickness 1.6mm and characterized by measuring
return loss, gain and radiation pattern. The measured
results are appreciably in good agreement with the
simulated results and this proves the validity of the
proposed antennas.
VI. REFERENCES
[1] L. E Miller, "Why UWB? A review of ultrawideband technology",
National Institute of Standards and Technology, 2003.
[2] Federal Communications Commission, "Revision of Part 15 of
the Commission's Rules Regarding Ultra-Wideband Transmission
Systems First Report and Order", ET Docket 98-153, FCC 02-
48, February 2002. [Online]. Available: http://www.fcc.gov.
[3] Martin and R Gomez, "Electromagnetic field theory for physicists
and engineers Fundamentals and Applications", Universidad de
Granada 2009.
Figure8:Simulated and Measured Radiation Pattern of the U- [4] Thomas A. Milligan, "Modern antenna design", Second edition,
shaped antenna at 5 GHz
A John Wiley & sons, Inc., Publication, Hoboken, New Jersey,
2005.
[5] Kai Fong Lee and Wei Chen, Eds., "Advances in microstrip and
printed antennas", John Wiley,1997.

264 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[6] John D Kraus, Ronald J Marhefka and Ahmad S Khan, "Antenna [17]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Novel
and Wave Propagation", Fourth edition, Special Indian Edition Ultra-Wide Band (UWB) Antenna with Dual Band Notch
2010, 2006, McGraw Hill Education (India) Private Limited. Characteristics for Short Distance Wireless Telecommunication
Applications", International Journal of Pure and Applied
[7] H Arslan, Z N Chen and M G D Benedetto, "Ultra-Wideband
Mathematics, Volume 114 No. 12 2017, 437-451.
Wireless Communication", A john Wiley & sons, inc., publication,
2006. [18]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Compact
UWB microstrip antenna with quadruple band-notched
[8] Y Rahayu, T A Rahman, R Ngah and P S Hall, "Ultra-Wideband
characteristics for short distance wireless tele-communication
Technology and Its Applications", in 5th IFIP International
applications", International Journal of Engineering & Technology
Conference on Wireless and Optical Communications Networks,
7(1) (2018) 57-64.
2008.
[19]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "UWB
[9] P, Withington "Ultra-wideband RF-A Tutorial", in presentation
Microstrip Antenna with Tunable Band-Notched characteristics
to the IEEE 802 Plenary meeting, 2000.
for Wireless Applications", International Journal of Scientific
[10]Narayan Prasad Agrawal, Girish kumar, and k P Ray, "Wide- Progress and Research (IJSPR), Volume 42, Number 01, 2017.
band planar monopole antennas", IEEE Transactions on Antennas
[20]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Novel
and Propagation, Vols. 46, no. 2, February 1998.
UWB microstrip antenna with dual band-notched characteristics
[11]E Lee, P S Hall and P Gardner, "Compact wideband planar for short distance wireless applications", Journal of Engineering
monopole antenna", Electronics Letters, vol. 35. No. 25, 9th Technology (JOET), Volume 6, Issue1, Jan. 2018, PP.584-594.
December 1999.
[21]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Compact
[12]J, Ammann M, "Control of the impedance bandwidth of wideband CSRR Etched UWB Microstrip Antenna with Quadruple Band
planar antennas using a bevelling technique", Microwave and Refusal Characteristics for Short Distance Wireless
Optical Technology Letters, Vols. 30, No. 4, August 20 2001. Communication Applications", Progress in Electromagnetics
Research Letters, Volume 82, 139-146, 2019.
[13]Chen, M J Ammann, Zhi Ning, "A Wide-Band Shorted Planer
Monopole with Bevel", IEEE Transaction on Antennas and [22]R. Kalyan, K. T. V. Reddy, and K. Padma Priya. "compact band
Propagation, Vols. 51, No. 4, April 2003. notched ultra wide band microstrip antenna for short distance
wireless applications", International Conference on Inventive
[14]Kin-Lu Wong, Chih-Hsien Wu, and Saou-Wen (Stephen) SU,
Communication and Computational Technologies, 10-11 March
"Ultra-Wide-Band Square Planar Metal-Plate Monopole Antenna
2017, Coimbatore, India, DOI: 10.1109/ICICCT.2017.7975161.
with a Trident-Shaped Feeding Strip", IEEE Transactions on
Antennas and Propagation, Vols. 53, No. 4, April 2005. [23]Ragini Mishra, R. Kalyan, Y. M. Dubey, "Miniaturized W slot
ultra-wide band microstrip antenna for short distance
[15]Seok H Choi, Jong K Park, Sun K Kim and Jae Y Park, "A new
communication" The International Conference of Electronics,
ultra-wideband antenna for UWB applications", Microwave and
Communication and aerospace technology (ICECA) sponsored
Optical Technology Letters, Vols. 40, No. 5, March 5 2004.
by IEEE, organized on 20-22, April 2017, Coimbatore, India.
[16]Jianxin Liang, Choo C. Chiau, Xiaodong Chen and Clive G. Parini, DOI: 10.1109/ICECA.2017.8212828.
"Study of printed circular disc monopole antenna for UWB
systems", IEEE Transactions on Antennas and Propagation, Vols.
53, NO.11, November 2005.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 265
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Covid-19 Detection and Safety Measures


K.S.Deveswari1, R.Kalyan2, S.Vidya Rani3, E.Devisri4, T.H.Chandramouli5
1,2,3,4
Assistant Professor, Department of ECE, Annamacharya Institute of Technology and Sciences-Tirupati, A.P., India
5
Assistant Professor, Department of ECE, Vemu Institute of Technology and Sciences P.Kothakota, A.P., India
Email: karthekdevigmail.com1, r.kalyanreddy@gmail.com2, vidyasvr4942gmail.com3, devisrireddye@gmail.com4,
mouli003@gmail.com5

Abstract - One of the most important measures Automatic hand sanitizer: In this corona period
suggested by the World Health Organization is hand sanitizer is a nessential thing. Because in this
constant hand washing with hand sanitizers. But process of using sanitization reduces the risk of
one of the most significant problems is the way we spreading of covid-19. But using the normal sanitizer
do it and that is by physically touching the dispenser
bottle becomes very dangerous. When an infected
which eliminates the whole purpose of the action
and even creates a great risk of infection. We person presses the bottle trigger, the virus may spread
proposed to create something using an Arduino Uno from this hand to the sanitizer bottle. We can solve this
board that could combat this problem, but we also by using Automatic hand sanitizer kit. Automatic means,
wanted it to be cheap and to be able to be attached no need to trigger with our hand. Just placeyour hand
to many different dispensers easily, quickly and near the bottle will automatically trigger.
effectively and this is exactly what we made, an
Automatic Door Lock system based on checking
accessory that can be attached to most hand
sanitizer dispensers and turn them completely
of person's Blood Oxygen Levels and temperature. In
hands-free and automatic. COVID-19 is a disease this process the kit checks both spo2 level and
caused by the SARS-CoV-2 virus that primarily temperature. When theseare above or below the
attacks a person's respiratory system. Some milder restricted level the door locks and unlocks. Long-
symptoms can include fever, aches, and chills, but distance measurement of a person's body temperature
it can also lead to more serious conditions such as maybe used to reduce cross-contamination risk and
pneumonia. A person who has pneumonia or even minimize the risk of spreading Corona virus disease.
slight shortness of breath might not know when to
go to a hospital, especially as they start to get even II. PROPOSED METHOD
more overwhelmed. This is why we proposed this Automatic Hand Sanitisation: One of the most
pulse oximeter, which can assist in getting people important measures suggested by the World Health
their SpO2 level. Temperature sensor gives Organization is constant handwashing with hand
accurate information about their temperature.The sanitizers. But one of the most significant problems is
door lock or unlock will depend on these two
the way we do it and that is by physically touching the
levels. Suppose the temperature and spo2 levels
are below or above the prescribed level they are dispenser which eliminates the whole purpose of the
not allowed. action and even creates a greatr isk of infection.
Index Terms -Arduino Uno, Dispenser, We proposed to create something using an Arduino
Pulseoximeter, Temperature sensor, SpO2 level Uno board that could combat this problem, but we also
I. INTRODUCTION wanted it to be cheap and to be able to be attached to
In this paper, the aim is to develop a Covid-19 many differentd ispensers easily, quickly and effectively
detection and safety measurement device. Nowaday's and this is exactly what we made, an accessorythat can
most of the peoples are facing a critical situation that is be attached to most hand sanitizer dispensers and turn
spreading of covid-19. So we are trying to reduce this them completely hands-free and automatic.
spread of covid-19 by using this kit. This single device Door Lock Based On Temperature and Spo2
can doThree various works. Level: As we know one of the main symptoms of
266 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

covid-19 are the increase of temperature and fall of IV. HARDWARE UNITS
SpO2 i.e., blood oxygen level or oxygen saturation A. ARDUINO UNO BOARD: The Arduino Uno
decrease or increase in these two cases may get covid is a microcontroller board based on the AT mega 328.
virus.To check the pulse of the patient we use It has 14 digital input/output pins (of which 6 can be
stethoscope. By using the stethoscope, we cannot used as PWM outputs), 6 analog inputs, a 16 MHz
etermine a person's accurate heartbeat, using ceramic resonator, an USB connection, a power jack,
stethoscope we cannot able to identify the exact anI CSP header, and are set button. It contains
heartbeat of a person. Whereas using pulse oximeter everything needed to support the micro controller;
we can determine accurate SpO2 and heartbeat (BPM) simply connect it to a computer with a USB cable or
of a person. Similarly, to check the temperature at any power it with a AC-to-DC adapter or battery to get
crowded place we use temperature gun, here the started.
temperature gun is a time taking process to hold a gun
by the person. Using our equipment without the help of
the person we can achieve the exact temperature.
COVID-19 is a disease caused by the SARS-CoV-
2 virus that primarily attacks a person's respiratory
system. Some milder symptoms can include fever,
aches, and chills, but it can also lead to more serious
conditions such as pneumonia. A person who has
pneumonia or even slight shortness of breath might not
know when to go to a hospital, especially as they start
to get even more overwhelmed. This is why we Fig. Arduino uno board
proposed this pulse oximeter, which can assist in getting
IR Sensor: A passive infrared sensor (PIR sensor)
their spo2 level. Temperature sensor gives accurate
is an electronic sensor that measures infrared (IR) light
information about their temperature. The door lock or
radiating from objects in its field of view. They are most
unlock will depend on these two levels. Suppose the
often used in PIR-based motion detectors. PIR sensors
temperature and spo2 levels are below or above the
are commonly used in security alarms and automatic
prescribed level they are not allowed.
lighting applications.
III. BLOCK DIAGRAM & COMPONENTS
MAX30100 Sensor: MAX30100 is an integrated
pulse oximeter and heart-rate monitor sensor solution.
It integrates two LEDs (IR and Red), a photo detector
(Red), optimized optics, and low-noise analog signal
processing to detect pulse oximeter and heart-rate
signals. It is fully configurable through software registers,
and the digital output data is stored is stored in a 16-
deep F

Fig. Block Diagram Fig. MAX30100 sensor

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 267
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

MLX90614 Sensor: The MLX90614 is an infrared supply. When power supply is given to PCB then the
thermometer for non-contact temperature required parameters will get displayed in theL CD with
measurements. Both the IR sensitive thermopile detector the help of sensor in thePCB.This sensor is connected
chip and the signal conditioning ASIC are integrated in successfullyto the Arduino
the same TO-39 can. Integrated into the MLX90614
are a low noise amplifier, 17-bit ADC and powerful
DSP unit thus achieving high accuracy and resolution
of the thermometer.
Solenoid Lock: When the power is applied, DC
creates a magnetic field that moves the slug inside and
keeps the door in the unlocked position. The slug will
retain its position until the power is removed. When the
power is disconnected the slug moves outside and locks
the door.

Fig.Results of Discussion

CONCLUSION AND FUTURE SCOPE


Conclusion: The primary application of this Paper
is to detect the Covid 19 and safety measures. The
proposed framework of our paper supports people to
Fig. Solenoid Lock
have less physical contact so, we used automatic hand
sanitisation and for detection of Covid 19 we use
DC Pump:This is Micro Submersible Water Pump MAX30100 and MLX90614, by these we conclude
DC 3V-5V, which can be easily integrated into your our project.
water system project. The water pump works using
the water suction method which drains the water Future Scope: This pandemic situation taught
through its inlet and released it through the outlet. You everyone to maintain certain safety measures to be
can use the water pump as an exhaust system for your healthy. In future there maybe many more diseases, as
as per our requirements we know that prevention is better than cure we shoul
dtake all safety measures. As a part of our idea there
will be a possibility to make huge changes in upcoming
days i.e, by uploading data into clouds. We can easily
access from our mobile itself "principle." Do not confuse
"imply" and "infer." The prefix "non" is not a word; it
should be joined to the word it modifies, usually without
a hyphen. There is no period after the "et" in the Latin
abbreviation "et al." The abbreviation "i.e." means "that
Fig. DC Pump
is," and the abbreviation "e.g." means "for example."
IV. RESULTS An excellent style manual for science writers is [7].
Assemble the circuit on the PCB as shown in block
diagram. After assembling the circuit on the PCB, check
it for properconnections before switching on the power

268 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES [5] US patent 5887467 Pawl & solenoid locking mechanism,


Inventor(s): BUTTERWECK DIETER?[DE]; PHILLIPS
[1] "Arduino UNO for beginners - Projects, Programming and Parts". PETER J?[US]; GARTNER KLAUS W?[US]. ----- solenoid
makerspaces.com. Retrieved 4 February 2018 lock.
[2] Hernando Barragán (2016-01-01). "The Untold History of [6] Millikan GA (1942). "The oximeter: an instrument for measuring
Arduino". arduinohistory.github.io. Retrieved 2016-03-06. --- continuously oxygen saturation of arterial blood in man". Review
Arduino uno. of Scientific Instruments. - pulse oximeter.
[3] Nitzan M, Romem A, Koppel R (2014). "Pulse oximetry: [7] Health, Center for Devices and Radiological (2020-06-23). "Non-
fundamentals and technology update". Medical Devices: Evidence contact Temperature Assessment Devices During the COVID-
and Research. 7: 231-239. ---- max30100. 19 Pandemic"
[4] William H. Yeadon, Alan W. Yeadon. Handbook of small electric
motors. McGraw-Hill Professional, 2001. ---- dc motor.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 269
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Design of High Speed and Efficient Block Based Carry


Speculative Approximate Adder
Dr. Boda Saroja1, Dr. Rajesh Gundlapalle2
1
Department of Electronics and Communication Engineering
2
Department of Electronics and Communication Engineering , New Horizon College of Engineering
Email: boda.saroja@gmail.com1

Abstract- In any Digital signal processing a lower accuracy loss, an error detection and recovery
applications adders plays a vital role. Here, a high mechanism, which significantly reduces the output error
speed and area efficient block-based carry rate, is proposed.
speculative approximate adder with a new parallel
prefix adder is proposed. Its structure is based on II. RELATED WORK
partitioning the adder into some non-overlapped The general architecture of n-bit speculative
summation blocks whose structures may be
approximate adder enhanced by a carry predictor unit
selected from different adders like the carry
is illustrated in Fig 3.1. The add operation is performed
propagate or parallel-prefix adders. Here, the carry
output of each block is speculated based on the by [n/l] l-bit summation blocks working in parallel
input operands of the block itself and those of the where l is the bit-length of each summation block. Each
next block. The block adder used in this is a summation block includes an l-bit sub-adder, a Carry
modified parallel prefix adder which has less area Predictor unit, and a Select unit. In this structure, the
and delay compared with existing Parallel prefix carry input of the ith sub-adder, is chosen by (i-1) th
adder circuit. In this, we propose a high Select unit from the carry signal generated by the (i-1)
performance yet low power/energy consumed th Carry Predictor unit and the one generated by the (i-
block-based carry speculative approximate adder 1) th sub-adder. Selecting the carry output of the Carry
structure which is called BCSA Adder. To reduce Predictor unit leads to a shorter critical path and lower
the critical path more, we suggest an approach to
energy consumption. In this case, the dependency
predict the carry output of a block based on its
between the blocks is cut at the cost of some accuracy
signals as well as of the next block.
loss. Thus, the accuracy of the add operation depends
Keywords- parallel prefix adder, BCSA Adder, on the accuracy of the Carry Predictor unit, and also,
power/energy consumption the policy of the carry output signal selection. In our
I. INTRODUCTION proposed structure, in the worst-case, the length of a
carry chain is equal to two blocks (i.e., 2??).
Introduction In this approach, we propose a high
performance yet low power/energy block-based carry In most of the state-of-the-art approximate adders,
speculative approximate adder structure which is called the carry input of each block is chosen only based on
BCSA Adder. In this structure, the adder is partitioned the input signals of the previous blocks. In this work,
into some non-overlapped parallel blocks, which in the however, we propose a speculative approximate adder
worst case, the carry output of a block is dependent that the carry input
on the carry output of the previous block. To reduce III. ROPOSED WORK
the critical path more, we suggest an approach to
predict the carry output of a block based on its signals A) Adders:
as well as of the next block. The structure has a low Adders are utilized for calculating the addition (or
hardware complexity leading a low delay (on average, sum) of two binary numbers. Two common types of
about one block) and a rather high quality. To achieve adders are the ripple-carry adder (RCA) and the carry

270 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

look ahead adder (CLA). In an n-bit RCA, n 1-bit full example, four LSBs are used to calculate each carry
adders (FAs) are cascaded; the carry of each FA is bit in Fig 1. As each carry bit needs a k-bit sub-carry
propagated to the next FA; thus, the delay of RCA generator in the design of, (n - k) k-bit sub-carry
grows in proportion to n (or O (n)). An n-bit CLA generators are required in an n-bit adder and thus, the
consists of n SPGs, which operate in parallel to produce hardware overhead is rather high. This issue is solved
the sum, generate (gi = aibi) and propagate (pi = ai + by sharing some components among the sub-carry
bi) signals, and connected to a carry look ahead generators. Moreover, a variable latency speculative
generator. For CLA, all carries are generated directly adder (VLSA) is then proposed with an error detection
by the carry look ahead generator using only generate and recovery scheme. VLSA achieves a speedup of
and propagate signals, so the delay of CLA is logarithmic 1.5 times on an average compared to CLA.
in n (or O (log (n))), thus significantly shorter than that
of RCA. However, CLA requires larger circuit area
and higher power dissipation. The carry look ahead
generator becomes very complex for large n. The area
complexity of CLA is O (nlog (n)) when the fan-in and
fan-out of the constituent gates are fixed.
Many approximation schemes have been proposed
by reducing the critical path and hardware complexity
of the accurate adder. An early methodology is based
Fig 1The almost correct adder (ACA)
on a speculative operation. In an n-bit speculative adder,
each sum bit is predicted by its previous k less significant C) Segmented Adders:
bits (LSBs) (k < n). A speculative design makes an A dynamic segmentation with error compensation
adder significantly faster than the conventional design. (DSEC) is proposed to approximate an adder. This
Segmented adders are also proposed. An n-bit scheme divides an n-bit adder into a number of smaller
segmented adder is implemented by several smaller sub-adders; these sub-adders operate in parallel with
adders operating in parallel. Hence, the carry fixed carry inputs. In this, the error compensation
propagation chain is truncated into shorter segments. technique is ignored because the focus is on the
But their carry inputs for each sub-adder are selected approximate design, so the equal segmentation adder
differently. This type of adder is referred to as a carry (ESA) (Fig 4.3.1) is considered as a simple structure
select adder. Another method for reducing the critical of the DSEC adder. Hence, the delay of ESA is O (log
path delay and power dissipation of a conventional (k)) and the hardware overhead is significantly less than
adder is by approximating the full adder the approximate ACA.
adder is usually applied to the LSBs of an accurate
Another segmentation based approximate adder
adder. In the sequel, the approximate adders are divided
(ETAII) is proposed. Different from ESA, ETAII
into four categories.
consists of carry generators and sum generators. The
B) Speculative Adders: carry signal from the previous carry generator
As the carry chain is significantly shorter than n in propagates to the next sum generator. Therefore, ETAII
most practical cases, has proposed an almost correct utilizes more information to predict the carry bit and
adder (ACA) based on the speculative adder design. thus, it is more accurate compared with ESA for the
In an n-bit ACA, k LSBs is used to predict the carry same k. Because the sub-adders in ESA produce both
for each sum bit (n > k). Therefore, the critical path sum and carry, the circuit complexity of ETAII is similar
delay is reduced to O(log(k)) (for a parallel to ESA, however its delay is larger (O(log(2k))). In
implementation such as CLA, the same below). As an addition to ETAII, several other error tolerant adders
(ETAs) have been proposed.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 271
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

signals are true (Pi = 1), otherwise it is the carry-out of


the i th sub-carry generator. Therefore, the critical path
delay of CSA is O(log(2k)). This carry select scheme
enhances the carry prediction accuracy.
F) Approximate Full Adders:
Fig 2 The equal segmentation adder(ESA)
The Lower-Part-OR Adder (LOA):
D) Carry Select Adders:
LOA divides an n-bit adder into an (n- l)-bit more
In the carry select adders, several signals are
significant sub-adder and an l-bit less significant sub-
commonly used: generate gj = aj bj, propagate pj = aj
adder. For the less significant sub-adder, its inputs are
⊕ bj, and pi signals are also used.
simply processed by using OR gates (as a simple
The Speculative Carry select Adder: approximate full adder). The more significant (n - l)-bit
The Speculative Carry Select Adder (SCSA) The sub-adder is an accurate adder. An extra AND gate is
SCSA is proposed. An n-bit SCSA consists of m =[n/ used to generate the carry-in signal for the more
k] sub-adders. Each sub-adder is made of two k-bit significant sub-adder by ANDing the most significant
adders: adder0 and adder1, as shown in Fig. 4.4.1 input bits of the less significant sub adder. The critical
Adder0 has carry-in "0" while the carry-in of adder1 is path of LOA is from the AND gate to the most
"1"; then the carry-out of adder 0 is connected to a significant sum bit of the accurate adder, i.e.,
multiplexer to select the addition result as a part of the approximately O (log (n - l)). LOA has been utilized in
final result. Thus, the critical path delay of SCSA is a recently-proposed approximate floating-point adder.
tadder + tmux, where tadder is the delay of the sub- G) Proposed Adder with Error recovery Unit:
adder (O (log (k))), and tmux is the delay of the
In this approach, we increase the accuracy and
multiplexer. SCSA and ETAII achieve the same
reduce the output error rate by inserting an error
accuracy for the same parameter k, because the same
detection and recovery mechanism. The effectiveness
function is used to predict the carry for every sum bit.
approximate adder is compared with state-of-the-art
Compared with ETAII, SCSA uses an additional adder
approximate adders using a cost function based on the
and multiplexer in each block and thus, the circuit of
energy, delay, area, and output quality. We focus on
SCSA is more complex than ETAII.
reducing the error as much as possible by selecting a
proper carry input on the next block. Therefore, in each
of these cases, the carry output is selected with the
highest possible accuracy. Thus, in the following
paragraphs, we discuss the idea behind the carry output
selection for the four cases
In the first case ( = 0 and = 0), since
= 0, and P(x) are 2/3 and
Fig 3 The speculative carry select adder
1/3, respectively. P(x) denotes the probability of the
E) The Carry Skip Adder: signal x. Thus, ( ) they may be incorrect. In
Similar to SCSA, an n-bit carry skip adder (CSA) addition, when = 0, the ( ) are 2/3 and 1/3,
is divided into [n/k] blocks, but each block consists of respectively. Note that these
a sub carry generator and a sub-adder. The carry-in of
the (i+1)th sub-adder is determined by the propagate
signals of the i th block: the carry-in is the carry-out of
the (i-1)th sub-carry generator when all the propagate

272 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Note that is the


approximate summation output in the first bit of the
(i+1)th block denoted as A in Fig 3. Since the ERU is
not on the critical path of adder, using the Error
Recovery Unit (ERU) leads to improving the accuracy
without increasing the delay of the proposed adder
Fig 4 The structure of the proposed adder with Error Recovery structure. Fig 4 shows the functionality of the proposed
Unit (ERU).
speculative approximate adder with ERU. The ERU
Probabilities have been obtained by assuming that imposes only about 3% and 2% power and area
the distribution of the 1 and 0 in the input operands bits overheads, respectively.
are uniform. Therefore, the carry input of the (i+1) th H) Proposed adder with new PPA:
block may be propagated to its most significant bits.
Hence, to reduce the probability of the error In this adder we use ripple carry adder in the sub
propagation in the convolution adder, in this case, the adder. So instead of using ripple carry adder if we use
Select unit circuit, chooses the whose error probability parallel prefix adder, we decrease the delay of the adder.
is smaller than Hence to improve the delay we use parallel prefix adder
like Brent-kung adder and new parallel prefix adder.
In the second case ( =0 and =1), because
is 1, the speculated carry ( ) is correct.
Therefore, for this case, is selected as the .
In the third case ) because
is 1, independent from the accuracy of the carry input
of the (i+1) th block, the carry input is not propagated.
Therefore, for shortening critical path, we suggest to
select as the carry output of the ith block. Fig 5 The structure of the proposed adder with new PPA with
Error Recovery Unit (ERU).
In the fourth case ( = 1 and ) similar
to the second case, since is 1, the predicated J) New parallel prefix adder:
carry is the same as the exact carry output of the block. A newly designed parallel prefix adder is used in the
sub adder in order to improve the delay when of the
Therefore, in the proposed approach, is
adder when compare to the existing adder. This parallel
selected as the . Among these cases, only in the
prefix adder also contains three stages. Processing,
first case, the carry is propagated in two blocks.
carry generation stage and post processing stage. it is
Therefore, on average, the length of the carry
similar to the Brent kung adder but the carry generation
propagation is close to one block. In the third case,
stage is different. In this adder also contains black cells
although the carry input of the block is killed and is not
and gray cells but the design is different .The 8 bit
propagated, the carry input is employed to determine
proposed parallel prefix adder is shown in the figure 8.
the first summation bit of the block. Therefore, if the
carry input in this case is wrong, it impacts on the output
accuracy of the summation. Hence, for improving the
accuracy of the proposed adder, we suggest an error
recovery unit which generates the first summation bit of
the ith block by

Fig. 6. Proposed parallel prefix adder

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 273
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Hence by using parallel prefix adder like Brent kung REFERENCES


and proposed parallel prefix adder in place of ripple [1] N. Zhu, W.L. Goh and K.S. Yeo, "An enhanced low-power high-
carry adder we can reduce the delay when compare to speed Adder for Error-Tolerant application," In Proc. ISIC, pp.
the existing adders. 69-72, 2009.
[2] N. Zhu, W.L. Goh and K.S. Yeo, Z.H. Kong, "Design of low-
IV. RESULTS power high-speed truncation -error-tolerant adder and its
application in digital signal processing", IEEE TVLSI, vol. 18,
2010.
[3] H. Esmaeilzadeh, A. Sampson, L. Ceze, and D. Burger, "Neural
Acceleration for General-Purpose Approximate Programs, " In
Proc. of Micro, pp.449-460, 2012.
[4] M. Bilal, S. Masud, and S. Athar, "FPGA Design for Statistics-
Inspired Approximate Sum-of-Squared-Error Computation in
Multimedia Applications," IEEE TCAS-II, vol. 59, no. 8, pp.
506-510, 2012.
Fig 7 RTL Schematic
[5] A. B. Kahng, S. Kang, "Accuracy-configurable adder for
approximate arithmetic designs," In Proc. DAC, pp.820-825,
2012.
[6] M. Samadi, J. Lee, D.A. Jamshidi, A. Hormati and S. Mahlke,
"SAGE: self-tuning approximation for graphics engines". Proc.
Micro, pp.13-24, 2013.
[7] Y. Kim, Y. Zhang, and P. Li. "An energy efficient approximate
adder with carry skip for error resilient neuromorphic VLSI
Fig 8 Technology Schematic systems," In Proc. ICCAD, pp. 130-137, 2013.
[8] R. Ye, T. Wang, F. Yuan, R. Kumar and Q. Xu, "On
Reconfiguration-Oriented Approximate Adder Design and Its
Application," In Proc. ICCAD, pp. 48-54, 2013.
[9] B. K. Mohanty, S. K. Patel, "Area-delay-power efficient carry
select adder", IEEE Trans. Circuits Syst. II Exp. Briefs, vol. 61,
no. 6, pp. 418-422, Jun. 2014.
[10] M. Kamal, A. Ghasemazar, A. Afzali-Kusha, and M. Pedram,
"Improving efficiency of extensible processors by using
Fig 9 Simulation output approximate custom instructions," in Proc. DATE, 2014. [11] J.
Hu and W. Qian, "A new approximate adder with low relative
IV. CONCLUSIONS
error and correct sign calculation," In Proc. IEEE DATE, pp.
In this, we proposed a block-based carry 1449-1454, 2015.
speculative approximate adder (BCSA), which was [12] M. Shafique, W. Ahmad, R. Hafiz and J. Henkel, "A low latency
based on dividing an exact adder into some non- generic accuracy configurable adder," In Proc. DAC, pp. 1-6,
2015.
overlapped blocks operated in parallel. Each block may
be composed of any desired type of adders. In this
adder, the length of carry chain was reduced and it was
utilized to estimate the carry. A select logic was suggested
to speculate the carry input of each block based on
some input operand bits of the current and next block.
In addition, to reduce the delay we are using a novel
design of parallel prefix adder where the delay and area
are better when compared to other parallel prefix
adders. For reducing the accuracy loss, an error
detection and recovery mechanism was suggested.

274 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

GPS and GSM Based Detection and Extraction of


Landmines
M. Arun Kumar
Asst. Prof. Department of ECE, VEMU Institute of Technology, P.Kothakota
Email: Arunkumar.mak.88@gmail.com

Abstract: This system uses the Global created programming, which will program the parallel
Positioning System (GPS) tracking technology in port and speak with the robot by means of radio signs.
combination with Global System for Mobile (GSM)
technology. An integrated system employing latest Created programming program utilizes catch and
tracking techniques using satellite receiver in the mouse control to explore the robot. The created
form of GPS Modem, integrated with a robotic programming will Demonstrate the ongoing area of the
vehicle can be used to detect the exact location of robot and the area is transmitted. At the point when the
metal in the field. Then the GSM module transmits robot distinguishes a landmine it sends the flag to the
the received data to the authorized Mobile user. GSM framework as the sort of metal recognized and
Main purpose of this project is to detect landmines their area in, for example, Latitude, Longitude, the
by using a GPS enabled remotely controlled robot. mechanical model.
Keywords: Microcontroller, GSM Module, GPS II. LITERATURE SURVEY
module, Sensors
There were a few writings which alluded before
I. INTRODUCTION
beginning the work to take a smart thought and to check
Expectedly, Wireless - controlled robots use RF the conceivable outcomes of getting the required
circuits, which have the downsides of restricted working outcomes. Jadhav. 2013) have appeared in his
reach, constrained recurrence run and the constrained examination about the car limitation framework utilizing
control. Utilization of a cell phone for mechanical control GPS and GSM administrations. The framework
can beat these confinements. It gives the benefit of strong licenses confinement of the vehicle and transmitting the
control, working extent as huge as the inclusion territory situation to the landmine at the getting station. This
of the specialist co-op, no obstruction with different framework is additionally given GSM to get an instant
controllers and up to twelve controls. In spite of the message about the where about of the mine.This writing
fact that the appearance and the abilities of robots differ has some shortcoming as specialist in a few spots where
inconceivably, all robots share the highlights of a there is no arrangement of GSM systems it is
mechanical, mobile structure under some type of control. troublesome for correspondence likewise did not make
The Control of robot includes three unmistakable stages reference to progressively required data of the diverse
as follows:1.Perception 2. Preparing 3. Activity. For sort of metals utilized for the mine. This is gotten by a
the most part, the preceptors are sensors mounted on GSM modem in the gadget and handled by the Spartan
the robot, handling is finished by the on-board processor and the processor sends order to a GPS
microcontroller or processor, and the undertaking is module in the gadget. The GPS module reacts with
performed utilizing engines or with some different arrange's situation of the mine. This position is sent to
actuators. Robot is intended to recognize landmines in the station as a SMS to the client with date, time, scope
a remotely controlled manner. Client can explore the and longitude positions. This writing has some
robot and find the landmines. Areas of distinguished shortcoming when comprise air masses in the sky GPS
landmines can likewise be gotten to by cell phones will stop the work and don't send message and decide
through SMS. The robot can be constrained by the the area. Likewise some quality, utilizing a FPGA

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 275
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

controlled framework we can without much of a stretch information/yield (I/O) sticks that might be interfaced
track the dig which guarantees wellbeing for the troops to different development sheets or breadboards
in the military vehicles and furthermore bunches of (shields) and different circuits. The sheets highlight
employments for open transport framework. sequential correspondences interfaces, including
Universal Serial Bus (USB) on a few models, which
This writing has some shortcoming as the postponed are likewise utilized for stacking programs from PCs.
correspondence systems to send message recorded
The microcontrollers are ordinarily customized
when the mishap and has some quality can catch the
utilizing a tongue of highlights from the programming
surges of information given by their accelerometers,
dialects C and C++. Notwithstanding utilizing customary
compasses, and GPS sensors to give a convenient black
compiler toolchains, the Arduino venture gives an
box that distinguishes impact mishaps. The main writing
incorporated improvement condition (IDE) in light of
study has done about the mishap location and send
the Processing dialect venture.
message utilizing GPS and GSM modems. The second
examination is planning the metal location sensor, which GPS Receiver with Active Antenna-Global
checks if the mishap has been caused because of the Positioning System (GPS) satellites Broadcast signals
impact of mines. Third writing to configuration station from space that GPS receivers use to provide three-
alert framework in case of impact. Fourthly, ponder dimensional location (latitude, longitude, and altitude)
planning mine following framework utilizing GPS. At plus precise time.GPS receivers provides reliable
long last, every one of the written works found are great positioning, Navigation and timing services to worldwide
and gave data about the application, working rule, how users on a continuous basis in all Weather, day and
to plan the System and pick best program to structure night, anywhere on or near the Earth. Sunroom's ultra-
the circuit this enables us to compose the paper and sensitive GPS receiver can acquire GPS signals from
furthermore to structure mishap notice system. 65 channels of satellites and output position data with
high accuracy in extremely challenging environments and
III. DESCRIPTION
under poor signal conditions due to its active antenna
The automated control system consists of GPS and high sensitivity. The GPS receiver's160dBm tracking
module, GSM Modem, Microcontroller, Metal detector sensitivity allows continuous position coverage in nearly
sensor Motor Driver L298, DC Motor. The unit is all application environments. The output is serial data
expressed in figure below: of 9600 baud rate which is standard NMEA 0183 v3.0
protocol offering Industry standard data messages and
a command for easy interface to mapping software and
Embedded devices.
2. Power supply unit- On-board 5Vrechargeable
battery is used to drive dc motors &PIC16F877
&AT89C51. We require 3.3V and for various sensors
and we require 5V to drive RF module, etc. So to do
this we will have to build power supply unit using
voltage
IV. WORKING
Fig 1: - block diagram of landmine detection using GSM & Metal detector consists of copper coils. On the off
GPS. We have built a prototype model which as shown in
above block diagram. Following is the hardware description.
chance that any metal is identified, it sends the flag
information to controller and with the assistance of GPS
1. Arduino UNO- Arduino board structures utilize an
it shows the scope and longitude of the correct position.
assortment of chip and controllers. The sheets are
furnished with sets of computerized and simple GSM through Attention Command sends the SMS. We
utilize engine driver L298D on the grounds that we give
276 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

just +5v control supply and +12v is required to turn thelandmine sullied area and adds a point highlight to
the engine so just L298D has the property to pivot the the landmine point layer in the GIS database.
engine regardless of whether the information control V. ADVANTAGES
supply is +5v.System comprises of two fundamental
modules, which are the control station, which keeps Totally Remote Controlled.
running on a PC or Laptop and the remotely controlled With the help of GPS we get the latitude and longitude
robot. of the detected position.
The control station comprises of three coordinated Locations of detected landmines can also be
modules comprising of Metal recognizing segment, GPS accessed by mobile phones via GPRS and SMS.
information gathering segment and Remote control
Wireless-controlled robots use RF circuits, which
segment. These three segments go about as one
have the drawbacks of limited working range, limited
framework however the fundamental framework parts
frequency range and the limited control. Use of a mobile
go about as all the while working autonomous
phone for robotic control can overcome these
frameworks. Remote control framework utilizes a radio
limitations. It provides the advantage of robust control,
recurrence transmitter. Control framework, which keeps
working range as large as the Coverage area of the
running on a PC or a Laptop, utilizes the parallel port
Service provider, no interference with other controllers
and control transfers to remotely control the robot.
and up to twelve controls.
Bluetooth GPS sends the area of the robot through
VI. APPLICATIONS
Bluetooth information association. Controlling
programming of the GPS of three incorporated modules Anti-Car Theft.
comprising of Metal distinguishing segment, GPS Alive Human Detector.
information gathering part and Remote control segment.
These three segments go about as one framework yet To detect the landmine and prevent the loss of human
the fundamental framework parts go about as all the lives.
while working free frameworks. Remote control VII. CONCLUSION
framework utilizes a radio recurrence transmitter.
The paper presents an advanced solution and a new
Control framework, which keeps running on a PC or a
direct approach for remote sensing based on the
Laptop, utilizes the parallel port and control transfers
concept of metal detectors to detect the metallic
to remotely control the robot. Bluetooth GPS sends
landmines in El Alamein region. The advanced solution
the area of the robot by means of Bluetooth information
solves three main problems a) The absence of maps
association. Controlling programming of the GPS goes
thatshow landmines locations that planted in the Egyptian
about as a transitional layer, in the correspondence
western desert from WWII, b) The lack of funds, c)
between the created programming and the robot. GPS
The limited use of technology. The solution based on
segment of the created programming peruses NMEA
integrated technologies by using the wireless
information by means of correspondence port of the
communications, cellular technologies and the packet
PC or the laptop.The programming unravels NMEA
oriented mobile data service to obtain a full control from
information and the area of the robo delineate is utilized
a safe distance for landmine monitoring team in fenced
as the GIS programming, which serves the GIS layers
minefields or suspicious regions. GSM sound tracker,
to the created programming. In the event that the robot
GPS tracker, smart cellphones plus advanced
recognizes a landmine by utilizing its metal indicator, it
applications and RC truck equipment were brought
sends a radio flag by utilizing a FM transmitter. At that
together to do three main tasks for metal landmines, a)
point the flag is caught by a FM collector which is
Tracing,-b) Detecting,-c) pinpoint location coordinates.
connected to the control framework and afterward
framework perceive the situation of the robot as
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 277
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

FUTURE WORK REFERENCES


In future, this proposed system can be used to find [1] KhIraky., Youssif, A. and Adel, A. -Explosive Detection in El
Alamein?. International Journal of Computer Applications
the actual condition of the place where the robot is sent .Published by Foundation of Computer Science, New York, USA,
to detect the landmine. This can be achieved by using a Volume 81 - No.9, November 2013..
CCTV (Closed Circuit Television) interfaced with the [2] HABIB, M.K., - Mine detection and sensing technologies- new
microcontroller. Thus the actual images can be accessed development potentials in the context of humanitarian demining?.
directly using the CCTV. Since the use of GPS, the Proceedings of the 27th Annual Conference of the IEEE Industrial
Electronics Society, 3, pp. 1612-1621, 2001.
weather conditions of the area can be accessed.
[3] L. ROBLEDO, M. CARRASCO and D. MERY, - A survey of
Knowing the weather conditions like heavy snowfall, land mine detection technology?, International Journal of Remote
landslide, heavy rains, etc. can be known. Thus the army Sensing, pp.1-9, 2008.
headquarters can actually decide to send more number [4] MAATHIUS, B. and VAN GENDEREN, J., 2004, a review of
of personnel in order to minimize the loss. satellite and airborne sensors for remote sensing based detection
of minefields and landmines. International Journal of Remote
Sensing, 25, pp. 5201-5245.

278 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Road Sign Recognition Using Open CV With Raspberry


PI
A. Mahesh Reddy
Assistant Professor, Department of ECE, SVPCET, PUTTUR
Email: Alumuru.mahesh@gmail.com

Abstract - At present situation the human beings The main objective of proposed system is to detect
are faced many accidents during the road ways the road sign automatically while driving and control
transportation. At the same time, they lose our life the speed or makes the turn according to that Road
and valuable properties in those accidents. To avoid sign. Road sign recognition is used to warn the distracted
these problems the system designed with the help
driver, and prevent his/her actions that can lead an
of Raspberry pi. The Digital image processing plays
important role in the sign capturing and detection
accident. The goal is to avoid accidents by both manual
system. The image processing algorithms to takes and automation process in which all the actions will be
the necessary action for resizing the captured signs. performed based on the detected Road signs[3]. A real-
The Raspberry pi camera port used to capture the time automatic speed sign detection and recognition can
road signs with image enhancement techniques. help the driver, significantly increasing his/her safety. To
The embedded system small computing platform avoid accidents and traffic jam road signs are generally
studies the characteristics of speed signs. In that placed near curved areas, hospital zones, school zones
daylight vision time to take the shape analysis for etc. Driver has to view the road signs and control the
recognizing the signs using edge detection speed or makes the turn according to it. Due to various
algorithms. The objective of the proposed work is issues,
to implement the available technique to traffic sign
with the help of raspberry pi3 board. Our worked focused on a low cost, off the shelf
Key Words: Raspberry pi3, Traffic signal
solution, specifically, a mini embedded computer
detection, Python, L298N, Robot chassis kit. Raspberry Pi. In order to provide fast processed results,
this system aimed to demonstrate use of simple shape
1. INTRODUCTION recognition algorithms and open-source optical
Every person, whether a passenger, driver, character recognition (Tesseract OCR) on Raspberry
pedestrian would have noticed along the roadside Pi. Tesseract OCR is an open-source optical character
various sign board that serve important purposes. These recognition module for various operating systems. And
important road paraphernalia help us as route guides, its development supported by Google since 2006[4].
warnings and traffic regulators. As control devices for 2. LITERATURE SURVEY
traffic, signs need full attention, respect and appropriate
driver's response. With the advent of motorized traffic According to, the first work on automated traffic
and its increasing pressure on road, many have adopted sign detection was reported in Japan in 1984. This
pictorial signs and standardized their signs to facilitate attempt was followed by several methods introduced
international travel, where language differences would by different researchers to develop an efficient TSDR
create barriers. In adverse traffic conditions, the driver system and minimize all the issues stated above. An
may not notice traffic signs, which may cause accidents. efficient TSDR system can be divided into several
In such scenarios, automatic road sign detection comes stages: preprocessing, detection, tracking, and
into effect[1,2] . recognition [5]. In the preprocessing stage the visual
appearance of images has been enhanced. Different
color and shape-based approaches are used to minimize
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 279
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

the effect of environment on the test images. The goal real world of traffic signboards using camera. After
of traffic sign detection is to identify the region of interest match found it generates a signal so the raspberry pi
(ROI) in which a traffic sign is supposed to be found sends a control signal to the L298 to control the
and verify the sign after a large-scale search for motorsof the chassis.
candidates within an image. Different color and shape 4. BLOCK DIAGRAM
based approaches are used by the researchers to detect
the ROI. The popular color based detection methods The block of proposed system is as follows:
are hsi/hsv transformation, region growing, color
indexing, ycbcr color space transform.
Greenhalgh and Mirmehdi [6, 7] showed a
comparison between SVM, MLP, HOG-based
classifiers, and Decision Trees and found that a Decision Fig. 1 - Block Diagram ofSystem

Tree has the highest accuracy rate and the lowest 5. HARDWARE & SOFTWARE
computational time. Its accuracy is approximately REQUIREMENT: RASPBERRY PI3
94.2%, whereas the accuracy of the SVM is 87.8%
Raspberry pi is a small chip of single board computer.
and that of MLP is 89.2%. Neural Network is flexible,
There are various model of raspberry available in the
adaptive, and robust. Hechri and Mtibaa [8] used a 3-
market i.e. the Raspberry Pi 1 Model B, Raspberry Pi
layer MLP network whereas Sheng et al. used a
1 Model B+, Raspberry pi 2,Raspberry Pi 3 Model B.
Probabilistic Neural Network for the recognition
These all are differ in memory capacity and hardware
process. Support Vector Machine (SVM) is another
features like Raspberry pi 3 has inbuilt Bluetooth and
popular method used by the researchers which is robust
wifi modules as shown in Fig. 2 whereas in previous
against illumination and rotation with a very high
versions these modules were not available. It has 1.2
accuracy. Yang and Garcia- Garrido [9, 10] used SVM
GHz 64- bit quad core ARMv8 CPU with 1 GB of
with Gaussian Kernels for the recognition whereas Park
RAM [12, 13].
and Kim used an advanced SVM technique that
improved the computational time and the accuracy rate
for gray scale images. For improving the recognition
rate of the damaged or partially occluded sign. Principal
Component Analysis (PCA) is used by Sebanja and
Megherbi [11] in which have a very high accuracy rate.
signs. Grey-scale images are used to make our detection
and recognition algorithm morerobust to changes in
illumination.
3. SYSTEM DEVELOPMENT
The main work of proposed system is to detect the
sign boards like stop board. For this, system will always
trying to determine between the lower and upper range Fig. 2 - Raspberry Pi 3 Model B Board
of the red color and a rectangle be formed on the red Camera
signals. The rectangle formed on the red light signal has
a fixed area by the use of that area system creates a Camera is used to take the continuous images to
signal that control the GPIO pins of the raspberry pi. get the traffic signs and signals from the real world.
For the detection of the stop board sign system used According to the images available through the camera
cascade classifier in which it compare the xml file of we can send these images to the raspberry pi to perform
different size of stop word with the input available from car's control action.
280 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Motor Driver IC L298 6. FLOW CHART


L298 is known as a dual bidirectional motor driver
which is based on dual H-Bridge Motor driver IC. This
circuit allows you to control two DC motors
independently in either direction. It is a commonly used
component for prototypes and hobbyist projects, as it
is easy to use and interface the L298 with a Raspberry
Pi or an Arduino as shown in Fig 3. Other than its
minimal design, it also provides an onboard 5V regulator
that you can use to power your 5V circuits very
conveniently. In this, locally available L298 based motor
drivers (L298 breakout board) are used because they
all are essentially the same which makes setup a little
easier and Controlling a DC Motor is easy with a
Raspberry Pi [14, 15].

Fig 3. Motor Driver IC L298


Chart-1: Flow Chart of System
Python Software
Python is a high level, general purpose programming 7. WORKING OF SYSTEM
language used widely in industries and research work The 2 wheels of chassis connected with two motors
also used in making general purpose projects. It`s
.Motor driver IC l293d is used to control the motor,
software comes in various version i.e. IDLE python 2,
one motor driver IC can control only two motors .So
python 3 also in these two types different version of
the proposed system used one l293d that is enough to
python IDLE are available for programming the python
control the motors. So the input for motor driver IC is
language.
given by the Raspberry pi and the output pins of the
Open CV motor IC are connected to the motor of the chassis.
It stands for Open Source Computer Vision .It has For movement of the car in forward and backward
a library of programming function mainly for real time direction system will rotate the wheels in equal speed
computer visions. It has over more than 2500 optimize whereas to move left or right system will slow down
algorithms for set of classical algorithm as well as for the one wheel as compare to the other one according
the state of art algorithms in the computer visions is to the turning points i.e. if system need to rotate the
basically used for image processing in which we used it turn in left direction Fig 6 system have to slow down
for the face detection, object detections, image the left wheel and if there is need to turn in right direction
recognition, traces and also for other functions.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 281
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig 5 system have to slow down the right wheel. In the Execution of Signs
proposed system the input to the motor driver IC from
is given from the GPIO pins(2,3) for driving the left
motor and GPIO pins(4,17) is used to drive the right
motor from L293d.
8. PERFORMANCE ANALYSIS
Actual Assembly of System
The Fig 4 shows actual assembly of system

Fig 5: Right turn movement of robot

Fig 4: Road Sign Detection Robot

Road Sign and Corresponding Actions


Table 1: The table below illustrates the different
roadsign and the corresponding action to be performed Fig 6: Left turn movement of robot

by the robot
Road Signs Actio n to be p e rf or m ed

As a starting indi cation.

Performs the forward


movement of robot.

As a left turn indication.

Pe rf orm s the lef t tu rn Fig 7: U-turn movement of robot


m ove m en t o pe ratio no f
robot. 9. CONCLUSIONS
The driver helping system has been presented in this
paper. The basic idea is to recognize and classify the
traffic signs from an input image. The image processing
As a right turn indicator.
As a U turn indicator.
technique used in this system is based on the SURF
Performs the right turn algorithm. Finally, the recognition and classification of
Performs
m ove m en t op the U turn
eration of th e these potential road signs is done according to a
movement through
robot. left side. database of road sign patterns and controls the speed
according to it. The performance of this idea depends
on the quality of the input image, in relation to its size,
contrast and the way the signs appear in the image.

282 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

This system is fully based on automation process which [5] Safat B. Wali, Mahammad A. Hannan, Aini Hussain, & Salina A.
Samad "An Automatic Traffic Sign Detection and Recognition
replaces the existing manual operation. Automation System Based on Colour Segmentation, Shape Matching, and
process, in turn decreases the human error, increases SVM" Hindawi Publishing Corporation Mathematical Problems
the accuracy, processing speed and reliability. In this in Engineering Volume 2015, Article ID 250461
report, a method to make a self- responding robot car [6] J. Greenhalgh and M. Mirmehdi, "Traffic sign recognition
is represented .Working of different hardware UsingMSERandRandomForests,"inProceedingsofthe 20 th
European Signal Processing Conference (EUSIPCO'12), pp.
components are described .A way to find the stop signs 1935- 1939, August 2012.
board and red signals have been defined and also way [7] J. Greenhalgh and M. Mirmehdi,"Real-time detection and
to detect the obstacles .All methods and algorithm recognition of road traffic signs," IEEE Transactions on Intelligent
mentioned in this paper are successfully implemented Transportation Systems, vol. 13, no. 4, pp. 1498-1506, 2012.
in a robot car of chassis having two wheels. [8] \A. Hechri and A.Mtibaa, "Automatic detection and recognition
of road sign for driver assistance system," in Proceedings of the
For future enhancement, more advanced 16 th IEEE Mediterranean Electro technical Conference
resolutioncamera and advanced processors can be used (MELECON '12), pp. 888-891, Yasmine Ham Mamet, Tunisia,
March 2012.
in order to detect the sign perfectly and quickly. A
System should be developed to monitor the rear end [9] S. Yang, X. Wu, and Q. Miao, "Road-sign segmentation and
recognition in natural scenes," in Proceedings of the IEEE
vehicle during the turnings so that the automation International Conference on Signal Processing, Communications
process will ensure more safety. and Computing (ICSPCC '11), pp. 1-4, Xi'an, China, September
2011.
To enhance it more in the future machine learning
[10]M. A. Garcia-Garrido, M. Oca˜na, D. F. Llorca,M. A. Sotelo, E.
algorithms can be used so it can be able to determine Arroyo, and A. Llamazares, "Robust traffic signs detection by
each objects .The current performance is good but to means of vision and V2I communications," in Proceedings of the
make it more efficient it is necessary to implement it 14th International IEEE Conference on Intelligent Transportation
Systems (ITSC '11), pp. 1003- 1008, IEEE, Washington USA,
using machine learning and other algorithms so it will Oct -2011.
understand more things .So in future to make it more [11]I. Sebanja and D. B. Megherbi, "Automatic detection and
advance it. recognition of traffic road signs for intelligent autonomous
unmanned vehicles for urban surveillance and rescue," in
10. REFERENCES Proceedings of the 10 th IEEE International Conference on
[1] Rafael C. Gonzalez, Richard E. Woods & Steven L. Eddins, Technologies for Homeland Security (HST '10), pp. 132-138,
"Digital Image Processing using MATLAB", Second Edition, - IEEE, Waltham, Mass, USA, November2010.
Pearson Education. [12]https://www.raspberrypi.org/documentation/configur ation/
[2] https://maker.pro/raspberry-pi/tutorial/how-to-do- basic- image- [13]https://www.raspberrypi.org/downloads/raspbian/
processing-with-raspberry-pi
[14]https://www.sparkfun.com/datasheets/Robotics/L298_
[3] https://www.raspberrypi.org/magpi-issues/Projects_Book_v1. H_Bridge.pdf
pdf
[15]https://researchdesignlab.com/l298-motor-driver.html
[4] Enis Bilgin, Dr. Stefan Robila, "Road sign recognition system on
Raspberry Pi" in Proceedings of IEEE Long Island Systems,
Applications and Technology Conference (LISAT), Farmingdale,
NY, USA, April 201610.1109/LISAT.2016.7494102

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 283
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

A Review on Solar Power Monitoring Using Internet of


Things
Suvidya Arif Patel
PhD Research Scholar, Department of Electronics and Communication, JJTU, Rajasthan, India

Abstract: According to the Internet of Things, homes, power management, assistance for disabled and
a future in which the internet has extended to elderly people, cochlear implants, object tracking,
everyday objects is envisaged. As a result of the equipment manufacturing, agriculture, and other
Internet of Things (IoT), remote sensing and industries. The number of connected devices is
control of things can be accomplished through
projected to reach 30 billion by 2020, valuing the
existing network infrastructure, allowing the
commercial sector at about 7.1 trillion dollars [2]. Using
physical world to be fully integrated into computer-
based systems and yielding increased efficiency, the Internet of Things, we may enable machine-to-
accuracy, and economic gain, as well as a reduction machine (M2M) or device-to-device communication
in human involvement. A number of applications, without requiring human intervention [3] [4].
such as solar cities and smart villages, as well as
microgrids and solar street lighting, may be made
possible via this technology. As In this time period,
renewable energy grew at a faster rate than it has
at any other moment in history before it. The online
display of solar energy's power consumption as a
renewable energy source is one of the methods
that have been proposed. This monitoring is
achieved via the use of the Raspberry Pi and the
Flask programming language. Smart Monitoring
keeps track of how much renewable energy is used
on a daily basis. This provides the user with the
ability to do an energy analysis. The implications Fig. 1:The percentage of power sources installed
for renewable energy usage and power shortages
Everyone in the modern world now need electricity,
are examined.
which has been added to the list of most basic
Keywords- Renewable energy; IoT, Electricity, necessities. The graph of energy use is rising on a daily
Solar panel etc. basis, while energy sources are decreasing at the same
I. INTRODUCTION time. As a means of compensating for the lack of
available power, energy is produced using a number of
The internet of things (IoT) is playing an important
techniques. There are two types of energy generation
and essential part in people's everyday lives by allowing
methods: conventional and unconventional.
the internet to link many and most physical objects in
Conventional electricity generation is the more common
order to exchange data and monitor and manage the
of the two. While certain sources of energy, such as
devices from a distant place, where the devices become
fossil fuels and nuclear fuels, are used, these sources of
intelligent [1]. This technology has the potential to
energy are not renewable (in the sense that the resources
connect a wide range of things, including animals,
are not renewed by nature) and are thus categorised as
humans, smart transportation, smart grids, virtual electric
non-conventional. Solar energy, in its broadest
grids, smart cities, vehicles, heart monitoring systems,
definition, may be used to provide a sustainable energy
environment monitoring, shopping systems, automated

284 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

source that is environmentally friendly. Solar energy is item on the globe. Some gadgets, buildings, vehicles,
readily accessible on a worldwide scale and is relatively and other objects with software, sensors, electronics,
inexpensive. The sun, like all other sources of energy, and a network connection may gather and share data
has been generating energy for billions of years. Solar [10].
energy has the potential to be a major source of energy Wireless sensor networks, sensor networks, 2G/3G/
production since it has the ability to transform heat into 4G, GSM, GPRS, RFID, WI-FI, GPS,
electricity. The term "solar thermal energy" refers to this microcontrollers, and microprocessors, as well as the
in the conventional meaning of the term [5] [6]. Internet of Things itself, are all essential components of
While there are many renewable energy sources the Internet of Things (Internet of Things). The article
available, such as wind, rain, tides, and geothermal investigates and categorises technical advances that
energy, as well as natural-based biofuels and enable the Internet of Things. They are-
conventional biomass, solar energy offers significant • A technological advancement that enables "things"
benefits over these other sources [7]. to absorb contextual information.
In India, power outages are very common these • Advancement that enables "things" to process
days, and they may last for hours. In order to do this, pertinent data and innovation that improves security
the primary goal should be the usage of renewable and protection.
energy, with monitoring coming in as a close second.
Accepting and analysing relevant data may offer the
Increased manufacturing efficiency, unrivalled quality, necessary knowledge for embedding "intelligence" into
and long-term durability of renewable energy "things" through artificial intelligence. The capacity of
applications have all contributed to the rapid growth of the Internet of Things to connect wirelessly distinguishes
renewable energy applications during the last decades. it from traditional internet [11].
In addition, by keeping an eye on energy predictions,
The Internet of Things idea is being used in this solar
families, and communities, productivity may be increased
tracking system to solve the main limitations of solar
even further [8].
energy-based power production. The quantity of solar
For India's growth and economic prosperity to be energy that reaches the planet changes throughout the
successful, electricity must be readily available. After year. Because the range varies according on location,
China, the United States of America, and Russia, India historical period, and weather circumstances. As a result,
is the world's fourth-largest energy user in terms of regardless of the weather, the solar panel is always fully
consumption. India had a total installed capacity of exposed to the sun's beams. As a result, the solar panel
278.7 GW and a total energy consumption per capita may be remotely monitored utilising Internet of Things
of 1,010 kWh in 2014-15, according to the technology. A number of techniques for solar panel
International Energy Agency. With a 5.54 percent rise tracking systems that utilise the Internet of Things have
in 2013-14 and reduced energy costs, In comparison been investigated. In addition, the sections that follow
to many other nations, notably the United States, the include assessments of a few methods [12].
country's per capita consumption remains low.
Two more segments are identified in this article.
Approximately 21% of the world's population lives in
Segment II delves into the numerous important research
countries with no access to electricity at all. India now
that have been conducted in this area. The conclusion
has a total electrification rate of 64.5 percent, with 35.5
and, finally, the references that were utilised in this part
percent of the population without access to electricity
are found in Segment III.
[9].
A. Solar Panel
A network of physical items that interact with one
another is referred to as the "internet of things." As a Solar energy is the electricity generated by collecting
result, the wireless sensor network can link to every the sun's rays, and it may be used for a variety of business
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 285
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

and domestic applications, including heating and cooling. The effects of dirt on solar panels were investigated
The sun acts as a natural nuclear reactor, releasing by Google, a well-known business in the globe that
energy in the form of tiny packets of energy known as runs a 1.6 MW solar facility at its headquarters in
photons as it heats the earth. When photons hit the solar California [15]. Researchers Hottel et al. performed
cells, the electrons in the atoms are stripped away [13]. pioneering research on the impact of dust on solar
It is possible to build a solar panel from multiple panels systems, which revealed an average loss of 4.7 percent
that are linked together; the greater the number of panels in solar efficiency. [16]. According to Salim et al., who
we deploy, the more energy we generate. The performed a research into dust accumulation, they found
semiconductors used in the construction of PV a 32 percent reduction in solar production over an
photovoltaic solar panels are silicon-like, as shown in eight-month period in a solar village in Riyadh. An
the picture. Direct current is produced by solar panels. experiment is carried out by the authors Dirk Goosen
Because alternating current is less expensive to transmit and colleagues. As reported in, the deposition of dust
over long distances, the vast majority of electrical particles that affected the performance of solar
equipment are powered by this kind of power source photovoltaic cells, as well as the effect of dust
[14]. accumulation on airborne concentration and wind
velocity, were investigated [16]. Garg of Roorkee
performed an experiment and discovered that dirt
accumulation on a 45-degree slanted glass plate
decreased average transmittance by 8 percent over a
10-day period. The accumulation of dust on the panels
leads in a 30 percent decrease in the amount of energy
that may be harvested. The most often used method of
dust removal is to spray water on the panels while
simultaneously spraying a cleaning solution on the panels.
Motors shock the panels in the same manner as a mobile
phone vibrates, ejecting dust from the panels as a result
Fig. 2: Solar Panels
of the shaking. The dust is propelled off the panels as a
II. LITERATURE OF THE EXISTING result of the generation of a positive charge. Manual
METHOD cleaning of the PV panels using a brush is required. It is
Several researchers have performed several essential to keep an eye on solar panels. Regular
researches on this important problem, and the results inspection of solar panels is required in some form or
have revealed that dust build-up on cleaned photovoltaic another on a recurring basis. To verify that they are
solar panels reduces the effectiveness of photovoltaic operating correctly and that the system is generating
solar panels by 50%. the quantity expected, you must check their
performance. [17] If you have solar panels installed,
you should check the generation metre at least once a
week and make a note of the reading. In addition, they
should pay frequent visits to the panel's location in order
to take notes on the readings. To capture the data, you
must physically go to the site where the solar panel
system is installed on a regular basis. Consequently, it
is not possible to gather readings on a continuous basis;
instead, whenever required, the user needs go to the
Fig. 3: Due to dust buildup prior to cleaning, the solar module place where the system configuration is stored.
was coated by a thick coating.
Furthermore, since solar radiation is not correctly
286 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

oriented, it is not possible to generate optimum Nkoloma, Mayamiko, Marco Zennaro, and Antoine
electricity. Bagula [10] discuss their recent work on a wireless-
Ersan Kabalci, Alper Gorgun, and Yasin Kabalci based remote monitoring system for Malawi's renewable
[24] present a real-time monitoring infrastructure for a energy projects, which they worked on alongside the
renewable energy production system consisting of a University of Malawi. The primary objective was to
wind turbine and solar panel arrays that may be used create a low-cost data collection system capable of
to track the performance of the system. It is based on continuously showing remote energy yields and
current and voltage data from each renewable energy performance metrics while staying under budget. The
source that the monitoring platform is built. In this case, project's output provides immediate access to electrical
the sensor circuits are intended to determine the related power produced at a remote location through SMS
values, which are then processed by a Microchip communication by utilising wireless sensor boards and
18F4450 microcontroller. The parameters that have text message (SMS) delivery over a cellular network.
been analysed are then sent to a personal computer Preliminary study findings indicate that the performance
(PC) via USB for storing in a database and real-time of renewable energy systems in distant rural regions
monitoring of the system's performance. Using the may be effectively assessed at a reasonable cost, despite
monitoring software's programmed visual interface, you the systems' remote location.
can manage your recorded data and analyse the results Antoine Bagula, Nkoloma, Mayamiko, Marco
for each measurement on a daily, weekly, and monthly Zennaro, and Marco Zennaro [10] present a novel
basis. monitoring and control system for real-time monitoring
K. Jiju and colleagues [7] discuss the creation of an and control of a hybrid wind-photovoltaic battery for
Android-based online monitoring and control system renewable energy systems. The proposed system offers
for dispersed Renewable Energy Sources (RES). When supervisory control and data acquisition (SCADA)
dealing with the digital hardware of the Power capabilities by using the campus network of National
Conditioning Unit, this approach connects to it through Cheng Kung University in conjunction with a
the Bluetooth interface on an Android tablet or programmable logic controller (PLC) and digital power
smartphone (PCU). metres. In addition to detecting electrical data in real
time, the suggested system can efficiently transmit it to
Yoshihiro Goto and colleagues [8] investigated the
a distant monitoring centre through the internet. The
development and deployment of an integrated system
simulation and experiment findings indicate that the
for managing and remotely monitoring telecoms power
proposed monitoring and control system can provide
infrastructure. The technology is used to monitor and
real-time supervisory control and data collection for
maintain over 200,000 telecoms power plants. These
distant renewable energy installations of various types
power plants comprise rectifiers, inverters,
and sizes.
uninterruptible power supplies, and air conditioning
plants located in about 8,000 telecommunications Several problems with solar panels were identified
facilities. The system's characteristics include enhanced in this study, including the time required for repairs, the
user interfaces that make use of information and lack of flexibility, the inability to be managed effectively,
communication technologies such as web technology, and difficulties with maintenance. In the next section,
in addition to combining management and remote they suggested a system concept in which a gateway is
monitoring responsibilities into a single system. integrated in the solar panel and linked to the internet
The issue of load disaggregation is described by through GPRS in order to update everything in a smart
Suzdalenko et al. [9] via the use of non-intrusive load system via the Internet of Things [18]. It provides
monitoring. When a large number of local renewable information on Internet of Things surveys performed in
energy producers are linked to the same grid, they may a variety of settings, including the home, city,
be mismatched with changing demand over time. environment, and business, as well as information on
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 287
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

the present status of IoT systems. However, in order for Wireless Personal Area Networks (WPAN). They
to provide a more effective suggestion [19], it is provide software for interfacing with and controlling
necessary to They recognised problems associated with remote sensing systems (RSSs), as well as the
solar panel management and field issues throughout the supervisory control system, which is built on a digital
power generation process in this paper, and in order to signal processor (DSP) [27]. They provide performance
solve these concerns, they developed a model that made data for a middle-scale grid-connected photovoltaic
use of tiny operating systems (small OS). In addition, it (PV) system throughout the duration of a monitoring
includes gateways, host computers, and other similar period throughout this article. The performance of
devices [20-23]. They are time-sensitive and feature photovoltaic systems is quantitatively evaluated and
WSN-based data recording capabilities (Wireless studied using a mathematical model and data from
Sensor Nodes). It can withstand 146V and 15.5A monitored systems to aid in the development of new
systems and has the potential to be improved further solar system technologies. Their aim is to develop a
[24]. To connect multi-mode power converters to solar reliable and accurate technique for evaluating
photovoltaic cells, a wireless communication protocol photovoltaic (PV) system performance, which will
known as ZigBee is utilised. It functions as a single host ensure that maximum output is reached throughout the
and monitors the surrounding environment. Each module system's lifespan while also improving performance [28-
in the MPPT (Maximum Power Point Tracking) method 30].
gathers information about itself and saves it as reference III. SOLAR ENERGY TRACKING USING
parameters in reference parameters. Once they have INTERNET OF THINGS
presented it, students will examine and evaluate a linear
parabolic solar power plant in this article. Each online It is possible to monitor the current and voltage of
feature is assessed for quality and efficiency, giving solar cells from a distance using this setup.
students a greater knowledge of how the Internet works. Communication between the solar boards and the server
They investigated delayed behaviour by reviewing prior is accomplished via the Internet of Things (IoT). The
study findings. Following an investigation of the delay microcontroller unit (MCU) manages current and
behaviour, system recognition techniques are utilised voltage information [31-33].
to mimic the dynamics associated with the delay on the With the help of remote transmission, the intended
Internet, and the Wave Variable approach is selected data is sent to the supporting server. During the
as the most effective remote monitoring method. Finally, verification process, the estimated current and voltage
a method for remotely monitoring solar energy facilities are sent to the IoT Module, which records the current
via the Internet has been developed [25]. This article and voltage measurements together with the date and
tackles these limitations by providing a technique for time on its own internal memory [34-38].
monitoring the health of solar photovoltaic (PV) systems
Compared to existing ways of remotely monitoring
in order to maximise performance while minimising
solar panels, the technology is more time efficient.
maintenance. When performance is on the verge of
failing, remote monitoring capabilities alert you. This There is a remote monitoring system for solar panels
data may be utilised to do preventative maintenance on installed in the construction. This module is used to keep
the system, extending its life and lowering its total track of the solar board from a distance. A current and
operating costs [26]. This article discusses the design voltage sensor is used to measure the current and
of a solar photovoltaic distributed generator (PVDG) voltage of the solar board. Due to the fact that these
for microgrid applications, as well as the development outputs are in analogue format, they must be converted
of a wireless remote monitoring and control system for to digital format using an analogue to advanced
a PVDG. The wireless communication technology is converter before being used. The calculated data is sent
created by combining a full duplex digital system with to the microcontroller unit.
the ZigBee protocol and the IEEE 802.15.4 standard
288 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

a serious power shortage. Individuals who live in remote


regions need a more sophisticated electrical
infrastructure to provide them with assistance.
Additionally, robust monitoring mechanisms are in place
for the gathering of complete energy discussions, and
they are being used effectively. Under these conditions,
these various types of projects may be able to provide
a satisfactory outcome, as energy security is one of the
most pressing problems facing the world today. There
are many more areas that may be handled by identifying
problems with solar panels caused by various factors,
giving information about surveys on IOT, and creating
Fig, 4: Framework of panel monitoring using IOT module
a low-cost monitoring system for detecting faulty solar
panels, according to the literature research.
The microcontroller is responsible for transmitting
the intended data to the Internet of Things. These REFERENCES
Modules may interact with one another and share data [1]. P. Gopi Krishna et. al. "Design and development of bi-directional
via the Internet of Things, which is a network of physical smart IoT gateway with heterogeneous device interoperability"
International Journal of Engineering & Technology, 7 (2.8) (2018)
objects. By using the IoT module, subtle elements of 109-114
the intended data will be transmitted remotely to an [2]. Nordrum, Amy (18 August 2016). "Popular Internet of Things
AWS S3 container for storage. The voltage and current Forecast of 50 Billion Devices by 2020 Is Outdated". IEEE
of the solar board may be monitored at any time and [3]. M. Moon. (2009) Google Studies How Dirt Affects Solar Panel
from any place by connecting to the AWS S3 container. Efficiency. PC Magazine: Good Clean Tech. Available:
www. goodcleantech.com/2009 /08/
The main goal of this endeavour is to examine the google_studies_how_dirt_affect.php
photovoltaic boards and store the data collected in an [4]. M. C. Hottel and B. B. Woertz, "Performance of flat plate solar
Amazon S3 bucket as soon as possible. The information heat collectors," ASME Trans., vol. 64, pp. 91-104, 1942.
that has been saved may be examined at any time, and [5]. P. Gopi Krishna et. al. "Smart energy metre design and
it can be seen in any manner that we need. As a development for efficient use of power in IoT applications"
International Journal of Engineering & Technology, 7 (2.8) (2018)
consequence of this endeavour, we will be able to 115-119
remotely monitor the solar panels and preserve the data
[6]. Kabalci, Ersan, Alper Gorgun, and Yasin Kabalci. "Design and
that has been collected voluntarily. The reports from implementation of a renewable energy monitoring system."
the microcontroller unit (MCU) are transmitted to the Power Engineering, Energy and Electrical Drives (POWERENG),
Internet of Things (IoT) (IoT) [39]. 2013 Fourth International Conference on. IEEE, 2013.
[7]. Jiju, K., et al. "Development of Android based on-line monitoring
IV. CONCLUSION and control system for Renewable Energy Sources." Computer,
Communications, and Control Technology (I4CT), 2014
The aim of this research was to compare and contrast International Conference on. IEEE, 2014.
the various techniques of solar panel tracing that have
[8]. Goto, Yoshihiro, et al. "Integrated management and Remote
been developed. It may be used to manage a range of monitoring solution for telecom power plants with completely
situations, including home activities, the workplace, and DC-powered centre equipment." INTELEC 07-29th International
even industrial applications and processes. The cost of Telecommunications Energy Conference. IEEE, 2007.
doing this task may be calculated in a number of ways. [9]. Suzdalenko, Alexander, and Ilya Galkin. "Case Investigate the
However, if cost is the most important consideration, use of a non-intrusive load monitoring system in conjunction
with renewable energy sources in intelligent grid applications."
then the method of embedding an Arduino within the 2013 International Conference-Workshop Compatibility And
module may be appropriate. Aside from that, it is an Power Electronics. 2013.
energy-efficient project. The world is now suffering from
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 289
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

[10].Nkoloma, Mayamiko, Marco Zennaro, and Antoine Bagula. "SM [26].L.V. Hien, Q.P. Ha, V.N. Phat,2009, "Stability and stabilization
2: Solar monitoring system in Malawi." Kaleidoscope 2011: The of switched linear dynamic systems with time delay and
Fully Networked Human? -Innovations for Future Networks uncertainties," Applied Mathematics and Computation, vol. 210,
and Services (K-2011), Proceedings of ITU. IEEE, 2011. pp. 223-231.
[11].Wang, Li, and Kuo-Hua Liu. "Implementation of a Monitoring [27].L.L. O, N.K. Hlaing,2010 "Microcontroller-based two-axis solar
and control system for a hybrid wind-photovoltaic-battery tracking system", Proc. IEEE 2nd international conference on
renewable energy system through the web." Intelligent Systems computer research and development, pp. 436-440.
Applications to Power Systems, 2007. ISAP 2007. International
[28].Malla.S.G and C.N. Bhende,2014, "Voltage control of stand-
Conference on. IEEE, 2007.
alone wind and solar energy system", International Journal of
[12].Big data (Dec 2016) Retrieved from http://bigdata- Electrical Power & Energy Systems, vol. 56, pp. 361-373.
madesimple.com
[29].Shrihariprasath Vimalathithan Rathinasabapathy, A smart IoT
[13].Internet of things (Nov 2016). Retrieved from http://cerasis.com/ system for monitoring solar PV power conditioning unit", 2016
2015/10/20/10-things-to-know-about-the-internet-of-things World Conference on Futuristic Trends in Research and
Innovation for Social Welfare (Startup Conclave).
[14]."Internet of Things Global Standards Initiative". ITU. Retrieved
26 June 2015. [30].Charithperera chi haroldliu, and srimaljayawardena, "the emerging
internet of thing market place from an industrial perspective: a
[15]."Internet of Things: Science Fiction or Business Fact?" (PDF).
survey", December 2015, IEEE transactions on emerging topic
Harvard Business Review. November 2014. Retrieved 23 October
in computing.
2016.
[31]. Yejihua, wang wen, "research and design of solar photovoltaic
[16].Mattern, Friedemann, and Christian Floerkemeier. "From the
power generation monitoring system based continuous", august
Internet of Computers to the Internet of Things." From active
2014, 9th international conference oncomputer science education.
data management to event-based systems and more. Springer
Berlin Heidelberg, 2010. 242-259. [32].ChagithaRanhotigamage and Subhas Chandra Mukhopadhyay,
"Field Trail and Performance Monitoring Of Distributed Solar
[17].Stankovic, John A. "Research directions for the internet of things."
Panels Using Low Cost Wireless Sensor Networks", October
IEEE Internet of Things Journal 1.1 (2014): 3-9.
2010,IEEE Sensor journal.
[18].Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision,
[33].Sol Moon, Sung-Guk Yoon and Joung-Hu Park, "A New Low
architectural elements, and future directions." Future generation
Cost Centralized MPPT Controller System For Multiply
computer systems 29.7 (2013): 1645-1660.
Distributed Photovoltaic Power Conditioning
[19].Arnau Gonzalez, Jordi-Roger Riba, AntoniRius and Rita Puig, Module",November 2015, IEEE Transactions on Smart Grid
2015 "Optimal sizing of a hybrid grid-connected photovoltaic
[34].Ali HoseinArianfar, M.HoseinMehrabanJahromi, Mohsen
and wind power system", Applied Energy, vol. 154, pp. 752-
Mosalanejad and BahramDehghan "Design And Modelling
762.
Remote Monitoring System For A Solar Power Plant'' 2009,
[20].Balbheem Nadpurohit, Roopa Kulkarni, Kadappa Matager, Second International Conference on Computer and Electrical
Nagaraj Devar, Rahul Karnawadi, Edmund Carvalho, June 2017 Engineering.
'IoT Enabled Smart Solar PV System', International Journal of
[35].Ravi Tejwani, Girish Kumar, ChetanSolanki, "Remote
Innovative Research in Computer and Communication
Monitoring System for Solar Photovoltaic Systems in Rural
Engineering, Vol. 5, Issue 6.
Application Using Gsm Voice Channel" 2013, ISES Solar World
[21].Chinnammai.S, January 2013 'An Economic Analysis of Solar Congress.
Energy', Journal of Clean Energy Technologies, Vol. 1, No.1.
[36].Martín E. Andreoni Lopez, Francisco J. GaldeanoMantinean,
[22].G.M. Tina, S. Gagliano, G. Graditi, A. Merola,2012 and Marcelo G. Molina "Implementation of Wireless Remote
"Experimental validation of a probabilistic model for estimating
[37].Monitoring and Control of Solar Photovoltaic (PV) System"
the double axis PV tracking energy production," Applied Energy,
2012 IEEE Conference Publications.
vol. 97, pp. 990-998,.
[38].J. H. So, B. G. Yu, H. M. Hwang, G. J Yu and I. Y. Choi
[23].'Google Cloud Platform.' In Wikipedia. The free Encyclopaedia.
"Performance Monitoring and Analysis of Middle Scale Grid-
Wikimedia.
[39].Connected PV System'' October 2007,7th International
[24].Kabalci, Ersan, Gorgun A. and Kabalci Y., 2013."Design and
conference on power electronics.
implementation of a renewable energy monitoring system."
Power Engineering, Energy and Electrical Drives (POWERENG),
Fourth International Conference on. IEEE.
[25].Keyur K Patel, Sunil M Patel,2016, "Internet of Things-IoT:
Definition, Characteristics, Architecture, Enabling Technology,
Applications & Future challenges", IJESC, Vol 6 Issue no:5.

290 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

A Neoteric Data Hiding and Color Image Sharing Based


on Compressed Sensing
Shaik.Shabeera Bee
Assistant Professor, Dept. of ECE, KMM Institute of Technology and Science, Tirupati
Email: shabeerabee@gmail.com

Abstract: Secret image sharing has been information-carrier is lost or destroyed by an


attracting considerable research attention in recent attacker,the secret information might disappear. Thus
years as images become ubiquitous on the Internet motivated, the secret sharing method might be the better
and mobile applications. The rising need of secret technique that not only increases the security but also
image sharing with high security has led to much
has an extremely high opportunity of recovering the
advancement in lucrative exchange of important
images which contain vital and confidential
secret information completely. It aims to distribute the
information. The purpose of secret sharing secret information to several shadow information
methods is to reinforce the cryptographic approach holders, and we can completely recover the desired
from different points of failure as a single information by collecting an enough number of multiple
information-container. Conventional methods carriers. That is, we can recover the secret based on
based on compressed sensing has some limitations. only some portion of shadow information.
An image is taken as input then DWT and SVD are
applied to the input image. Again a message image
To safeguard cryptographic keys, Shamir and
is taken and the methods, DWT and SVD are Blakley presented a novel method for constructing
applied such that we will get a converted image. secure and robust key management schemes, called
Image sharing is don furtherly. Inverse DWT is secret sharing (SS), which can overcome many
applied to the obtained image and finally a secret vulnerabilities when one possesses a single master key
image is obtained.The proposed method based on for a certain cryptosystem. From a cryptographic
DWT and SVD shows better results when perspective, SS scheme refers to some methods for
compared to other state-of-art methods. distributing a secret among a group of participants and
Keywords: Discrete Wavelet Transform (DWT), each one in the group is allocated a share or shadow of
Singular Value Decomposition (SVD), Secret Image the secret. The secret can be reconstructed only when
Sharing etc. a sufficient number of shadows are combined together
I. INTRODUCTION and individual shadow serves no useful purpose for
obtaining it. As a secure and fault-tolerant technique,
Because of the fast growth of internet technology SS has been widely used in many fields, such as
development, our daily lives cannot be separated from distributed storage system, secure multiparty
the internet. We can get lots of information we want by computation, and electronic voting. In Shamir's (k, n)(2
powerful search engine, share the articles or photos in ? k ? n) threshold SS scheme, the secret is divided into
blogs, and contact friends by social network. Therefore, n shadows and any k of them can reconstruct the whole
information security becomes more and more important original secret. However, any less than k shadows
nowadays. If we do not process or hide our secret cannot obtain any information about the secret. Although
information, the information might be stolen by the this construction method is information theoretically
hackers easily. The image hiding and watermarking are secure, each participant requires relatively large storage
techniques that can increase the security of the secret space because the size of each shadow is equal to that
information. However, there is a drawback that the of the secret data. Therefore, using Shamir's SS scheme
information is kept in a single information-carrier. If the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 291
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

will result in huge communication burden when we share reconstruction algorithm can be improved to take it
image or video data at the pixel level. In fact, the topic into account.
of designing SS scheme for image data has attracted • The loss of a small fraction of the measurements
wide attention in the past fifteen years. generally results in only a minor degradation in
The secret sharing scheme was first proposed by reconstruction quality. This may be used to achieve
robustness to channel impairments without the usual
Shamir and Blakley in late 1980s. It is also called (k, n)
overhead of error protection.
threshold scheme which should meet the following three
requirements, where a secret is represented by a positive According to theory of CS, if the signal can be
integer S. (1) The secret value S is used to generate n represented by a small number of non-zero coefficients,
shadows (positive integers): D1, D2, … , Dn. (2) Any it can be converted into a limited number of incoherent
k or more shadows can be used to reconstruct the random measurements by constructing a suitable
secret value S. (3) Any k-1 shadows or fewer cannot measurement matrix. These random measurements
get sufficient information to reveal the secret value S. maintain the information of the reconstructed signal, so
Some (k, n) threshold schemes proposed by Shamir, the original signal can be accurately reconstructed from
Blakley, and Asmuth, which are applied for image a small number of measurements by solving the sparse
sharing can be found in, respectively. optimization problem.
II. RELATED WORK Assume that a real-valued signal, x∈ RN, is a k-sparse
vector on an orthonormal basis Ψ ∈ RN×N, i.e., only
Compressive Sensing (CS) has been proposed more
k(k<< N) out of the N elements of x have non-zero
than a decade ago as a method for dimensionality
values. Then
reduction of signals which are known to be sparse or
compressible in a specific basis representation. By x =Ψ  (1)
"sparse" we mean that only a relatively small number of
where the coefficient  can be well approximated
the coefficients of the representation are non-zero,
by k non-zero values. So, a small number of linear
whereas "compressible" indicates that the magnitude
random measurements y∈ Rm, k < m << N obtained as
of the coefficients decays quickly, according to a power
law, hence the signal can be well approximated by a y=x (2)
sparse signal. In the CS paradigm, the signal is projected where ∈ Rm×N is a measurement matrix that is
onto a low-dimension space, resulting in a incoherent with Ψ and satisfies the restricted isometric
measurements vector. If the signal is sparse, it is possible property (RIP).
to exactly reconstruct it from the measurements vector.
Then, according to the given y, we can reconstruct
A compression scheme based on CS enjoys the signal x by solving the following optimization problem.
following unique properties which are primarily different
from those of any conventional signal compression
scheme.
III. METHODOLOGY
• The encoder is of much lower complexity than the
decoder. In fact, a significant part of the encoder Input Image
processing, namely the measurements generation, can An image is taken as input in this stage for further
be done in the analog domain, e.g. by a single-pixel processing.
camera or a lensless camera.
Discrete Wavelet Transform (DWT)
• The decoder is not fully defined by the encoder.
Different reconstruction algorithms can be applied to Discrete wavelet transform is being used widely in
the same measurements vector at different situations, 1D and 2D signal processing due to its advantages in
and as more prior information becomes available the signal and image processing applications like
292 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

compression, de-noising, texture analysis and etc. Later values are not effected much and vice versa. Hence,
on, its usage is carried into high pass filter and together these are used for watermarking
can be termed as filter banks. In this work, Haar SVD is compression technique, SVD of an image
Wavelets are selected due to its simplicity in-terms of gives three matrices among these two matrices are
operations and it decomposes the signal into four sub ortho-normal matrices and one matrix is diagonal matrix.
band signals. Hungarian mathematician Alfred Haar Diagonal elements are called as singular values. The
introduced the Haar wavelets, which is similar to step equation for SVD is as
function. Original signal can be computed by inverse
operation of the decomposition filter and is symmetry
of the decomposition filter. Instead of down sampling Not all the singular values are used to reconstruct
where up-sampling will be used on the given four sub the original information; few singular values are
band inputs. All though DWT is old transform domain, reconstruct the information, there by compression is
still it has been being used in image or video achieved.
watermarking due to its advantages
Image sharing
DWT gives the relation between time and frequency
domain of signal. Applying DWT to an image gives four The secret image sharing is a technique based on
different bands among which three are high frequency secret message sharing. Each pixel value of a secret
bands and one is low frequency band. Most of the image is a secret message. We use the secret image to
information is carried by low frequency band. so any generate shadow images and only require part of these
operation/ processing on image is carried by taking the shadow images to reconstruct the secret image. The
low frequency band. shadow images should not reveal any information about
the image itself such as silhouette and smooth regions.
Two Dimensional Wavelet Transform Ideally, each shadow image should look like random
In two dimensions Wavelet transformation, the noise so that anyone without the permission won't be
wavelet representation can be computed with a able to get any information about a secret image.
pyramidal algorithm. The two-dimensional wavelet Inverse DWT (IDWT)
transform that we describe can be seen as a one In inverse DWT (IDWT) step we are applying
dimensional wavelet transform along the x and y axes. inverse DWT to the output image obtained after merging
Mathematically the wavelet transform is convolution the K shares.
operation, which is equivalent to pass the pixel values
of an image through a lowpass and highpass filters.
Singular Value Decomposition (SVD)
Singular value decomposition (SVD) is generally
used for decomposing the image into sub matrices for
removing redundant data in compression applications
and also used for watermarking. As name suggests the
Decomposition results in three matrices and they are
left, right singular vector matrix and diagonal matrix.
The diagonal Matrix consists of singular values along
its diagonal in decreasing order, where singular value
represents the energy of the given signal. These singular
values plays an important role in compression and as
well as watermarking. One peculiar property of the
Figure 1: Block Diagram of Proposed Method
singular values is small perturbation over signal, these
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 293
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IV. RESULTS

Figure 4: Restored Image

Figure 1: Input Image

Figure 5: Converted Image

Figure: 2 Input histogram image

Figure 6: Generation of eight Shares

Figure 3: Message Image

Figure 7: Merged K Shares

294 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

VI. REFERENCES
[1] Shamir A. How to share a secret [J].Communication of the
Association for Computing Machinery, 1979,22(11 ):612-613.
[2] Blakley G R. Safeguarding cryptography keys[C] Proceeding of
AFIPS 1979 National Computer Conference, New York,
1979:313-317.327
[3] Emmanuel Candes. Compressive sampling [A]. In: Proceedings
of the International Congress of Mathematicians[C]. Madrid,
Spain, 2006, 3, 1433-1452.
[4] Emmanuel Candes, Justin Romberg, Terence Tao. Robust
Figure 8: output Image
uncertainty principles: exact signal reconstruction from highly
incomplete frequency information [J]. IEEE Transaction on
Information Theory, 2006, 52(2):489-509.
[5] David L.Donoho, Compressed sensing[J]. IEEE Transaction on
Information Theory, 2006, 52(4):1289-1306.
[6] Thien CC, Lin JC. An image-sharing method with user-friendly
shadow images. IEEE Transactions on Circuits and Systems for
Video Technology 2003; 13(12): 1161 -1169.
[7] Lin CC, Tsai WHo Secret image sharing with steganography and
authentication. Journal of Systems and Software 2004; 73(3):405-
414.
[8] Yang CN, Chen TS, Yu KH, Wang Cc. Improvements of image
sharing with steganography and authentication. Journal of Systems
Figure 9: Output histogram and Software 2007; 80(7): I 070-1 076.
[9] Lin PY, Lee JS, Chang Cc. Distortion-free secret image sharing
mechanism using modulus operator. Pattern Recognition
2009;42(5):886-895.

Figure 10: Retrieved secret image

V. CONCLUSION
This paper reviews and implements three secret
image sharing algorithms. By applying the existing
schemes directly on a secret image, the silhouette and
smooth regions of an image may appear in a shadow
image. In the proposed scheme, it was extended to
secret image sharing scheme with DWT and SVD
concept. The experimental results and security analysis
indicate the potential superiority of our scheme. The
performance is measured using metrics which says that
our proposed scheme is better compared to other state-
of-art methods.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 295
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Automatic Em Based Video Deraining and Desnowing


Using Temporal Correlation and Low-Rank Matrix
Completion
Allabaksh SK1, K.R.Surendra2, D.Chaitanya3
1,2,3
Assistant Professor, Department of ECE, Sri Venkateswara College of Engineering, Tirupati
Email: allabaksh.sk@svcolleges.edu.in1, surendra.kr@svcolleges.edu.in2, chaitanya.darla@svcolleges.edu.in3

Abstract: Image dehazing plays a vital role in Because rain and snow streaks are 1000 times larger
the field of image processing. Previously, many than fog .For big debris such as raindrops and
researchers have suggested many techniques like snowflakes, analysis is extra hard. Spatially and
histogram equalization and gamma transformation temporally neighboring areas are laid low with rain and
in order to achieve the target. But these techniques
snow differently, so ought to be dealt with differently.
have many limitations like different degree of
polarization, different kind of weather conditions On this work, we will use the time period "rain? to mean
or depth information of pixel in image. The existing rain and snow collectively, due to the fact de-training
work has tried to develop a more effective and techniques can be used to remove snow and vice versa.
reliable image quality assessment method that can Maximum of de-raining algorithms do now not recollect
evaluate the quality of the proposed dehazing global motions, object motions, and/or various sizes of
algorithms. The proposed algorithm to get rid of rain streaks, and as a consequence they may fail to
rain and snow streaks from the video collection remove rain streaks in reality. The visual appearances
using temporal correlation and low-rank matrix of dynamic weather circumstance picture are given
finishing touch. We convert input video series into underneath.
number of frames and take a frame. We attain a
preliminary rain map with the aid of subtracting
temporal warped frame from present frame. Based
totally on sparse representation, we decomposing
the rain map into foundation vector. Then, we break
up the idea vector into rain map as soon as and
outlier with the aid of using SVM. Eventually, we
cast off the rain streaks with the aid of the usage of
low matrix set of rules.
Fig(a) Fig(b)
Keywords- Rain Streaks Removal, Low Rank
Matrix Completion, Sparse Illustration, And Fig 1. (a) An image of a scene taken beneath rain
Temporal Correlation situations. (b) A picture of a scene taken in snow
condition
I. INTRODUCTION
In this paper, we proposed algorithm for de -raining
In recent times, we use greater video capturing tool
video the use of temporal correlation and low-rank
inclusive of, digital cameras, smart phones, and micro
matrix algorithm crowning glory. Assuming that adjacent
virtual video cameras. Which can be used both steady
frames, warped by way of the optical flows, are almost
and dynamic weather condition. Motion pictures are
same with a present day frame besides for rain streak
large blurred by means of dynamic weather
areas, we generate a preliminary rain map via
circumstance such as snow, rain as compared to
subtracting warped adjacent body from modern-day
consistent climate condition together with fog, mist.
frame. Then, we represent the preliminary rain map the
296 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

use of sparse foundation vectors, which might be into a simple 1-dimentional vector for less computation.
dichotomized into rain streak once and outliers the use Since the dark channel basically relies on sample minima
of a help vector device (SVM). We refine the rain map because dark channels are sensitive to the outliers. The
and come across. Rain streaks by way of excluding artifacts arise during computation of the dark channel.
outlier. In the end, we update the detected wet pixels As mentioned in (algorithm 1.1), the dark channel
using a matrix crowning glory set of rules, which plays calculation focused on minima of pixel intensity that
the expectation maximization (EM) iterations for the simply selects minimum value of intensity for each pixel
low-rank approximation. in the local patch. In literature, lots of methods are
available that robustly estimate the dark channel from
dehazed image. With the help of extension of dark
channel, we have computed the transmission map that
also assumes the presence of noise. This is more
sophisticated approach that has taken by applying
stochastic approximation to locate the local minima
which is followed by the point estimate. The point
estimate is needed (for example, to estimate the
atmospheric light), this method simply denoise the entire
image by removing noise automatically with the
Fig (a)
assumption as a pre-processing step. Now, simply
compute the transmission map from dark channels, by
selecting minima of normalized dark channels. Finally
recover the scene radiance from most haze-opaque
based minima and subtracting from 1 as shown in
algorithm 1.1. In computer vision and computer
graphics, the model widely used to describe the
formation of a haze image is as follows:
Fig(b)
I(x) = R(x). t(x) + L(1 ? t(x))
Where I, R and L are the observed intensity, scene
radiance and global atmospheric light respectively.
Whereas t is the medium transmission which describes
the portion of unscattered light that reaches the camera.
The goal is to recover R, L and t from I. The first term
on the right hand side of the equation (2) is i.e. R(x).t(x)
is called direct attenuation [8] which is used to describe
Fig.2 (a) Input frame, (b) de-snowing result, and scene radiance and its decay in medium. And the second
(c) snow map. term L(1-t(x)) is called air-light [6, 16] which is the
result of previously scattered light and contributes to
II. EXISTING SYSTEM shift in scene color. In case of homogenous atmosphere,
A. Brief description of working algorithm t is defined as:
The complete haze removal procedure is Where scattering coefficient of atmosphere  is
summarized in above algorithm. In the beginning, the attenuated exponentially with the scene depth d.
proposed work read a single hazed image from the Geometrically, In RGB color space, vectors L, I(x) and
dataset. After reading the image we have converted it R(x) are coplanar and their end points are collinear.
The transmission i.e. t(x) is the ratio of two line segments:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 297
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

D. Recovering the Scene radiance


With the transmission map, this work simply recovers
the scene radiance according to the equation:
Where c ∈ {r, g, b} is color channel index. Based
on this model, Tan's method [8] focuses on enhancing
the visibility of the image. For a patch with uniform
transmission t, the visibility (sum of gradient) of the input
Where t0 has typical value of 0.1.
image is reduced by the haze, since t<1:
E. Estimating the Atmospheric light
The atmospheric light i.e. L is generally estimated
from the most haze-opaque pixel i.e. pixel with high
Here, the transmission t in simply a local patch that intensity is used to represent atmospheric light. But this
has estimated by maximizing the visibility of the patch. assumption becomes invalid in case of bright objects
It also Satisfies a constraint that the intensity of R(x) is such as white car or a white building. In previous section
less than the intensity of L. we discussed that the low intensity pixel is used to
B. Low Intensity Pixel Selection approximate the haze denseness well. We can also use
it to improve the atmospheric light estimation. For that
In case of most of the non-sky objects, at least one
we choose 0.1% of the brightest pixels in low intensity
color channel has the lowest intensity at some pixels. In
region which are most haze-opaque pixels. Among these
other words minimum intensity value is very low in such
pixels the pixel with highest intensity is selected as
a patch.
atmospheric light which yields the robust result for
Formally, for an estimation of atmospheric light.
Image R, we define: The existing method for haze removal procedure is
summarized in algorithm 1.1:
Algorithm 1.1:
Where Rc is a color channel of R and (x) a local
patch centered at x. Except for the sky region the Step 1: Read the image, I from dataset
intensity of Rdark is very low and tends to be zero. (i) Convert image into 1- D array, I(:);
C. Haze Removal Model Steps 2: Estimate the atmospheric pixels i.e. estimate
Our final equation for transmission yields the top 0.1 % bright pixels in dark channel because these
following form, where  is a constant parameter to pixels belong to haze-opaque.
introduce some hazes for distant objects which is (i) Call dark_Channel(image, patch size).
application based.
(ii) Find minimum across all Channels.
Step 3: Find the highest intensity pixel from the
original image using the 1-D vector calculated above.
This modification adaptively and keep more haze (i) If intensity > sum(highest intensity
for the distant objects. The value of  is fix to 0.95 for
all results reported in this work. In proposed ) then
experiments, this method uses the local min operator highest_Intensity = pixel Intensity
using Marcel van Herk's method [9] whose complexity
is linear to image size. (ii) Now set this intensity as atmospheric
lighting pixel.

298 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

L(:, :, dim) = L(:, :, a) + highest Intensity(:, :, a); highlights the noise removal ways for the grey scale
(iii) Resize A into 2-D image. image likewise because the color image and conjointly
to extend the bar graph of a picture that is corrupted
L (:, :) = L (:, :) + highest Intensity(:, :) ; by the salt and pepper noise. For removing the salt and
Step 4: To estimate the transmission pepper noise, noise filtering techniques area unit used
like minimum, maximum, mean, median and Gaussian.
t'(x,y) = 1 - minc (miny??(x)(Ic(y)/ Lc)) ;
However the median filter produces the proper image
(i) Transmission compared to all or any alternative filtering techniques.
t'(x,y) = 1 - w.minc (miny??(x) (Ic(y)/Lc)) ; We had implemented [8] our modified MAP-ML
algorithm which gives comparable results with the
// Dark Channel of normalized haze image. original MAP-ML algorithm performing the image
// It directly provide the estimation of transmission. segmentation. Thus from the experimental results we
had successfully shown that the modified MAP-ML
// for sky region:
algorithm takes less time to execute as compared to
Evaluate minc (miny??(x) (Ic(y)/ Lc)); when t(x) = the original MAP-ML algorithm giving nearly same
0; results as the original algorithm.
// for non sky-region:
Evaluate minc (miny??(x) (Ic(y)/ Lc)); when t(x) =
1;
Step 5: Recovering the scene Radiance:
R(x) = I(x) - L / max (t(x, y), t0) + L;
// L: estimate from most haze-opaque and R
represent the
// Fig. 3. An overview of the proposed algorithm: We
achieve an initial rain map from a picture body, which is
radiance based resulting image
then delicate based on sparse representation and
Step 6: Dehazed the image and write the image. classification. Subsequently, we reconstruct a rain free
III. PROPOSED SYSTEM body by means of exploiting the data in adjoining
frames.
We have proposed a new image processing scheme
[7] which is based on smooth 1D ordering of the pixels Discern-2 display a brief diagram of proposed
in the given image .We have shown that using a carefully algorithm. First, we locate initial map from difference
designed permutation matrices and simple and intuitive between temporal warped frame and contemporary
1D operations such as linear filtering and interpolation, frame. Then, we decompose the initial map into basis
the proposed scheme can be used for image de noising vector primarily based on sparse representation, and
and in painting, where it achieves high quality results. rent an SVM classifier to dichotomize the ones vectors
Therefore, we tend to specialize in the image de-noising, into legitimate ones and outliers. SVM manner help
the planned ways area unit utilized in order to scale vector gadget, with assist of this we acquire separate
back the unwanted data or distortion that is termed as rain and outlier. With the aid of casting off outlier, we
noise which will be caused by the external force whereas get legitimate rain streak map. Then, we replace rainy
a picture is being transmitted, whereas transmittal a pixels with rain-loose values, with the aid of formulating
picture knowledge over Associate in Nursing unsecure the rain streak removal as a matrix of entirety problem.
channel, a noise also can be other by effort. This paper Eventually, we cast off the detected rain streaks by

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 299
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

means of using a low-rank matrix final touch approach. representation, and then reconstructs the sign through
Moreover, we enlarge the proposed algorithm to stereo using decided on foundation vectors only.
video. We are able to see about element on preliminary C. Rain Streak removal
rain map detection, rain refinement and rain streak
elimination. We update the pixel fee to detected rain by means
of exploiting temporal redundancies in adjoining frames.
A. Preliminary rain map detection Particularly, we formulate the rain removal as a low-
Within the beginning, we convert sequence video rank matrix Completion trouble. We first partition the
into wide variety of the frames. Rain streaks appeared cutting-edge body K into disjoint blocks. For every
randomly and it passes throughout a pixel, the pixel block C, we seek for the l maximum comparable blocks
price come to be brighter than its authentic pixel. We from every of the 4 adjacent frames are supply through
will detect a rainy pixel, which has a larger price in a k-2, k-1, k+1, k+2.
modern-day body than in adjacent frames. This
approach, but, is liable to fake detection, for the reason Above frames are do no longer suit with modern
that equal pixel coordinates in extraordinary frames frame. That is because similar blocks within the modern-
might not represent the equal scene point. A video day body tend to be selected close to the given block c
collection may also contain dynamic items or be and affected by the same rain streak, degrading the
captured with a transferring digicams. We can hit upon de-raining performance. To measure the similarity among
preliminary rain map from subtracting temporal warped two blocks, we compute the sum of the squared
frame from modern-day body. Let we assume modern differences between rain-unfastened pixels only. Then,
frame and warped frame for gain preliminary rain map. we define a matrix F by concatenating the given block
R is a initial rain map because the difference photo b inside the modern body and its 4l most comparable
among the modern body K and the hybrid warped body blocks Ci’s in the adjacent frames, C= [c, c1,
K-1, c2,…..c4l] Blocks are represented through a column
vector. note that we subtract the mean cost from every
R(x) = max {k (x) - ((k-1) (x)), 0} block to make amends for the variations in illumination.
Where terrible differences are truncated to 0, We additionally outline the binary rain mask matrix F
considering the fact that rainy pixels are assumed to be for C, given via
brighter than their unique color’s. F= [f, f1, f2,... f4l]
B. Rain Map Refinement To discover a crammed-in matrix X from incomplete
To refine an initial rain map, we make the most the matrix C by using low rank matrix crowning glory. ǁǁXǁǁ
directional assets of rain streaks: rain streaks generally issue to regular.it need to minimize through X.
tend to have elliptical shapes, whose fundamental axes (1-F)◦ X = (1-F) ◦ C, F◦ X ≤ F◦ C
deviate little from the vertical route. In evaluation, falsely
detected outliers have arbitrary shapes or yield random In which ≤ denotes the element-sensible inequality..
instructions of major axes. Therefore, we are able to To resolve this confined optimization problem, we use
find outliers by using evaluating the horizontal the expectancy maximization (EM) set of rules. In the
components with the vertical components of detected expectation step of the t th generation inside the EM
ellipses. However, putting off elliptical areas with framework, we compose a stuffed-in matrix X (t)
massive horizontal additives may additionally omit actual through taking the factors of the enter matrix Cat rain-
wet pixels, due to the fact rain streaks and outliers arise free pixels and taking the elements of the modern
concurrently and may overlap every other. The estimate Y (t) at rainy pixels, i.e.
morphological factor evaluation (MCA) decomposes X (t) = (1-F) ◦ C+F◦ (Y (t) C)
a given sign into basis vectors based on sparse

300 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Here, denotes the detail-sensible minimal operator experimental results verified that the proposed algorithm
to return the minimal between the two factors of in removes rain and snow streaks extra effectively, at the
comparison matrices. We use the elements of (Y (t) ∧ same time as preserving scene structures more faithfully,
C), instead of Y (t), because of the constraint in that than the conventional algorithms.
rain streaks make the pixel values brighter. In the REFERENCES
maximization step, we update the estimator Y (t) to be
[1] P. C. Barnum, S. Narasimhan, and T. Kanade, "analysis of rain
a low-rank approximation of the stuffed-in matrix X and snow in frequency space," Int. J. Comput. Vis., vol. 86, nos.
(t). That is due to the fact we attempt to reduce the 2-three, pp. 256-274,Jan. 2010.
nuclear norm ǁǁXǁǁ , that's the sum of the singular values [2] X. Zhang, H. Li, Y. Qi, W. okay. Leow, and T. k. Ng, "Rain
of X. To this step, we first perform the SVD removal invideo by combining temporal and chromatic houses,"
in Proc. IEEE ICME, Jul. 2006, pp. 461-464.
X (t) = U VT
[3] L.-W. Kang, C.-W. Lin, C.-T. Lin, and Y.-C. Lin, "Self-learning-
Where, U is a rotation matrix and is a diagonal matrix, primarily based rain streak removal for photo/video," in Proc.
IEEE ISCAS, may additionally 2012, pp. 1871-1874.
composed of the singular values. Then, we update the
estimator Y (t+1) as a low rank approximation of X (t), [4] M. Shen and P. Xue, "a quick algorithm for rain detection and
removal from movies," in Proc. IEEE ICME, Jul. 2011, pp. 1-6.
given by [8] V. Santhaseelan and V. k. Asari, "A section area method for
detection and elimination of rain in video,"Proc. SPIE, vol. 8301,
Y (t+1) = U H () VT p. 830114, Jan. 2012.
Here, the operator H? truncates each singular value [5] J. Chen and L.-P. Chau, "A rain pixel recuperation set of rules for
into 0, if it's far smaller than a threshold  = 2000. The films with extraordinarily dynamic scenes," IEEE Trans.
photograph system., vol. 23,no. 3, pp. 1097-1104, Mar. 2014.
general process of EM algorithm is given by way of
[6] J.-L. Starck, M. Elad, and D. L. Donoho, "picture decomposition
D. Algorithm 1 EM-based Rain Streak removal via the mixture of sparse representations and a variational
approach," IEEE Trans.picture technique., vol. 14, no. 10, pp.
Input pixel matrix C and masks matrix M 1570-1582, Oct. 2005.
Initialize t=zero and Y (1) =C [7] M. J. Fadili, J.-L. Starck, J. Bobin, and Y. Moudden, "photo
decomposition and separation the usage of sparse representations:
Repeat t=t+1 (t) = (1 - F).C + F. (Y (t) ^ C) an overview," Proc IEEE, vol. 98, no. 6, pp. 983-994, Jun. 2010
U^VT=X (t) (t+1) =U HK ^VT [8] P. C. Barnum, S. Narasimhan, and T. Kanade, "Analysis of rain
and snow in frequency space," Int. J. Comput. Vis., vol. 86, nos.
Until ll Y (t) -Y (t+1) llM<E or t=tMAX 2-3, pp. 256-274, Jan. 2010.
Output: X=X (t) [9] M. Shen and P. Xue, "A fast algorithm for rain detection and
removal from videos," in Proc. IEEE ICME, Jul. 2011, pp. 1-6.
IV. CONCLUSION
[10] V. Santhaseelan and V. K. Asari, "A phase space approach for
We proposed EM based video de-raining and de- detection and removal of rain in video," Proc. SPIE, vol. 8301, p.
snowing, which exploits temporal correlation in a video 830114 , Jan. 2012.

collection based the low-rank matrix crowning glory. [11] L.-W. Kang, C.-W. Lin, C.-T. Lin, and Y.-C. Lin, "Self-learning-
based rain streak removal for image/video," in Proc. IEEE ISCAS,
The proposed algorithm obtains an initial rain map, by May 2012, pp. 1871-1874.
subtracting temporal warping body from modern frames.
[12] J. Chen and L.-P. Chau, "A rain pixel recovery algorithm for
It then refines the preliminary rain map by means of videos with highly dynamic scenes," IEEE Trans. Image Process.,
putting off outliers based on the sparse representation vol. 23, no. 3, pp. 1097-1104, Mar. 2014.
and the category. Sooner or later, the proposed [13] T. Brox, A. Bruhn, N. Papenberg, and J. Weickert, "High accuracy
algorithm fills in rainy pixels using the EM-based low- optical flow estimation based on a theor
rank matrix final touch. We additionally prolonged the
proposed set of rules to stereo video de-raining. Whilst
in comparison with the preceding execution time and
complexity, we've got decreased them. Great
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 301
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Convolutional Neural Network for Diagnosing Skin


Cancer
Mrs. K. Jayasree1, Ms.M. Navyasree2
1
Associate Professor, 2UG Student
1,2
Dept of ECE, Vemu Institute of Technology, P Kothakota
Email: jayasree.417@gmail.com1, navyasremedarametla16@gmail.com2

Abstract: Skin diseases have a serious impact processing-based approach is used to diagnose the skin
on people's life and health. This an efficient diseases. This method takes the digital image of disease
approaches to identify unique skin diseases. It is affected skin area then uses image analysis to identify
necessary to develop automatic methods in order the type of the disease.
to increase the accuracy of diagnosis for multi-type
skin diseases.Image segmentation is a technique II. LITERATURE REVIEW
which aids with the detection of skin diseases.
• Lakshay Bajaj, Himanshu Kumar, Yasha Hasija
Image processing techniques like adaptive
"Automated System for Prediction of Skin Disease
thresholdedge detections are being used.
using Image Processing and Machine Learning"
Depending on the definite pattern (pertaining to a
International Journal of Computer Applications (0975
distinct disease) input image is subjected to 3d
- 8887) Volume 180 - No.19, February 2018.
conversion, and thenthe diagnosis takes place.
Morphology-based image segmentation has been • Ms Seema Kolkur, Dr. D.R. Kalbande, Dr. Vidya
used to identify the skin diseases from the given Kharkar "Machine Learning Approaches to Multi-
image set. The texture and color features of Class Human Skin Disease Detection" International
different skin disease images could be obtained Journal of Computational Intelligence Research ISSN
accurately. 0973- 1873 Volume 14, Number 1 (2018), pp. 29-39.
I. INTRODUCTION III. EXISTING METHOD
Skin diseases are more common than other diseases. A Recurrent Neural Network (RNN) is a class
Skin diseases may be caused by fungal infection, of artificial neural networks where connections between
bacteria, allergy, or viruses. The advancement of lasers nodes form a directed graph along a temporal sequence.
and Photonics based medical technology has made it This allows it to exhibit temporal dynamic behavior. In
possible to diagnose the skin diseases much more quickly existing Method there is a lack of clarity to detect the
and accurately. skin diseases must be diagnosed early hairy affected skins. Multi -class classification using
to reduce their development and spread. The diagnosis Recurrent Neural Network(RNN) was lower
and treatment of a skin disease takes longer time and compared to CNN binary classification due to the
causes financial and physical cost to the patient.In number of handled class and also due to similarity
general, most of the common people do not know the between the sub-classes.
type and stage of a skin disease. Some of the skin DISADVANTAGES
diseases show symptoms several months later, causing
the disease to develop and grow further. This is due to • Clarity of images
the lack of medical knowledge in the public. Sometimes, • Hair density detection
a dermatologist (skin specialist doctor) may also find it
• Texture
difficult to diagnose the skin disease and may require
expensive laboratory tests to correctly identify the type • Tattoo detection
and stage of the skin disease.In this project image • Remedy accuracy
302 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. 3: Flow chart of CNN

POSSIBLE OUTCOMES OF RANDOM


FOREST CLASSIFIERS
Fig. 1: Block Diagram of Existing Method.
Table 1: Possible Outcomes of RFC
IV. PROPOSED METHOD
Input Output of The System
This is the first algorithm to automatically segment Image Original Image Tampered Image
scaling directly from normal image in 3D Digital images. Normal True Positive False Negative
(TP) (FN)
The approach is to reduce the problem of segmentation Abnormal False Positive True Negative
of affected area from consideration and then classifying (FP) (TN)
the remaining pixels as either skin pixels or scaling pixels.
PERFORMANCE PARAMETERS OF
The feature space used in the classification is derived
PROPOSED METHOD:
from the color contrast between scaling and affected
area and the image texture describing the roughness of The performance of the proposed system is
scaling which is determined by the aggregated result evaluated in terms of following parameters
from a bank of Gabor filters. The segmentation is • Accuracy=(TP+TN)/(TP+TN+FP+FN)
achieved by using a Convolution Neural Network
(CNN). For improving the quality of image user used TN = True positive, TP = True negative
SRG (Seeded Region Growing) techniques. FP = Flase positive, FN = Flase Negative
Data Set V. EXPERIMENTAL RESULTS
Input Image

Gray Scale Conversion

Gaussian Filter
Pre-processing
Image Segmentation

Feature Texture Texture


Extraction Feature Feature

Classification CNN

Fig 2 : Block diagram of proposed method


Fig (a) : Training Progress

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 303
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

of a dermatologist thus improving the quality standards


in the area of medical department.
FUTURE SCOPE:
The method of detecting skin disease will be
developed as a mobile application; instead of dataset
collection live images are captured to detect skin
disease. This system may also detect all the skin diseases
of human being and also for many living beings like
animals, birds etc.
Fig (b) : Acne
VII. REFERENCES
1. Lakshay Bajaj , Himanshu Kumar, Yasha Hasija "Automated
System for Prediction of Skin Disease using Image Processing
and Machine Learning" International Journal of Computer
Applications (0975 - 8887) Volume 180 - No.19, February 2018.
2. Haofu Liao "A Deep Learning Approach to Universal SkinDisease
Classification"
3. Ms. Seema Kolkur , Dr. D.R. Kalbande , Dr. Vidya Kharkar
"Machine Learning Approaches to Multi-Class Human Skin
Disease Detection" International Journal of Computational
Intelligence Research ISSN 0973- 1873 Volume 14, Number 1
(2018), pp. 29-39.
Fig (c) : Eczema
4. Danilo Barros Mendes, Nilton Correia da Silva "Skin Lesions
Classification Using Convolutional Neural Networks in Clinical
Images".
5. D.S. Zingade, Manali Joshi, Viraj Sapre , Rohan Giri "Skin Disease
Detection using Artificial Neural Network" International Journal
of Advance Engineering and Research Development Special Issue
on Recent Trends in Data Engineering Volume 4, Special Issue 5,
Dec.-2017.

Fig (d) : Mealnoma

SOFTWARE TOOLS REQUIREMENTS


• Simulation Tools : MATLAB R2019a
• Operating System : Windows 10
VI. CONCLUSION AND FUTURE SCOPE
CONCLUSION:
The system successfully detects the dermatological
disease present in the image. Though the data set was
small the system is able to identify the disease with
minimum error.Image processing is used to efficiently
classify the disease.Using advanced computational
techniques and data set, the system can match the result
304 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Design and Development of Silent Sound Integrated


Smart Defence Helmet
Srinigha A1, Vigashini GP2, Vishnupriya J3, Yashwanthi V4
1,2,3,4
S Elango Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu
Email: srinigha.ec19@bitsathy.ac.in1, vigashini.ec19@bitsathy.ac.in2, vishnupriya.ec19@bitsathy.ac.in3,
yashwanthi.ec19@bitsathy.ac.in4

Abstract: Conveying information during an systems and so on and are also moving ahead with rapid
emergency situation is of utmost need from a development. The main reason for peaceful and conflict-
soldier's point of view. Nowadays communication free life is just because of the soldiers who are on the
in the military includes wireless communication, border of our nation. Life of a military man is not so
message signalling and many more. But during
easy. When there is an unexpected war the most
combat these types of communication will not be
effective. In the past combat communication
important thing needed is communication. Earlier,
consisted mostly of code words,signlanguage and numerous kinds of communication were used which
tactical communication. In these types of scenarios, include telephonic, telegraphic, photo telegraphic and
the chances of misinterpretation are high and a data transmission were carried on using wire & radio
minor mistake may risk the soldier's life. Here we equipment.
introduced a smart helmet which allows
Information regarding the enemy's capability, actions,
communication with each other by detecting the
muscle movement of the throat, lips and jaws. Silent
their intentions and their way of attacking are always
sound technology allows speech communication to unpredictable. Indeed, if it is predicted by any of the
take place while an audible acoustic sign is military troops, it is really hard to transfer that
unavailable. It works by the computer identifying information with their respective crew mates. Only when
the phonemes that an individual pronounces from the gathered information is shared promptly as well as
nonauditory sources of information about their accurately within their squads/crewmates proper actions
speech movements. Smart Helmet consists of an can be taken.
electromyography sensor which observes tiny
muscular movements that arise while we talk and The idea of using silent sound technology in helmets
convert them into electric pulses then later which will be effective in conveying the information.
converted into speech without a sound. The Generally, helmets are designed to protect from danger.
measurement system consists of electrodes, a In particular the military helmets are designed to
preamplifier of an Electromyo signal, a safeguard them from shrapnel's, attacks, injuries etc.
multichannel recorder and an AD converter. As an Since communication during battles is really difficult but
AD converter, a multichannel recorder has been with the help of our smart defending helmet which is
used, or a sound card with a software for digital based on the SILENT SOUNDTECHNOLOGY the
signal processing. Thus, this method will be communication can be done smoothly. Moreover,
innovative and an effective one.
soldiers would benefit greatly from the development of
Keywords: Smart helmet, communication, smart defencing helmets.
electromyography-signal,military,Silent Sound
technology. II. LITERATURE REVIEW

I. INTRODUCTION [1] States the need for Silent Sound Technology and
its advantages, disadvantages and various applications.
Nowadays technologies are likely to step forward The main aim of the study is to transfer the information
in reality systems, sensing systems, communication
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 305
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

without the need for vocal cords. The objective of the The main process used here is electromyography
technology is based on the process of transmitting which is used to measure the movement of muscles near
information over a phone only through lip movement's to face. Anciently, for measuring muscular movement,
and not by vocal cord. [2] Gives a clear view about they used the tiny electrodes attached to the face near
Silent Sound Technology. This technology neglects the to lips and pharynx. The EMG observes the tiny muscle
surrounding noise and transmits information by just motions when we speak which are converted into
receiving the electrical impulse from the lip movements electrical pulses shown in fig.1
and converts as sound speech at the receiver end. It is
also mentioned that this technology can be used for
languages like English, German and French. The two
methods used in SST and the applications of SST are
stated in this study. [3] Proposes the idea of SST. Brief
notes on various image processing techniques like
Fig.1
Analog Image processing and Digital Image Processing
are also discussed in this study. Moreover, the future a Electromyographic sensors such as Myo-ware
scope of this technology is also stated which refers to muscle sensor attached to the face records the electrical
the process where the electrodes will be incorporated signals produced by facial muscles, it compares that
into the cell-phones instead of being attached to the with previously recorded signal pattern if the sound
face and nanotechnology will be a major part in the matches, the sound gets transmitted to another end
SST process. [4] Silent Sound Technology is Gift for person using traducers.in order to attach to skin, the
Dumb People states the process of detecting the lip sensor requires three electrodes that snap into the
movement and the act of converting the electrical pulse sensor's snap style connectors. The EMG sensor surface
into a sound signal and then sending it to the receiver. which includes speech interface consists of
The three general steps under Digital Image Processing 1. Pressure sensor
are included in this study. Pre-processing is the first
2. Vibration sensor
process followed by Enhancement and then Information
Extraction. These are the processes under this Digital 3. Electromagnetic sensor
Image Processing. Study states that this Silent sound 4. Motion sensor
technology works 99% efficiently. This will be one of
the most useful technologies in the near future. In image processing technique, there are two
techniques:
III. PROPOSEDMETHODOLOGY
1. Analog image processing
Silent sound technology is an amazing idea for
people who lost their voice to speak but wish to 2. Digital image processing
communicate among people. This technology helps Digital image processing is used here which helps in
people to communicate without sound but by using lip the process of converting image to image or image to
movement which is converted into audio signals. The audio. The output is audio waves with minimal
electrical pulse gets converted into sound signals. corrections and calibrations. For image processing, the
In this silent sound technology,we generally using recognition interface contains ultrasound transducer, high
two things, resolution camera and lip reader. By this process, a
monitored image will be sent to the lip reader and it
1. Electromyography (EMG) gets compared with registered spoken words with
2. Image processing present lip and facial movement and compares the
image.

306 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The main algorithm used here is CNN technology contrast. The enhancement techniques work under two
in deep learning. Deep learning models are the most factors mainly: The digital data, the objectives of
important and essential thing in extracting the complexity interpretation.
information from the input images. Convolutional neural In Information Extraction the distantly detected
networks play a dramatic role in reducing the information is exposed to quantitative analysis to
computation time taken when many networks fail to relegate singular pixels to explicit classes. It is then
utilize. grouped. It is important to assess its precision by
Digital image processing undergoes three steps: contrasting the classifications on the characterized
1. Pre-processing images with the spaces of known personality on the
ground. The eventual outcome of the analysis comprises
2. Display and enhancement guides (or images), information and a report. Then, at
3. Information extraction. that point these are changed over to comparing signals
shown in fig.2
IV. FLOWCHART
The smart defence helmet consists of electromyo
sensor and its interfacing sensors, image processing
camera/pi camera, raspberry pi, Wi-Fi module,
electromechanical transducers and Ultra-sound
transducers.
The defence military can communicate secret or
confidential matters to their team. At that time, the smart
helmet which is fixed with an Electromyo sensor
converts their lip movement to speech to other people
in the mission. First, the user makes facial movement
to speak; the sensor absorbs the facial movements
keenly,which converts to electrical pulses. The extracted
impulse undergoes digital signal processing. The
ultrasound transducer placed below the chin so that
the camera could capture the movement of tongue and
Fig.2
lips. With the help of a portable camera fixed in the
helmet, analyse the digital image processing technique. SOLIDWORK VIEW:
The impulse gets converted into an audio signal to the The three-dimensional view of the smart defence
receiver end using an ultrasound transducer. helmet is shown in fig.3
In digital image processing technique, pre-processing
takes place which consists of those operations that
prepare data for subsequent analysis that attempts to
correct or compensate for systematic errors. The digital
imageries are subjected to several corrections such as
geometric, radiometric and atmospheric, though all
these corrections might not necessarily be applied in all
cases.
Fig.3
Image Enhancement Used to improve the
interpretability of the image by increasing apparent

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 307
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

V. FEATURE WORK VIII. REFERENCES


This Silent Sound Technology(SST) seems to be a [1] Brumberg, .J. Nieto-Castanon A, Kennedy, .P., Guenther, .H.
(2010). Brain-computer interfaces for speech communication.
great benefit for the people who have lost their voice Speech Communication Journal. 52(4): 257-270
but wish to communicate through mobiles.SST works
[2] International Journal of Science and Research (IJSR) ISSN
as a perfect method for the people to make silent calls (Online): 2319-7064 Index Copernicus Value (2015): 78.96 |
and communicate clearly without any disturbance in Impact Factor (2015): 6.391
noisy places.It is also one of the best methods to [3] International Journal of Engineering Trends and Technology
eradicate noise pollution.Moreover, it is the best method (IJETT) - Volume 9 Number 14 - Mar 2014
to transmit confidential or causal information without [4] The International Journal on Recent and Innovation Trends in
using vocal cords.This method may also seem to be Computing and Communication (ISSN: 2321-8169)
very useful for the astronauts to communicate. [5] SreenivasSremath Tirumala, "Implementation of Evolutionary
Algorithms for Deep Architecture", vol. 1315, pp. 164-171, ISSN
VI. LIMITATIONS 1613-0073.

Silent Sound Technology is the best solution for [6] ShehjarSafaya and Kameshwar Sharma, "Silent Sound
Technology-An End to Noisy Communication", International
various situations and it works well for different Journal of Innovative Research in Computer and Communication
languages like French, English and German. But on the Engineering, vol. 1, no. 9, November 2013, ISBN 2320-9801.
other hand, it is difficult for languages like Chinese. It is [7] International journal in multidisciplinary and Academic Research
so because different tones may hold different meanings. (SSIJMAR) Vol .2, No.2, March - April (ISSN 2278 - 5973)

VII. CONCLUSION
Thus, the idea of using SST (Silent sound
technology) permits communication without uttering a
single word. This automation will be very convenient
for soldiers in transmitting the information within their
crew mates/ squad. Significance of this helmet is to carry
out the information to their respective teammates and
not to be transferred to the opponent squad. From a
design point of view the helmet is comfortable to wear.
Additionally, this helmet is designed using simplified
components and also there should be free space to such
an extent that the helmet is convenient to use

308 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

An Efficient Design of Optimized Low Power Dual


Mode Logic for Full Adder Design
G. Munirathnam1, S. Hema Madhuri2, P. Bhaskar Reddy3, V. Indhu4, S. Mamatha5
1,2,3,4,5
Asst. Professor, ECE Dept., SITAMS,Chittoor

Abstract: This paper represents a Dual Mode This paper presents Dual Mode Logic (DML), a
Logic (DML) gates for low power application's. new design paradigm for digital integrated circuits. DML
DML is an alternative to the CMOS logic. DML logic gates can operate in two modes, each optimized
has a switching ability between two modes i.e., static for a different metric. Its on-the-fly switching between
mode and dynamic mode. In dynamic mode, The
these operational modes at the gate, block and system
DML circuit achieves high performance along with
increased Power dissipation, while in static mode
levels provide maximal E-D optimization flexibility. Each
DML circuit attain lower power with moderate highly detailed chapter has multiple illustrations showing
performance. Dual mode logic operates both how the DML paradigm seamlessly implements digital
modes in a single circuit, where as in CMOS logic circuits that dissipate less energy while simultaneously
it requires different types of circuits for static and improving performance and reducing area without a
dynamic mode. In this project, a digital circuit is significant compromise in reliability. All the facets of the
designed by using DML and it is designed in sub DML methodology are covered, starting Describes a
threshold region. The parameters like Power novel, promising alternative to conventional CMOS
consumption were measured. It has been compared logic, known as Dual Mode Logic (DML), with which
with existing CMOS logic with various process a single gate can be operated selectively in two modes,
techniques.
each optimized for a different metric (e.g., energy
Keywords- Micro Wind, CMOS, Dual Mode consumption, performance, size). Demonstrates several
Logic, Digital circuit, VLSI Technology. techniques at the architectural level, which can result in
I. INTRODUCTION high energy savings and improved system performance.
Focuses on the tradeoffs between power, area and
In CMOS Digital circuits there are many types of
speed including optimizations at the transistor and gate
logic families are available. The most used logics are
level, including alternatives to DML basic cells,
static CMOS and dynamic CMOS. The static CMOS
Illustrates DML efficiency for a variety of VLSI
circuits are constructed by both NMOS and PMOS
applications.
devices. The logical operation evaluated by the
combination of input values. The dynamic CMOS The methodologies which are used to achieve low
circuits are constructed by only pull down network. power consumption in digital systems span a wide range,
The keeper and header transistors are connected with from device/process level to algorithm level. Device
clock signal. But both the logics are having some characteristics (e.g., threshold voltage), device
disadvantages like charge sharing, transistor count, geometries and interconnect properties are significant
transistor ratio, clock rate etc and these are the different factors in lowering the power consumption. Circuit-level
physical structures . The proposed Dual mode logic is measures such as the proper choice of circuit design
operates between static and dynamic modes of styles, reduction of the voltage swing and clocking
operation with a single circuit. The clock signal is a mode strategies can be used to reduce power dissipation at
selecting signal for this logic. It can be a continuous the transistor level. Architecture-level measures include
clock signal or a fixed pulse signal depends on type of smart power management of various system blocks,
operating mode. utilization of pipelining and parallelism, and design of
bus structures. Finally, the power consumed by the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 309
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

system can be reduced by a proper selection of the parasitic capacitance. The interconnect lines between
data processing algorithms, specifically to minimize the the gates contribute to the second component of the
number of switching events for a given task. total capacitance. Note that especially in sub-micron
II. TYPES OF POWER DISSIPATION IN technologies, the interconnect capacitance can become
CMOS the dominant component, compared to the transistor-
related capacitances. Finally, the input capacitances are
1. Switching Power Dissipation mainly due to gate oxide capacitances of the transistors
This component represents the power dissipated connected to the input terminal. Again, the amount of
during a switching event, i.e., when the output node the gate oxide capacitance is determined primarily by
voltage of a CMOS logic gate makes a power the gate area of each transistor.
consuming transition. In digital CMOS circuits, dynamic 2. Short-Circuit Power Dissipation
power is dissipated when energy is drawn from the
power supply to charge up the output node capacitance. The switching power dissipation examined above is
During the charge-up phase, the output node voltage purely due to the energy required to charge up the
typically makes a full transition from 0 to VDD, and the parasitic capacitances in the circuit, and the switching
energy used for the transition is relatively independent power is independent of the rise and fall times of the
of the function performed by the circuit. To illustrate input signals. Yet, if a CMOS inverter (or a logic gate)
the dynamic power dissipation during switching, is driven with input voltage waveforms with finite rise
consider the circuit example given in Fig. 7.1. Here, a and fall times, both the nMOS and the pMOS transistors
two-input NOR gate drives two NAND gates, through in the circuit may conduct simultaneously for a short
interconnection lines. The total capacitive load at the amount of time during switching, forming a direct current
output of the NOR gate consists of (1) the output path between the power supply and the ground, as
capacitance of the gate itself, (2) the total interconnect shown in Fig.1
capacitance, and (3) the input capacitances of the driven The current component which passes through both
gates. the nMOS and the pMOS devices during switching
does not contribute to the charging of the capacitances
in the circuit, and hence, it is called the short-circuit
current component. This component is especially
prevalent if the output load capacitance is small, and/or
if the input signal rise and fall times are large, as seen in
Fig. 7.5. Here, the input/output voltage waveforms and
the components of the current drawn from the power
supply are illustrated for a symmetrical CMOS inverter
with small capacitive load. The nMOS transistor in the
circuit starts conducting when the rising input voltage
exceeds the threshold voltage VT,n. The pMOS
Fig1: A NOR gate driving two NAND gates through
interconnection lines. transistor remains on until the input reaches the voltage
level (VDD - |VT,p|). Thus, there is a time window
The output capacitance of the gate consists mainly
during which both transistors are turned on. As the
of the junction parasitic capacitances, which are due to
output capacitance is discharged through the nMOS
the drain diffusion regions of the MOS transistors in
transistor, the output voltage starts to fall. The drain-
the circuit. The important aspect to emphasize here is
to-source voltage drop of the pMOS transistor
that the amount of capacitance is approximately a linear
becomes nonzero, which allows the pMOS transistor
function of the junction area. Consequently, the size of
to conduct as well. The short circuit current is terminated
the total drain diffusion area dictates the amount of
when the input voltage transition is completed and the
310 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

pMOS transistor is turned off. An similar event is exceeds the threshold voltage VT,n. The pMOS
responsible for the short- circuit current component transistor remains on until the input reaches the voltage
during the falling input transition, when the output voltage level (VDD - |VT,p|). Thus, there is a time window
starts rising while both transistors are on. during which both transistors are turned on. As the
Note that the magnitude of the short-circuit current output capacitance is discharged through the nMOS
component will be approximately the same during both transistor, the output voltage starts to fall. The drain-
the rising-input transition and the falling-input transition, to-source voltage drop of the pMOS transistor
assuming that the inverter is symmetrical and the input becomes nonzero, which allows the pMOS transistor
rise and fall times are identical. The pMOS transistor to conduct as well. The short circuit current is terminated
also conducts the current which is needed to charge up when the input voltage transition is completed and the
the small output load capacitance, but only during the pMOS transistor is turned off. An similar event is
falling-input transition (the output capacitance is responsible for the short- circuit current component
discharged through the nMOS device during the rising- during the falling input transition, when the output voltage
input transition). This current component, which is starts rising while both transistors are on.
responsible for the switching power dissipation of the Note that the magnitude of the short-circuit current
circuit (current component to charge up the load component will be approximately the same during both
capacitance), is also shown in Fig.1 The average of the rising-input transition and the falling-input transition,
both of these current components determines the total assuming that the inverter is symmetrical and the input
amount of power drawn from the supply. rise and fall times are identical. The pMOS transistor
3. Short-Circuit Power Dissipation also conducts the current which is needed to charge up
the small output load capacitance, but only during the
The switching power dissipation examined above is falling-input transition (the output capacitance is
purely due to the energy required to charge up the discharged through the nMOS device during the rising-
parasitic capacitances in the circuit, and the switching input transition). This current component, which is
power is independent of the rise and fall times of the responsible for the switching power dissipation of the
input signals. Yet, if a CMOS inverter (or a logic gate) circuit (current component to charge up the load
is driven with input voltage waveforms with finite rise capacitance), is also shown in Fig.1. The average of
and fall times, both the nMOS and the pMOS transistors both of these current components determines the total
in the circuit may conduct simultaneously for a short amount of power drawn from the supply.
amount of time during switching, forming a direct current
path between the power supply and the ground, as III. EXISTING METHOD
shown in Fig. 1. 1. nMOS logic
The current component which passes through both The MOSFETs are n-type enhancement mode
the nMOS and the pMOS devices during switching transistors, arranged in a so-called "pull-down network"
does not contribute to the charging of the capacitances (PDN) between the logic gate output and negative
in the circuit, and hence, it is called the short-circuit supply voltage (typically the ground). A pull up (i.e. a
current component. This component is especially "load" that can be thought of as a resistor, see below) is
prevalent if the output load capacitance is small, and/or placed between the positive supply voltage and each
if the input signal rise and fall times are large, as seen in logic gate output. Any logic gate, including the logical
Fig. 1. Here, the input/output voltage waveforms and inverter, can then be implemented by designing a network
the components of the current drawn from the power of parallel and/or series circuits, such that if the desired
supply are illustrated for a symmetrical CMOS inverter output for a certain combination of boolean input values
with small capacitive load. The nMOS transistor in the is zero (or false), the PDN will be active, meaning that
circuit starts conducting when the rising input voltage at least one transistor is allowing a current path between

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 311
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

the negative supply and the output. This causes a voltage


drop over the load, and thus a low voltage at the output,
representing the zero.
As an example, here is a NOR gate implemented in
schematic NMOS. If either input A or input B is high
(logic 1, = True), the respective MOS transistor acts
as a very low resistance between the output and the
negative supply, forcing the output to be low (logic 0, =
False). When both A and B are high, both transistors Fig.3 CMOS logic
are conductive, creating an even lower resistance path
In CMOS technology, both N-type and P-type
to ground. The only case where the output is high is
transistors are used to design logic functions. The same
when both transistors are off, which occurs only when
signal which turns ON a transistor of one type is used
both A and B are low, thus satisfying the truth table of a
to turn OFF a transistor of the other type. This
NOR gate:
characteristic allows the design of logic devices using
only simple switches, without the need for a pull-up
resistor. In CMOS logic gates a collection of n-type
MOSFETs is arranged in a pull-down network
between the output and the low voltage power supply
rail (Vss or quite often ground). Instead of the load
resistor of NMOS logic gates, CMOS logic gates have
a collection of p-type MOSFETs in a pull-up network
between the output and the higher-voltage rail (often
named Vdd).
Thus, if both a p-type and n-type transistor have
their gates connected to the same input, the p-type
MOSFET will be ON when the n-type MOSFET is
Fig 2:NMOS logic
OFF, and vice-versa. The networks are arranged such
that one is ON and the other OFF for any input pattern
2. CMOS logic as shown in the figure. CMOS offers relatively high
The term CMOS stands for "Complementary Metal speed, low power dissipation, high noise margins in both
Oxide Semiconductor". This is one of the most popular states, and will operate over a wide range of source
technology in the computer chip design industry and it and input voltages (provided the source voltage is fixed).
is broadly used today to form integrated circuits in The fabrication of CMOS transistors can be done on
numerous and varied applications. Today's computer the wafer of silicon. The diameter of the wafer ranges
memories, CPUs, and cell phones make use of this from 20mm to 300mm. In this, the Lithography process
technology due to several key advantages. This is the same as the printing press. On every step, different
technology makes use of both P channel and N channel materials can be deposited, etched otherwise patterned.
semiconductor devices. One of the most popular This process is very simple to understand by viewing
MOSFET technologies available today is the the wafer's top as well as cross-section within a
Complementary MOS or CMOS technology. This is simplified assembling method. The fabrication of CMOS
the dominant semiconductor technology for can be accomplished through using three technologies
microprocessors, microcontroller chips, memories like namely N-well pt P-well, Twin well, an SOI (Silicon
RAM, ROM, EEPROM and application-specific on Insulator). Please refer to this link to know more
integrated circuits(ASICs) about CMOS Fabrication.
312 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IV. PROPOSED TEHNIQUE


The basic DML gate architecture is composed of a
standard CMOS gate and an additional transistor M1,
whose gate is connected to a global clock signal, as
shown in Fig. At first glance, this architecture is very
similar to the noise tolerant precharge (NTP) structure,
introduced by Yamada et al. However, in contrast to
the NTP, which was developed as a high-speed, high-
noise-tolerance dynamic logic, the DML aims to allow
operation in two functional modes: static mode and
dynamic mode. To operate the gate in the dynamic
mode, the Clk is assigned an asymmetric clock, allowing
Fig.4.DMA logic
two distinct phases: precharge and evaluation. During
the precharge phase, the output is charged to high/low,
depending on the topology of the DML gate. In the
consequent evaluation phase, the output is evaluated
according to the values at the gate inputs. The
proposed DML topologies, marked Type A and Type
B, are illustrated in Fig. Type A has an added p-MOS
transistor that precharges the output to a logical "1"
during the precharge phase. Type B has an added n-
MOS that precharges the output to a logical "0." Dynamic
logic gates are often implemented using a footer, which
requires an additional transistor. The footer is used to
decrease precharge time by eliminating the ripple effect Fig:5. Proposed method
of the data advancing through the cascaded nodes and
allowing faster precharge. Switching the DML gate to
operate in CMOS-like (i.e., static mode) operation is
fairly intuitive: the global Clk should be fixed high for
Type A topology and constantly low for Type B
topology. As a result, the gate attains a similar topology
to CMOS, except for the extra parasitic capacitance,
which is usually negligible. Creating a DML node based
on a CMOS gate is also very simple: "gluing" an
additional transistor for the precharge phase, and, in
the case of a footed gate, adding an additional n-MOS Fig.6. Full adder with NAND Type A DML
transistor as a footer in Type A gates and a p-MOS
transistor as a header in Type B gates.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 313
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

V. SIMULATION RESULT

Fig.10. Schematic of Full adder with Type A NAND

Fig.7. Schematic of NAND Type A DML

Fig.8. Transient response of NAND gate

Fig.11. Transient response of Full adder

VI. CONCLUSION
The proposed dual mode logic circuit is evaluated
using Full adder. It is the efficient logic family than
conventional CMOS family. It was tested under various
logic gates like nand , nor, not and results were
compared with conventional CMOS logic circuits .The
proposed design reduces the power consumption and
and also a single circuit operates as static circuit and
dynamic circuit without any physical modification. This
dual mode logic gives efficient result with low power
consumption.
Fig.9. Schematic of NAND Type B DML

314 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

REFERENCES [5].M. C. Johnson, D. Somasekhar, L. Y. Chiou, and K. Roy, "Leakage


control with efficient use of transistor stacks in [12]. single
[1]. A. Kaizerman, S. Fisher, and A. Fish, "Sub threshold dual mode threshold CMOS," IEEE Trans. VLSI Syst., vol. 10, pp. 1-5,
logic,"IEEE Trans. Very Large Scale Integra. (VLSI) Syst., vol. Feb. 2002.
21, no. 5, pp.979-983, May 2013.
[6].J. Kao, A. Chandrakasan, and D. Antoniadis, "Transistor sizing
[2]. Itamar Levi, Alexander Belenky, and Alexander Fish" Logical issues and tool for multi-threshold CMOS technology," in Proc.
Effort for CMOS-Based Dual Mode Logic Gates" IEEE Trans. 34th DAC,1997, pp. 409-414.
Very Large Scale Integra. (VLSI) Syst.,, vol. 22, no. 5, pp.1042-
1053, May 2014. [7]. C. Gopalakrishnan and S. Katkoori, "Resource allocation and
binding approach for low leakage power," in Proc. IEEE Int.
[3]. I. Levi, A. Kaizerman, and A. Fish, "Low voltage dual mode Conf. VLSI Design, Jan. 2003, pp. 297-302.
logic: Model analysis and parameter extraction," Excepted
Elsevier, Microelectron.J, vol. 12, no. 1, Jan. 2012. [8].Q. Wang and S. Vrudhula, "Static power optimization of deep
sub-micron CMOS circuits for dual V technology," in Proc.
[4].M. D. Powell, S.-H. Yang, B. Falsafi, K. Roy, and T. N. Vijay ICCAD, Apr. 1998, pp. 490-496.
kumar, "Gated-Vdd: A circuit technique to reduce leakage in deep
submicron cache memories," in Proc. IEEE ISLPED, 2000, pp. [9]. S. Narendra, S. Borkar, V. De, D. Antoniadis, and A. P.
90-95. Chandrakasan, "Scaling of stack effect and its application for
leakage reduction," Proc.IEEE ISLPLED,pp.195-200,Aug.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 315
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Identification of Bone Fracture using Support Vector


Machine Classifier
Dr. S. Muni Rathnam1, Ms. Y. Viritha2, Ms. G. Mounika3, Mr. R. Muni Prathap4, Mr. P. Karthik5
1
Professor & HOD, 2,3,4,5UG Student
1,2,3,4,5
Dept. of ECE, Vemu Institute of Technology, P Kothakota
Email: smredt@gmail.com1, viritha2511999@gmail.com2, muniece479@gmail.com4

Abstract: The bone fracture is a common is applied on the bones.X-ray images are examined
problem in human beings occurs due to high manually, but it is time consuming and prone to errors.
pressure is applied on bone or simple accident and As X-ray images are more suspected to noise, many
also due to osteoporosis and bone cancer. The preprocessing steps to remove noise and blur from the
accurate diagnosis of bone fracture is important
image.
aspects in medical field. Medical Imaging is the
process used to promote body images for medical In medical science, a break or crack in a bone or
uses to pinpoint diseases. In this work X-ray cartilage is known as Fracture. A fracture can also be
images are used for bone fracture analysis which the result of conditions which weaken the bones, for
is obtained from hospital. In this paper GUI is example, osteomalacia (softening of the bone),
developed with Image Pre-processing, Image osteopenia (condition before osteoporosis),
Morphology and Image Classification using osteogenesis (brittle bone diseases) osteoporosis
Support Vector Machine.The processed images will
(porous bone diseases), and osteofibrosis (lack of
be further classified into fractured and non-
calcium).
fractured bone and compare the performance of the
classifier with existing methods. II. LITERATURE SURVEY
Statistical Features like Mean, Standard Anu T C et. al. have used Neural Network for image
Deviation, Contrast,Entropy,Correlation, Skew& classification, median filter for removing of noise, Sobel
Kutosis are extracted from pre-processed image edge detector was used for edge detection, K-Means
to train and test the classifier. The following Clustering technique for segmentation[1]. Image
performance parameters of classifierobtained features such as Entropy, Contrast, Correlation, and
Sensitivity, Specificity, Precision and Accuracy Homogeneity were used for training and testing of the
100%, 89.32%, 89.85% and 93.33% respectively.
classifier. The performance of the classification are
MATLAB R2020a is employed which uses the
image processing tool box.
Accuracy is 85%, Precision is 76.9%, Sensitivity is
100% and Specificity is 70%.
Index Terms -X-ray image, Support Vector
Machine, Statistical Features and Bone Fracture. Kamil Dimililer et.al.developed an intelligent
classification system that would be capable of detecting
I. INTRODUCTION and classifying the bone fractures. The developed
Bones are rigid bars that are made up of connected system comprises of two principal stages. In the first
tissues and adult consisting of 206 bones.Bones are stage, the images of the fractures are processed using
solid organs which provide strength and stability to different image processing techniques in order to detect
body.The Bones are provides shape & Support to body their location and shapes and the next stage is the
and also moment to body.Types of bones are Long, classification phase, where a backpropagation neural
Short, Flat, Sesamoid and Irregular. network is trained and then tested on processed
images. Experimentally, the system was tested on
Bone fracture is a common problem that can occur
different bone fracture images and the results show high
due to accidents or any other case in which high pressure
efficiency and a classification rate.
316 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Peruri Srinivasulu et. al. used canny edge detection The block diagram or proposed method is shown
methodology for segmentation. The canny method in Fig. 1 which uses the image processing techniques
produces perfect information from the bone image. The for pre-processing, Feature extraction and Support
main aim of this research is to detect Bone fractures Vector Machine (SVM) for classification. This
using image processing using MATLAB[3]. The proposed method effectively identifies the bone
proposed system has the following steps, namely, fractures in the images. Your goal is to simulate the usual
preprocessing, segmentation, and fracture detection.in appearance of papers in conference proceedings. For
feature excitation step, the paper uses to Hough items not addressed in these instructions, please refer
Transform technique for line detection inline-image. to the last issue of your conference's proceedings for
Feature extraction is the main task of the system. the reference or ask your conference Publications Chair
results from various experiments show that the for instructions.
proposed system is very accurate and efficient. A. Data Set
O.Ozgur et.al.have used Neural Network for image A dataset in computer vision is a curated set of digital
classification, Wavelets for Image features and Intelligent photographs that developers use to test, train and
Bone Fracture Detection System (IBFDS) for detection. evaluate the performance of the classifier.
The proposed artificial neural network has achieved
89% success rate[4]. Total No. of Images in Data Set : 275 ( X- Ray
Images)
Louisville et.al. proposed method decrease patient
morbidity include early fracture stabilization and Bone Fractured Images : 92
sequential debridement. External fixation remains the None Bone Fractured Images : 183
standard; however, early internal fixation in low grade
Data Set is divided into Two Sets i.e Training Set &
injuries may be an acceptable option. Early soft tissue
Testing Set
coverage is critical. The use of prophylactic parenteral
antibiotics has decreased the incidence of acute infection Training Set:
and chronic osteomyelitis. Supplemental use of local Total No. of Images in Training Set : 110
antibiotic polymethyl methacrylate (PMMA) beads
appear to further diminish the morbidity in high-grade Bone Fractured Images : 30
open fractures[5]. None Bone Fractured Images : 80
III. METHODOLOGY Testing Set:
Total No. of Images in Training Set : 165
Bone Fractured Images : 62
None Bone Fractured Images : 103
B. Image Resize
Fig.1 Block Diagram of Proposed Method for Identifying Image resizing is necessary when you need to
Fractures. increase or decrease the total number of pixels, whereas
In medical science, a break or crack in a bone or remapping can occur when you are correcting for lens
cartilage is known as Fracture. A fracture can also be distortion or rotating an image. Zooming refers to
the result of conditions which weaken the bones, for increase the quantity of pixels, so that when you zoom
example, osteomalacia (softening of the bone), an image.Interpolation works by using known data to
osteopenia (condition before osteoporosis), estimate values at unknown points. Image interpolation
osteogenesis (brittle bone diseases) and osteoporosis works in two directions, and tries to achieve a best

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 317
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

approximation of a pixel's intensity based on the values removed from the objects in an image depends on the
at surrounding pixels. Here image is resized to size and shape of the structuring element used to process
256X256. the image. In the morphological dilation and erosion
C. Color Conversion operations, the state of any given pixel in the output
image is determined by applying a rule to the
A pixel color in an image is a combination of three corresponding pixel and its neighbors in the input image.
colors Red, Green, and Blue (RGB). The conversion The rule used to process the pixels defines the operation
of a color image into a grayscale image is converting as a dilation or an erosion.
the RGB values (24 bit) into grayscale value (8 bit).
Various image processing techniques and software F. Feature Extraction
applications converts color image to grayscale image Feature extraction is the main step in various image
conversion of a color image into a grayscale image processing applications. Gray-Level Co-occurrence
inclusive of salient features is a complicated process. Matrix is used for feature extraction and selection.
The converted grayscale image may lose contrasts, GLCM is main tool used in image texture analysis.
sharpness, shadow, and structure of the color image. GLCM is a statistical way to indicate image texture
D. Removal of Noise structure by statistically sampling the pattern of the
greylevels occurs in relation to other grey levels. Gray
Noise is always presents in digital images during Level Co-occurrence Matrix (GLCM) method is used
image acquisition, coding, transmission, and processing to extract statistical features.
steps. It is very difficult to remove noise from the digital
images without the prior knowledge of filtering The Probability Density Function or Histogramf_z
techniques.Filtering image data is a standard process (z_i) is used to calculate the statistical features. The no.
used in almost every image processing system. Filters of grey levels in the image is varies from 0 to ( 2^n-1)
are used for this purpose. They remove noise from where n is no. of bits.
images by preserving the details of the same. Table 1 Features Extracted from image
S.No Parameter Formula Description
The median filter is used in the work to remove the Measures average
1 Mean variation of intensity
noise, It is a sliding-window spatial filter, replaces the levels
centre value in the window with the median of all the Standard
M easures majority
variations of intensity
2
pixel values in the window. The window or kernel is Deviation levels about mean
value
3x3 used. Measures shape of
3 Skew = Probability Density
E. Image Morphology Function
Measures flatness of
4 Kurtosis Probability Density
Morphology is a broad set of image processing Function
operations that process images based on shapes. 5 Contrast
Measures intensity
contrast between a
Morphological operations apply a structuring element pixel and its neighbor
Measures the
to an input image, creating an output image of the same 6 Entropy randomness of
intensity levels
size. In a morphological operation, the value of each Measures the joint
pixel in the output image is based on a comparison of 7 Correlation
= occurrence of
specified pixel pairs
the corresponding pixel in the input image with its
G. Classifier
neighbors. =
The most basic morphological operations are dilation Support vector machines (SVM) is used for
and erosion. Dilation adds pixels to the boundaries of classification, which is supervised linear classifier based
objects in an image, while erosion removes pixels on on the margin maximization principle. They perform
object boundaries. The number of pixels added or structural risk minimization, which improves the
complexity of the classifier with the aim of achieving
318 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

excellent generalization performance. The SVM Step5: Extract the image features such Mean,
accomplishes the classification task by constructing, in Contrast, Correlation, Entropy, Standard Deviation,
a higher dimensional space, the hyperplane that Kurtosis, and Skewness from all training set images
optimally separates the data into two categories. and store as vectors.
Support Vector Machine is an extremely popular Step6: Calculate the value of decision functionf(x).
supervised machine learning technique which can be Step7: If f(x) ? 0 then test image is Bone Fractured
used as a classified as well as a predictor. For Image otherwise non Bone Fractured image.
classification, it finds a hyper-plane in the feature space
that differentiates between the classes. An SVM model Step8: Repeat above steps for all test images and
represents the training data points as points in the feature calculate TN, FN, FPv& TP.
space, mapped in such a way that points belonging to Step9: Calculate performance evaluation measures
separate classes are segregated by a margin as wide as Sensitivity, Specificity, Accuracy and Precision.
possible. The test data points are then mapped into Table 2 Confusion Matrix of a Classifier
that same space and are classified based on which side
of the margin they fall.
H. Algorithm
Training of SVM Classifier:
Step1: Read image from training set and resize to
256x256.
Table 3 Classifier Output
Step2: Convert Color Image to Grey Scale
Step3: Noise Removal using 3x3 Median Filter
Step4 : Perform Image Morphology operations i.e
Dilation & Erosion
IV. RESULTS AND DISCUSSION
Step5 : Extract the image features such as Mean,
Contrast, Correlation, Entropy, Standard Deviation, The proposed system is implemented in Graphical
Kurtosis, and Skewness from all training set images User Interface (GUI) using MATLAB and Identification
and store as vectors. of Bone fracture image and non Bone fractured image
are shown in figure2 and figure 3 at different stages.
Step6: Calculate bias value, support vectors and
quadratic kernel function using training set vectors.
Step7: Calculate decision function f(x)
With this training process is completed.
Testing of SVM Classifier:
Step1: Read image from testing set and resize to
256x256. Fig.2 Identification of Bone Fractured Image.
Step2: Convert Color Image to Grey Scale
Step3: Noise Removal using 3x3 Median Filter
Step4: Perform Image Morphology operations i.e
Dilation &Erosion

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 319
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The performance of the proposed system is


compared with existing system which shown in Table
4. And graphical representation is shown in figure 4.
The Specificity, Accuracy and Precession are improved
in Proposed method because of Morphological
Operation such as dilation and erosion and also more
Fig.3 Identification of Non Bone Fractured Image. no. of Statistical parameters are used.
The performance of the proposed system is V. CONCLUSION
evaluated in terms of following parameters:
A computer based analysis techniques for the
Sensitivity is ability to identify the Bone detection of bone fracture using X-ray have been
Fractured(abnormal) Image correctly. presented in this work. It starts from the preprocessing
Sensitivity = TP/(TP+FN) to remove the noise and Morphological operation to
highlight the details. The SVM Classifier tested on a
Specificity is ability to identify the Non Bone set of images and Performance have been evaluated
Fractured(normal) Image correctly based on Sensitivity, Specificity, Accuracy and
Sensitivity = TP/(TP+FN) Precision.Analysis shown that results obtained are
satisfactory and accuracy of this method is 93.33%.
Accuracy is ability of the image recognition correctly
V. FUTURE WORK
Accuracy = (TP+TN)/(TP+TN+FP+FN)
The performance of the proposed system can be
Precision or Positive Predictive Value (PPV) is the
improved by increasing number of feature
proportion of the positive .
extractions.The performance of the proposed system
Precision=TP/(TP+FP) can be improved by using combination of image
Table 4Comparison between Existing and Proposed Output processing techniques for pre-processing and
segmentation.The performance of the proposed system
can also be improved with help of ANFIS (Adaptive
Network based Fuzzy Inference) classifier system.
REFERENCES
[1] Anu T C et. al, "Detection of Bone Fracture using Image
Processing Methods " International Journal of Computer
Applications , (0975 - 8887) , 2015.
[2] Kamil Dimililer, "IBFDS: Intelligent bone fracture detection
th
s y s tInternational Conference on Theory and Application
e m " , 9

of Soft Computing, ICSCCW 2017.


[3] PeruriSrinivasulu, JolluVamsi, Kattubadi Drutesh, and Gandham
Prudhvi, "Bone fracture detection using Image Processing",
International Journal of Scientific Development and Research,
ISSN: 2455-2631, Volume 5, Issue 6, June 2020.
[4] O.Ozgur "Detection of bone fractures using image processing
techniques and artificial neural networks". 2017 International
Artificial Intelligence and Data Processing Symposium (IDAP),
pp. 1-5,2017.
[5].DavidSeligson and Stephen L. Henry MD, "Treatment on
Compound Fractures", The American Journal of Surgery, Vol.
161, Issue 6, pp: 696-701, 1991.
Fig.4 Graphical Representation of Performance of Classifier.

320 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

IoT Based Smart Bot


Debjyoti Roy1, Debojyoti Banerjee2, Debolina Sett3, Epsita Das4, Partha Das5, Pushpendu Kanjilal6
1,2,3,4,5
UG Student, Dept of ECE, B. P. Poddar Institute of Management and Technology, Kolkata.
6
Assistant Professor, Dept of ECE, B. P. Poddar Institute of Management and Technology, Kolkata.
Email: debjyotiry@gmail.com1,debojyotirock7@gmail.com2, debolinasett123@gmail.com3, epsitadas22@gmail.com4

Abstract: This paper is on developing an IoT technologies, real-time analytics, machine learning,
based smart bot which will be controlled by our commodity sensors, and embedded systems. Traditional
smartphone simply by opening the IP address of fields of embedded systems, wireless sensor networks,
the network connected with the microcontroller control systems, automation (including home and
(ESP8266 12E-NODE MCU). It has an ultrasonic
building automation), and others all contribute to
sensor attached to a servo motor for rotating the
sensor. The sensor will give us the distance of the
enabling the Internet of things. In the consumer market,
nearest obstacle from the bot by rotating the servo IoT technology is most synonymous with products
motor left, right and forward. And seeing this pertaining to the concept of the "smart home", covering
distance we can move the bot in any direction devices and appliances (such as lighting fixtures,
manually. We have also installed a DHT-22 thermostats, home security systems and cameras, and
temperature and humidity sensor to monitor the other home appliances) that support one or more
temperature and humidity of the surroundings. common ecosystems, and can be controlled via devices
INTRODUCTION associated with that ecosystem, such as smart-phones
and smart speakers.
The phrase Internet of Things for future scope, we
can attach a camera module and also GPS tracking The Internet of Things (IoT) is the network of
system to make it more precise and also easy to physical objects-devices, instruments, vehicles, buildings
control.gs (IoT) refers to connecting various physical and other items embedded with electronics, circuits,
devices and objects throughout the world via internet. software, sensors and network connectivity that enables
The term IoT was firstly proposed by Kevin Ashton in these objects to collect and exchange data. The Internet
1999.The following section illustrates the basics of IoT. of Things allows objects to be sensed and controlled
It deals with various layers used in IoT and some basic remotely across existing network infrastructure, creating
terms related to it. This section also presents the opportunities for more direct integration of the physical
architecture of IoT. For example, when the household world into computer-based systems, and resulting in
devices of our daily life connect with the internet the improved efficiency and accuracy. Some preliminary
system can be called a Smart-Home in IoT environment. IoT applications have been already developed in
The IoT is not just a deep vision for the future. It is healthcare, transportation, and automotive industries.
already under implementation and is having an impact IoT technologies are at their infant stages; however,
on more than just technological development. many new developments have occurred in the integration
of objects with sensors in the Internet. The development
The Internet of things (IoT) is the extension of of IoT involves many issues such as infrastructure,
Internet connectivity into physical devices and everyday communications, interfaces, protocols, and standards.
objects. Embedded with electronics, Internet The objective of this paper is to give a general concept
connectivity, and other forms of hardware (such as of IoT, the architecture and layers in IoT.
sensors), these devices can communicate and interact
with others over the Internet, and they can be remotely
monitored and controlled. The definition of the Internet
of things has evolved due to the convergence of multiple

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 321
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Model description the microcontroller will have the request from the user
Hardware:- and trigger the gear motors to execute the action by
moving towards the desired direction. The ultrasonic
1) NODEMCU ESP8266-12E MODULE. sensor will measure the distance of the nearest obstacle
2) 9V BATTERY and show it on the webpage. We can also rotate the
3) L293D MODULE ultrasonic sensor by rotating the servo motor in three
different directions to check the obstacle distances by
4) ULTRASONIC SENSOR just clicking the buttons available on the webpage.
5) SERVO MOTOR Similarly, DHT22 sensor will detect the temperature
6) DC GEAR MOTOR and humidity in real time and also show in the webpage.
7) WHEEL
8) FREE WHEEL
9) JUMPER WIRE
10)ULTRASONIC SENSOR HOLDER
11)CHASSIS
SOFTWARE:-
1) ARDUINO IDE
Working Principle:
The main component used in the model is the Picture
microcontroller Node MCU ESP8266-12E and along
with that components used are L293D module, gear
motors, servo motor, ultrasonic sensor, DHT22 sensor
to name a few.
The circuit connections made are as follows:
Firstly, the gear motors are connected to the L293D
motor driver and the motor driver then wired to the
Node MCU. The power source which is a series of
two 9V batteries is connected with the particular slot
of the motor driver. Ultrasonic sensor's 4 pins Vcc,
trig, eco and gnd; DHT22's 3 pins Vcc, data and gnd
and also the servo motor are then connected with the
Node MCU accordingly with the exact pins mentioned
in the code. RESULTS AND DISCUSSION
After the whole connection is done the code is Using the concept of IOT and the required hardware
uploaded and after the execution of the code a IP and software components mentioned above we have
address is generated in the serial monitor in the Arduino developed the bot which will help in different industrial
IDE. When we put this IP address in our smart phone's domains, especially in green houses and plantation
web browser the five buttons: Forward, Backward, projects. We have implemented it specifically to
Left, Right and Stop appear. By clicking these buttons observe accurate temperature and humidity of different
we can move the BOT as per our choice. In this process sections of a large green house where the temperature

322 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

and humidity should be in a certain range. So, using this Future plans
bot, the user can sit in a place and he or she can monitor This paper can be enhanced with the help of more
temperature and humidity from different areas of that sensors, gyroscope, compass and so on. As for future
green house. scope, we can attach a camera module and also GPS
Same application can be implemented for different tracking system to make it more precise and also easy
industries where temperature monitoring is needed for to control.
different jobs. So, as a conclusion we can say that this Other than this on a different note we can make this
device will help a person to collect data from different bot ready for being applicable in other industrial
sectors of any industrial area or green houses where environments also by replacing or adding new sensors
temperature and humidity monitoring is needed. with different functionality which will work for collecting
In this paper we have implemented the working of different types of data in different types of other
different sensors and NodeMCU (microcontroller) and industries.
also, we have learned and implemented concepts of REFERENCES
IOT. We have faced different types of errors while
1. www.wikipedia.org
working on this paper like errors in connecting different
hardware components and compilation errors in the 2. https://circuitdigest.com/microcontroller-projects/arduino-
obstacle-avoding-robot
code sometimes. But we have resolved all those and
3. https://www.electronicshub.org/obstacle-avoiding-robot-arduino/
finally developed the paper with all specifications we
were desired to have in it. 4. https://create.arduino.cc/projecthub/chandankumarcmsn/
obstacle-avoiding-robot-using-arduino-with-ultrasonic-sensor-
af66f1
5. https://gist.github.com

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 323
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

ATMEGA328 Microcontroller Based Air and Noise


Pollution Monitoring System Over IoT
Dr.K.Gopi1, Mr.K.M.Hemambaran2
1
Associate Professor, Dept.of ECE, SITAMS, Chittoor
2
Assistant Professor, Dept.of ECE, SITAMS, Chittoor
Email: gopiradha47@gmail.com1, hemambarankm@gmail.com2

Abstract: In the Present situations Air and and keep it under control for a better future and healthy
sound pollution is one of the serious and growing living for all. Here we propose an air quality as well as
issues. Because, with increasing number of sound pollution monitoring system that allows us to
industrial units and transport vehicles the problem monitor and check live air quality as well as sound
of air and sound pollution is increasing day by day.
pollution in an area through IOT. System uses air sensors
Hence, it is necessary to monitor air quality and
keep it under control for a better future and healthy
to sense presence of harmful gases/compounds in the
living for all. Here in the proposed work an air air and constantly transmit this data. Also, system keeps
quality as well as sound pollution monitoring system measuring sound level and reports it. The sensors
is developed that allows us to monitor and check interact with raspberry pi which processes this data and
live air quality as well as sound pollution in transmits it over the application. This allows authorities
particular areas through IOT (Internet of Things). to monitor air pollution in different areas and act against
The System uses air sensors which detects (CO, it. Also, authorities can keep a watch on the noise
LPG, and Methane) to sense presence of harmful pollution near schools, hospitals and no honking areas,
gases/compounds in the air and constantly transmit and if system detects air quality and noise issues it alerts
this data to microcontroller. Also system keeps authorities so they can take measures to control the
measuring sound level and reports it to the online
issue. Some future consumer applications envisioned
server over IoT. The sensors interact with
Microcontroller which processes this data and
for IoT sound like science fiction, but some of the more
transmits it over internet. This allows authorities practical and realistic sounding possibilities for the
to monitor air pollution in different areas and take technology include: Receiving warnings on your phone
action against it. or wearable device when IoT networks detect some
physical danger is detected nearby. Self-parking
In the proposed work the system detects the
level of pollution (Air or Sound) time by time. It automobiles. Automatic ordering of groceries and other
explains the different units such as hardware and home. Automatic tracking of exercise habits and other
software used in the proposed system and also day-to-day personal activity including goal tracking and
explains the modeling and working of the basic regular progress reports. Network Devices and the
components used in the proposed system such as Internet of Things All kinds of ordinary household
Microcontroller (Arduino board) and its gadgets can be modified to working an IoT system.
architecture, Gas sensor and its features, Sound Wi-Fi network adapters, motion sensors, cameras,
sensors and its specifications. microphones and other instrumentation can be
Keywords: ATMEGA328, Air quality sensor, embedded in these devices to enable them for work in
Sound sensor, Blynk app. the Internet of Things. Home automation systems
I. INTRODUCTION already implement primitive versions of this concept for
things like light bulbs, plus other devices like wireless
The main objective of IOT Air & Sound Monitoring scales and wireless blood pressure monitors that each
System is that the Air and sound pollution is a growing represents early examples of IoT gadgets. System uses
issue these days. It is necessary to monitor air quality air sensors to sense presence of harmful gases/
324 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

compounds in the air and constantly transmit this data gases like NH3, CO, CO2 and SO2. The MQ135 is
to microcontroller. Also system keeps measuring sound used to measure the air quality of the atmosphere.
level and reports it to the online server over IOT. The Microphone sensor shows the noise value in dB. Flame
sensors interact with microcontroller which processes sensor is used to detect the presence of fire in our
this data and transmits it over internet. This allows surroundings. Here we proposed a system in which the
authorities to monitor air pollution in different areas and Arduino is the heart of the system. The atmospheric
take action against it. Also authorities can keep a watch condition is checking by the sensors all the time. When
on the noise pollution near schools, hospitals and no the sensed value reaches to the threshold point then
honking areas, and if system detects air quality and noise sensor gives that information to the Arduino. After that
issues it alerts authorities so they can take measures to Arduino check all sensor value. Arduino then process
control the issue. the values and gives the signal to the webpage. This
II. LITERATURE SURVEY system is based on the Arduino and all the processing
is takes place in Arduino only. Wi-Fi module is
Arushi Singh et al. have proposed a system which providing the network connection to the computer for
uses air and sound sensors to monitor the data sending the information to the public. This allows
constantly and then transmit the data. A raspberry pi authorities to monitor air pollution in different areas and
module interacts with the sensors and processes the act against it. Also, authorities can keep a watch on the
data thereby transmitting it to the application. noise pollution near schools, hospitals and no honking
Dr. A Sumithra et al. have proposed the concept of areas.
a smart city. Technology and communication is the basis METHODOLOGY & IMPLEMENTATION
of this smart city. Various sensors and modules have
also been used to monitor the various environmental The Atmega328 is a very popular microcontroller
parameters. This system uses air and sound sensors to chip produced by Atmel. It is an 8-bit microcontroller
monitor the data and then upload the data on the cloud that has 32K of flash memory, 1K of EEPROM, and
server as digital data. The cloud storage managers 2K of internal SRAM. The Atmega328 is one of the
analyze the data and notify accordingly. microcontroller chips that are used with the popular
Arduino boards. The Arduino board comes with either
SRM. ArthiShri et al. have proposed the idea of 1 of 2 microcontroller chips, the Atmega168 or the
monitoring the parameters using a PIC microcontroller Atmega328. Of these 2, the Atmega328 is the
which senses the atmosphere signals. Gas sensors are upgraded, more advanced chip. The Atmega328 has
used to measure the pollution level. This data is 28 pins.It has 14 digital I/O pins, of which 6 can be
uploaded on the internet and can also be viewed through used as PWM outputs and 6 analog input pins.
an app.
Seung Ho Kim et al. have designed a monitoring
system that uses an environmental parameter analyzer
and sends the results in a server through a LTE
communication network. The resulted data was
compared with the data obtained by the National
Ambient air quality Monitoring Information System
(NAMIS).
III. PROPOSED METHOD Fig 1: Block Diagram of Proposed Method

The sensor we are using here is MQ135,Flame Air quality sensor for detecting a wide gases,
sensor and Microphone sound sensor. Sensor MQ135 including NH3,NOx,alcohol,benzene,smoke and CO2.
is air quality sensor which is used to detect the harmful Idea for use in office or factory. MQ135 gas sensor
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 325
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

has high sensitivity toAmmonia,Sulfide and other harmful degree of on-chip integration allows for minimal external
gases.MQ135 alcohal sensor is a Sn02 with a lower circuitry, including the front-end module, is designed to
conductivity of clean sir.it is with low cost and occupy minimal PCB area. The ESP8266 supports
particularly suitable for Air quality monitoring APSD for VoIP applications and Bluetooth co-existance
applications. interfaces, it contains a self-calibrated RF allowing it to
work under all operating conditions, and requires no
external RF parts.
Node MCU is a low cost open source platform. It
initially included firmware which runs on the ESP8266
Wi-Fi SoC and hardware. The name "NodeMCU"
combines "node" and "MCU" (micro-controller
unit).The ESP8266 NodeMCU is a device, which
combines some features of the ordinary Arduino board
with the possibility of connecting to the internet.
The prototyping hardware typically used is a circuit
Fig 2.Interfacing of Air quality sensor board functioning as a dual in-line package (DIP) which
Sound detection sensor module detects the intensity integrates a USB controller with a smaller surface-
of the sound where sound is detected via a microphone mounted board containing the MCU and antenna.
and fed into an LM393 OP-AMP. It comprises an The design was initially based on the ESP-12 module
onboard. potentiometer to adjust that the set point of the ESP8266, which is a Wi-Fi SoC integrated with
for the sound level. The working principle of this sensor a Tensilica Xtensa core 32 bit RISC processor, widely
is related to human ears. Because human eye includes used in IoT applications.
a diaphragm is, it uses the vibrations and changes into
signals. Whereas in this sensor, it uses a microphone This RISC processor supports RTOS and operates
and the main function of this is, it uses the vibrations at 80MHz to 160 MHz adjustable clock frequency. Its
and changes into current otherwise voltage. The high processing power with in-built Wi-Fi / Bluetooth
ESP8266 WiFi Module is a self contained SOC with and Deep Sleep Operating features make it ideal for
integrated TCP/IP protocol stack that can give any IoT protocol.
microcontroller access to your WiFi network. The IV. EXPERIMENTAL RESULTS
ESP8266 is capable of either hosting an application or The proposed system was fully developed and tested
offloading all WiFi networking functions from another to demonstrate its feasibility and effectiveness. The
application processor. Each ESP8266 module comes Screenshots of the proposed work has been presented
pre-programmed with an AT command set firmware, in Figure below.
meaning, you can simply hook this up to your Arduino
device and get about as much WiFi-ability as a WiFi
Shield offers (and that's just out of the box)! The
ESP8266 module is an extremely cost effective board
with a huge, and ever growing, community.
This module has a powerful enough on-board
processing and storage capability that allows it to be
integrated with the sensors and other application specific
devices through its GPIOs with minimal development
Fig.4.Hardware component interconnection
up-front and minimal loading during runtime. Its high

326 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The output of this pollution monitoring device is REFERENCES


provided using a mobile application. The monitoring [1] Sai surya vamsi, "Iot Based Air pollution Monitoring
systems will be fitted at different locations in the city or system"Journal of Network Communications and Emerging
any area such as hospitals, highways, streets, parks, Technologies (JNCET) Volume 8, Issue 4, April (2018), pp. 1-5.

homes and malls, etc. Sensors continuously sense the [2] Arnab Kumar saha " A Raspberry Pi Controlled Cloud Based
Air and Sound Pollution Monitoring System"IEEE 8th Annual
level of air or sound or flame pollution and give the Computing and communication conference, January 2018.
results in blynk app.the indication will be given through
[3] Anjaiah Guthi, "Implementation of an Efficient Noise and Air
the device by a beep sound if the air pollution increases Pollution Monitoring System Using Internet of Things (IOT)",
from a certain value (decided by the programmer) in Vol. 5, Issue 7, July 2016
case of air pollution whereas the sound pollution and [4] L.Ezhilarasi, K.Sripriya, A .Suganya , K.Vinodhini "A system
flame is monitered with respective region. By using the for monitoring air and sound pollution using Arduino controller
with IOT technology" , vol 3 issue 2 (2017), march 23, 2017.
internet of the android phone user can check air,flame
and sound pollution level in that area. This application [5] K. V. N. Kavitha, A. Bagubali and L. Shalini, "V2v wireless
communication protocol for rear-end collision avoidance on
can be used to get the knowledge regarding pollution highways with stringent propagation delay", In Proceedings of
in a particular area, and then the common people can international conference on advances in recent technologies in
take relative measures accordingly and authorities can communication and computing ARTCom '09, pp. 661-663.
warn various industries about the level of pollution. [6] Dr. Siva yellampalli, "IOT Based Air and Noise Pollution
Monitoring in Urban and Rural Areas, Important Zones like
V. CONCLUSION Schools and Hospitals in Real Time" , Volume 1, Issue 5, May
2017
The proposed work is very helpful in the Present
[7] T. Hoppe, S. Kiltz, and J. Dittmann. ?Security threats to
situations for monitoring the Air and sound pollution as automotive CAN networks-practical examples and selected short-
it is one of the serious growing issues. In this work the term countermeasures,? InternationalConference on Computer
proposed air quality as well as sound pollution Safety, Reliability and Security, pages 235-248, Newcastle upon
Tyne, United Kingdom, Sep. 2008.
monitoring system allows us to monitor and check live
air quality as well as sound pollution in particular areas [8] B. Groza, S. Murvay, A. Van Herrewege, and I. Verbauwhede,
?LiBrA-CAN: a lightweight broadcast authentication protocol
through IOT (Internet of Things). The System uses air for Controller Area Networks,? International Conference on
sensors which detects (CO, LPG, and Methane) to Cryptology and Network Security, pp. 185-200, Darmstadt,
sense presence of harmful gases/compounds in the air Germany, Dec. 2012.

and constantly transmit this data to microcontroller. Also [9] Charles Birdsong, Ph.D., Peter Schuster, Ph.D., John Carlin,
Daniel Kawano, William Thompson,"Test Methods and Results
system keeps measuring sound level and reports it to for Sensors in a Pre-Crash Detection System"in California
the online server over IoT. Polytechnic State University, San Luis Obispo, California, Paper
Number 06AE-19.
The result and analysis of this practical experiment
[10].Global Status Report on Road safety 2013 by World Health
shows the expected output and guaranteeing the Organization (WHO).
detection of air and sound pollution and it supports a
cost effective system to provide modest, flexible and
compact system.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 327
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

An Attribute Based Encryption for Data Security in


Cloud Storage
Ms. A. N. Hemavathy1, Mr. G. Murali2, Ms. K. Swarna3, Mr. K. Ajith4
1,2,3,4
UG Student, Dept.of ECE, Vemu Institute of Technology, P.Kothakota
Email: anhemachowdary003@gmail.com1, kataswarna1999@gmail.com3

Abstract: Attribute-based encryption (ABE) can I. INTRODUCTION


be utilized to achieve both data security and fine-
grained access control in a cloud computing A commonly used solution in cloud security is
environment. However, we need to consider the encryption, such as attribute-based encryption (ABE).
risks of key abuse and key escrow in such a setting. ABE can, for example, be used to realize flexible access
Specifically, the former risk category includes the control of cloud data. Existing ABE-based approaches
illegal sharing of user's keys (i.e., user key abuse) can be further divided into key-policy ABE (KP-ABE)
and illegal key distribution by an authority (i.e., and cipher text- policy ABE (CP-ABE). In CP-ABE
authority key abuse), and the latter includes the approaches, the access policy is determined and
scenario where some cipher text is decrypted by embedded in the cipher text by the data owner, and a
the authority without the user's approval. Hence, private key is associated with the attributes of a data
in this article, we seek to address both key abuse
user. Such a scheme is particularly suitable for cloud-
and key escrow concerns when deploying ABE in
a cloud computing environment. In our
related applications. For example, the access policy
construction, two authorities [i.e., a key generation can be specified by enterprises or individuals, and used
center (KGC) and an attribute authority (AA)] to encrypt the outsourced data based on the attributes
participate in the generation of the user's secret owned by potential users. Only users whose attributes
key. Both KGC and AA will not know the full meet the access policy of cipher text can decrypt and
decryption key or have the capability to forge one. obtain the outsourced data successfully.
As a result, neither KGC nor AA can illegally
A. ATTRIBUTE BASED ENCRYPTION (ABE)
distribute the user's private key to unauthorized
users or decrypt user's cipher texts without the SCHEMES IN CLOUD
user's approval. In addition, in our scheme, any There have been a number of extensions to the basic
private keys modified by malicious users cannot CPABE schemes. For example, Lewko and Waters
be successfully used for decryption. In the event considered the property of a large universe and divided
that some user illegally shares his/her original ABE into ABE for the small universe (SU-ABE) and
private key, the scheme has in place a mechanism
ABE for the large universe (LU-ABE). In SU-ABE,
to trace the abused private key (since the user's
identity information is embedded in the private
the attribute universe of the system is required to be
key). Hence, our scheme supports public determined when the public parameters are established
traceability, key abuse, and key escrow. In addition, and no additional attribute can be added, while in LU-
our scheme is based on prime order bilinear groups, ABE, the available attributes are "infinite" (super
and is shown to be selectively secure in the polynomial size) and new attributes can be added any
standard model. time.
Index Terms - Accountability, attribution-based While there are many different CP-ABE schemes
encryption, cloud storage, key abuse, key escrow, proposed in the literature, key abuse and key escrow
large universe, public traceability, selectively remain two challenging issues. Key abuse can be further
security. divided into two categories, namely, user key abuse
and authority key abuse. In the former category, users
328 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

illegally share their own keys, and in the latter category, and Waters enlarges the practical applications by
a malicious attribute authority (AA) illegally redistributes supporting flexible number of attributes. Several systems
users' private keys to unauthorized users. In the have been proposed to obtain either of the above
conventional CP-ABE scheme, an individual user's properties. However, none of them achieve the two
private key is only associated with an attribute set. properties simultaneously in practice, which limits the
Therefore, different users with the same attribute subset commercial applications of CP-ABE to a certain extent.
may have the same decryption key. When an abused In this paper, we propose a practical large universe
private key is found, it is hard to determine the true CP-ABE system supporting white-box traceability,
owner of the abused key. This enables a dishonest user which is suitable for commercial applications.
to share his/her own key without the risk of being caught. Compared to existing systems, our new system has three
On the other hand, as the private keys of all users in the advantages: (1) The number of attributes is not
system are generated and distributed by a trusted AA, polynomially bounded; (2) Malicious users who leak
it enables AA to redistribute the keys of legitimate users their decryption keys could be traced; and, (3) The
in the system to unauthorized users with minimal risk. storage overhead for traitor tracing is constant. We also
For key escrow, a malicious AA may also use the user's prove the selective security of our new system in the
private key to illegally decrypt the cipher texts instead standard model under "q-type" assumption
of redistributing it; thus, infringing on data privacy. In a 2. Zhang Y, Zheng D, Deng R H. Security and privacy
single-authority CP- ABE scheme, the key escrow in smart health: Efficient policy- hiding attribute-based
problem is inevitable and a practical CP-ABE scheme access control[J]. IEEE Internet of Things Journal,
should reduce the trust on AA. A direct solution to 2018.
mitigate key escrow is to use multiauthority to remove
With the rapid development of the Internet of Things
the trust in a single authority.
(IoT) and cloud computing technologies, smart health
II. LITERATURE REVIEW (s-health) is expected to significantly improve the quality
1. JiantingNing, ZhenfuCao,Xiaolei Dong, of health care. However, data security and user privacy
LifeiWeiAndXiaodong Lin - Large Universe Cipher concerns in s-health have not been adequately
text-Policy Attribute-Based Encryption with White- addressed. As a well-received solution to realize fine-
Box Traceability - 2014. grained access control, cipher text-policy attribute-
A Cipher text-Policy Attribute-Based Encryption based encryption (CP-ABE) has the potential to ensure
(CP-ABE) system extracts the decryption keys over data security in s-health. Nevertheless, direct adoption
attributes shared by multiple users. It brings plenty of of the traditional CP-ABE in s-health suffers two flaws.
advantages in ABE applications. CP-ABE enables fine- For one thing, access policies are in clear text form and
grained access control to the encrypted data for reveal sensitive health-related information in the
commercial applications. There has been significant encrypted s-health records (SHRs). For another, it
progress in CP-ABE over the recent years because of usually supports small attribute universe, which places
two properties called traceability and large universe, an undesirable limitation on practical deployments of
greatly enriching the commercial applications of CP- CP-ABE because the size of its public parameters grows
ABE. Traceability is the ability of ABE to track the linearly with the size of the universe. To address these
malicious users or traitors who intentionally leak the problems, we introduce PASH, a privacy-aware s-
partial or modified decryption keys to others for profits. health access control system, in which the key ingredient
Nevertheless, due to the nature of CP-ABE, it is difficult is a large universe CP-ABE with access policies partially
to identify the original key owner from an exposed key hidden. In PASH, attribute values of access policies
since the decryption privilege is shared by multiple users are hidden in encrypted SHRs and only attribute names
who have the same attributes. On the other hand, the are revealed. In fact, attribute values carry much more
property of large universe in ABE proposed by Lewko sensitive information than generic attribute names.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 329
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Particularly, PASH realizes an efficient SHR decryption decrypt and obtain the outsourced data successfully.
test which needs a small number of bilinear pairings. There have been a number of extensions to the basic
The attribute universe can be exponentially large and CPABE schemes. For example, Lewko and Waters
the size of public parameters is small and constant. Our considered the property of a large universe and divided
security analysis indicates that PASH is fully secure in ABE into ABE for the small universe (SU-ABE) and
the standard model. Performance comparisons and ABE for the large universe (LU-ABE). In SU-ABE,
experimental results show that PASH is more efficient the attribute universe of the system is required to be
and expressive than previous schemes.. determined when the public parameters are established
III. EXISTING METHOD and no additional attribute can be added, while in LU-
ABE, the available attributes are "infinite" (super
Attribute based encryption(ABE) is a new polynomial size) and new attributes can be added any
cryptographic primitive which provides a promising tool time..
for addressing the problem of secure and fine grained
data sharing and decentralized access control. Existing IV. PROPOSED METHOD
ABE-based approaches can be further divided into key- CIPHERTEXT
policy ABE (KP-ABE) and cipher text-policy ABE Ciphertext is also known as encrypted or encoded
(CP-ABE). information because it contains a form of the original
KEY BASED ATTRIBUTE BASED plaintext that is unreadable by a human or computer
ENCRYPTION without the proper cipher to decrypt it. Decryption,
Key-policy attribute-based encryption (KP-ABE) the inverse of encryption, is the process of turning
is an important class of ABE, where cipher texts are ciphertext into readable plaintext.
labeled with sets of attributes and private keys are ADVANCED ENCRYPTION STANDARD
associated with access structures that control which (AES)
cipher texts a user is able to decrypt. KP-ABE has The algorithm described by AES is a symmetric-
important applications in data sharing on un trusted key algorithm, meaning the same key is used for both
cloud storage. However, the cipher text size grows encrypting and decrypting the data. The Advanced
linearly with the number of attributes embedded in cipher Encryption Standard (AES) is a symmetric block cipher
text in most existing KP-ABE schemes. In this paper, chosen by the U.S. government to protect classified
we describe our work on designing a KP-ABE scheme information. AES is implemented in software and
with constant size cipher text for monotonic access hardware throughout the world to encrypt sensitive data.
structures. The downside of the proposed KP-ABE It is essential for government computer security, cyber
scheme is that private keys have multiple size growth in security and electronic data protection. Symmetric, also
the number of attributes in the access structure. The known as secret key, ciphers use the same key for
proposed KP- ABE scheme is proved to be secure encrypting and decrypting, so the sender and the
under the general Diffie-Hellman exponent assumption. receiver must both know and use the same secret key.
In CP-ABE approaches, the access policy is The government classifies information in three
determined and embedded in the cipher text by the data categories: Confidential, Secret or Top Secret. All key
owner, and a private key is associated with the attributes lengths can be used to protect the Confidential and
of a data user. Such a scheme is particularly suitable Secret level. Top Secret information requires either
for cloud-related applications. For example, the access 192- or 256-bit key lengths.
policy can be specified by enterprises or individuals, The AES algorithm (also known as the Rijndael
and used to encrypt the outsourced data based on the algorithm) is a symmetrical block cipher algorithm that
attributes owned by potential users. Only users whose takes plain text in blocks of 128 bits and converts them
attributes meet the access policy of cipher text can
330 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

to cipher text using keys of 128, 192, and 256 bits. Third Party Audit: • Login their correct user name
Since the AES algorithm is considered secure, it is in and password. • View all Data User and authorized
the worldwide standard. them. • View user request to Check the Integrity
The AES includes: Auditing • Logout

• Symmetric key symmetric block cipher Key Generation Center : • Login their correct
user name and password.(KGC) •View all upload File.
• 128 bit data, 128/192/256 bit keys o View all Data User Request details then, send the
• Stronger and faster than Triple-DES Private key user mail id • Logout
• Provide full specification and design details Cloud Server: •View all registered Data Users. •
• Software implementable in C and Java.. View all Searchable History details. • View all Integrity
check Request details. • Result- Generate the result
V. SYSTEM ARCHITECTURE based on the file request counts. • No. of. Download
file:- calculate the number of download file to the cloud.
• Logout
Attacker: • Login •View all Upload file & Attacker
them. •Logout.
VI. RESULTS

Fig.1 Architecture of Proposed Sytem.

Module Description Fig.1.: input image Fig.2.: File uploaded for encryption

In this project have 5 modules:


• Data user
• TPA
• KGC
• Cloud Server Fig.3.: Algorithm Based Fig.4.: Encryption for Given Image
Ciphertext
• Attacker
DATA USER: • Register their own details.•
Authorized the AAAfter login, Login their correct user
name and password. • Upload the files to the cloud in
encrypted format with file private and trapdoor key by
using fuzzy logic for key generation for encryption &
decryption. • Manage the file. • Search Files: User can
search file with Encrypted format, then sends the request
to the key Generator Center. • View Request Status Fig.5.: Trapdoor Key
Waiting or Accept. • Download Files by using the file
VII. CONCLUSION
private key, user can download the files in decrypted
format. • Logout Login • View all Upload file & The proposed scheme an efficient large universe
Attacker them. •Logout. cipher text policy attribute-based encryption with public
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 331
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

traceability (LU-CPABE-PT) for cloud storage REFERENCES


deployment. The results showed that the large universe [1] Li J, Yu Q, Zhang Y, et al. Key-policy attribute-based encryption
attribute-based encryption is key abuse and key escrow against continual auxiliary input leakage[J]. Information Sciences,
resilience. Specifically, it allows two authorities key 2019, 470: 175-188.

generation center (KGC) and attribute authority (AA) [2] Wang S, Guo K, Zhang Y. Traceable ciphertext-policy attribute-
based encryption scheme with attribute level user revocation for
to collaboratively generate the private keys of system cloud storage[J]. PloS one, 2018, 13(9): e0203225.
users. Since neither KGC nor AA knows the final
[3] Zhang Y, Zheng D, Deng R H. Security and privacy in smart
private keys of users and is not able to forge a valid health: Efficient policy-hiding attribute-based access control[J].
private key, the key generation center and attribute IEEE Internet of Things Journal, 2018, 5(3): 2130-2145.
authority is not capable of illegally distributing the users [4] Lewko A, Waters B. Unbounded HIBE and attribute based
private keys to unauthorized users or decrypting the encryption[C]//Annual International Conference on the Theory
and Applications of Cryptographic Techniques. Springer, Berlin,
users cipher texts without the users authorization. We Heidelberg, 2011: 547-567.
also showed that LU-CPABE supports public
[5] Lai J, Deng R H, Li Y. Expressive CP-ABE with partially hidden
traceability, which in turn implies user key abuse access structures[J]. 2012.
resilience. In addition, we evaluated the performance
[6] Li J, Shi Y, Zhang Y. Searchable ciphertext policy attribute based
and security of the proposed scheme. The experimental encryption with revocation in cloud storage[J]. International
results show that the large universe cipher text policy Journal of Communication Systems 2017, 30(1): e2942.
attribute-based encryption is selectively secure under [7] Jiang Y, Susilo W, Mu Y, et al. Ciphertext-policy attribute-based
the decisional q-parallel BDHE assumption in the encryption against key- delegation abuse in fog computing[J].
Future Generation Computer Systems, 2018, 78: 720-729.
standard mode. It also supports multiple authorities,
large attribute domains and access policy updates. [8] Premkamal P K, Pasupuleti S K, Alphonse P J A. A new verifiable
outsourced ciphertext- policy attribute based encryption for big
Considering all the features the proposed scheme is data privacy and access control in cloud[J]. Journal of Ambient
static and traceable secure based on the state-of-the- Intelligence and Humanized Computing, 2019, 10(7): 2693-2707.
art security models. [9] Wang Q, Peng L, Xiong H, et al. Ciphertext-policy attribute-
based encryption with delegated equality test in cloud
computing[J]. IEEE Access, 2017, 6: 760-771.
[10]Ning J, Cao Z, Dong X, et al. Auditable ?-Time Outsourced
Attribute-Based Encryption for Access Control in Cloud
Computing[J]. IEEE Transactions on Information Forensics and
Security, 2017, 13(1): 94-105.

332 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Lossless Hyperspectral Image Compression Based on


Reversible Integer of TDLT and KLT
M. Renu Babu1, G. Chenna Keshava Reddy2
1,2
Associate Professor, ECE Department, TKR Engineering College, JNTUH, Meerpet, Hyderabad, Telangana, India
Email: renubabum@tkrec.ac.in1, gckreddy2001@gmail.com2

Abstract: We proposed a new transform scheme scalable coding, most of the state-of-the-art
of multiplier less reversible time-domain lapped compression methods adopt 3-D discrete wavelet
transform and KL transform for lossy-to-lossless transform (DWT) [1]-[3] or DWT/Karhunen-Loève
hyperspectral image compression. Instead of transform (KLT) [4]-[6], where 9/7 floating-point filter
applying discrete wavelet transform (DWT) in the
is al-ways used for decorrelation in lossy compression.
spatial domain, RTDLT is applied for decorrelation.
RTDLT can be achieved by existing discrete cosine
Lossless compression schemes include methods based
transform and pre- and postfilters, while the on vector quantization, prediction, integer transform,
reversible transform is guaranteed by a matrix and so on. Although prediction-based methods perform
factorization method. In the spectral direction, well, they do not have the ability of realizing progressive
reversible integer low complexity KLT is used for lossy-to-lossless compression which is owned by
decorrelation. Owing to completely reversible transform-based method [9] proposed the lifting
transform, the proposed method can realize scheme for the realization of wavelet transforms (WTs).
progressive lossy-to-lossless compression from a Bilgin et al. [10] introduced reversible integer WT in
single embedded code-stream file. Numerical the application of 3-D image compression. Xiong et al.
experiments on benchmark images show that the applied 3-D integer WT in medical image compression
proposed transform scheme performs better than
and pointed out that the transform has to be unitary to
5/3DWT-based methods in both lossy and lossless
compressions, comparable with the optimal 9/
achieve good lossy coding performance. Some
7DWT Float KLT based lossy compression researchers have studied integer KLT for spectral
method. decorrelation. Hao and Shi proposed reversible integer
KLT, and Galli and Salzo improved it. However, in
Index Terms: Hypersectral image compression,
spatial domain, integer WTs are still applied as common
integer transform, Karhunen Loève transform ,
lossy-to-lossless compression, time-domain lapped methods. A drawback of a wavelet- based compression
transform, DCT. method is that 5/3DWT is usually applied instead of 9/
7DWT in lossy-to-lossless compression schemes, and
I. INTRODUCTION this will lead to performance degradation. Another
Hyperspectral images have wide applications nowa- disad- vantage of DWT is that it cannot compete with
days such as in atmospheric detecting, remote sensing, DCT due to the constraint of CPU and computer
military affairs, and so on. However, the volume of memory, particularly in real- time and low-complexity
hyperspec- tral image is so large that a 16-bit AVIRIS applications, because the computing complexity of WT
image with size of 512  512  224 will occupy 112 increases exponentially when the image size increases.
MB. Therefore, efficient compression algorithms are DCT has its own special advantages such as low
required to reduce the cost of equipment storage or memory cost, flexibility at block-by-block level, parallel
bandwidth. processing, etc. Tran et al. have designed pre- and
Lossy-to-lossless compression will be of great postfilters to improve the performance of DCT and
importance in telemedicine and satellite communications called the combination as time- domain lapped
for legal reasons or research requirements. To realize transform (TDLT). The rationale behind this method is
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 333
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

that, within the filtered block, the pixels are as A. Multiplierless Multilifting Based on Matrix
homogenous as possible, and this will be helpful for Factorization
improving transform efficiency. Although TDLT Based on matrix factorization theory, a nonsingular
performs even better than DWT does in the energy matrix can be factorized into a product of at most three
compatibility and lossy compression, it does not perform trian- gular elementary reversible matrices (TERMs).
well in the lossless compression where the reversible If the diagonal elements of the TERM are equal to one,
transform is required. In fact, for hyperspectral image the TERM can real- ize reversible integer-to-integer
compression, completely reversible transform method transform by multilifting. We should notice that the
is always required to realize lossy-to-lossless coding. factorization is not unique because there are other
In this letter, we take a practical and innovative different factorizations that affect the error between the
approach to replace integer WT with integer reversible integer approximation transform and the original
TDLT (RTDLT) in the spatial domain, and the RTDLT transform. Those factorizations will further affect the
is realized by the improved matrix factorization method. intrinsic energy- compacting capability of DCT, so the
RTDLT can realize integer re- versible transform, and error should be reduced as much as possible. Quasi-
hence, we adopted a progressive lossy- to-lossless complete pivoting is suggested in the progress of matrix
hyperspectral image compression method based on factorization [12]. In our experiments, we found that
RTDLT and reversible KLT (RKLT). Block this method was very effective in reducing the error
transforming coeffi- cients in the spatial domain would and enhancing the stability and hence achieved better
be reorganized into subband integer approximation to the original floating-point
transform. We have proposed an efficient 2-D image
coding method using reversible DCT with the help of
improved matrix factorization method.
Fig. 1. Forward and inverse multilifting method. (a) Forward Based on the aforementioned theory, it can also be
multilifting. (b) Inverse multilifting. proved that matrix A has a unit TERM factorization of
structure so as to be coded by wavelet-based coding A = PLUS, if and only if | det A| = | det P| = 1, where
methods. In addition, an improved 3-D embedded zero- L and S are lower triangular matrices, U is the upper
block coding method used to code transformed triangular matrix, and P is the permutation matrix.
coefficients is also integrated in this letter. The proposed In this letter, multilifting is used for TERM to realize
method retains the character of scal-ability in re- versible integer transform, an extension of traditional
reconstruction quality and spatial resolution, so at the dual lifting. In our proposed method, 4-stage, 8-stage,
show that the proposed method performs well in both and 16-stage lifting are used. For example, four-point
lossy and lossless compressions. To reduce complexity, reversible integer-to- integer transform Y = UX and its
our proposed method is implemented using shift and inverse transform, where U is an upper triangular matrix
addition without any multiplier with the help of multilifting. of size four, can be realized as (2), and the multilifting
II. RTDLT/RKLT implementation is shown in Fig. 1.
In the proposed method, RTDLT and RKLT are ? y0 ?
used for decorrelation in the spatial domain and spectral
direction, respectively. We will make a brief introduction
about how to re- alize reversible integer transform by The forward integer transform and its inversion
multiplierless multilifting based on matrix factorization y0 = x0 + ×u01x1 + u02x2 + u03x3|
and then present the design of multiplierless RTDLT/
y1 = x1 + ×u12x2 + u13x3|
RKLT.
y2 = x2 + ×u23x3|

334 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

y3 = x3 Prefiltering acts as flatting operation on two


x3 = y3 neighboring blocks, after which the pixels in one block
are as homogeneous as possible and as a result of better
x2 = y2 - ×u23x3| energy concentricity. Before transforming, the filtering
x1 = y1 - ×u12x2 + u13x3| and DCT matrices are factorized into TERMs, and one
of the characters of TERM is that it can realize complete
x0 = y0 - ×u01x1 + u02x2 + u03x3| (2)
reversible integer-to-integer transform, while the integer
B. Design of Multiplierless RTDLT/KLT transform approximates its floating transform very well.
KLT is the most efficient linear transform in the sense Hence, RTDLT adapts better to block transform while
of energy compaction. The transform matrix can be it can realize reversible integer transform.
obtained by calculating the eigenvectors of the According to our proposal, KLT and DCT matrices,
covariance of the input data. To reduce the high as well as the pre- and postfilters, are all realized by
computation complexity, low-complexity KLT (Low- multiplierless multilifting based on matrix factorization.
RKLT) has been proposed by Penna et al. [6]. In our Now, we take the prefilter, for example, to illustrate
proposed method, integer reversible Low-RKLT is how to realize this method. The general formula of
designed for decorrelation in the spectral direction. The prefilter can be defined as
evaluation of the covariance matrix is simplified by
F=1I J I 0 I J (4)
sampling the input signal vectors. In our experiments,
100 : 1 is applied in the sampling process. As illustrated where I and J are identity matrix and reversal identity
in [6], the performance of Low-RKLT is very similar matrix, respectively. V is the free control matrix.
to the full-complexity RKLT but reduced the com- VTDLT = J (CM/2 II)T DcCM/2IV J, where CM/2 II and
putation complexity significantly. The computation CM/2IV Stand for M/2 point type-II and type-IV DCT
comparison will be given in Section IV. matrix, respectively; DS = diag s, 1,..., 1 is a diagonal
DCT is widely used for decorrelation in the spatial matrix where s is a scaling factor. It should be pointed
domain because of its special advantages such as low out that the determinant of the filter matrix F is not equal
memory cost, parallel processing capability, flexible on to one and should be modified to satisfy det F =1 before
block level, etc. The forward DCT is defined as follows: factorizing TDLT, and then, the filter matrix F can be
factorized as follows. AF = PF LF UF SF, where PF is
the permutation matrix and LF, UF, and SF are triangu
(3) lar TERMs whose diagonal elements are equal to one.
In the conventional algorithms based on DCT, Thus, the four-point filter can be realized y multilifting
images are always divided into blocks with the size of as shown in Fig. 2. Integer approximation of the floating-
8 8. As a result, these algorithms are less of consideration point transform can be achieved if rounding operations
about the interblock correlations, and therefore, are added just as (1). Reversible integer KLT and TDLT
blocking artifacts-results of dif- ferent quantization are realized in the same way. The integer transform can
between neighboring blocks-always affect the be realized by shifting and adding only without any
compression performance. In this situation, we multiplier if the floating-point lifting coefficients are
improved the pre- and postfilters designed by Tran et replaced by fractions, whose dominators are power of
al. to overcome these defects. In our experiments, eight- two. For example, 75/256 = 1/4 + 1/32 + 1/64 + 1/
point pre- and postfil- ters and eight-point DCT are 256, while 1/4, 1/32, 1/64, and 1/256 can be realized
used, because this proved to be the best performance- by shifting only. Multilifting coefficients of matrices L,
complexity tradeoff. U, and S decomposed from the four-point filter have
been tabulated in Table I. Experimental results show
that the multiplierless and multilifting-based filter

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 335
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

approximates the floating-point filter very well. Further Fig. 4(a)-(c) shows the 38th band of Jasper Ridge,
experiments about the efficiency of multilifting based the 180th band of Cuprite, and the 180th band of Lunar
on RTDLT/RKLT when applied in lossy-to-lossless Lake, respectively. Lossless compression performance
image compression will be discussed in the next section. is compared in Table II, where two coding methods-
3DSPECK and JPEG2000- MC-have been adopted,
and transforms include asym- metric 3D-5/3DWT
(A3D-5/3DWT), 5/3DWT+RKLT, and
RTDLT+RKLT. Based on the same codec-
3DSPECK, we can see that our proposed RTDLT/
Fig. 2. Four-point filter implemented by multilifting.
RKLT performs 7.35%-8.6% better than 3-D DWT
TABLE I
and comparable to 5/3DWT+RKLT. We also
TRIANGULAR TERM MATRICES WITH DYADIC
COEFFICIENTS
compared the performance of M-CALIC [22] which
is mainly based on predicting techniques.

III. EXPERIMENTAL RESULTS AND


DISCUSSIONS
A progressive hyperspectral image compression
method is designed based on RKLT and RTDLT, with Fig. 4. Original AVRIS images. (a) Jasper Ridge, 38 th band. (b)
Cuprite, 180 th band. (c) Lunar Lake, 180 th band.
higher compression ratio and better rate distortion (RD)
TABLE II
performance compared with 3-D-DWT-based method.
LOSSLESS COMPRESSION PERFORMANCE
The flow graph has been shown in Fig. 3. In the spatial COMPARISON (IN BITS PER PIXEL PER BAND)
domain, two-level RTDLT and five-level WT are
adopted separately. Moreover, RTDLT transform
coefficients are reorganized into tree-structure so as to
be coded by wavelet-based methods. In the coding
method, 3DSPECK algorithm [19] and JPEG2000-
MC [20] have been applied. Lossy compression performance is given in Table
III. In our experiments, the performances of four-type
AVIRIS hyperspectral images, "Jasper Ridge" (scene transforms combined with 3DSPECK are compared
1), "Cuprite" (scene 3), and "Lunar Lake" (scene 2) at different bit rates, where 3DSPECK is carried with
(spatially cropped to 512 512 208 bands), are used in QccPack Version 0.56 .It can be seen that our
our experiments to test the performance of different proposed RTDLT/RKLT consistently outperforms
algorithms. The test images are coded with 16 bands a asymmetric 3D-9/7DWT by a large margin (up to 4.97
group, so for the entire image, 208 bands are divided dB), combined with the same coding method. In
into 13 groups. addition, it also obtains a gain of 0.42-0.67 dB
compared with 5/3DWT+RKLT. Although the
proposed method performs not as well as 9/
7DWT+FloatKLT, it is capable of complete reversible
transform, while the latter cannot.

Fig. 3. Flow graph of the proposed compression scheme.

336 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

TABLE III method performs well in both lossy and lossless


LOSSY COMPRESSION, SNR COMPARISON (IN hyperspectral image compression. Among conventional
DECIBELS)
transforms based on integer wavelet (i.e., 5/3 DWT),
the nonunitary transform can obtain the bestperformance
of lossless compression but will decrease the per-
formance of lossy compression. Therefore, from a single
loss- less codestream, the decoder cannot obtain such
good results shown in Table III. However, we do not
need to consider unitary problem by using uniform
RTDLT framework to obtain embed- ded and high
efficient lossy-to-lossless coding performance.
TABLE IV
COMPUTATIONAL TIME COMPARISON (IN SECONDS)

r
Fig. 6. Hardware implementation complexity of different
transforms.(a) Multiplication. (b) Addition.

IV. COMPUTATION COMPLEXITY


Transforms used in our experiments include RTDLT,
KLT, and WTs. First, we will have a computation
comparison between the Low-RKLT and full-
complexity KLT. The covariance computational time
of KLT, as well as the spectral-transform time, has been
Fig. 5. RD Performance of different transform schemes
given in Table IV. From the table, we can see that Low-
combined with the same codec-3DSPECK. (a) Jasper ridge. (b) RKLT has reduced the computational time of full-
Cuprite.
complexity KLT significantly. Second, we perform a
Fig. 5 shows the RD performance of different computa- tion complexity analysis about RTDLT, 5/3-
transform schemes using the same codec-3DSPECK. WT, and 9/7-WT. Parallel implementations can be used
From the aforementioned experimental results, we in the hardware realization, and in this case, RTDLT is
can draw the conclusion that the proposed compression much more efficient than 5/3-WT and 9/7-WT, because

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 337
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

of its block transform characteristics. Hardware [3] P. L. Dragotti, G. Poggi, and A. R. P. Ragozini, "Compression of
mul- tispectral images by three-dimensional SPIHT algorithm,"
implementation complexity has been shown in Fig. 6. IEEE Trans. Geosci. Remote Sens., vol. 38, no. 1, pp. 416-428,
V. CONCLUSION Jan. 2000.
[4] B. Penna, T. Tillo, E. Magli, and G. Olmo, "Transform coding
In this paper, we present a new transform scheme techniques for lossy hyperspectral data compression," IEEE
of RTDLT/RKLT for the compression of hyperspectral Trans. Geosci. Remote Sens., vol. 45, no. 5, pp. 1408-1421,
images with a performance that is competitive or even May 2007.

superior to that of state-of-the-art conventional [5] B. Penna, T. Tillo, E. Magli, and G. Olmo, "Progressive 3-D
coding of hyperspectral images based on JPEG 2000," IEEE
transform-based techniques. The proposed scheme can Geosci. Remote Sens. Lett., vol. 3, no. 1, pp. 125-129, Jan.
realize reversible integer-to-integer transform, and so, 2006.
it can be applied in progressive lossy-to- lossless [6] W. Sweldens, "The lifting scheme: A construction of second
compression combined with zero-block-based bit- generation wavelet," SIAM J. Math. Anal., vol. 29, no. 2, pp.
plane coders. The new transforming scheme has some 511-546, 1997.

advantages such as multiplierless computing, flexibility [7] I. Daubechies and W. Sweldens, "Factoring wavelet transforms
into lifting steps," J. Fourier Anal. Appl., vol. 4, no. 3, pp. 247-
in processing, par- allel implementation, and so on. 269, May 1998.
Moreover, it also preserves
[8] A. Bilgin, G. Zweig, and M. W. Marcellin, "Three-dimensional
REFERENCES image compression using integer wavelet transforms," Appl. Opt.:
Inf. Process., vol. 39, no. 11, pp. 1799-1814, Apr. 2000.
[1] X. Tang, W. A. Pearlman, and J. W. Modestino, "Hyperspectral
im- age compression using three-dimensional wavelet coding," [9] Z. Xiong, X. Wu, S. Cheng, and J. Hua, "Lossy-to-lossless
Proc. SPIE, vol. 5022, pp. 1037-1047, 2003. compression of medical volumetric data using three-dimensional
integer wavelet trans- forms," IEEE Trans. Med. Imag., vol. 22,
[2] Q. Du and J. E. Fowler, "Hyperspectral image compression using no. 3, pp. 459-470, Mar. 2003.
JPEG2000 and principal component analysis," IEEE Geosci.
Remote Sens. Lett., vol. 4, no. 2, pp. 201-205, Apr. 2007. [10]P. Hao and Q. Shi, "Reversible integer KLT for progressive-to-
lossless compression of multiple component images," in Proc.
IEEE ICIP, Barcelona, Spain, 2003, pp. I-633-I-636.

338 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

An Application of Red Sandalwood Protection Using


Rasberry Pi
Y. Mahesh1, Y.Murali2
1
Dept.of ECE, Vemu Institute of Technology, Chittoor
2
Dept.of ECE, Siddharth Institute of Engineering & Technology, Puttur
Email: phdmahesh@gmail.com1, muraliy85@gmail.com2

Abstract papers about pirating of the tress. These trees are all
Background and Objective: This research around exorbitant. These are for the most part helpful
article has proposed that to find the smuggling in the therapeutic sciences just as beautifying agents.
activities in the thick forest area. Our life is Because of huge amount of money involved in selling
dependent upon trees. There is a long association of such tree woods and lots of incidents are happening
of man and trees. Since the hoary past man and of cutting of tree and their smuggling. This issue isn't
trees have been the two major creations of Nature. identified with India just, in China, Australia and African
In his prehistoric days man turned to trees and nations are additionally battling with same issues. Placing
plants to collect the things vitally necessary for his cost at the top of the priority list, Indian sandalwood
existence. Since that time man and trees have been
costs 12000 to 13000 INR for every kg though in global
interdependent, though man is more indebted to
market Red Sanders order a high cost of INR 10 center
trees. Amongst the variety of flora available on the
planet, "SANDALWOOD" is one of the most costly for every ton. The Indian sandalwood tree has turned
as well as less available trees. They are useful in out to be jeopardized as of late, and trying to control
medical sciences and cosmetics. From the past few its conceivable eradication the Indian government is
years, we are finding that the newspapers and news attempting to restrict the exportation of sandalwood.
channels are frequently filled with news regarding For an individual, most extreme passable buy limit isn't
the smuggling activities. Since they are costly, to surpass 3.8kg according to Govt. The tree is as of
smugglers allegedly cut down many of these trees now government controlled, and evacuation is
and transport them to their factories for commercial disallowed whether on private or sanctuary grounds
purposes. until the tree is thirty years of age. But even though
Methodology: Anti-smuggling system is a some corner of newspaper shows us the same title.
measure that has been taken to stop these
2. SYSTEM IMPLEMENTATION
smuggling activities using GSM module and Metal
Detector sensor, IR Sensor, MEMS Sensor. All Embedded system includes mainly two sections, they
these modules are interfaced with Raspberry pi. are
Keywords: Raspberry pi 3, GSM module and 1. Hardware
MEMS Sensor.
2. Software
1. INTRODUCTION Embedded System Hardware:
Forests constitute approximately 30 % of the global As with any electronic system, an embedded system
land area. They give natural surroundings to the two requires a hardware platform on which it performs the
people and a few animal types that share the profitable operation. Embedded system hardware is built with a
environment's merchandise. Dealing with woodland has microprocessor or microcontroller. The embedded
turned into an amazingly hard undertaking. Illicit logging system hardware has elements like input output (I/O)
speaks to one of the greatest difficulties of woods interfaces, user interface, memory and the display.
maintainability. For a long time we are perusing in the Usually, an embedded system consists of:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 339
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

1. Microprocessor
2. Microcontroller
3. Digital signal processor
Microprocessor
CPU on a chip.
We can attach required amount of ROM, RAM and
I/O ports.
Expensive due to external peripherals.
Microcontroller
Computer on a chip
fixed amount of on-chip ROM, RAM, I/O ports
Power Low cost.

Supply Embedded System Software:

Processor The embedded system software is written to perform


a specific function. It is typically written in a high level
Memory format and then compiled down to provide code that
Timers can be lodged within a non-volatile memory within the
hardware. An embedded system software is designed
Serial communication ports to keep in view of the three limits:
Output/Output circuits Availability of system memory
System application specific circuits Availability of processor's speed
Embedded systems use different processors for its When the system runs continuously, there is a need
desired operation. Some of the processors used are to limit power dissipation for events like stop, run and
wake up.
Implementation flow:
Stage 1:
Considering the problems of existing methods and
giving solution to that problem by considering the basic
requirements for our proposed system
Stage 2:
Considering the hardware requirement for the
proposed system
For this we need to select the below components:
1. Microcontroller
2. Inputs for the proposed system (ex: sensors, drivers
etc..,)
Figure 2: Block diagram of embedded system 3. Outputs (ex: relays, loads)

340 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Stage 3: is inbuilt in Raspberry Pi. The server sends the data to


After considering hardware requirements, now we web app provided to Govt. officials to keep the track
need to check out the software requirements. Based of it. In addition with sending the data to nearest base
on the microcontroller we select there exists different station the information will also be sent the Web app.
software for coding, compiling, debugging. we need to WORKING:
write source code for that proposed system based on • Every tree will be armed with one small electronics
our requirements and compile, debug the code in that unit which consists of Micro Controller, Mems
software . Accelerometer Sensor, PIR sensor, metal detector
After completing all the requirements of software and IOT modem Interfaced with Raspberry Pi
and hardware we need to bring both together to work module.
our system. For this we need to burn our source code • Tree cutting will be noticed by Server unit, cutting
into microcontroller, after burning our source code to trees will be shown in Data base communication
microcontroller then connect all input and output among the trees and server will be done by IOT
modules as per our requirement. modem.

BLOCK DIAGRAM OF THE PROPOSED • It alerts the near by control room that the tree getting
SYSTEM: smuggled.
In case of failure or any disturbance occurred to the
system the alert will be sent to control system The fig
shows the flow diagram for proposed system illustrates
that sensing module is divided into three streams
1) Metal detection
2) Motion detection.
1. Starts the process and sense the sensor inputs If the
Metal is detected (Metal Detector sensor) then it
fetches the geographical location (latitude and
longitude) using GPS tracker. Then sends the alert to
forest officials in the form of text message to their
mobile phones and captured images to Gmail. It also
updated in the IOT cloud server webpage for every
30 seconds.
2. If motion is detected (PIR sensor) then it works on
The above figure shows the block diagram ofthe the next step. It reports the tree status and also checks
project mainly consists of three blocks a tree block, a whether there is a vibration on the tree.
server and controlling data base block and web App
as shown in the block diagram. The tree block is Now with the exact geo location it sends the message
connected to all the trees where it is having a centralized alert to the mobile phone and also Captured images to
microprocessor interfaced with a Mems sensor on the Gmail and updates the data in the IOT webpage.
body of a tree.When Whenever anybody tries to cut 3. CONCLUSION
the tree then the sensor senses the variation and sends The purpose of this is to save valuable trees which
the information to processor. have high demand in market like Sagwaan, Sandalwood
Upon receiving the signal the processor track the etc. These trees are very costly as well as less available
location of that tree and the predefined ID number and in the world. These are use in the medical sciences as
send the information to server using IOT modem which well as cosmetics. Because of huge amount of money
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 341
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

involved in selling of such tree woods lots of incidents 4. REFERENCES


are happening of cutting of trees and their smuggling. [1] Mr.V.Narasimman Asst. Prof, Anand.M, Anandha kumar.C,
Here we have developed a system which prevents the Krishnan.T "Design of a WSN node for forest trees against
smuggling of valuable trees and save the money of poaching", 978-93-87793-11-8, ICAETS-2018.

nation. [2] Santhosh Hebbar, Praveenraj Pattar, Rajeshwari


Madli,Varaprasad Golla, "Sandalwood Tree Protection Using
Bluetooth Version 4.0", Conference on Computing and Network
Communications, 978-1-4673-7309- 8/15/$31.00 ©2015 IEEE.
[3] Prof. Mhaske D.A. , Bhabad Vishnu S. , PathareSagar A.
"Antismuggling System for Trees in Forest using Flex Sensor
with GSM & Zigbee Network", International Journal of
Advanced Research in Computer and Communication.
Engineering Vol. 5, Issue 4, April 2016.
[4] Mohan Sai.S, Naresh K, RajKumar.S, Mohan Sai Ganesh, LokSai,
Abhinav "An Infrared Image detecting System model to monitor
human with weapon for controlling smuggling of Sandalwood
Trees", International Conference on Inventive Communication
and Computational Technologies.
[5] Prof. P. G. Salunkhe, Poonam U. Chaudhari "Design of WSN
Node For Protection Of Forest Trees Against Poaching Based
MSP430", International Conference On Advances in
Communication and Computing Technology (ICACCT), 978-1-
5386-0926-2/18/$31.00 ©2018 IEEE.

342 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Design of Power and Area of Efficient Approximate


Multipliers
Mrs.N.Kavya
Dept of ECE, SVCET, Chittoor.
Email: nagarajkavya24@gmail.com

Abstract: To obtain hardware level Authors : Mrs. Sunitha Kumari, B. Jhansi Reddy.
approximation by introducing the partial product
3. Design of low error fixed width modified Booth
technique for designing approximate multiplication
Multiplier in the year 2015.
circuits. This approximation multiplier can
decreases the design complexity with an increase Authors : K-C Lee, K-L cho
in performance and power efficiency for error
4. Energy efficient Approximate Multiplier for Digital
resilient applications.
Signal Processing in the year 2015.
Logic complexity of approximation is varied for
the accumulation of altered partial products based
Authors : Narayana Moorthy, Moghaddam.
on their probability. 5. Design for Power and Area of Efficient Approximate
INDEX TERMS: Approximate computing, error Multipliers in the year 2019.
analysis, low error, low power, multipliers. Authors : Sandhi Naresh, Malathi Naddunooro.
I. INTRODUCTION III. EXISTING METHOD
In CMOS technology and VLSI design complexity A) Approximate Multipliers:
scale, delivering desired functionalities while managing
As mentioned in above Sub-section, there are mainly
power consumption has been a first class design
two types of approximate multipliers existing:
challenge. To remedy this energy-efficiency challenge,
approximate AND-array multipliers, which utilize AND
they designed the Array-based Approximate Multipliers
gates for partial products generation and approximate
circuits (AMC). Here two types of Approximate
Booth multipliers, which use the modified Booth
Multipliers exist i.e.,
algorithm to reduce the number of partial products.
a) Approximate AND- Array Multipliers. Constant correction and variable correction schemes
b) Approximate Booth Multipliers are proposed for approximate AND-array multipliers.
Constant correction scheme suggests adding one
Where A utilize AND gates for partial products. constant to compensate for the truncated error and
B use the modified Booth algorithm to reduce the variable correction multipliers add some signals in the
number of partial products. Here Approximate partial product table to make compensation.
Arithmetic Unit designs optimally trade-off between However, since Booth multipliers are much more
Area, Power and Energy. efficient than AND-array multipliers, approximate
II. LITERATURE REVIEW Booth multipliers have been intensively investigated. In
1. A Design technique faster for Dadda Multiplier in
particular, statistical linear regression analysis, estimation
the year 2013. threshold calculation and self-compensation approach
have been utilized to compensate the truncation error.
Authors: B. Ramkumar, Harish Kumar. Accuracy is increased by using certain outputs from
2. Design of a Approximate compressor for Dadda Booth encoders. To decrease energy consumption, a
Multiplier in the year 2014. probabilistic estimation bias (PEB) scheme is presented.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 343
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

B) APPROXIMATE SQUARER'S DISADVANTAGES:


A series of approximate squarer's having been 1. MORE AREA AND POWER.
proposed. For instance, the designs of and compensate 2. MORE LOGIC COMPLEXITY.
truncation error by utilizing constant and variable
correction scheme, respectively. A LUT- based squarer IV. PROPOSED METHOD
is proposed by employing a hybrid LUT-based Fundamentals of Booth Multipliers:
structure. • Booth Multipliers are ideal for high speed applications
and the Radix-4 modified Booth multipliers are most
widely applied.
• The blocks of Radix-4 are shown in figure.
• The encoding block applies the Radix-4 Booth
algorithm to encode the multiplier.
• Selection block is to generate only half number of
partial products needed for array multipliers.
• Then compressors in the compression block compress
the number of partial products to two.
FIG : ERROR-FREE COMPUTING UNIT (EFCU) MODEL
• Finally, a 2n bit adder is used to generate the final
C) Model of Error Compensation unit (ECU) product.
Here it consists of two types i.e.,
a) Signature Generato
b) Kx1 Multiplier.

Fig. Error-Free Booth multiplier blocks.

Figure shows the schematics of Radix-4 Booth encoding


block applied in this research, the outputs of encoding
block are si, di, ni, zi and ci:
(a) is the schematic of si, di generation.
(b) is the schematic of ni generation.
(c) is the schematic of zi generation.
(d) is Schematic of ci generation.

(a) Signature generator,


(b) Fixed compensation per input group

344 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Fig. Complete designs blocks of proposed system Table: 16x16 fixed-width multipliers.

V. EXPERIMENTAL RESULTS
• The proposed 16-bit fixed-width Booth multiplier and
squarer are designed in Verilog HDL with a CMOS
technology.
• From reports, we get the delay, dynamic power,
leakage power and area.
• We also implement four additional fixed-width Booth
multipliers
a) DTM (Direct Truncated Booth Multiplier),
b) PEBM (with probabilistic estimation bias
Fig: 16x16 fixed width multipliers
compensation).
c) ZSM (Zero Significant Multiplier) FIXED WIDTH BOOTH MULTPLIERS
Table: Error metrics of 12x12 fixed-width Booth multipliers
d) PTM (Probability Truncated Multiplier)
Table: Implementation results of different 16x16 bits fixed-
width Booth multipliers.

• In order to give an overall comparison between the


proposed fixed-width 16x16 multiplier design and other
approximate fixed-width Booth multipliers, an energy-
delay- mean square error product
Power = Energy . Delay . Ems (EDEms)
Below table lists the EDEms of DTM, PTM, PEBM,
ZSM and the proposed 16-bit fixed width Booth
Fig: 12x12 bit fixed width Booth Multipliers
multiplier.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 345
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

The achieved reductions are 9.09%, 12.57% and


17.65% in terms of Emax and Ems, respectively, when
compared with ZSM
Table: Error metrics of 16x16 fixed-width Booth multipliers

Fig: Error reduction of the proposed 32x32 fixed-width Booth


multiplier over DTM, PEBM, ZSM.

FULL WIDTH BOOTH MULTIPLIERS:


Then, we evaluate the accuracies of the five different
designs operated in full- width mode in terms of Eave,
Emax and Ems for n = 12 (bits) in below Table.
Table: Error metrics of 12x12 full-width Booth multipliers

Fig: 16x16 fixed width booth multlipers

• The below shows the significant error reductions of


the proposed fixed-width multipliers over DTM,
PEBM and ZSM for n = 16 (bits).
• The achieved reductions are 11.11%, 28.11% and
25.00% in terms of E, Emax and Ems.
• Lastly, to evaluate the performance of our approach
for much wider multipliers, we evaluate the accuracies
of the five different designs in terms of Eave, Emax
and Ems for n = 32 (bits).
• The below figure shows the significant error
reductions of the proposed fixed width multipliers over
DTM, PEBM and ZSM for n = 32 (bits).
• The achieved reductions are 19.89%, 33.79% and
36.90% in terms of Emax and Em respectively, when
compared with ZSM.

Fig: 12x12 full width Booth Multiplier

• The below figure shows the significant error


reductions of the proposed full-width multipliers over
PEBM and ZSM for n = 12.

346 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

• The achieved reductions are 12.00%, 25.68% and method of introducing extra signatures and don't cares,
30.00% in terms of Eave, Emax and Ems, respectively, with 15.81% reduction. Significant error improvements
when compared with ZSM. have also been achieved for proposed multipliers and
• Additionally, the proposed full-width outperforms the squarers when operated in full width mode.
most accurate fixed width PTM with an error FUTURE SCOPE:
reduction of 12.00% and 12.50% for Eave
respectively, when n = 12 (bits). In large-scale forgery, this method is not stable and
has poor effect , which is also the problem will need to
solve in the future.
How to improve the detection of post-processing
forgery is also a problem will need to solve in the future.
REFERENCES:
1. Schulte, Michael J., and Earl E. Swartzlander. "Truncated
multiplication with correction constant [for DSP]." VLSI Signal
Processing, VI, 1993.,[Workshop on]. IEEE, 1993.
2. King, Eric J., and E. E. Swartzlander. "Data-dependent truncation
scheme for parallel multipliers." Signals, Systems & Computers,
1997. Conference Record of the Thirty-FirstAsilomar Conference
on. Vol. 2. IEEE, 1997.
3. Jou, Shyh-Jye, Meng-Hung Tsai, and Ya-Lan Tsao. "Low-error
reduced-width Booth multipliers for DSP applications." Circuits
Fig: Error reduction of the proposed 32x32 full width and Systems I: Fundamental Theory and Applications, IEEE
Booth multiplier over PEBM, ZSM. Transactions on 50.11 (2003): 1470-1474.

• The above figure shows the significant error 4. Min-An, S. O. N. G., V. A. N. Lan-Da, and K. U. O. Sy-Yen.
reductions of the proposed full-width multipliers over "Adaptive low- error fixedwidth Booth multipliers." IEICE
Transactions on Fundamentals of Electronics,Communications
DTM, PEBM and ZSM for n = 32. and Computer Sciences 90.6 (2007): 1180-1187.
• The achieved reductions are 27.09%, 37.09% and 5. Huang, Hong-An, Yen-Chin Liao, and Hsie-Chia Chang. "A self-
44.93% in terms of Eave, Emax and Ems, respectively, compensation fixed-width booth multiplier and its 128-point
when compared with ZSM. FFT applications." Circuits and Systems, 2006. ISCAS 2006.
Proceedings. 2006 IEEE International Symposium on. IEEE,
V. CONCLUSION AND FUTURE SCOPE 2006.
6. Cho, Kyung-Ju, et al. "Design of low-error fixed-width modified
CONCLUSION: booth multiplier." VeryLarge Scale Integration (VLSI) Systems,
IEEE Transactions on 12.5 (2004): 522-531
Our proposed 16x16 bits fixed-width Booth
multiplier consumes 44.85% and 28.33% less energy
and area compared with the most accurate fixed-width
Booth multiplier. Additionally, a 11.11%, 28.11%,
25.00% and 19.10% reduction is achieved for average
error, max error, mean square error and EDE,
respectively, when compared with the best reported
approximate design. Using the same approach, our
approximate 16-bit fixed-width squarer reduces average
error, max error, mean square error and EDEms by
more than 18.18%, 21.67%, 31.25% and 20.00%,
respectively, when compared with existing designs.
Error and cost are further reduced by utilizing the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 347
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

A Novel Method to Detect Alzheimer's Disease Using


Image Processing
Mr. B.Praveen Kumar1, Ms.C.Yamini2, Ms. M. Sravani3, Ms. M. Nirmala4, Mr. G. Parthasarathy Reddy5
1
Assistant Professor, Dept of ECE, Vemu Institute of Technology, P Kothakota, Chittoor.
2,3
UG Student, Dept of ECE, Vemu Institute of Technology, P Kothakota, Chittoor.
Email: prksh.bb@gmail.com1, yaminisadanandareddy@gmail.com2, nirmalanimmu1999@gmail.com3,
sravanimangasamudram22@gmail.com4, pavanpardhu12@gmail.com5

Abstract-This study proposes a new method for to predict the disease.The technique has obtained an
the detection of Alzheimer's Disease (AD) using minimum accuracy.
image processing in brain Magnetic Resonance
(MRI) images. This is a progressive disease and "NMF-SVM based CAD tool applied to functional
early detection and classification of AD can majorly brain images for the diagnosis of Alzheimer's disease",
help in controlling disease with machine learning Padilla p and Ramirez J. International journal of
algorithms for this purpose. The proposed method Engineering and Technology vol.8, May 2019.
uses ensemble model in the classification part of
In this paper, they proposed a novel CAD technique
the
for the early diagnosis of Alzheimer's disease based on
System to improve accuracy. In the classification non-negative matrix factorization.Thistechnique has
phase, ensemble model is used to predict the obtained an minimum accuracy.
classes AD or Healthy Control is done.
Experimental results show that the accuracy is III. EXISTING METHOD
improved compared to other techniques. This paper includes a method for detecting
Index Terms -Alzheimer's, Classification, MRI Alzheimer's Disease based on the machine learning
Image processing, Ensemble Model techniques. All the different views of slices(Axial, sagittal
I. INTRODUCTION and coronal) of grey matter and the white matter has
been used for this study. Support vector machine (SVM)
This paper proposes a new method for the detection algorithm is used to predict the disease. SVM is an
of AD in brain MR image. Alzheimer's Disease is a extremely popular supervised machine learning
neurodegenerative disorder that destroys brain memory technique which can be as a classifier as well as a
and thinking skills. In existing method the machine predictor. Support vector machine is used in the
learning algorithms are used to detect the disease, the classification part of the system. By this, the accuracy
accuracy is minimum. Here, the presented machine is not in a accurate way. An SVM model represents
learning algorithm method uses ensemble model to the training data points as points in the feature space,
classify and predict the disease. Hence, the proposed mapped in such a way that points belonging to separate
method has more classification accuracy. classes are segregated by a margin as wide as
II. LITERATURE REVIEW possible.The test data points are then mapped into that
Detection of Alzheimer's Disease with Machine same space and are classified based on which side of
Learning", Shamili and Neha Gopal. International the margin they fall.
journal for technological research in Engineering,
volume 3, May 2018.
In this they proposed a support vector machine
algorithm and image processing techniques an are used

348 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

preprocessing, segmentation, feature extraction and


classification.

Fig.2: Block diagram of proposed method

C. Algorithm of Proposed Method:


Step 1 : Select the image from data set.
Step 2 : Pre-processing
Step 2a : Read the image from data set.
Step 2b : Resize the image in to 227X227.
Fig. 1: Block Diagram of Existing Method.
Step 2c : Convert in to grey scale image.
A. Results of Existing Method:
Step 2d : Using Gaussian filter, remove the noise.
• Accuracy = 0.91%
Step 3 : Segmentation using FCM
• Precision = 0.83%
Step 3a : FCM allowing a piece of data belong to
• Sensitivity = 1% two or more clusters.
B. Disadvantages: Step 3b : Thresholding and Binarization is
• Segmentation is not in proper way. performed.
• The results are inaccurate. Step 4 : Edge Detection using sobel technique.
• Its exhibits low performance. Step 5 : Feature extraction DWT and GLCM
IV. PROPOSED METHOD Step 5a : Grey levels were normalised by stretching
the image contrast to cover the full pixel dynamic range.
Here, the proposed method is based on image
processing techniques the Alzheimer's disease is Step 5b : Using DWT and GLCM, we can extract
detected. In preprocessing, Gaussian filter is used to the features like contrast, correlation, entropy and
remove the noise and is more effective at smoothing energy.
images. In segmentation, FCM technique is used to Step 5c : It is a method of extracting statistical texture
segment an image and it is supervised clustering features.
algorithm that has been applied to no of problems.
Step 6 : Classification using Ensemble model.
An ensemble model is used in the classification part
Step 6a : Training process of Ensemble Model.
of the system. Ensemble model is ideal for classification
and regression, where they reduce bias and variance • Read the image from data set.
to boost the accuracy of models. • The image is pre-processed and resize to
Classification using ensemble model produce better 227X227.
predictions when compared to a single model. Some • Extract the image features such as mean, entropy
techniques are used to predict the disease. They are and energy.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 349
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

• Train the features and split the data in to labels. Sensitivity: It defines "what proportion of actual
• Fit the ensemble model to training set. positives were predicted correctly" =[TP / (TP + FN)]
×100
• Predict the result.
Specificity: It defines "what proportion of actual
Step 6b: Testing Process of Ensemble Model negatives were predicted correctly" = [TN / (FP + TN)]
• Read the image from test set. × 100
• The image is pre-processed and resize to 227X227. V. RESULTS
• Extract the image features such as mean, entropy
and energy.
• Predicting the test results with training set.
• By confusion matrix, calculate the FP, FN, TP and
TN of the test results.
• Predict the test set result.
Table 1: Confusion Matrix of classifier Fig: a Fig: b

Table 2: Classifier Output

DATA SET TP TN FP FN
350 130 180 20 20
Fig: c Fig: d
D. PERFORMANCE PARAMETERS OF Fig. 3: Results of Normal case
a)Original Image, b) Resized image, c)Segmented image,
PROPOSED METHOD: d) Edge detected image
Crack is defined as positive class,No Crack is
defined as negative class.
True Positives(TP): Correctly predicts the positive
class.
False Positives(FP): Incorrectly predicts the positive
class.
Fig: a Fig: b
True Negatives (TN): Correctly predicts the negative
class.
False Negatives (FN): Incorrectly predicts the
negative class.
Accuracy: The percentage of number of correct
positive predictions out of total images.
= [(TP + TN) / (TP + TN + FP + FN)]×100
Fig: c Fig: d
Precision: It defines "what proportion of positive Fig.4: Results of Abnormal Case
predictions were actually correct" = [TP / (TP + FP)] a) Original image, b) Resized image, c) Segmented image,
d) Edge detected image
×100
350 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

SOFTWARE TOOLS REQUIREMENTS: VII. REFERENCES


• Simulation Tools : MATLAB R2020a [1] Exploring a smart pathological brain detection method on pseudo
Zernike moment", Zhang YD, Jiang Y, Zhu W, Lu S, Zhao G.
• Operating System : Windows 7 2019 Sep 1;77(17):22589-604.

Comparision between existed method and [2] "Voxel based diagnosis of Alzheimer's disease using classifier
ensembles", Armaanzas R, Iglesias M, Morales DA, Alonso-
proposed method: Nanclares L. IEEE journal of biomedical and health informatics.
2018 Mar 4;21(3):778-84.
[3] "Improving MRI-based diagnosis of Alzheimer's disease via an
ensemble privileged information learning algorithm", Zheng X,
Shi J, Zhang Q, Ying S, Li Y. In2017 IEEE 14th International
Symposium on Biomedical Imaging (ISBI 2017) 2017 Apr 18
(pp. 456-459) IEEE.
[4]"Improving MRI-based diagnosis of Alzheimer's disease via an
ensemble privilegedinformation learning algorithm", Zheng X,
Shi J, Zhang Q, Ying S, Li Y. In2017 IEEE 14th International
Symposium on Biomedical Imaging (ISBI 2017) 2017 Apr 18
(pp. 456-459) IEEE.
VI. CONCLUSION AND FUTURE SCOPE
CONCLUSION:
In this paper, the performance factor indicates that
the proposed method provides better result by
improving accuracy.Our experimental results shows that
the proposed approach can aid in the accurate and
timely detection of Alzheimer's Disease. Thus, the
proposed approach is significant for Alzheimer's Disease
detection from MR images.
FUTURE SCOPE:
Neural network is another booming field in the
computer science and it is widely used in medical imaging
field. In the future work, to improve the accuracy of
the classification of the present work, we are planning
to use concept of deep learning like CNN in order to
better result.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 351
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Evaluation of Wireless Power Consumption and Energy


Efficient in Green Communication
G. ChennaKesava Reddy1, Dr. A.A.Ansari2, M. Renu Babu3
1
Research Scholor, Sri Satya Sai University of Technology, Medical Sciences, Sehore (M.P.)
2
Professor, Sri Satya Sai University of Technology, Medical Sciences, Sehore (M.P.)
3
Associate Professor, TKR Engineering College, JNTUH,Hyderabad
Email:gckreddy2001@gmail.com1,renubabum@tkrec.ac.in3

Abstract: Energy efficiency is a significant issue Introduction: The global energy footprint of cellular
in portable wireless networks since the battery life networks was 120 TWh in 2010 [1]. Approximately
of versatile terminals is restricted. Protection of 60% of the total power consumption of a legacy base
battery power has been tended to utilizing station (BS) is attributed to the power amplifier (PA),
numerous procedures. Wireless sensor networks
10% to signal processing and the remaining 30%
(WSNs), framed by various little gadgets fit for
tocooling and power supply [2]. This explains why
detecting, processing, and wireless
correspondence are arising as a progressive research has mostly focused on maximising the number
innovation, with applications in different territories. of transmitted bits per Joule consumed by the PA. The
The novel highlights of wireless sensor networks power figures of transmitter and receiver components
have carried new difficulties and issues to the field will become more balanced as cell sizes continue
of conveyed and communitari and at a preparing. shrinking and the processing complexity increasing [3].
Energy efficiency in cell networks has gotten Considering the power contributions of bothsides of a
critical consideration from both scholarly world and wireless communications link can then lead to
industry in light of the significance of lessening the considerable energy savings.
operational consumptions and keeping up the profit
ability of cell networks, not withstanding making Today's long-term evolution (LTE) BSs transmit at
these networks "Green communication". Since the the maximum allowed power and do heavy processing
base station is the essential energy shopper in the to minimise the battery drain of mobile terminals. Cuietal.
organization, endeavors have been made to examine propose adapting the modulation scheme to minimise
base station energy utilization and to discover the power consumption[4]. Miaoetal.[5] present
approaches to improve energy efficiency. The numerical methods for energy-efficient power and rate
tradeo ffs between energy utilization and adaptation for frequency-selective channels. A
throughput, under nearby just as under helpful computing efficient algorithm was later developed in[6].
detecting, are portrayed. The Energy efficient trade
Gomez-Miguelez et al.[7] derive energy-efficient link
offs have been arranged dependent on every
convention layer and examined itseffect in the
adaptation solutions, considering retransmissions,and
organization energy efficiency. analyse the outage probability and energy per bit for
different channels.
Further more, we consider that the Turbo
decoder with early stopping is the receiver This Letter considers the transmitter and receiver
component whose computational power trade offs from a system-level perspective. We
Keywords: Wireless sensor networks(WSNs), propose a methodology for dynamically weighing the
Green energy Communication, Energy efficient, power distribution among transmitters and receivers
Tradeoff with the goal of minimising the overall communications
energy footprint. Numerical results show that significant
energy savings can be achieved by coordinating the
transceiver operational parameters.
352 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Problem formulation and assumptions: The energy


spent for wireless communications can be split into two
1.0
parts, the energy spent

normalisedreceiver power function


The most of the energy consumed by the transmitters 0.8 QAM16
at near stations. [8] reports a power consumption of L=100
0.6
675mW for 18 iterations. The power consumption
periteration needs to be accordingly scaled. The 0.4
transmission rateis constant here andwe deal with power BPSK
figures (The relation between rate and distance is 0.2
L=1000
analysed in [9].) We assume a noise limited system,
where the SNR target is upper-bounded by pTx, max 0

and the path loss and lower-bounded by the receiver Fig.1:Power Vs SNR
sensitivity. assume a variable transmission power pTx. ERx(x)
Single link analysis: We compare two receiver is a function of the signal processing that is performed
realisations, whose cost functions are plotted in Fig. 1. at the receiver. The processing power pRx is a function
These functions were obtained from real measurements of the wave form, the radio enviro nment and the
[10]. The transmitter and receiver are separated by 200 receiver's internal characteristics, that is, how efficiently
m.Table1 provides the remaining simulation parameters. it can decode the information. The system operates
For bigger inclusion, the tradeoff between data efficiently if the chosen link level parameters x minimise
transfer capacity efficiency and energy-efficiency has the total energy ET(x). This leads to the formulation of
been concentrated if there should a rise an occurrence the constrained non-linear optimisation problem.
of adhoc wireless organization. It has been shown that The total energy consumption can be limited by
the per hub through put limit of a specially appointed ideally picking the rate, decided from the area of
organization with n hubs diminishes with n as (1/√ n log transfers andthe start to finish distance. Accordingly,
n),without any requirements on the energy utilized at the best energy-transfer speed tradeoff can be gotten
hubs. The creators likewise build up a solitary by contrasting theabsolute energy utilization for various
measurementas transport efficiency which is the result area of transfers and a directing way. The work an
of transmission capacity efficiency and EE. As a tradeoff, energy-efficientagreeable hand-off determination
there is amajor addition in EE as indicated by the conspire that uses the transmission power all the more
techniques on the channel employment by the transmitter efficiently in helpful transferring frameworks. The hubs
and the energy consumed by the receiver. in the organization were sent with different antennas
ET(x)= ETx(x)+ ERx(x) x[X (1) and unravel and-forward transfer convention was
utilized.
We define a link level parameter space X and x as a
valid instantiation or parameter set that satisfies all Fig.1 Receiver cost functions normalised to power
system constraints. The transmitter and receiver energy consumption of 18 turbo decodingiterations for different
cost functions are evaluated for this parameter set. modulation schemes and code blockl engths L with early
stopping at biterrorrate of 10-3
ETx(x) is a function of the selected wave form
parameters. Here we

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 353
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

Table1:Simulationparameters Finding the optimal parameter set for the downlink


Transmitter PA ef?ciency 20% of a cellular communications system requires substituting
Circuit po wer 500 mW ERx(x) by the sum of N different energy cost functions,
consumption one per mobile terminal. E(x) is to be substituted by
minimum circuit power 25 0mW a
Receiver consumption the sum of N energy portions for the multi user uplink
maximum circuit power 875mW b (UL) case. The constraints need to be accordingly
consumption modified as well.
Noise power - 100dBm
Path loss model Okumura-Hata Without loss of generality, this Letter assumes that
Terrain type Urban the SNR target at the receiver is the single parameter
Channel Carrier frequency 2GHz determining the transmission power.
BS/mobile terminal 20/1.5 m
heights
Fig.2.Powertradeoffsforsinglelink
a1decodingiteration.
a. BPSKmodulationwithcodeblocksof L=1000bits
b18decodingiterations
b. QAM16modulationwithcodeblocksof L=100bits
Fig.2 plots the transmitter,receiver and total power Feature 3G 4G 5G
consumption as a function of SNR for binary phase Carbon Dioxide 86Mto 170Mto 235Mto
Emissions
shift keying(BPSK) and 16-quadrature amplitude RAN Electricity 49TWh 77TWh 86TWh
modulation (QAM16). The optimal SNR isfound to Consumption
be∼3 and 7.4 dB, leading to a total power consumption Green
Technology Used
High Efficiency Green base stations, D2D, massive
Tracking phantom cells, liquid MIMO,
of 930 and 1380 mW (Note the linear SNR scales in cells, soft cells spectrum sharing
Carbon foot 20kg 23kg 31kg
Figs.1 and 2). This means that the decoders perform printper mobile
only 2 and 3.5 iterations on average. The extra subscription
Femto cell Power 10W 6W 5W
processing power pRx needed for executing more Consumption
iterationsdoes not compensate for a reduction in the SARValues High Higher Expected to
reduce
transmission power pTx.Hence, the power of iterative
Table 2.1 Comparison of different generations from green
decoding is not leveraged and a simplercoding and communication perspective
decoding scheme could be employed instead. This result
supports the argument of[11], stating that robust channel
codes are not useful for reducing the system power
consumption.

1800

1600

Fig.3. Relationship of energy efficiency, bandwidth, circuit


1400 power and interference

(Green Performance Indicator, Carbon Emission


Calculator, emission factors(gCO2e/kWh etc. [56]) in
minET(pTx,pRx)=ETx(pTx wireless networks from a component, equipment and
networks level, respectively[57]. EE performance at
)+ERx several components

354 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

adapting the access and transmission parameters of Fig.2a, it is desirable to operate at low SNR.
These green engineering solutions showed that by APs Conversely, slower decaying cost functions allow for
to the network scenarios can have a large impact The better balancing the transmitter and receiver power
important aspects of a green communications on figures at the cost of a higher overall power consumption
improving EE of wireless s networks. However, to (Fig.2b).
include defining green metrics, bringing architectural Multi-user analysis: Forty users are uniformly
introduce energy saving in a holisticway, Het Netrequ distributed between 10 and 500m from the BS. We
base stations, network planning, and efficient maner for analyse the UL and consider two general strategies: the
ires a generic framework that enables intel-ligent and fixed SNR strategy adjusts the transmission powers so
system design [42]. EEmetricsare required to measure that all user signals are received at the same SNR. The
dynamic selection of different available strategies at flexible SNR strategy adapts the SNRs to minimise the
APs.the energy consumption of the network. total power consumption. We consider that the
The issue of EE in wireless communication networks processing power of the BS is a shared and limited
Different metrics can measuret he energy-consumption resource[12]. Different pRx, max constraints are imposed
or can be approached in two ways energy-performance on the flexible SNR strategy for this analysis: 14, 11.5
tradeo ff in a different ways and 10.002W. When each UL decoder needs only one
Several surveys available in the literature are iteration, the per-user and total power for processing
discussed These metrics have been used to measure at the BS become 250mW (Table1) and 10W (pRx,
the energy from different perspectives. Authors in [39] min).
provide a consumption in component level, equipment Figs. 3a and b illustrate the SNR and the transmitter
for shape survey on green networking research from a plus receiver power consumption per user as a function
system level, system level. This includes the of distance. The SNR decreases with distance to
measurement for design perspective. In this survey, they compensate for the additional path loss, while balancing
have considered each of the proposed techniques for the extra power that is needed between the transmitter-
reducing power into four main branches, as adaptive higher pTx-and receiver-higher pRx. The 11.5 and 14 W
link rate, interface proconsumption or enhancing energy constrained cases lead to nearly identical results
efficiency. Since, thesexying, energy-aware infrastructure because the constraint becomesinactive for pRx,max≥ 12
and energy-aware app metrics are related to enhancing W. When inactive, the optimal SNR allocation for each
energy efficiency in each locations and observed the user is computed in dependently of other users.
root causes of energy-waste in layer of communication,
altogether can be considered as a these four main
branches. In[40], authors have presented as Green
metric. On the other hand, Greenness metrics for an
overview ofthe energy y consumption problemsof are
directly involved into CO2 emission.Understanding it
wireless communication networks and described
differemetrics provide a better view on how EE can be
achieved it nt techniques in general that have been used
to improve the This metric can be reliably used to
measure the EE performance at seenergy efficiency of
these networks.
We conclude that if the slope of the receiver cost
function drops early and steeply, such as shown in

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 355
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

fixedSNR=1.3fi Results:
9 xedSNR=3
Pmax =14W
8 RX The trade-off of EE and quality of experience (QoE)
Pmax =11.5W
7 RX

Pmax =10.002W
with the principal definitions is represented. Different
RX
6 utility based quality of experience capacities are subbed
SNR,dB

5
into plan as is appeared in Figure5.1. With the
4
3 development of asset dispensed to clients, clients' quality
2 of experience and organization energy utilization will
1 build, which brings about EE diminishing with P. In this
0 way, it appears to be that EE is a ceaseless droning
0 100 200 3 400 500
0
0 diminishing capacity of quality of involvement. In any
distan case, EE is the carefully sunken capacity of QoE
ce,m
fixedSNR=1.3 whencircuit power is thought of. The bends increment
9
8
a from the outset and afterward decline immediately when
P max=14W
fixedSNR=3
7
RX

Pmax =11.5W
the utility capacity arrive at its pinnacle esteem.
RX
Moreover, the bend rises and falls all the more quickly
PT.user, W

6 Pmax =10.002W
RX
5 for BE client in view of not having unexpected
4 development in utility. The ordinary measurement of EE
3
2
or quality of involvement can scarcely consolidate the
1 attribute of client types and organization energy
0 utilization together. For instance, to amplify QoE, the
(Fig. 3b). The total power figures for the 1.3 and framework may designate a lot of asset pointless that
3.0 dB fixed SNR strategies are 84.5 and 97.2 W, has little quality of experience improvement however
which are both considerably higherthan what is harms EE harshly.
achievable with the unconstrained or lightly constrained CONCLUSIONS
adaptive SNR approach. Energy efficiency in cell networks is a rising worry
Fig.3 SNR and total power consumption per user for the versatile organization administrators (MNOs).
over distance a.SNR, b.Total power consumption per Theissues include the expense, yet additionally the
user raising CO2 levels in the climate and wellbeing concerns,
The energy-efficient solution moves away from the whichare fearing alongside the developing innovation
unconstrained minimum as the system becomes more and a relating endorser and gadget check. Wireless
constrained. The total power consumptions for the three sensornetworks additionally hold the guarantee to
constrained cases are 67.1, 68.2 and 105.9 W. The change the detecting innovation for a wide range of
105.9 W figure represents the highly constrained utilizations,including foundation checking,
case,where all 40 decoders perform about oneiteration reconnaissance and debacle the executives, where the
each, requiring very high SNR (Fig.3a) and, thus, high identification capacity ofthe WSN is essential. In light
UL transmission powers. of the force utilization model, we reason the maximum
furthest reaches of energy efficient transmission. We
Assuming unconstrained resources, the selection of show that, in a given radio climate, the furthestreaches
an SNR of 3 dB well approximates the optimal solution of energy efficient transmission power is relative to the
for distances below 275 m,whereasanSNRof 1.3dB force utilization of Tx/Rx circuits (defined by PR0 and
is the better choice beyond this point. PT0), and further more corresponding to the channel
efficiency of force speaker (Parameterized by ).
Additionally the impact of the quantity of dynamic clients

356 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

on the reach (cell breathing) and subsequently the force 6 Gomez-Miguelez,I.,Marojevic,V.,andGelonch, A.:'Energy-
efficientwater-filling with ordered statistics', Trans. Veh. Technol.,
efficiency will be researched. When there is practically 2014, 63, (1),pp.428-432
no movement nearby the base station, the base station
7 Gomez-Miguelez,I., Marojevic,V., and Gelonch,A.: 'Link
could be turned off (cell breathing). adaptation for energy-efficient transmission with receiver CSI',
Commun. Lett.,2012,16,(9),pp.1412-1415
REFERENCES
8 Gomez, I., Marojevic, V., and Gelonch, A.: 'Processing-to-
1 GSMA:'Mobile'sgreenmanifesto2012',WhitePaper,June2012 amplifier power ratio for energy effiient communications',
2 Correia, L.M., Zeller, D., Blume, O., et al.: 'Challenges and enabling Electron.Lett.,2012,48,(12),pp.732-734
technologies for energy aware mobile radio networks', 9 Gomez,I., Marojevic,V., Bracke,J.,etal.: 'Performance and over
Commun.Mag.,2010,48,(11),pp.66-72 head analysis of ALOE middle ware for SDR'.IEEE Military
3 Ge, X., Yang, J., Gharavi, H., et al.: 'Energy efficiency challenges Communications Conf., SanJose, CA, USA, 31O ctober-3
of5G small cell networks', Commun. Mag.,2017,55,(5),pp.184- November 2010, pp.1134-1139
191 10 Grover,P., Woyach,K.A.,Palaiyanur,H.,etal.:'An interference-
4 Cui,S.,Goldsmith,A.,andBahai,A.:'Energy-constrained aware perspective on decoding power'.6 th Int.Symp. Turbo
modulation optimization', Trans. Wirel. Commun., 2005,4,(5), Codes& Iterative Information Processing, Brest, France,6-10
pp.2349-2360 September 2010, pp.457-461

5 Miao, G., Himayat, N., and Li, G.: 'Energy-efficient link adaptation 11 Marojevic, V., Gomez, I., and Gelonch, A.: 'Cognitive resource
infrequency-selective channels', Trans. Commun., 2010, 58, man-agement for all wireless access layers', Veh. Tech. Mag.,
(2),pp.545-554 2012, 7, (2),pp.100-106

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 357
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021

358 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Department of Computer Science & Engineering

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 359
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

360 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Data Acquition System for Greenhouse Management


Based on IoT
Dr.Bommi R.M1, Ravimukilan.M2, Akashkumar.M.L3, Ashwini.P4
1
Center for System Design, Chennai Institute of Technology, Chennai, India
2,3,4
Student, Bio-Medical Engineering, Chennai Institute of Technology, Chennai, India
Email: bommirm@citchennai.net1, ravimukilanm.bme2020@citchennai.net2, akashkumar.bme2020@citchennai.net3,
ashwinip.bme2020@citchennai.net4

Abstract: In recent years, IoT technology has exertion of smart greenhouse different from any
become vision of the world and has given customary greenhouse that are available in market.
tremendous dependency in each and every field.
This project proposes an automated system for I. INTRODUCTION
crop growth monitoring and effective utilization of The strong correlation between agricultural growth
water resources in agriculture, using wireless and economic prosperity has demonstrated that
sensor and RF433MHz protocol. In this project,
agriculture stands as the major economic activity of India
three sensor nodes (soil moisture sensor, humidity
sensor, ultrasound sensor) are deployed in during last 50 years. The fundamental goal of this work
monitoring the greenhouse environment. The soil is to outline a basic, simple to introduce, microcontroller
moisture sensor is used to monitor the moisture - based circuit (MSP430) to screen and record the
present in the soil and when the earth is dry, and estimations of temperature, dampness, pH (hydrogen-
then the motor will be ON automatically for particle focus) of the nursery condition that are
sprinkling of water. The ultrasonic sensor is used persistently altered and controlled so as to advance
to monitor the plant growth and provides required them to accomplish most extreme plant development
amount of fertilizer through sprinkler motor. The yield[9]. The outstanding achievements and missed
insect repellent circuit is also deployed in the opportunities are mixed by the present agricultural
system for preventing the pests from affecting the scenario. Our agricultural productivity should equal
crops. The signals from the sensors are coordinated
other countries in which India has to emerge as an
manufacturers and more. The agriculture is one of
the sector which is catching up with the various economic power in the world,which are currently rated
industries. With the concept of smart farming and as economic power of the world. The productivity,
by the microcontroller and transmitted to the profitability, sustainability of our major farming systems
intermediate node through IoT communication. could improve continuously, new and effective
The Development of wireless sensor network technologies are needed. One such technology is the
technology allows us to develop a system for real green house technology. Although it is centuries old,
time environmental monitoring. In the current
scenario wireless sensor networks participates a
It is new to India. The proposed system consists of
lot in precision agriculture[12]. In this way, the microcontroller which monitor and controls the
greenhouse environment is monitored, controlled greenhouse parameter. It consists of monitoring and
and agricultural crop yield can be improved. The controlling blocks for Greenhouse management.
system reports data to the user remotely and allow
them to effectively control through IoT. Finally, an 1.2 DESIDERATUM OF THE PAPER
apt care of data acquisition from the sensors, The main aim of our project is to overcome the
increasing overall productivity by means of disadvantages produced by the existing system. In our
algorithms have been observed and performed project, an different approach for monitoring and
analysis in meticulous way, which have made the controlling the Greenhouse parameters in real time and

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 361
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

added additional applications that control the plant also ensures a supply of fresh air for photosynthesis
growth as well as prevent crops from the pests. Our and plant respiration.Vents can be accomplished by
project totally builded up with help of Embedded means of ventilation - frequently controlled consequently
System. - and distribution fans.
1.3 IOT IN AGRICULTURE: 2.2 LITERATURE REVIEW
Internet of things has been proving its mettle across An environment parameter intelligent measurement
the industries such as banking, retail, tele companies, system based on GPRS has been put forward and the
digitization, Data collection and automated farming hardware circuit and the software design of the system
techniques are offer high precision crop control with have been completed and the combining characteristics
potential before the gaining popularity. of the greenhouse and the problems existing in
theprocess of environment parameter measurement [2].
1.4 WHY DO WE NEED IOT IN The greenhouse parameter is mainly controlled main
AGRICULTURE? by this project. This project measure various
By 2050, Food and agriculture of the United Nations parameters using different sensors. Temperature sensor
(FAO) says that food production should see 70% will be used to get the temperature. Humidity to test
increase. And the experts believe that IoT could play a the moisture level in air and Soil moisture o test the soil
crucial role in meeting this need. The vital usage of condition of Wet/Dry[3]. The transmission betweenthe
agriculture in IoT is fertilizers and pesticides, monitoring wireless sensor network and the Internet is a method
the livestock,scanning storage capacities and making put forward by this article .The IOT (Internet of Things)
sure that crops are fed andwatered well. It shows an passage is utilized as a major aspect of the nursery
overall potency to increase the productivity with a observing system[4].The application demonstrates the
reduced cost. gateway is reliable, compatible, and extendible.
Because of this gateway the forest monitoring system
II. EXISTING SYSTEM
realized the real-time, and improved the ability of
2.1 INTRODUCTION monitoring the forest parameters[7].
A greenhouse is a building in which plants are grown 2.3 SYSTEM OVERVIEW
for commercial or research purposes Because of
The basic parameters of the green house control is
incoming visible solar radiation from the sun is absorbed
the main aim of this system. To measure various
by plants, soil, and other things inside the building ;
parameters, different sensors are used. Temperature
frequent glass or plastic walls heats up.. Air warmed
sensor will be used to get the temperature. Humidity to
by the heat from hot interior surfaces is retained in the
test the moisture level in air and Soil moisture o test the
building by the roof and wall.Some of the energy is
soil condition of wet/ dry. This project will be
also trapped inside the glasshouse in which the
implemented using advanced CAN protocol and ARM7
greenhouse re-radiate some of their thermal energy in
based LPC2148 32microcontroller [6].
the infrared spectrum .Convection is the primary heating
mechanism of a greenhouse is One of the most important
components of greenhouse isventilation. The plants can
become prone to problems when there is no proper
ventilation. Ventilation plays a main roll, for temperature
regulation and to ensure movement of air and thus
prevent build-up of plant pathogens (such as Botrytis
cinerea) that prefer still air conditions. Ventilation enable
important pollinators to access the greenhouse crop and

362 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2.4 BLOCK DIAGRAM (CANH and CANL) are connected to another CAN
lines and those CAN lines are converted back to the
SPI lines by using MCP2515 again. The received data
was sent to the LPC2148. The CAN protocol was
used to display the sensor values on the LCD. The
coding was written in embedded C language and
compile using keil compiler. The relevant hex file was
dumped into the microcontroller using FLASH MAGIC
software.
III. PROPOSED SYSTEM
3.1 INTRODUCTION
The major drawback of the existing system is
FIG2.1 Transmission section of Existing system. overcome by the proposed system. In wired connection
there are many advantageous .Even though it has certain
disadvantages because in wire medium there occurs
lot of damages and may occur the entire system to get
damage. In proposed system, a wireless network is
designed to communicate through wireless medium. This
can be operated both automatically and manually. Due
to this method there will be less cause of damage in the
whole circuit. A wireless sensor network is a device
which connects the entire system without using wire. It
connects both transmitter and receiver without using
wire. The datas are being transmitted with the help of
wireless sensor network. The figure 4.1 shows the
FIG2.2 Receiver section of Existing system.
overview of the working.
2.5 WORKING
The above diagram shows the prototype model of
the existing system. The main aim of this system is to
send the sensors data from one microcontroller to
another microcontroller using CAN protocol. For this
system, made ofLPC2148 microcontroller. This
LPC2148 has USB port internally. In this system,
Temperature sensor (LM35) and humidity sensor and Fig3:1overview of the working
soil sensor are used. The sensors give the analog output A sensor node which consists of soil moisture sensor,
and these outputs are connected to the ADC pins of humidity sensor deployed in the system. In addition,
the LPC2148. The ADC converts the analog values Ultrasonic sensor is added for analysing the plant growth
into the equivalent digital values. These digital values and provides required amount of fertilizers to the plants.
are displayed on the 16*2 alphanumeric LCD and sent Insect repellent circuit is added for additional function.It
to another LPC2148 through the SPI lines of the is deployed in the system for preventing the pests from
LPC2148. The SPI lines are converted to the CAN affecting the crops.Microcontroller is mainly used to
lines by using the MCP2515 IC. The CAN lines designed to produce high performance and low cost. A

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 363
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

microcontroller can allow only 5v dc voltage in to the 3.3 MONITORING BLOCKS


circuit. The coding in microcontroller is done using Kiel 1) Soil moisture Sensor.
compiler.
2) Humidity sensor.
3.2 OVERVIEW
3) Ultrasound sensor.
Our system is mainly used in agricultural environment
which is mainly designed using wireless medium. The 4) Insect repellent circuit.
monitoring and controlling of greenhouse environment 5) Microcontroller.
using wireless sensors and RF433MHz.The soil 6) Cloud
moisture sensor sense the moisture content of the soil
and Humidity sensor senses the moisture level in the 3.4 CONTROLLING BLOCKS
atmosphere.The objective of this work is to test the 1) Microcontroller.
impacts of the osmosis of various soil dampness items
in a dispersed physically based hydrological 2) Relay.
show[10].The ultrasonic sensor is used to analyse the 3) Motor.
plant growth. Then, the Microcontroller collects the data
from the sensors and access the motor for sprinkling of • ARDUINO UNO (MICROCONTROLLER)
water when the earth is dry and fertilizers, according to Arduino UNO is used here for monitoring the
plant growth. The data from the microcontroller is send parameters of the greenhouse environment. It is used
to cloud using IoT technology. Thus we can able to for transmitting purpose. It collects the sensor values
monitor our land anywhere at any time in this world. and used to send the monitored value to the controlling
This system runs automatically or manually.The blocks for controlling purpose.
proposed system consists of microcontroller which
monitor and controls the greenhouse parameter. It • ARDUINO NANO (MICROCONTROLLER)
consists of monitoring and controlling blocks for It is used at the Receiver side. It receives the sensed
Greenhouse management. data from Arduino UNO and sends the data to cloud
through IoT.
• RF433MHz:
RF communication incorporated for transmitting and
receiving data from microcontroller wirelessly. It
does not require line of sight. It can be used with any
microcontroller
• SOIL MOISTURE SENSOR
Measuring soil moisture is important for agricultural
applications to help farmers manage their irrigation
systems more efficiently. Volumetric water content in
soil is measured by soil moisture sensor.some other
property of the soil,is used indirectly such as electrical
resistance, dielectric constant, or interaction with
Fig 3.2 Block diagram of proposed system neutrons, as a proxy for the moisture content. In this
system, soil moisture sensors monitor the moisture of
the soil and send the values to the microcontroller.

364 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• HUMIDITY SENSOR At 35 kHz, some pests are repels others get repelled
Humidity sensors are used to monitor the moisture at 38 to 40 kHz or even higher frequencies.
of the atmosphere and it will send the values of humidity Effectiveness, frequency of ultrasonic oscillator are
values to microcontroller for monitoring the greenhouse increased continuously varied between certain limits.
atmosphere.Temperature and air humidity are controlled Ultrasonic sound is varied by the frequency of emission
by humidity and temperature sensors and a fogger is and our product in different patterns to repel different
used to control the same [11]. insects.

• ULTRASONIC SENSOR • MICROCONTROLLER

At a specific frequencysound wave send out for Microcontroller are used here for monitoring the
measure distance and listening for that sound wave to parameters of the greenhouse environment and it is also
bounce back. The ultrasound sensor measures the plant used to send the monitored value to the controlling
growth and send the height value of the plant to blocks for controlling purpose
microcontroller for monitoring the greenhouse • CLOUD (IOT)
atmosphere.
The cloud gathers the monitored values of
Echolocation sonar is similar to ultrasonic greenhouse which is monitored by microcontroller and
distancesensor used by different animals. The ability to it too collects the values through microcontroller. The
detect and emit ultrasonic frequencies, which are above person monitor the values through PC or mobile phone
the human hearing range, is an essential survival tool which is uploaded in the cloud.
for many animals. Ultrasonic systems for navigation and
finding prey of rely is sensitive to nocturnal and marine • RELAY
animals. while some insects use ultrasonic hearing to A 4 channel relay is used in which 2 channel only
detect and escape predators. This ability is known as used for connecting the motor i.e., water sprinkling
Echolocation, and it is important to many animals. motor and fertilizer motor. It can be controlled directly
• ECHOLOCATION by Arduino UNO. The motor1 (Fertilizer Motor) is
connected to the channel 1 of relay through NO NC
"Echolocation is the use of sound waves and echoes pins. The motor 2 (Water sprinkling Motor) is
to determine where objects are in space "Any sound connected to the channel 2 of relay through NO and
above 20 kilohertz (20,000 hertz) is considered NC pin.
Ultrasound, and these sounds are above the range of
human hearing. Ultrasounds are not only heard by • MOTORS
animals, but to produce it. CD4047 IC,built the The motor used for water sprinkling and fertilizer
ultrasonic frequency oscillator ultrasonic signals are sprinkling. It is compatible with the Arduino UNO. The
boosted by push-pull power amplifier(with 2N3055 two motors have small direct-drive, high-efficiency
or TIP31C) and transformer. Output of transformer motors that work at 12 volts.
X1, is coupled to the power amplifier to a tweeter which
is wound over ferrite core (UU or CC core). 150 turns • ARDUINO IDE:
of 20 SWG is primary winding. while the 40 turns of It connects to the Arduino and Genuine hardware
24 SWG wire is secondary winding. Adjust to upload programs and communicate with them.
potentiometer VR1 for maximum effectiveness. "Arduino Platform" is to allow for easy and fast
prototyping
• INSECT REPELLENT CIRCUIT
Ultrasonic frequency in the range of 30 kHz to 50
kHz can repel the pest like insects ,ants, rats, mice etc.,.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 365
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• LANGUAGE: EMBEDDED C
Extensions for the C Programming language.
Embedded C uses most of the syntax and semantics of
standard C, e.g., main () function, variable definition,
data type declaration, etc Application Programming
Interface .
• PYTHON:
Python is a widely used high-level programming
language. The language provides constructs intended
to enable writing clear programs of both a small and
large scale. Python features a dynamic type system and
automatic memory management.
• UBUNTU
Ubuntu is a type of Debian-based Linux operating
system which is as Touch edition in personal computers, Fig3.5 Flow chart of proposed system

tablets and smart phones. IV. RESULTANDDISSCUSSION


3.5 FLOW CHART DESCRIPTION 4.1 TRANSMITTER PART
The above flow diagram shows the flow diagram of
the proposed system. Initially the sensor values send to
the microcontroller and the values are controlled by
the microcontroller itself. Then the obtained values are
ultrasound sensor is in microseconds which is converted
to cm, humidity and soil moisture value. Then the
fertilizer motor is controlled by the microcontroller
according to the obtained ultrasound sensor value( in
cm).Similarly, the water sprinkler motor is controlled Fig 4.1 Transmitter
by the microcontroller according to the soil moisture Automatically these different essential parameters
and humidity obtained values.In another side ,the IoT are controlled by the value of sensors. Not only the
webpage is created and the obtained values is smart system can control the parameters but it can also
transmitted to the webpage for monitoring the transmit the signals to greenhouse owner's computer
greenhouse parameters i.e, humidity, soil moisture and wirelessly. The wireless transmission made the system
ultrasound ' cm' values. Then the user sign out the more efficient and smarter. In contrast, the owner can
webpage according to their preference. Thus the also switch OFF manually the entire greenhouse
process ends here. monitoring system by giving command wirelessly if he/
she thinks of making it. However, data are collected by
sensors and actuators are run according to the value of
it. The research was successfully performed and
transmission was observed satisfactorily.

366 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4.2 RECEIVER PART Greenhouse monitoring software achieves the data


through serial communication via Arduino Nano which
is connected with the RF receiver shown in the figure
7.3. When serial port receives the data, the software
processes the data by sorting out the received value by
a routine and places in the specific table. Data sorting
process in the software is designed using an algorithm
that it can perceive the garbage data accurately thus
we are obtaining precise value. Then a webpage is
Fig 4.2 Receiver
created and the received data is updated to the
Greenhouse monitoring software achieves the data webpage as shown in the figure 7.4
through serial communication via Arduino Nano which
is connected with the RF receiver shown in the figure 4.3 CONCLUSION
7.2. When serial port receives the data, the software The implementation of this Smart Greenhouse is
processes the data by sorting out the received value by customizable, which means Arduino UNO can be
a routine and places in the specific table. Data sorting programmed according to the users requirement and
process in the software is designed using an algorithm the system is of low cost which is compatible in the
that it can perceive the garbage data accurately thus perspective of this South Asian Countries where the
we are obtaining precise value. implementation of this system can help the farmers to
grow more plants and as a result it can contribute to
• SOFTWARE PART
the economy of any country. This system, comparing
To monitor greenhouse's environmental and with traditional manual inspection and large scale wiring,
meteorological functions, we have included monitoring the accuracy of data acquisition and the real-time of
software in our Smart greenhouse system. The software transmission is improved significantly, and its
will be installed in control room far away from the constructing is flexible, measurement is precise,
greenhouse. Here, the software for this project has been operation is simple and energy is saving for entire
done us sing PYTHON language in Arduino IDE monitoring system. This system can integrate sensor
because of f necessary features available for building technology, microprocessor technology, wireless
successful software. It has been made in a simple communication technology and intelligent control
manner with a combox to select the port for port technology into one, measure the soil moisture and
interfacing the Arduino NANO with the computer's USB humidity parameters in greenhouses, and coordinate
and three data are implemented where the readings of with the subsequent controller to realize automatic
soil moisture , humidity and ultrasound sensor data are control of greenhouses.
stored and displayed.
Internet on things and cloud computing collectively
makes a system that control green house effectively.
This system will sense all the environmental parameter
and sends that data to the user via cloud.In this
system,ultrasonic sensor and insect repellent circuit is
deployed for plant growth monitoring and preventing
crops from pests respectively. This asset allows the
farmer to improve the cultivation in a way the plants
need. It leads to higher crop yield, prolonged production
period, better quality, and less use of protective
chemicals.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 367
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

V. REFERENCES [8]Zhu Fengwu,Zoy Lina,Tu Chuanchuan,Yu Fenghuua,Shan


Xiao,the research of Lab VIEW,Journal of Chinese Agricultural
[1]L.T.Cai,P.H,Chen,B.Luo Design of data acquisition System for Mechanization,Vol.34,Issue 2,2013,PP.127-130.
Zigbee based on chip CC2530,Computer technology and
development ,Xian, China, Vol.11.no.22, pp.197-200,2012 [9]Z. Xiaoyan, Z. Xiangyang, D. Chen, C. Zhaohui, S. Shangming,
and Z. Zhaohui, "The design and implementation of the
[2] Qianqian Yuan and wencheng wang,2015,Design of green house greenhouse monitoring system based on gsm and rf technologies,"
environment parameter measurement system based on in Computational Problem-solving (ICCP), 2013 International
GPRS,International Journal of control and Automation,Vol.8, Conference on, Oct 2013, pp. 32-35.
No.11(2015),pp.105-112
[10]P. Laiolo, S. Gabellani, L. Pulvirenti, G. Boni, R. Rudari, F. Delogu,
[3] SuribabuKoyya,T.D.V.A.Naidu,March 2016,Design of Intelligent F. Silvestro, L. Campo, F. Fascetti, N. Pierdicca, R. Crapolicchio,
greenhouse monitoring and controling system based on CAN S. Hasenauer, and S. Puca, "Validation of remote sensing soil
Bus,International Journal of Innovative technology,Vol.04,Issue moisture products with a distributed continuous hydrological
.03. model," in 2014 IEEE Geoscience and Remote Sensing
[4]Zheng Qiang, Peng Lin, Zou Qiuxia,Gao Lutao, The design of Symposium, July 2014, pp. 3319- 3322.
remote Greenhouse monitoring based on Embeeded web server, [11]A. Bseiso, B. Abele, S. Ferguson, P. Lusch, and K. Mehta, "A
Agricultural mechanization research,Vol.11,Issue 11,2013,pp.84/ decision support tool for greenhouse farmers in low-resource
87. settings," in Global Humanitarian Technology Conference
[5]Jang Feng,Zhao wei,Zigbee technology application in greenhouse (GHTC), 2015 IEEE, Oct 2015, pp. 292-297.
wireless monitoring system, Agricultural mechanization Research, [12] O. Mirabella and M. Brischetto, "A Hybrid Wired/ Wireless
Vol.9, Issue 9,2013, PP.218-222. Networking Infrastructure for Greenhouse Management", IEEE
[6] Y.X.Han,W.F.Yang,S.M.Yang,"The embedded smart Home Transactions on Instrumentation and Measurement, vol.60, pp.
System based on Zigbee and GPRS Technology" Information 398- 407, Feb 2011.
Technology, Harbin, China, No.12,pp.102-108,2012.
[7]Zheng Qiang, Peng Lin,Zou Qiuxia,Gao Lutao,the design of remote
greenhouse monitoring system based on the embedded web
server,Agricultural Mechanization Research,Vol.11,Issue
11,2013,PP.127-130.

368 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Agree- Culture: Eventual Fate of Precision Agriculture


in India Utilizing Machine Learning and Artificial
Intelligence
Mr. Rajesh R Yadav
Assistant Professor, Dept. of Computer Science, V.K.Krishna Menon College, Bhandup, Mumbai, India
Email: rajeshy2808@gmail.com

Abstract- The adjustments in climate and the food creation and this undertaking has lead to the
atmosphere conditions have consistently arrangement of the Green Revolution. Through the green
influenced crop development, cultivating and upset the accompanying accomplishments have been
creature reproducing. A measure set up in some acquired:
cases comes up short. Data and intellectual
advances are inventive strategies that can be • Acquiring more land for cultivation-development.
utilized to battle these progressions by applying • Expansion of water system plans.
"precision agriculture". In this paper, conversation
is on eventual fate of precision agriculture which • Adoption of cutting edge high-yielding seeds.
has been demonstrated to work in different nations • Application of better water board strategies.
utilizing AI and computerized reasoning. The
extent of use is engaged on medium and huge scope • Plant insurance exercises through reasonable
farmers with a plan to bring up the preferences and utilization of composts, pesticides and yield
drawbacks of the procedures. Beforehand there has applications.
been a moderate development in this part yet from The above accomplishments thusly have prompted
the year 2016 onwards many new businesses have
a great ascend in wheat and rice creation. Thinking
been rising which are yielding high ventures. These
intellectual innovations have been applied in
about the quantum rise, a national Pulse Development
cutting edge nations and have come about in Program that secured right around 13 states was set
expanded yield, development in GDP, low death up in 1986 with the intend to present the improved
rates and improved expectations for everyday advancements for farmers. Across the country
comforts. The equivalent can be applied locally to Technology team was divulged in 1986 after the
help creation in the rural segment. accomplishment of National Pulse Development
Keywords: Agriculture, Machine Learning, Program to improve the oil and seeds area in India's
Artificial Intelligence, AI advancements frugality. Pulses too went under this program. This
pattern has proceeded till date and enhancements have
I. INTRODUCTION been seen ceaselessly. As per Precision cultivating or
Agriculture in India is the significant wellspring of accuracy horticulture alludes to playing out the proper
employment for 66% of the whole populace India, thing, in the correct way, in the ideal spot and at the
Service and private part represent the rest. Farming perfect time. Exactness cultivating is implied to
area involves roughly 43% of India's topographical land coordinate rural practices according to agro-climatic
spread. In the previous days, India was to a great extent conditions so as to build the exactness of utilization.
subordinate upon food imports however throughout the Over the most recent 40 years cultivating land has
years through research, the nation has accomplished contracted a little however the number of farmers had
independence in grain and seed creation. Coordinated quite recently multiplied. According to Agricultural
endeavors have been made to act naturally adequate in Registration of 2010-11, the all out number of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 369
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

operational property (singular farmers) was assessed preliminaries; however permits plant reproducers all the
as 139.36 million and the all out worked zone was more precisely foresee the execution of yields.
158.59 million hectare. The normal size of holding had
been assessed to be 1.25 hectare. It essentially implied
that one farmer was having 1.25 hectare of land to
develop the yields. This implies there is a tremendous
degree to make a harmony between the accessible
grounds versus the land under development. To make
this suitable, accuracy farming offers an open door
adventure into this sort of cultivating for its supportability.
II. METHODOLOGY
The methodology of research focuses on the recent
Fig. 1 Machine learning approach processing for data
technologies that can be leveraged in order to provide
reasonable option for current techniques in agriculture. Data about the yield assortment to be tried is utilized
as input and gone through an AI approach that directed
The study is isolated into 3 areas
or unaided, for example, convolution neural network
1] Area 1 arrangements with AI and accuracy (CNN), Bayesian system, bolster vector machine and
agriculture:- so on. The methodology investigations the contribution
A) AI intellectual innovation. to extricate the applicable highlights and data identified
with the difficult subject. In light of the factors and
B) Effect of Precision Agriculture.
capacities set, the preparing calculation playing out the
C) AI advancements for exactness cultivating. information examination and gives a possible yield that
2] Area 2 arrangements with results and end :- is grouped, or relapsed.
A) Indian Agriculture and extension for artificial B. Effect of Precision Agriculture
insight.
Applying psychological advancements in
B) Difficulties of AI in Agricultural Sector in India. agribusiness could help in deciding the best yield decision
3] Area 3 arrangements with conclusion and future for various climatic conditions and more qualified to
scope. farmers' needs. This can be accomplished by
investigating and looking at data about seeds types,
1] Area1: Arrangements climate, kinds of soil, pervasions in a certain territory,
A. AI intellectual innovation likelihood of maladies and information about what
worked greatest, step by step results, current market
Machine Learning is the part of counterfeit patterns, costs also, buyer needs. Farmers would then
knowledge and software engineering which manages be able to settle on choices on step by step instructions
the formation of calculations that show self-learning to expand return on crops.
property. With the guide of Artificial Intelligence, precise
and productive frameworks equipped for assessing are The pace at which the AI innovation is getting created
created to illuminate the everyday errands. Researchers no doubt that the cultivating business is on the cusp of a
can utilize computerized recreations to lead early yield mechanical upheaval under artificial knowledge as its
tests to assess how a specific assortment may perform main thrust.
when confronted with various sub atmospheres, soil
types, climate designs and different variables. This
computerized testing doesn't supplant physical field

370 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

C. AI advancements for exactness cultivating 2] Area 2 arrangements


i. Automatons and unmanned ethereal vehicles A. Indian Agriculture and Extension for
Unmanned ethereal vehicles (UAV) catch pictures Artificial insight
and gather information about a specific scene. The The sole driver and advancement of AI and its
utilization of UAV prompts low cost of activity and wide psychological suggestions across enterprises, has not
natural observing. Giving better approaches for been simply to lessen manual exercises altogether,
expanding crop yields through in-profundity however dynamically and precisely foresee for future
examination, significant distance crop showering and results. Agriculture in the decade ago has been
high-effectiveness will upgrade the degree of profitability. constrained by entrance of innovation driven business,
Advancements in drones are rapidly picking up trust the beginning of AI has permitted a chance to illuminate
among farmers. Pragmatic applications for drone difficulties like environmental change and a worldwide
innovation are continually progressing in this manner temperature alteration. This achievement has assisted
almost certainly, drone- fueled arrangements will be on with adapting up to the expanding measure of
the step throughout the following not many a long time. multifaceted nature in present day cultivating. Farm
ii. Talk bots for ranchers/farmers Analytics driven by the intellectual capacity of neural
systems to run through huge datasets, has gotten one
Talk bots are conversational menial helper which of the high drive for effectiveness and research driven
mechanizes collaborations with end clients. In applications.. While the improvement of AI calculations
horticulture talk bots are utilized for correspondence can be a difficult assignment in an agrarian setting, the
between farmers, government partners, producers and approach of huge information and area explicit AI
markets. While still in its early days visit bots were utilized apparatuses identified with the area can increment
for the most part by retail, travel, media or on the other farming yields. The eventual fate of AI in cultivating is
hand protection offices. Agribusiness could likewise use progressively significant for a nation like India, where
this developing innovation by helping farmers with over 64% of everyone is as yet utilizing direct farming
answers to their inquiries, offering guidance and while near 75% despite everything depends on the
proposals on explicit homestead issues. The inventive division for their occupation. In contrast to the west,
mode will give opportune and intelligent checking of India's horticultural issues can't be managed simply
the harvests remotely. progressed agritech arrangements like plant rearing and
iii. Driverless Tractors yield duplication as cultivating despite everything
remains to a great extent dissipated and chaotic.
Mechanical agribusiness is a foreseen future yet to
be completely actualized in the following 10-15 years. B. Difficulties of AI in Agricultural Sector in
Driverless tractors play out all the ranch rehearses self- India
rulingly. They are fixed with sensors that can play out In spite of the fact that the utilization of AI is
the necessary practices, screen deterrents and promising with regards to cultivating, the advancement
comprehend where to apply the homestead inputs. of AI calculations can be testing in farming setting. The
Driverless vehicle innovation has been the adjustment underlying and major square requires huge pieces of
over a wide cluster of innovative firms. Farming is information, clean information to productively prepare
presently consolidating off-rack advancements, for the calculations with noteworthy measure of spatial
example, Global Positioning System (GPS) information in agribusiness. A more prominent measure
frameworks, radars and sensors. This advancement in of adequate information is for the most part accessible
programming and apparatus are making new roads of during the developing season which is once, making
venturesome cultivating and ranchers will lessen research cycles constrained. For India specifically, non-
pressures on an AI. accessibility of information from remote regions and

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 371
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

farmlands that don't meet least hectare measures during REFERENCES


studies are regularly forgotten about, given the dominant [1] Rich. E and Kevin Knight, "Artificial intelligence", New Delhi:
part of our farmlands despite everything stay divided, a McGraw-Hil,1991.
mass paper or on the other hand all encompassing [2] S. Russell and P. Norvig , "Artificial Intelligence: A Modern
information assortment might be very aspiring. Approach", Prentice Hall, New York , 2003.
[3] Zixing Cai and Guangyou Xu, "Artificial Intelligence and Its
With the regularly changing climatic conditions, there Applications", The 3 rd Edition, Tsinghua University Press,
are eccentric climate conditions in the dirt surface. The Beijing ,2004.
exceptional appearance of vermin and sicknesses [4] Clark.F, "Striking Hypothesis", Human Sci. & Tech. Press,
remains obscure even with enough assurance gauges Changsha, 2003.
set up. [5] Polya.G, "How to Solve It: A New Aspect of Mathematical
Method", Princeton University Press, New Jersey,2004.
Farmers and cultivators may feel made sure about
[6] J. Han, M. Kamber and J. Pei,"Data Mining: Concepts and
from all collect and get ready for a guard gather however Techniques", MK Series, 2012.
the vulnerabilities of nature are consistently in pausing
[7] D Ramesh and B Vishnu Vardhan, "ANALYSIS OF CROP YIELD
What may happen with a similar seed and compost in PREDICTION USING DATA MINING TECHNIQUES",
the US may not be relevant in India. A couple of variables International Journal of Research in Engineering and Technology,
that could influence the change would commonly eISSN: 2319-1163 | pISSN: 23217308.
incorporate the estimation of downpour per unit of a [8] Aakunuri Manjula and Dr. G.Narsimha, "Crop Yield Prediction
yield planted, soil types, examples of oil corruption, with Aid of Optimal Neural Network in Spatial Data Mining:
New Approaches",Volume 6, Number 1,International Journal of
light hours, temperature and so forward. To address Information & Computation Technology, 2016, pp. 25-33.
the issue of cultivators' interests; the issue is no two
conditions will be actually similar, which makes the
testing, approval and fruitful rollout of such
advancements substantially more relentless than
generally other enterprises.
III. CONCLUSION AND FUTURE SCOPE
Precision agriculture still remains a wishful concept
in many developing countries. It is possible to achieve
the above vision in India in order to improve the food
security and per capita income of the farmers. The above
mentioned challenges and promising solutions are
prediction of future landscape of the Indian agriculture.
Technological advancements and government initiatives
to foster and promote precision agriculture through aids,
reliefs, tax holidays and other incentives to farmers will
greatly attract investment. This move will thus help
deliberate efforts to protect the growth and sustainability
of future generations yet to come.

372 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Email Spam Filtering Using Naive Bayes Classifier


Dr. Keshetti Sreekala1, Ganesh Dasari2
1
Assistant Professor, Department of CSE, Mahatma Gandhi Institute of Technology, Hyderabad, India
2
Student, B.Tech IV Yr., Department of CSE, Mahatma Gandhi Institute of Technology, Hyderabad-India
Email:ksrikala_cse@mgit.ac.in1, dganesh_cse1705d0@mgit.ac.in2

Abstract- E-mail spam continues to be a big in email spam filtering such as SVM (support vector
problem on the internet. Daily we receive lots of machine), Decision tree, neural network, logical
mails which contain more useless content i.e., cash regression and Naïve Bayes. Among those naïve Bayes
back offers, irrelevant posts and many others. Due is popular in commercial and open-source filters.
to those the email users were neglecting to read
the useful or company mails. There are many II. RELATED WORK
techniques to filter the spam messages and stop
them from entering our inbox. In this paper, We
Shafi'i Muhammad Abdulhamid, et al. [1] proposed
present Naïve Bayes Classifier for email spam "Comparative Analysis of Classification Algorithms for
filtering on two datasets. Here we classify the mails Email Spam Detection", Maintaining the Integrity of the
into spam and ham based upon Naïve Bayes Specifications. Their survey indicates that a number of
algorithm which uses Bayes theorem in the back classification algorithms exist that if properly explored
end. It uses probability functions to classify a mail through feature selection then it will yield more accurate
into spam or ham. Naïve Bayes classifier is the results for email classification.
simplest technique in the classification. It is mainly
known for its simplicity, easy to implement, linear Sunday Olusanya Olatunji et al. [2] proposed
computation and accuracy. "Improved email spam detection model based on
support vector machines", in this work, support vector
Keywords-Spam Filtering, Naive Bayes
machines-based model is proposed for spam detection
Classifier, Email, Probability.
and attention is given to appropriately search for the
I. INTRODUCTION optimal parameters to achieve better performance.
In recent years, the increasing popularity and low Ismaila Idris, Ali Selamat et al. [3] proposed
cost of e-mail have attracted direct marketers. Bulk "Improved email spam detection model with negative
mailing software and lists of e-mail addresses harvested selection algorithm and particle swarm optimization",
from Web pages, newsgroup archives, and service This work demonstrates adaptive nature of unsolicited
provider directories are readily available, allowing email by the use of huge mailing tools prompts needed
messages to be sent blindly to millions of recipients at for spam detection.
essentially no cost. As a result, many unsolicited bulk Ismaila Idris, Ali Selamat,Sigeru Omatu et al. [4]
e-mails, also known as spam e-mail spread widely and proposed "Hybrid email spam detection model with
become serious threat to not only the Internet but also negative selection algorithm and differential evolution",
to society. For example, when user received large inspired by adaptive algorithm, this paper introduces a
amount of e-mail spam, the chance of the user forgot modified machine learning technique of the human
to read a non-spam message increase. As a result, many immune system called negative selection algorithm
e-mail readers have to spend their time removing (NSA). The used a fitness function to maximize the
unwanted messages. E-mail spam also may cost money distance of generated spam detectors from the non-
to users with dial-up connections, waste bandwidth, spam space.
and may expose minors to unsuitable content. There
are several machine learning algorithms are employed Samira Douzi, Feda A.AlShawan, Mouad
Lemoudden, and Bouabid El Ouahidi et al. [5]

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 373
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

proposed " Hybrid Email Spam Detection Model Using representing as the bag of its word. The bag of words
Artificial Intelligence", One of the most common is always used in methods of document classification,
representations used in spam filters is the Bag-of-Words where the frequency of occurrence of each word is
(BOW). Although BOW is very effective in the used as a feature for training classifier. These bags of
classification of the emails, it has a number of words features are included in the chosen datasets.
weaknesses.
These are the motivations of this work which can
identify the spam messages from the input dataset and
check the performance of the classifier.
III. DESIGN AND METHODOLOGY OF
EMAIL SPAM FILTERING SYSTEM
Fig 3.2 Descripting Naïve Bayes technique
A. System architecture
Naive Bayes technique uses Bayes theorem to
System architecture is the conceptual model that determine that probabilities spam e-mail. Some words
defines the structure, behavior, and more views of a have particular probabilities of occurring in spam e-
system. An architecture description is a formal mail or non-spam e-mail. By using Bayes using we
description and representation of a system, organized calculate the following probabilities. Suppose the
in a way that supports reasoning about the structures selected word is "replica" .The above fig 3.2 shows the
and behaviors of the system. Figure 3.1 shows the block diagram of how spam and ham gets classified by
architecture of Email Spam Filtering System. the classifier
The following is the formula for the probability
function.

Where,
• P (S|W) is the probability that a message is a spam,
knowing that the word is it.
• P(S) is the overall probability that any given message
is spam.
• P(W|S) is the probability that the word appears in
spam messages.
• P(H) is the overall probability that any given message
is not spam.
Fig 3.1 architecture of the Email Spam Filtering System
• P(W|H) is the probability that the word appears in
B. Methodology ham messages.
The Naive Bayes algorithm is a simple probabilistic By using the above probabilities the naïve Bayes
classifier that calculates a set of probabilities by counting classifier works.
the frequency and combination of values in a given To achieve the objective of the project, It is
dataset. In this work, Naive Bayes classifier use bag of conducted in three phases. The phases involved are as
words features to identify spam e-mail and a text is follows:

374 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Phase 1: pre-processing are then used to calculate the probabilities and also the
• Phase 2: Feature selection classifications of data into spam or ham then the
parameters are analyzed for better performance
• Phase 3: Naïve Bayes classifier
IV. RESULTS OF THE PROPOSED EMAIL
C. Pre-Processing SPAM FILTERING SYSTEM
Today, most of the data is incomplete containing The input module takes the input of email messages
aggregate, noisy and missing values. In this phase some which are saved in a folder. All the email messages are
words like conjunction words, articles are removed read. The below figure 4.2.1 shows the spam messages
from email body because those words are not useful in present in the dataset .
classification.
D. Feature Selection
In this phase, we apply the feature selection like we
select the threshold value for classifying the mail into
spam or ham based on the probability.
E. Naïve Bayes Classifier
The Naive Bayes algorithm relies on Bayes Rule. Fig 4.2.1 input dataset consisting of spam messages
This algorithm will classify each object by looking at all Figure 4.2.2 shows the categorical representation
of its features individually. Bayes Rule below shows us of the dataset that is done in Excel based on the spam
how to calculate the posterior probability for just one and ham and is used to train the model.
feature. The posterior probability of the object is
calculated for each feature and then these probabilities
are multiplied together to get a final. Following is a data
flow diagram of E mail Spam Filtering system depicted
in Fig 3.3

Fig 4.2.2 the categorical representation of the dataset based


on ham and spam

The figure 4.2.3 shows the ham messages present


in the dataset.

Fig 3.3 Data flow diagram for the model

The above figure 3.3 represents the data flow


Fig 4.2.3 ham messages present in the dataset
diagram for the model of the Naïve Bayes classifier.
The data flow starts by first giving the dataset to the The figure 4.2.4 shows the spreadsheet of the dataset
classifier which is a collection of raw data and this raw categorized based on spam and ham in the Excel.
data is sent to preprocessing which filters the noise and
converts the data into arrays of words. These words
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 375
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig 4.2.4 spreadsheet of dataset Fig 4.4.1 output of the Email spam filtering model

The logic module is the implementation module which The above figure 4.4.1 shows the output the
contains the main logic. The preprocessing phase we messages which are incorrectly labeled as spam and
convert all the data into bag of words that it will be ham; it has predicted the messages based on the trained
easy for further processing. Then the bag of words is dataset.
used to calculate the required probabilities and then
based upon the probabilities the input data is trained to V. CONCLUSION
classify the mails as spam or ham. Then we provide the From the results obtained for Email Spam Filtering
testing data set to check the performance of the System we can conclude that the proposed approach
classifier. is highly based on Naïve Bayes classification technique.
The approach works using the preprocessing phase
where the datasets are converted into bag of words
and then they are passed through the Naïve Bayes
function for classifying the mails. The results indicate
that the proposed approach is a valuable approach and
can be significantly support accurate classification.
Fig 4.3.1 count of spam and ham in dataset

The fig 4.3.2 shows the messages are assigned values REFERENCES
using lambda function i.e. 1 for spam and 0 for ham [1] Shafi'i Mohammad, Maryam and Osho , "Comparative analysis
of classification algorithms spam detection ", International journal
which helps the model in prediction. of computer and information security , vol1, 2018, pp61-67.
[2] Sunday Olasunya Olatunji, "Improved Email Spam detection
model based on support vector machines", Neural Computing
and Applications,2017. pp. 691-699.
[3] Ismaila Idris Ali Selamat, Sigeru Omatu, "Hybrid Email Spam
Detection Model with negative selection algorithm and
differential evolution ", Engineering Applications of Artificial
Intelligence, 2013.
[4] Kirti Agarwal and Tarun Kumar, "Email Spam Detection using
integrated approach of Naïve Bayes and Particle Swarm
Fig 4.3.2 values 0 or 1 assigned to the messages Optimization", second international conference on intelligent
computing and control systems, 2018.
the output module, Here the dataset given is tested
[5] Samira Douzi, Feda A.AlShawan, Mouad Lemoudden, and
and it's classified into spam and ham and displays Bouabid El Ouahidi , "Hybrid Email Spam Detection Model
"SPAM" and "HAM" percentages and "spam labeled Using Artificial Intelligence", Internaional Journal of Machine
as ham", "ham labeled as spam" messages from the Learning and Computing,2020, vol. 10. pp.316-322.
dataset.

376 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Appraising the Strength of Machine Learning in


Healthcare: Novel Perspectives
Manas Kumar Yogi1, Jyotsna Garikipati2
1
Asst.Prof. Dept.of CSE, Pragati Engineering College(Autonomous), Surampalem, India.
2
Dept. of IT V R Siddhartha Engineering College, Vijayawada, India
Email: manas.yogi@gmail.com1, jyotsna.garikipati@gmail.com2

Abstract- Machine Learning (ML) Techniques medical decision making. Due to covid-19, this
in HealthCare are very much useful in the early paradigm change happened at a faster pace. Many
diagnosis of various diseases, discovery of new individuals are perplexed by AI and ML. AI can be
drugs for the new viruses or diseases that are understood as a machine or a technology that can act
spreading, predicting the diseases, and maintaining intelligently by making suitable decisions. ML is a subset
the huge volumes of data that is being generated -
of AI and Deep Learning (DL) is a subset of ML.
in an easily accessible manner. The accuracy of
different algorithms for the diagnosis of various In simple words, ML can be defined as making the
diseases has been compared. Drug development computer(machine) learn on its own. To do so, we will
using Support Vector Machine (SVM) and Random use a model to train the machine. The model is nothing
Forest (RF) is compared. The differences between but a mathematical formula that can be applied to the
the Electronic Medical Record (EMR) and data that is provided to the machine as input. This is in
Electronic Health Record (EHR) are discussed and
contrast to the traditional programming which requires
case studies are discussed to understand the use
us to tell the computer what to do with the data provided
of EHR. Finally, robust disease prediction
frameworks are also discussed in this paper. This by a program. Based on the problem or the application
paper will act as a readymade guide to persons who at hand an appropriate machine learning algorithm will
want to pursue using ML principles in the be chosen and will train the model by splitting the data
healthcare domain. set into two parts (generally unequal), namely training
Keywords-Healthcare, Machine Learning, Drug
and test data. There are numerous applications of ML
development, Electronic Medical Record, in the healthcare sector. These include Disease
Electronic Health Record. Identification and diagnosis, Drug Discovery and
Manufacturing, Electronic Health Records (EHR),
I. INTRODUCTION Disease Prediction, Radiology and Radiopathy, Robotic
NetFlix, Alexa, Siri and other websites that Surgery, and so on. In the present paper, we will be
recommend products/services to their customers based discussing the first four applications listed.
on their previous choices are the real-world examples II. LITERATURE REVIEW
of Machine Learning (ML). Advances in ML techniques
have skyrocketed in the recent past leading to a great Existing work done by researchers [2, 3] discussed
impact on various domains like the Finance, Media, various tools for SNP (Single Nucleotide
Travel, Retail, Healthcare sector etc. As per Gartner, Polymorphism) analysis and target discovery
the global Artificial Intelligence(AI)-based economic respectively and concluded that the Support Vector
activity will be about $4.2 trillion in 2021 with a 8.6% Machine (SVM) and Random Forest (RF) showed
increase from 2020 [1]. Advances in AI and ML better performance over other algorithms in both the
techniques help to unfold complex data patterns, thereby scenarios. In the survey paper [4], Random Forests,
providing quality solutions. When integrated with AI Ensemble models and Naive Bayes (NB) have
tools, there can be a considerable paradigm change in performed well in predicting heart disease. The

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 377
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

framework in [5] used a combined dataset with hybrid better diagnosis. Huge data will be generated for each
classifiers by combining traditional ones with the bagging and every patient which needs to be classified for the
and achieved highest accuracy of 99.05% using medical data analysis and the disease detection. First,
Random Forest Bagging Method (RFBM) and Relief the medical data will be analyzed and then used for
Feature Selection Methods for predicting diagnosing the diseases. This analyzed data will be the
cardiovascular diseases, whereas the framework in [6], input to the ML algorithm and the results will be obtained
where traditional methods like k-Nearest Neighbour by using the previously solved cases. These results will
(kNN), AdaBoost, Random Forest, Naive Bayes and be taken by the physicians to diagnose a novel patient
Logistic Regression are used, a positive prediction at a much higher speed and enhanced accuracy.
accuracy of only 94% is achieved. Using the Random
Forest, XGBoost and ResNet [7], creatinine value is A. Heart Disease
predicted with an area under Receiver Operating Various researchers have proposed different systems
Characteristic Curve (AUC) of 0.76 in classifying the for detecting heart diseases [14]. SVM gave the highest
samples for Chronic Kidney Disease. In [8], XGBoost, accuracy. The advantage of SVM over other techniques
SVM and Logistic Regression are compared and is that it constructs the classifiers correctly with less
concluded that XGBoost gave the best accuracy in over-fitting and robustness to noise. Its main drawback
predicting chronic kidney disease. In [9], the is, it is a binary classifier, with high computational cost
researchers studied the EHR's of New York City, which and its running time is also high.
has 24 cancers in total with 28 features. In [10], 366398
B. Diabetes
EHR's of 1694 colorectal cancer patients (CRC) and
3458 breast cancer (BC) patients were studied post Diabetes is due to the insufficient supply or improper
chemotherapy and observed that the patients with Type2 utilization of insulin taking place in the body. In the
diabetes showed more symptoms like anxiety, diabetes disease diagnosis, the research shows that the
depression and neuropathic symptoms. [11] has taken Naive Bayes algorithm gives better accuracy over the
a dataset with 1500 observations, built the Classification other algorithms. Naive Bayes on different data sets
And Regression Trees (CART) and RF predictive achieved 79.56% and 95% with the WEKA tool and
models to predict the variables that are responsible for MATLAB with SQL Server respectively. The Naive
chronic diabetes. Reference [12] combined K-means Bayes algorithm eliminates the unnecessary features
clustering with improved ensemble methods to diagnose thereby enhancing the performance with less
liver disease and achieved accuracy as high as 99.35%. computational time. But we need to give enormous input
The automated heart disease diagnosis system proposed to get a better output.
in [17] integrates convolutional neural networks, genetic
C. Liver Disease
algorithms, SVM and NB and achieves 85.3%
accuracy. In [13], a new improved k-means clustering Liver disease is also called Hepatic disease. The
algorithm is used by setting the seed value depending FT (Functional tree) algorithm gave better results. On
on the minimal clustering error. the UCI data set using the WEKA tool, it gave 97.10%
accuracy. The FT algorithm has a very easy
III. DISEASE IDENTIFICATION AND interpretation and also its prediction is faster. But the
DIAGNOSIS calculations involved will be complex if the values are
Major changes have come in the computer aided uncertain.
diagnosis applications because a small error can lead
D. Dengue Disease
to a wrong treatment, which in adverse cases may result
in loss of patient's life. In identifying the diseases, ML This problem is caused due to mosquitos which
algorithms can be used for pattern recognition and result into viral infection subsequently leading to serious
hence improve the perception accuracy thus leading to illness and death. RS (Rough Set) theory shows

378 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

promising results of 100% accuracy. Uncertain restricted environment, which is different from the actual
problems can be solved using Rough Set theory. behavior of the microbes. It takes around two years.
Although it is very easy to understand and applies for Step 5: In-Vivo studies: Now the compounds will
both qualitative and quantitative, it is not widely used. be tested on animal models like mice etc. Again the
E. Hepatitis Disease failure rate will be high with a completion period of one
to two yrs.
Various ML algorithms have been used to diagnose
Hepatitis disease, which is due to the inflammation of Step 6: Clinical Trials: Now that the compound
the liver. Feed Forward Neural Networks with back is showing promising results in the above stages, it will
propagation technique using the RapidMiner tool gave be tested in human settings to validate the usefulness
results with 98% accuracy. Neural Networks are and safety of the compound on humans. This takes
known for adaptive learning and self-organization. nearly six years.
Overall the NB algorithm and the SVM are mostly used Step 7: Only those drugs that complete the above
and have better results. tests will be submitted to FDA for approval. Once this
IV. DRUG DISCOVERY AND is done, the drug will be commercially available in the
MANUFACTURING market. This step roughly takes one year.

For a drug to come into the market it will take more As the overall process is taking more than 10 years,
than 10 years after extensive research with an average we need to speed up the process except for the clinical
cost of 2.6 billion dollars. Consequently, for most of trials. Lead compounds can be discovered and then
the rare diseases effective treatment is not getting done. optimized using digital techniques for studying the
Traditional approaches to drug discovery focus mainly molecular structures, their bindings, relation between
on overall treatment of the body. With the drastic the structure and the activity etc. ML techniques can
increase in the cost of the drug discovery, alternative be used in various stages of drug discovery, like in
approaches using ML techniques are being used. Now, predicting how different drugs bind with the proteins,
let us first see the various steps involved in drug discovering the optimal response of a drug, making sure
discovery and then how ML helps in speeding up the that the body responds well to a medication or
process. The steps involved in the drug discovery are treatment, and optimizing the effect of the chemical/drug
[17]: on the molecules. Various machine learning methods
can be used for the Drug Target Interaction that can be
Step 1: Target Identification: First we identify based on either the similarity/distance, deep learning,
the possible targets for the diseases. Roughly two years feature, matrix factorization, network based or hybrid
are needed for this. methods [15]. An alternative for in-vitro is to use the
Step 2: Lead Discovery: The main chemical in-silico where computer simulation will be done [16].
compound that can be used for the treatment of the Some of the companies that were using AI and ML
disease will be identified. Here, we need to narrow techniques for the drug manufacturing are Pfizer, Janssen
down to the actual potential compounds in one to two Pharmaceutica, Sanofi, Novartis, Bayer, etc.
years. The algorithms RF and SVM are widely used for
Step 3: Medicinal Chemistry: Need to test the drug discovery [17]. The RF is explicitly used for huge
potential compounds for their reactions with the targets multi-featured data sets. RF accelerates the training of
identified in step1. This step needs around two years. the model, with minimal parameters, dealing with the
missing and nonparametric data. Another version, the
Step 4: In-Vitro Studies: The optimized set of the
multi-variant RF, limits the error by various error
compounds will be tested in an in-vitro model of the
estimating techniques. RF is used to generate the
disease in which the cells and the microbes behave in a
regression tree nodes and the leaf nodes. Leaf nodes

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 379
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

will make the predictions regarding the dose-specific quicken precision medicine research, etc. EMR will
profile and also store the functional data. contain the real-world data of the patient's clinical and
SVM is used to unrelate different classes of private data, which can be either in structured or
compounds using the feature selector by getting a hyper unstructured form. Analyzing the unstructured data is
plane. The count of hyper planes is not finite. In the relatively difficult and time consuming when compared
case of linear data, depending on the selected features, to the structured data [19]. These EMRs are integrated
the classes of compounds are projected into a chemical for a long-term view of a particular patient. With a
feature space. For N dimensional space, optimal standardized EHR system, if a patient wants to switch
hyperplane is obtained by maximizing the margin to a different doctor, the patient's data can be
between the classes of compounds. SVM can separate homogeneously transferred to different hospitals. This
the active compounds from the available compounds, reduces record duplication, identifies missing data,
and give them rankings in the database etc. These thereby reducing the time spent on the clinical care and
regression models help us to find the relation between hence improving the quality of care.
the drug and the ligand. SVM can also differentiate the Statistical ML methods such as Logistic Regression,
active and inactive molecules. SVM, RF etc. are used for mining reliable predictive
Due to Covid-19 pandemic, the research community patterns using EHR data. Natural Language Processing
is forced to use ML and AI to develop vaccines. As the (NLP) approach [20] can also be used for retrieving
understanding or the knowledge about Sars-Cov2 virus useful data from EHR. Now let us take some of the
is limited, predictive modelling is used. case studies to understand the use of EHR in a better
way.
V. ELECTRONIC HEALTH RECORDS CASE 1[9]: Cancerous tumors when detected and
An Electronic Health Record (EHR) is a digital treated at an early stage, can improve the chances of
version of the patient's health/treatment data. They store the survival of the patients. Delayed detection or
the real-world data of the patient during and after the treatment may result in shorter survival periods. Even
meeting with the medical professional. The data from though machine learning algorithms are used in the
all the smart devices like the sensors on the patient's diagnosis and prediction of cancer, wrong or biased
body, smart homes, robots, etc. will be collected and data leads to a wrong prediction and hence to a wrong
shared among the authorized users for a better treatment. SVM can be used for both the linear and
diagnosis, monitoring, early detection and treatment of nonlinear relationships between the predictors and the
the patient. Smart Health System which takes data from outcomes. Generally, EHRs might contain missing data
the EHR, includes acquiring data from different sources, due to various reasons like the availability of different
interconnecting between different devices using different testing equipment, how the disease progresses and
technologies by ensuring the security and privacy issues others. Because of the missing data problems, the
and processing the data and data dissemination. accuracy in the classification and prediction of diseases
The terms EHR and Electronic Medical Record using machine learning algorithms will be reduced
(EMR) are often confused. EMR will store the medical drastically. The data is stored in the form of vectors
and treatment history of a patient from a single physician and the missing values are filled with the mean values.
in digital form. It is not shared among the various Kernels are used in SVM to manipulate the data. By
doctors. On the contrary, EHR will store the patient's plotting the testing scores for the linear kernel SVM
data from various doctors. It will give a holistic view of and RBF (Radial Basis Function) kernel SVM in K-
the patient's health [18]. fold cross-validation, it is observed that the RBF kernel
SVM is more efficient than the linear SVM.
The EMRs help us to discover the phenotype-
genotype associations, detect the adverse drug event, CASE 2[11]: As more and more data is being stored
in the enterprise databases and in the cloud storage for
380 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the EHR, we now have to deal with big data. Big data VI. DISEASE PREDICTION USING
can be described with 4V characteristics. They are MACHINE LEARNING
Volume, Variety, Velocity and Veracity. Predictive Classical Diagnosis requires that the patients have
analysis is needed by the doctors to identify the to undergo various medical tests and based on the
admission of the patient at an early stage. The main reports obtained, the Medical Supervisor will start
challenge is to find the strong indicators for the accurate treating the patient. This is a very laborious, costly and
prediction. Predictive modelling takes help of a time-consuming process. To speed up the process
mathematical model for prediction of the future. machine learning techniques can be used. The general
Independent variables are identified and a mathematical workflow of any disease prediction system with ML
model is designed. Among the CART, RF and the starts with the user input as the symptoms the patient is
scalable RF models, the scalable RF model gave a better exhibiting, which then compared with the dataset having
accuracy of 87.5%. various diseases and their symptoms and then using
CASE 3 [21] As EHRs contain data from different machine learning techniques the disease will be
hospitals, it might not have the data in a computable predicted. Now we will be discussing a few disease
fashion. To elaborate further, a medication might be used prediction frameworks.
for various conditions, and the condition for which this SVM and the Bootstrap aggregation (Bagging) using
medication is being used for a particular patient may Reduced Error Pruning (REP) tree can be used for
not be listed in the EHR. Even if the medication and the disease prediction [22]. Minimum Redundancy and
conditions were listed in the same note, they might not Maximum Relevance (MRMR) feature selection
be linked properly. The simplest statistical method to algorithm is used for extracting only the relevant features
store the medications and the conditions is the tabulation and also with less repetition. Three datasets namely the
method. Regression is better than tabulation and can diabetes dataset, breast cancer dataset and hypothyroid
differentiate the medications for hypertension. dataset were used. The training data is classified by
Regression also gives information regarding some means of operations related to SVM and Bagging. The
medications that are preferred over the other test data will first be classified using SVM. If a positive
medications depending upon the patient's condition. output is obtained, it will be validated. Otherwise the
LASSO (Least Absolute Shrinkage and Selection remaining test data will be classified using bagging. This
Operator) logistic regression is used to reduce over tool is not specific to any disease type.
fitting with simple functions. Using LASSO, the logistic
regression will be performed by keeping the summation Apriori Association Algorithm is used to select the
of the absolute values of the regression coefficients less 10 best rules from the dataset to implement different
than the given threshold value. classification algorithms [23]. Then the performance of
the 5 classifiers namely kNN, NB, Zero R, One R and
There are few problems with EHRs in the healthcare J48 is evaluated using the WEKA tool. Their study
systems. These are significantly related to the emphasized on usage of feature selection with the
implementation and the workflow disturbances. Only classification algorithms. In WEKA, Instance Based
affordable hospitals can implement an EHR system. For Learner (Ibk) with Apriori Associative Algorithm
small scale practices implementing EHR systems is not predicted Chronic Kidney Disease with 99% accuracy.
financially viable. Also, the workflow will be disturbed
because the clinicians have to spend their valuable time ML techniques like the kNN and RF are used to
filling up the documents. Also we need to have up-to- predict whether a person has Heart disease or not [24].
date technology to store the data. Depending on the attributes like the severity of the chest
pain, cholesterol level, age of the person etc the analysis
was done. The kNN and RF have been predicted with
accuracy of 86.885% and 81.967% respectively.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 381
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VII. FAIRNESS particular patient queries [26]. With so many


It is useless to use biased machine learning models applications of AI and machine learning in the healthcare
in any field. Many applications of ML will have the industry, many startups are now entering healthcare with
potential for life changing consequences and obviously machine learning and AI. Some of these include
its importance is supreme in healthcare, judicial system, SigTuple, Qure.ai, Tricog, OncoStem, Nirami Health
etc. Thus fairness in ML plays a crucial role. The need Analytics, Predible Health, CARING (Centre for
for fairness in ML is stimulated by the inclination to stick Advanced Research Imaging, NeuroScience and
to the legislative rules. ML models are to be built in Genomics). Due to the lack of trained doctors and the
such a way that they ensure trust and transparency. population explosion, the HealthCare industry is getting
Fairness is critically needed in all the domains in which overburdened. In India, the doctor patient ratio is
automated systems are used. Even though everyone 1:1700, a very higher value than the recommendation
agrees upon the need for fairness in ML, there is no by WHO which is 1: 1000. Various applications of ML
single idea that can be applicable in all the scenarios. in healthcare were discussed. The various algorithms
Fairness in ML on the classification parity due to the that can be used in the drug discovery, disease
protected features such as age, gender and race can identification and diagnosis, and prediction of diseases
be calculated [25] and described the dimensions for were explained. We have also understood how the Big
fairness in ML as the data, algorithms and metrics. Data generated in the EHR will be processed. Various
tools that can be used in the prediction of the diseases
A. Fairness in the Dataset were explained. Finally the aspect of fairness in machine
Even with a larger training dataset, that has either learning and the dimensions for fairness were discussed.
outdated or understated or has unintentional support The Covid-19 pandemic has stimulated the usage of
or has historical skewed attributes, then the ML AI and ML techniques in various domains, mainly in
methods outcomes might be unfair. Oversampling of the healthcare sector. The pandemic resulted in the
protected features is applied to have a fair dataset. generation of enormous amounts of data about patients
which then be used for various analyses. This helps in
B. Fairness in the Model or Algorithm speeding up the drug development process and also
The biasing in the ML algorithms can be due to the for a better and early diagnosis. Usage of machine
biasing in the dataset or in the preprocessing stage or in learning and artificial intelligence techniques will improve
the design of the algorithm like resource allocation etc. the productivity and fidelity of the existing systems,
thereby helping in attending more patients in less time
C. Fairness in the Metrics / Results with greater healthcare outcomes and limited cost.
This comes in the post-processing stage where REFERENCES
metrics are used for calculating the efficiency of the used
[1] M. Rimol. "Gartner Forecasts Worldwide IT Spending to Grow
algorithms. The threshold is determined to have an 9% in 2021." July 14, 2021. https://www.gartner.com/en/
unbiased outcome. The AUC (Area Under the ROC newsroom/press-releases/2021-07-14-gartner-forecasts-
Curve) scores of the Logistic Regression, RF and worldwide-it-spending-to-grow-9-percent-2021

XGBoost methods are compared and observed that [2] A. Nayarisseri, R. Khandelwal, G. Thakur, and A. S Planche.
"Artificial Intelligence, Big Data, Machine Learning Approaches
the output of an accurate model does not infer a fair in Precision Medicine and Drug Discovery." last modified Jan
outcome. 2021. https://www.researchgate.net/publication/348234715_
Artificial_Intelligence_Big_data_and_ Machine_Learning_
VIII. CONCLUSION approaches_in_Precision_Medicine_ Drug_Discovery

As per Frost & Sullivan report, by the year 2025, [3] M. Elhoseny et al., "A new multi-agent feature wrapper machine
learning approach for heart disease diagnosis," Computers,
AI systems will be part of everything from population Materials & Continua, vol. 67, no.1, pp. 51-71, 2021,
health management to digital avatars that can answer doi:10.32604/cmc.2021.012632

382 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[4] V. V. Ramalingam, A. Dandapath and M. K. Raja. "Heart Disease [15]M. Bagherian et al. "Machine learning approaches and databases
Prediction using machine learning techniques: A survey." for prediction of drug-target interaction: a survey paper", Briefings
International Journal of Engineering and Technology, vol. 7, in Bioinformatics, vol 22, no. 1, 2021, pp: 247-269, doi:10.1093/
(2018): pp. 684-687 bib/bbz157
[5] P. Ghosh et al., "Efficient Prediction of Cardiovascular Disease [16]Sallieq. "Differences between in vitro, in vivo and in silico
Using Machine Learning Algorithms With Relief and LASSO studies." Jan, 09, 2019. https://mpkb.org/home/patients/
Feature Selection Techniques," in IEEE Access, vol. 9, pp. 19304- assessing_literature/in_vitro_studies#:~:text= Bacterial%
19326, 2021, doi: 10.1109/ACCESS.2021.3053759. 20sequencing%20techniques%20%E2%80%93% 20As%20an,
polymerase%20 chain%20reaction%20(PCR).
[6] E. Maini, B. Venkateswarulu, B. Maini, and D. Marwaha.
"Machine Learning- Based Heart Disease Prediction System for [17]L. Patel, T. Shukla, X. Huang, D. W. Ussery, and S. Wang.
Indian Population An Exploratory Study done in South India." "Machine Learning Methods in Drug Discovery." molecules 25,
Medical Journal Armed Force India, (2021). no.22(2020):5277
[7] W. Wang, G. Chakraborty, and B. Chakraborty. "Predicting the [18]"Understanding EMR Vs EHR". nextgen. https://www.
Risk of Chronic Kidney Disease (CKD) Using Machine Learning nextgen.com/insights/emr-vs-ehr/emr-vs-ehr.
Algorithms." Applied Sciences 11, no 1(2020):202.
[19]M. Tayefi et al. "Challenges and opportunities beyond structured
[8] H. You. "Predictive analysis of chronic kidney disease based on data in analysis of electronic health records" WIRE's
machine learning." Engineering and applied Science Letters, vol. Computational Statistics, (2021):1-19, doi: 10.1002/wics.1549
11, no. 1, pp.62, 2020.
[20]J. Zeng et al. "Natural Language Processing to Identify Cancer
[9] X. Zhang, J. Xiao, and F. Gu, "Applying Support Vector Machine Treatments with Electronic Medical Records." JCO Clinical
to Electronic Health Records for Cancer Classification," 2019 Cancer Informatics,5, (2021): pp. 379-393. doi: 10.1200/
Spring Simulation Conference (SpringSim), 2019, pp. 1-9, doi: CCI.20.00173
10.23919/SpringSim.2019.8732906.
[21]D. Backenroth, "Monitoring Prescribing patterns using regression
[10]X. Luo et al. "Analysing the Symptoms in Colorectal and Breast and electronic health records." BMC Medical Informatics and
Cancer Patients with or without Type2 diabetes using EHR data." Decision Making 17, no.17(2017):175. doi: 10.1186/s12911-017-
Health Informatics Journal, vol. 27, no.1, (2021):pp. 1-20. doi: 0575-5.
10.1177/14604582211000785
[22]M. Rathi, and V. Pareek. "Disease prediction tool: an integrated
[11]S. Rallapalli, and T. Suryakanthi, "Predicting the risk of diabetes hybrid data mining approach for healthcare." IRACST-
in big data electronic health Records by using scalable random International Journal of Computer Science and Information
forest classification algorithm," 2016 International Conference Technology & Security vol. 6, no.6,(2019): pp. 2249-9555.
on Advances in Computing and Communication Engineering
[23]Z. Wang et al. "Machine-Learning based PRediction System for
(ICACCE), 2016, pp. 281-284, doi:10.1109/
Chronic kidney Disease using Associative Classification
ICACCE.2016.8073762.
Technique." International Journal of Engineering and Technology,
[12]A. Singh, J. C. Mehta, D. Anand, P. Nath, B. Pandey, and A. vol. 7,no 4.36(2018):1161-1167. doi: 10.14419/ijet.v7i4.36.25377
Kamparia. "An intelligent hybrid approach for hepatitis disease
[24]A. Garg, B. Sharma, and R. Khan. "Heart Disease Prediction
diagnosis: Combining enhanced k-means clustering and improved
using Machine Learning Techniques." IOP Conference Series
ensemble learning." Expert Systems, (2019): doi: 10.1111/
Material Science and Engineering, vol. 1022,no. 1(2021):1757
exsy.12526
[25]M. Yuan , V. Kumar , M. A. Ahmad, and A. Teredesai. "Assessing
[13]R. T. Selvi, and I. MuthuLakshmi. "Modelling the map reduce
Fairness in Classification Parity of Machine Learning Models in
based optimal gradient boosted tree classification algorithm for
Healthcare." arXiv, last modified February 7,2021. https://
diabetes mellitus diagnosis system." J Ambient Intell Human
arxiv.org/pdf/2102.03717.pdf.
Comput 12, pp.1717-1730, 2021. doi:10.1007/s12652-020-
02242-1. [26]K. Arora, and V. Sharma. "India's top Artificial Intelligence
Organizations in Healthcare." InnoHEALTH Magazine. last
[14]M. Fathima, and M. Pasha. "Survey of Machine Learning
modified May 13, 2020. https://innohealthmagazine.com/2020/
Algorithms for Disease Diagnostic." Journal of Intelligent Learning
trends/top-artificial-intelligence-organizations-in-healthcare-in-
Systems and Applications, vol. 9, no. 1, pp. 1-16, 2017, doi:
india/.
10.4236/jilsa.2017.91001.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 383
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Revamping the CIA Triad: Novel Perspectives


PattabhiKeerthana1, Darapu Uma2, Manas Kumar Yogi3
1
B.Tech II Year Student, 2,3Asst. Prof.
1,2,3
Department of CSE, Pragati Engineering College(Autonomous), Surampalem. Dist:EastGodavari, AndhraPradesh, India.
Email: pattabhikeerthi21@gmail.com1, umadarapu03@gmail.com2, manas.yogi@gmail.com3

Abstract: Data security is extremely huge should Confidentiality :


be gotten because of individuals depending on
Confidentiality means that its main aim is to keep
organizations and correspondence. Subsequently,
securing data is a significant test with the quantity the data of organization's efforts private or secret. It is
of clients increments quickly lately. The point of a practice about handling access to data to prevent
this article is to audit Confidentiality, Integrity and unauthorized disclosure. Actually ,thisinvolves ensuring
Availability (CIA) in data security. This article that only those who have authorized access to specific
centers around the issues of data security and the assets and that those who are unauthorized are actively
prerequisites of data security. The articles, diaries prevented from obtaining access. As an example, only
and meeting papers are assessed by specialists authorized Payroll employees have only the access to
were distributed in most recent couple of years. the employee payroll database. Moreover, within a
Security issues are dissected in the new group of authorized users, there may be additional, more
philosophies. The aftereffect of the connection
strict limitations on which information those users who
between CIA in every data security prerequisite
are authorized are only allowed to access. The other
is at a moderate level.
example : it is reasonable to expect the e-commerce
Keywords: Availability, Confidentiality, Integrity, customers is that they provide their personal information
Privacy, Security to the organization .The organization have a need to
I. INTRODUCTION protect the customers information by preventing the
unauthorized access to their accounts.
"CIA" has no certain recognized US intelligence
agency in the Information Security (InfoSec) Integrity :
community.Here CIA stands for confidentiality, integrity, Integrity means the quality of something being whole.
and availability. In information Security (InfoSec), integrity is about
The three principles of CIA triad act as the keystone ensuring that data has not been tampered with .so we
for any organization's security .Their main task and it's can say that it is trusted,correct,authentic and reliable.
main objective is to function as goals for every security For example: if e-commerce customers want to buy
program .The CIA triad is so foundational to providing something .They expect something like the product
security to the information in times of any data is revealed details ,quantity ,availability and pricing details must be
,any system is going to be attacked ,an account may accurate .These information should not be changed after
aim for hacking ,or any security incident occurs .so we the order is confirmed . It is a need that banking
may understand that CIA plays a crucial role in customers are able to trust that their banking and
information security. personal information ,transaction details , credit or debit
The threats and susceptibilities based on the potential details have not been tampered with.
impact they have on the confidentiality, integrity,and Integrity's main objective is to protect the customers
availability of an organization's assets - its data information even if they stored whether on a laptop or
,applications and critical systems are evaluated by the on any portable storage device or , in the data center
security professionals. ,or in the cloud.

384 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Availability : ,then it supports in many cyber criminal security


Systems, applications, and data are of little value to categories by preventing the cyber attacks from
an organization and its customers if they are not hackers.
accessible when authorized users need them. When CIA triadChallenges :
needed ,authorized users have timely, reliable access
to resources . In the corporation world ,most of the business
persons invest large money ,time and effort to ensure
II. PRINCIPLES that their information should be secure and provides
There are three main principles are applicable based more privacy .so providing security to that information
on the security goals of an organization,the industry and is a big challenge to the CIA triad.The data is a collection
the nature of business and rest of the necessities. of all the information regarding that organization or
administration.
Among these three principles one principle indicates
the importance of another.As an example,some We have a responsibility to provide privacy around
government agencies like industry services require that data .The data recovery and backup when the times
secrecy and honesty takes a vital role in financial sector of data disaster or data theft needs very high cost.
where there is a large difference between $1.00 and The privacy to protect the information of individuals
$1,000,000.Integrity is necessary in ecommerce sector or any organization is supported by the field of Internet
and healthcare centre.Loss of critical systems results of things .In IOT sector,it provides a better environment
in disappearance of humanlives. to the data without give the access to unauthorized
The key concept to get a clear view about the CIA users.so the data must be secure inthis sector.
triad is that preceding one or more principles can mean Over the internet there have many entities like it may
the trade off of others. As an example, a system that be logical entity or physical entity or an object and there
requires high privacy and honesty might sacrifice is a need to those to communicate internallyto managing
lightning-speed performance that other systems (such the large amount of information in a responsible way.But
as ecommerce) might value more highly. This trade off in some situations there requires more privacy when
is not necessarily a bad thing; it is an intentional choice. combining of modules takes place.In these days ,internet
Each firm must decide how to apply these principles of things also facing many challenges.Because
given their unique requirements, balanced with their ,technology is increasing day-to- day ,the cyber
desire to provide a consistent and safe user experience. criminals also found many ways to attack the specific
information.Even though ,IOT provides many security
III. IMPORTANCE OF CIA TRIAD : agencies still it requires better security in case of any
The acronym of CIA is Confidentiality, integrity and weak passwords or any human errors.
availability and triad means three.
IV. CIA TRIADIMPLEMENTATION :
In the Information security sector,Each and every
letter in CIA triad represent thefundamental principle CIA triad implementation requires to follow some
of the cyber security.so the terms in the CIA such kind of practices. Some implementing methods include:
thatconfidentiality it refers to security,integrity which Confidentiality(Security)
refers to morality andthe other term availability together
are treated as the most crucial concepts in the security • It is better to keep access control lists and other file
permissions up to date.
field.The three principles of cyber security means the
CIA Triad provides a better security and give a guide • Data should be handled ,according to the
to the development of security concerns .By organization's privacy policy.
implementing these keys by adapting new technology

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 385
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Integrity (Morality) follow .like ,whatever the tools and processes you want
• By adapting new techniques to reduce the errors to select must support the communication networks
caused by humans. through both operational technology(OT) and
information technology(IT) protocols. During the
• It is better to use the software which have backup implementation stage you should be aware of there will
and recovery management .because the main aim is be longer upgradation and maintain cycles in IT. But
to protect the data.
now-a-days ,there are not such a problems because
• To ensure integrity, use version control, access control, ,day-to-day technology increases .By using that there
security control, data logs and checksums. is a fast-evolution in security controls of IT .so ,IT also
become a competitor to OT. Because of its fast
Availability
evolution.
• Keep the system and applications up to date and
So there is a need to some of the implementing
applying the preventive measures like redundancy,
RAID and failover.
techniques of IT practices and some monitor options
can be used in OT to give maximum productivity.
• Use network or server monitoring systems.
But you should make sure that whatever the
• In case of any data loss,use data recovery and practices we are trying to implement have to be adapted
business continuity . to the industrial context when it will be used and we
And we have a better knowledge on how the each have to make sure that those tools must be
term in CIA triad is responsible to providing security communicate clearly without any interrupts .Now the
and how they functioned according to the requirement IT security becomes an complex field with very severe
.we need to know those things to minimize the errors threats and it is not an easy task to explain this much of
and manufacturing defects. complexity problem to OT. Because in case of
OT,people tend to have different priorities.We come
A final important principle of information security
to know as the active and passive network monitoring
that doesn't fit neatly into the CIA triad is non-
have been hired from some of the reservations which
repudiation, which essentially means that someone
are regarding IT security.
cannot falsely deny that they created, altered, observed,
or transmitted data. This is crucial in legal contexts when, Besides OT experts and their implementing
for instance, someone might need to prove that a techniques ,the successful monitoring gain more fame .
signature is accurate, or that a message was sent by the It is very important to take best practices and adapt
person whose name is on it. some best implementations to provide more security
over the information .
Let's see some other implementing Techniques:
This is the crucial task to every organization and
From information technology (IT) enterprise ,the they need to implement large networks to achieve this
operational technology(OT) and ICS are physically security concerns.
separated .so ,now theses are not vulnerable to cyber
attacks. These are experienced in many organizationlike IT
and OT practices.
In most of the situations ,this leads to a very plain
In Information Technology(IT) and cyber security,
networks where all physical subnets are connected. This
we use the triad as CIA - like confidentiality ,Integrity
situation makes difficult to secure them .so here we have
and availability . Because ,in these fields confidentiality
to choose best step carefully, sometimes it is nearly
has higher priority and the priority order of remaining
impossible to providing secure environment to them.
things are in this order .while coming to industrial cyber
Whenever you are trying to build the security security, we use the triad as AIC .Because,here we
controls,you must be aware of some things you should give high priority to availability.
386 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

V. SOME MORE SECURITY VI. CONCLUSION


CHALLENGES IN SOME NETWORKS Contingent upon an association's security objectives,
Now a days in convergent networks ,information the business, the idea of the business, and any relevant
technology and automation technology are increasingly administrative prerequisites, one of these three standards
growing each other .But the problem is that the control may outweigh another. For instance, confidentiality is
,connection between in these network may lead to fundamental inside certain administration offices, (for
growth of risks ,which in turn leads to damage and example, insight administrations); integrity takes need
disruptions .so the experts worried about the connected in the monetary area where the contrast somewhere in
devices much faster compared to the capacity to protect the range of $1.00 and $1,000,000.00 could be
their devices .So there is a need to implement the security calamitous; and availability is basic in both the web
control and mechanisms and it is a urgent need to based business area (where personal time can cost
enhance the security posture by investing the time and organizations a great many dollars), and the medical
effort and choose the best requirement which are services area (where human existence could be lost if
suitable to the industrial security and its environment basic frameworks are inaccessible). A vital idea to
.We are come to know that cyber security incidents comprehend about the CIA set of three is that focusing
are similar to considering it as hacker attacks .In early on at least one standards can mean the tradeoff of
researches ,the thing that is revealed is that the maximum others. For instance, a framework that requires high
of cyber attacks are caused mainly by the errors that confidentiality and integrity may forfeit lightning-speed
are done by humans or outage of some devices .In these execution that different frameworks, (for example,
two cases ,the manufacturing projects efficiency is online business) may esteem all the more exceptionally.
directly impacted.By dividing the networks into small This tradeoff isn't really something awful; it is a cognizant
tasks like modules then it will give better protection decision. Every association should conclude how to
and it is also a better way to provide better security. apply these standards given their extraordinary
after this step ,we have to make an investment in necessities, offset with their longing to give a consistent
firewalls and patching solutions .at this point ,the main and safe client experience.
objective is continuous monitoring of environment
.There is a need to choose the right tool to discover REFERENCES:
any digressions from this secure baseline as quickly as [1] Al-Darwish, A. I., &Choe, P. (2019, July). A framework of
information security integrated with human factors. In
possible as it is done only Once you have established a International Conference on Human-Computer Interaction (pp.
configuration that meets your security requirements.So 217-229).Springer, Cham.
we can say that different tools are best suited for [2] Alhassan, M. &Adjei-Quaye, A. (2017). Information Security in
different environments and the most effective monitoring an Organization.International Journal of Computer (IJC).pp 100-
solution for your organization will probably be a 116.

combination of passive, active, and hybrid [3] Alhosani, K. E., Khalid, S. K., Samsudin, N. A., Jamel, S.,
&Mohamad, K. M. (2019). A policy driven, human oriented
tools.Everytype of tool in its element work effectively, information security model: A case study in UAE banking sector.
need to delivers the maximum amount of transparency, IEEE Conference on Application, Information and Network
and keeps the network as stable and available as Security (AINS).
possible. But the differences between the various [4] Gao, T., Li, T., Jiang, R., Yang, M., & Zhu, R. (2019). Research
network environments are too great for that solution on Cloud Service Security Measurement Based on Information
Entropy. Int. J. Netw. Secur., 21, 1003-1013.
.This is a crucial part of the process, mainly for those
[5] Horne, C. A., Maynard, S. B., & Ahmad, A. (2017).Organisational
organizations want to modeling their cybersecurity on Information Security Strategy: Review, Discussion and Future
trusted industry standards or frameworks. Research. Australasian Journal of Information Systems,https://
doi.org/10.3127/ajis.v21i0.1427.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 387
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[6] Treacy, C., &Mccaffery, F. (2017). Data Security Overview for [8] Shoufan, A., &Damiani, E. (2017). On inter-rater reliability of
Medical Mobile Apps Assuring the Confidentiality, Integrity information security experts.Journal of Information Security and
and Availability of Data in Transmission.International Journal Applications, 37, 101-111, 2017.
on Advances in Security. 9(3&4), 146-157.
[7] Tsaregorodtsev, A. V., Kravets, O. J., Choporov, O. N., &Zelenina,
A. N. (2018). Information security risk estimation for cloud
infrastructure.International Journal on Information Technologies
& Security, 10(4).

388 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Using Machine Learningand Artificial Intelligence to


Personalizeand Track Workout Routines with Computer
Vision
P.Thanish Kumar1, M.Vimal Raj2
1,2
Department of CSE, Narasu’s Sarathy Institute of Technology, Salem, Tamil Nadu
Email: thanishkumar2000@gmail.com1, vimalmohan812@gmail.com2

Abstract- As the world gone into global user can expect in weeks and optimizes the diet by the
pandemic staying fit in quarantine is not possible poor or good following nature of the user
even for the regular gym members so to solve this
problem, this application uses Artificial Intelligence In Artificial Intelligence we use algorithms that
to get current body data to customize workout calculates complex decision making choices to make
routine according to the users given data that optimal solution to the user. It takes part in deciding a
generates unique routine that helps user to stay perfect workout and diet choices from the data it got
heathy and fit based on their regular diet and food from the performance of the user by the Machine
choices. To track and improve user's workout we Learning technology.
use Progressive Machine learning to monitor user
progression on the given routine and update the In Computer Vision we train our models to monitor
workout. To detect and recognize user's user's movement posture to ensure there is no injuries
performance during workout to ignore bad posture in the process and it can monitor and shows the error
injuries with help of Computer Vision Technology. in workout to ensure safety of the user and to achieve
Keywords: Machine Learning, Artificial the user's goal. It also counts and duration of the
Intelligence, Computer Vision, progressive exercises to calculate the calorie burn and more to
Learning, Fitness technology monitor the efficiency of the user to get the progression
data to be used in Machine Learning and Artificial
I. INTRODUCTION Intelligence.
Due to lack of physical activities at the decade of
III. SYSTEM OVERVIEW
technologies booming and accessing everywhere in this
world it can also be used to stay fit and to be healthy. This application can be done in every platform easily
In our busy world we don't have enough time to maintain now, This app can be used anytime at anywhere Indoor
our physical and mental strength. Instead of spending and outdoor butAs the world gone into global pandemic
our expenses on expensive equipment we attempt to staying fit in quarantine is not possible even for the
solve this with the application that does everything a regular gym members so to solve this problem, this
Trainer would do for you using Machine Learning, application uses Artificial Intelligence to get current body
Artificial Intelligence, Computer Vision, progressive data like the BMI and body fat percentage and the
learning. user's goal to achieve and the AI gives customize
workout routine and diet plans for every user according
II. BACKGROUND AND TECHNIQUES: to the users given data and the goals the user set that
In Machine Learning we use computer algorithm that generates unique routine that helps user to stay heathy
improve automatically throughexperience and by the and fit based on their regular diet and food choices.
use of the user's data given it progressively enhances To track and improve user's workout we use
the routine user got. It predicts the future results that Progressive Machine learning to monitor user

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 389
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

progression on the daily routine and update the workout IV. SAMPLE CODE:
by storing more trained models on the data set. To class _RenderDataArmPressState extends
detect and recognize user's performance during State<RenderDataArmPress> {
workout to ignore bad posture injuries with help of
Computer Vision Technology. Map<String, List<double>> inputArr;
It detects arm position, angle and speed to measure String excercise = 'arm_press';
calorie burn progression and to generate a report that double upperRange = 300;
shows the user's progress every day. The routines can
double lowerRange = 500;
also be modified by the user's request.
bool midCount, isCorrectPosture;
We use Tensor Flow for training program to
calculate to probability and accuracy of the user's int _counter;
progress by this application for pc and Tflite package Color correctColor;
on mobile application platform library to use computer
vision models to train the app in every possible way by double shoulderLY;
the Machine Learning Technology. double shoulderRY;
double wristLX, wristLY, wristRX, wristRY,
elbowLX, elbowRX;
double kneeRY;
double kneeLY;
bool squatUp;
String whatToDo = 'Finding Posture';

var leftEyePos = Vector(0, 0);


The more user uses the app the application will be var rightEyePos = Vector(0, 0);
trained effectively to suggest accurate workout routine
and diet for the user. It also suggest yoga forusers to var leftShoulderPos = Vector(0, 0);
strengthen their mental health and can have lot of var rightShoulderPos = Vector(0, 0);
activates to choose from. It's cost effective and user
var leftHipPos = Vector(0, 0);
does not require to spend expensive on fitness. It enables
people to exercise at indoor and outdoor it can track var rightHipPos = Vector(0, 0);
multiple people at the same time and generates the var leftElbowPos = Vector(0, 0);
report individually.
var rightElbowPos = Vector(0, 0);
var leftWristPos = Vector(0, 0);
var rightWristPos = Vector(0, 0);
var leftKneePos = Vector(0, 0);
var rightKneePos = Vector(0, 0);
var leftAnklePos = Vector(0, 0);
var rightAnklePos = Vector(0, 0);

390 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

@override wristLY < 240 &&


void initState() { wristLY > 200 &&
inputArr = new Map(); wristRY < 240 &&
midCount = false; wristRY > 200;
isCorrectPosture = false; } else {
_counter = 0; return wristLY < 125 && wristRY < 125;
correctColor = Colors.red; }
shoulderLY = 0; }
shoulderRY = 0; }
kneeRY = 0; _checkCorrectPosture(Map<String,
kneeLY = 0; List<double>> poses) {
squatUp = true; if (_postureAccordingToExercise(poses)) {
super.initState(); if (!isCorrectPosture) {
} setState(() {
bool _postureAccordingToExercise(Map<String, isCorrectPosture = true;
List<double>> poses) { correctColor = Colors.green;
setState(() { });
wristLX = poses['leftWrist'][0]; }
wristLY = poses['leftWrist'][1]; } else {
wristRX = poses['rightWrist'][0]; if (isCorrectPosture) {
wristRY = poses['rightWrist'][1]; setState(() {
elbowLX = poses['leftElbow'][0]; isCorrectPosture = false;
elbowRX = poses['rightElbow'][0]; correctColor = Colors.red;
});
shoulderLY = poses['leftShoulder'][1]; }
shoulderRY = poses['rightShoulder'][1]; }
kneeLY = poses['leftKnee'][1]; }
kneeRY = poses['rightKnee'][1]; Future<void> _countingLogic(Map<String,
}); List<double>> poses) async {
if (excercise == 'arm_press') { if (poses != null) {
if (squatUp) { _checkCorrectPosture(poses);
return wristLX > 280 &&
elbowLX > 280 && @override
wristRX < 95 && Widget build(BuildContext context) {
elbowRX < 95 &&

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 391
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

void _getKeyPoints(k, x, y) { leftHipPos.y = y - 45;


if (k["part"] == 'leftEye') { }
leftEyePos.x = x - 230; if (k["part"] == 'rightHip') {
leftEyePos.y = y - 45; rightHipPos.x = x - 230;
} rightHipPos.y = y - 45;
if (k["part"] == 'rightEye') { }
rightEyePos.x = x - 230; if (k["part"] == 'leftKnee') {
rightEyePos.y = y - 45; leftKneePos.x = x - 230;
} leftKneePos.y = y - 45;
if (k["part"] == 'leftShoulder') { }
leftShoulderPos.x = x - 230; if (k["part"] == 'rightKnee') {
leftShoulderPos.y = y - 45; rightKneePos.x = x - 230;
} rightKneePos.y = y - 45;
if (k["part"] == 'rightShoulder') { }
rightShoulderPos.x = x - 230; if (k["part"] == 'leftAnkle') {
rightShoulderPos.y = y - 45; leftAnklePos.x = x - 230;
} leftAnklePos.y = y - 45;
if (k["part"] == 'leftElbow') { }
leftElbowPos.x = x - 230; if (k["part"] == 'rightAnkle') {
leftElbowPos.y = y - 45; rightAnklePos.x = x - 230;
} rightAnklePos.y = y - 45;
if (k["part"] == 'rightElbow') { }
rightElbowPos.x = x - 230; }
rightElbowPos.y = y - 45; List<Widget> _renderKeypoints() {
} var lists = <Widget>[];
if (k["part"] == 'leftWrist') { widget.data.forEach((re) {
leftWristPos.x = x - 230; var list= re["keypoints"].values.map<Widget>((k) {
leftWristPos.y = y - 45; var _x = k["x"];
} var _y = k["y"];
if (k["part"] == 'rightWrist') { var scaleW, scaleH, x, y;
rightWristPos.x = x - 230; if (widget.screenH / widget.screenW >
rightWristPos.y = y - 45; widget.previewH / widget.previewW) {
}
scaleW = widget.screenH / widget.previewH *
if (k["part"] == 'leftHip') { widget.previewW;
leftHipPos.x = x - 230;

392 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

scaleH = widget.screenH; });


var difW = (scaleW - widget.screenW) / scaleW; //lists.clear();
x = (_x - difW / 2) * scaleW; return lists;
y = _y * scaleH; }
} else { Following code is used to load Tensorflow models
scaleH = widget.screenW / widget.previewW * into the app,
widget.previewH; loadModel() async {
scaleW = widget.screenW; return await Tflite.loadModel(
var difH = (scaleH - widget.screenH) / scaleH; model: "assets/posenet_mv1_075_float_from_
x = _x * scaleW; checkpoints.tflite");
y = (_y - difH / 2) * scaleH; }
} Following is the vector Function used in this code,
inputArr[k['part']] = [x, y]; class Vector {
//Mirroring double x, y;
if (x > 320) { Vector(this.x, this.y);
var temp = x - 320; }
x = 320 - temp; class MyPainter extends CustomPainter {
} else { Vector left;
var temp = 320 - x; Vector right;
x = 320 + temp; Color color;
} MyPainter({this.left, this.right, this.color});
@override
_getKeyPoints(k, x, y); void paint(Canvas canvas, Size size) {
final p1 = Offset(left.x, left.y);
if (k["part"] == 'leftEye') { final p2 = Offset(right.x, right.y);
leftEyePos.x = x - 230; final paint = Paint()
leftEyePos.y = y - 45; ..color = color //Colors.blue
} ..strokeWidth = 4;
if (k["part"] == 'rightEye') { canvas.drawLine(p1, p2, paint);
rightEyePos.x = x - 230; }
rightEyePos.y = y - 45; @override
} bool shouldRepaint(CustomPainter old) {
_countingLogic(inputArr); return false;
inputArr.clear(); }
lists..addAll(list); }

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 393
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

V. RESULT REFERENCES
Nowadays technology changes human lifestyle, it [1] https://www.tensorflow.org/learn
makes peoples less active on outdoor exercise and have [2] https://github.com/PeterMclay/AlignAI
no time to get out to maintain fitness and to monitor [3] https://flutter.dev/
themselves regularly. Our application monitors exercises [4] https://en.wikipedia.org/wiki/Machine_learning
and diet routine that is uniquely generated for each user [5] https://en.wikipedia.org/wiki/Artifcialintelligence
according to their current BMI, body fat and habits.
It creates huge impacts on fitness at this decade of
technology we have access internet anywhere and smart
phones. Our application works for more than 3+ billion
devices.
VI. CONCLUSION
By using our application, we can change fitness
technology the way we seen it, the advanced technology
we implemented on our application .we can completely
change a person's habit and make them adopt to simple
diets that can help achieve our user's goal.

394 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

DNA Sequence Global Alignment Method using


Needleman-Wunsch Algorithm
N. Senthilkumaran
Department of Computer Science and Applications, The Gandhigram Rural Institute ( Deemed to be University)
Gandhigram, Dindigul, Tamil Nadu, India.

Abstract - DNA sequencing is used to determine However, comparing these new sequences to those
the sequence of individual genes, full chromosomes with known functions is a key way of understanding
or entire genomes of an organism. DNA sequencing the biology of an organism from which the new sequence
is determining the sequence of bases with a nucleic comes. Thus, sequence analysis can be used to assign
acid molecule, is an essential problem in molecular
function to genes and proteins by the study of the
biology leading to a multitude of combinatorial
problems. The large amount of information obtained
similarities between the compared sequences.
from sequencing has deepened our understanding Nowadays, there are many tools and techniques that
and fundamental knowledge of organisms. This provide the sequence comparisons (sequence
research paper is about study the basic concepts alignment) and analyze the alignment product to
of DNA sequence global alignment and understand its biology [10][8].
implementing Needleman-Wunsch algorithm for
DNA sequence alignment. II. METHODS OF SEQUENCE
ALIGNMENT
Index Terms - DNA Sequence, Global
Alignment, Needleman-Wunsch Algorithm. First generation sequencing techniques include the
sequencing technique described by Maxam and Gilbert
I. INTRODUCTION and the dideoxy sequencing technique of Sanger et al..
Sequencing is the operation of determining the Second generation sequencing technologies include
precise order of nucleotides of a given DNA molecule. massively parallel sequencing of gene short read lengths
It is used to determine the order of the four bases of DNA. The short length sequences then require
adenine (A), guanine (G), cytosine (C) and thymine (T), extensive assembly. Sequence alignment is a method
in a strand of DNA. DNA sequencing is used to of arranging sequences of DNA, RNA, or protein to
determine the sequence of individual genes, full identify regions of similarity. The similarity being
chromosomes or entire genomes of an organism [1]. identified, may be a result of functional, structural, or
DNA sequencing has also become the most efficient evolutionary relationships between the sequences.
way to sequence RNA or proteins. In bioinformatics, Complex regions of the genome, e.g., regions with high
sequence analysis is the process of subjecting a DNA, content of repeat sequences present difficulties in
RNA or peptide sequence to any of a wide range of assembly. Third generation sequencing methodologies
analytical methods to understand its features, function, involve single molecule real-time sequencing (SMRT).
structure, or evolution [7]. Methodologies used include
A. Local Alignment
sequence alignment, searches against biological
databases, and others. Since the development of Sequences which are suspected to have similarity
methods of high-throughput production of gene and or even dissimilar sequences can be compared with
protein sequences, the rate of addition of new local alignment method. Alocal alignment is an alignment
sequences to the databases increased exponentially. of two sub-regions of a pair of sequences. It finds local
Such a collection of sequences does not, by itself, regions with high level of similarity. The two different
increase the scientist's understanding of the biology of alignment methods are mostly defined by Dynamic
organisms [9]. programming approach for aligning two different

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 395
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

sequences [12]. This type of alignment is appropriate


when aligning two segments of genomic DNA that may
have local regions of similarity embedded in a
background of a non-homologous sequence.
B. Global Alignment Fig. 2 Matrix for Simple Scoring Function

Closely related sequences which are of same length By comparing these alignment scores, it can
are very much appropriate for global alignment. A global determine the best sequence alignment to be the one
alignment is a sequence alignment over the entire length with the maximum score [14].
of two or more nucleic acid or protein sequences. Here, A gap in an alignment is introduced by deletion or
the alignment is carried out from beginning till end of insertion of a base. Note that in previous examples it
the sequence to find out the best possible alignment. didn't consider the gap penalties. But in real scenario,
This is suitable to compare two sequences across their the penalty for gap should be higher than mismatch
entire length. In a global alignment, the sequences are score. Because a gap shifts the reading frame. There
assumed to be homologous along their entire length. are several gap penalty functions such as constant gap
Needleman-Wunsch algorithm (1970) is used for penalty, linear gap penalty, affine gap penalty etc [16].
optimal global alignment [11].
Alignment score tells us which alignment is the best
In Global alignment, Consider the two sequences: alignment; In other words, which alignment has the
X= ATGCTAGT and Y= ATGTTAT highest alignment score, but it doesn't tell us how to
find the best alignment. It can be determined by the
equation given below,

Fig. 1 Type of Sequences

\Two sequences can be aligned in numerous ways


(Figure 1). But during sequence alignment it seek for If we have two sequences with 12 residues, then
the one that captures genuine similarities. The degree we should consider around 1 million possible unique
of similarity or differences between two sequences has alignments and calculate their alignment scores
to be measured. individually to determine the best alignment [17][15].
It can come up with a measure by defining a scoring III. NEEDLEMAN-WUNSCH
scheme/function. A simple scoring method is to use +1 ALGORITHM
score for matches, -1 for mismatches and 0 for gaps. A. Needleman-Wunsch Progression
Different scoring method are used in real world
sequence alignment problems. The substitution matrix/ Consider the two given sequences, sequence A as
similarity matrix for a simple scoring function are "MNOP" and sequence B as "XYZ" and gap opening
following fig.2 [5]: penalty of 20 (no gap extension). The length (count of
the nucleotides or amino acids) of the sequence A and
sequence B are 4 and 3 respectively. The initial matrix
is created with n+1 column's and m+1 row's (where n
and m corresponds to length of the sequences). Extra
row and column is given, so as to align with gap, at the
starting of the matrix as shown in Figure 1, The Score
And Traceback Matrices. The cells of the score matrix
are labeled C(i; j) where i = 1; 2; :::; n and j = 1; 2; :::;
m [3].

396 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Where, C(1; 1), C(1; 2), and C(2; 1) are read from
the score matrix, and S(S; A) is the score for the S <-
> A taken from the BLOSUM62 matrix. For the score
matrix C(2; 2) =qdiag which is 1. The corresponding
cell of the traceback matrix is "diag" [3] (Figure 6).
Fig. 3 The Score and Traceback Matrices

The score matrix cells are filled by row starting from


the cell C(2; 2). The score of any cell C(i; j) is the
maximum of:
• qdiag = C(i 1; j 1) + S(i; j)
• qup = C(i 1; j) + g Fig. 6 The Calculate the value of C(2;2)

• q = C(i; j 1) + g
left
2) Step 2 (Matrix Fill): The second and crucial step
where, S(i; j) is the substitution score for letters i of the algorithm is matrix filling starting from the upper
left hand corner of the matrix. To find the maximum
and j, and g is the gap penalty. The value of the cell C(i;
score of each cell, it is required to know the
j) depends only on the values of the immediately neighbouring scores (diagonal, left and right) of the
adjacent northwest diagonal, up, and left cells [3]. current position. From the assumed values, add the
match or mismatch (assumed) score to the diagonal
value. Similarly add the gap score to the other
neighbouring values. Thus, obtain three different
values, from that take the maximum among them and
fill the ith and jth position with the score obtained. In
Fig. 4 The Score Matrix Cells terms of matrix positions, it is important to know [M(i-
, )+S(i,j),M(i,j-1)+w,M(i-1,j)+w] [3].
The Needleman-Wunsch algorithm requires two 1 j-1

matrices: score matrix and traceback matrix. The


algorithm consists of following steps [1]: To score the matrix of the current position (the first
1) Step 1 (Initialization): This example assumes that position M1,1) the above stated formulae can be used
there is gap penalty. First row and first column of the [6].
matrix can be initially filled with 0. If the gap score is
assumed, the gap score can be added to the previous =
cell of the row or column [2]. =
The first step is to calculate the value of C(2; 2) =
(Figure 5):
= -1
The obtained score -1 is placed in position i,j (1,1)
of the scoring matrix. Similarly using the above equation
and method, fill all the remaining rows and columns [1].
Place the back pointers to the cell from where the
maximum score is obtained, which are predecessors
Fig. 5 The Calculate the value of C(2;2) of the current cell (Figure 7).
• qdiag= C(1; 1) + S(S; A) = 0 + 1 = 1 The next step is to calculate C(2; 3)[2]:
• qup= C(1; 2) + g = 10 + (10) = 20
• qdiag= C(1; 2) + S(E; A) = 10 + 1 = 11
• q = C(2; 1) + g = 10 + (10) = 20
left

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 397
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• qup= C(1; 3) + g = 20 + (10) = 30 B. The Traceback Step-by-Step


• qleft =C(2; 2) + g = 1 + (10) = 9 1) The first cell from the traceback path is "diag" implying
that the corresponding letters are aligned [14]:
Thus C(2; 3) = 9 and the corresponding cell of the
traceback matrix is "left". After complete calculations P
of all cells, the score and traceback matrices are: Z
2) The second cell from the traceback path is also "diag"
implying that the corresponding letters are aligned:
OP
YZ
3) The third cell from the traceback path is "left" implying
the gap in the left sequence:
Fig. 7 The Calculate the value of C(2;3)
NOP
3) Step 3 (Traceback): Traceback is the process of
deduction of the best alignment from the traceback -YZ
matrix. The traceback always begins with the last
4) The fourth cell from the traceback path is also "diag"
cell to be filled with the score, i.e. the bottom right
implying that the corresponding letters are aligned.:
cell. One moves according to the traceback value
written in the cell [3][4]. MNOP
There are three possible moves: diagonally (toward X-YZ
the top-left corner of the matrix), up, or left. The
C. Compare with the Exhaustive Search
traceback is completed when the first, top-left cell of
the matrix is reached ("done" cell). The traceback • The best alignment via the Needleman-Wunsch
performed on the completed traceback matrix [2] algorithm [3]:
(Figure 8): MNOP
X-YZ
• The exhaustive search:
MNOP
-XYZ score: +1
Fig. 8 The Completed traceback matrix X-YZ score: +3 the best
The alignment is deduced from the values of cells XY-Z score: -3
along the traceback path, by taking into account the XYZ- score: -8
values of the cell in the traceback matrix [12]:
In this example, considered very short sequences
• diag - the letters from two sequences are aligned MNOP and XYZ which are much easier to compare
• left - a gap is introduced in the left sequence using exhaustive search but if think of real problems
that contains longer sequences the situation quickly turns
• up - a gap is introduced in the top sequence against it [14].
Sequences are aligned backwards [13].
IV. RESULTS AND DISCUSSION
Under the assumption that both input sequences a
and b stem from the same origin, a global alignment

398 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

tries to identify matching parts and the changes needed Output:


to transfer one sequence into the other. The changes
are scored and an optimal set of changes is identified,
which defines an alignment [12].
The dynamic programming approach tabularizes
optimal sub solutions in matrix D, where an entry Di,j
represents the best score for aligning the prefixes a1..i
with b1..j. The according recursions are shown below.
Note, consecutive gap (insertion/deletion) scoring is
Fig. 10 Output for optimization of similarity
done linearly [15].
For the given input, the final table D is provided V. CONCLUSIONS
along with a list of according optimal alignments. On DNA sequencing is a technique used to determine
table cell selection, optimal traceback options are the exact order of the four nucleotide bases - adenine,
shown. On alignment selection, an according traceback guanine, cytosine and thymine that build up a thread of
path is visualized in the table. DNA. DNA sequence information is important to
scientists investigating the functions of genes. In this
Input:
research paper, studied the basic concepts of sequence
Sequence A: ATGTA, Sequence B: CATGC alignment and implemented the Needleman-Wunsch
Optimization : Distance algorithm for DNA sequence alignment.

Scoring in S: Match= -10, Mismatch=1, Gap=2 REFERENCES


Recursion: (Figure 9) [1] S.B. Needleman and Christian D. Wunsch, "A general method
applicable to the search for similarities in the amino acid sequence
of two sequences", Journal of Molecular Biology, 48(3):443-
453, 1970.
[2] Joshua,L. et al., "BitPAI: A Bit Parallel, General Integer Scoring
Sequence Alignment Algorithm", Bioinformatics, 30, 3166-3173,
2014.
Output:
[3] Luis de la Torre and Jaime Seguel,"A Parallel Needleman-Wunsch
and Hirschberg Biosequence Alignment Algorithm", MIT Press,
2015.
[4] Mardis ER, "Next-generation DNA sequencing methods", Annu
Rev Genomics Hum Genet,9:387-402, 2008.
[5] Wing-Kin., Sung, "Algorithms in bioinformatics: a practical
introduction", Boca Raton: Chapman & Hall/CRC Press. pp.
34-35, 2010.
[6] Sankoff D, "Matching sequences under deletion/insertion
constraints". Proceedings of the National Academy of Sciences
Fig. 9 Output for optimization of distance of the USA. 69 (1): 4-6, 1972.
Optimization : Similarity [7] Dieny R., Thevenon J., Martinez-del-Rincon J., Nebel J.-C.,
"Bioinformatics inspired algorithm for stereo correspondence ",
Scoring in S: Match=10, Mismatch=-1, Gap= -2 International Conference on Computer Vision Theory and
Applications, March 5-7, 2011.
Recursion: (Figure 10)
[8] Source of DNA Sequences [online], National Center for
Biotechnology Information. Available: http://
www.ncbi.nlm.nih.gov/mapview

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 399
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[9] Pairwise Sequence Comparison [online], Lab of Bioinformatics, [13]Chand T. John, April 2004, CS273: Algorithms for Structure and
Institute of Computing Technology (ICT), Chinese Academia of Motionin Biology, Stanford University. Available: http://
Sciences (CAS).Available:http://www.bioinfo.org.cn/lectures/ www.stanford.edu/class/cs273/scribing/8.pdf
index-13.html
[14] DNA Sequence Comparison [online], The BioWall by Swiss
[10]Introduction to Bioinformatics - Chapter 5 - Introductory Federal Institute of Technology in Lausanne (EPFL). Available:
Sequence Analysis [online], Human Genome Mapping Project http://lslwww.epfl.ch/biowall/VersionE/ApplicationsE/
Resource Centre (HGMP-RC) by UK Medical Research Council. SequenceE.html
Available: http://portal.rfcgr.mrc.ac.uk/Courses/Jemboss_3day/
[15] Krishna N. and Akshay L. and Dr. Rajkumar B., 2002, Alchemi
Chapter5.html#Global %20sequence%20alignment
v0.6.1 Documentation [online], University of Melbourne.
[11]Rong X, Jan 2003, Pairwise Alignment - CS262 - Lecture 1 Available: http://alchemi.net/doc/0_6_1/index.html
Notes [online], Stanford University. Available: http://
[16]BioInformatics Educational Resources Documentation [online],
ai.stanford.edu/~serafim/cs262/Spring2003/Notes/1.pdf
European Bioinformatics Institute United Kingdom. Available:
[12]Bin Wang, 2002, Implementation of a dynamic programming http://www.ebi.ac.uk/2can/tutorials/protein/align.html
algorithm for DNA Sequence alignment on the Cell Matrix
[17] Chitta Baral, Computational Molecular Biology, CSE 591 Arizona
Architecture [online], Utah State University, Logan, Utah.
State University, United States of America. Available: http://
Available: http://www.cellmatrix.com/entryway/products/pub/
www.public.asu.edu/~cbaral/cse591-s03/classnotes/seq-align.pdf
wang2002.pdf

400 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Review on Blockchain Based Cloud Computing


Sushma Sumant1, Monika Madhukar Raut2
1,2
Computer Science Department, PhD Research Scholar, JJTU, Rajasthan, India.
Email: sushmasumant@gmail.com1, rautmonika1992@gmail.com2

Abstract: Blockchain technology, in the context Amazon, and Microsoft. To assess the feasibility of
of distributed ledger technology, is a distributed various applications, prototypes of Google App Engine,
ledger that keeps track of all transactions and Google Cloud Platform, Amazon Cloud, and the Elastic
distributes them across the network's nodes. All computing platform have been created. This payment
transactions in the system are controlled by
method allows us to operate on a pay-per-use basis
consensus procedures, and data that has been
saved cannot be changed again. The operation of
and maintain a flexible IT infrastructure that is available
Bitcoin, a well-known digital cryptocurrency, is through the internet and mobile devices. Despite the
reliant on blockchain technology. Cloud computing fact that the cloud offers a plethora of advantageous
refers to the technique of storing, managing, and services, companies are hesitant to use it due to privacy
processing data via a network of distant computers concerns. Cloud throttling has a number of significant
hosted on the internet, rather than as a local server drawbacks, the most significant of which being security
or a personal computer. It continues to face many concerns and cloud-related issues. For companies
difficulties, including data security, data wanting to improve their security and privacy,
management, regulatory compliance, and blockchain technology is the way forward. A blockchain
dependability, to name a few. In this post, we've is a decentralised ledger that maintains tamper-evident
discussed some of the most pressing problems
data in the form of a chain, obviating the need for a
confronting the cloud, as well as some possible
solutions, such as combining the cloud with
centralised authority to exercise control. Nodes are the
blockchain technology. We typically give a short individuals or pieces of equipment that form a
review of past research that focuses on how blockchain network in blockchain technology. In
blockchains interact with the cloud when showing contrast to traditional networks, blockchain technology
the advantages of blockchains in the cloud. In enables a decentralised network in which all network
addition, we created an architecture that integrates nodes engage actively in data authentication and
blockchain and cloud technologies, showing the verification. The data that will be stored on the
connection between the two. blockchain will be encrypted using cryptography. Each
Keywords: Cloud computing, Blockchain block in that series contains an encrypted hash, a
technology, data security, decentralisation, and data timestamp, and the hash of the block before it in the
management chain. As a consequence, the data contained inside the
blockchain is impervious to modification. The
I. INTRODUCTION
blockchain protects the data, and all members are
Cloud computing is a mature technology that grew verified inside the network, which alleviates participants'
out of large-scale distributed computing and is now concerns about data privacy.
widely used. Consumers gain from cloud computing
We can use blockchain technology to address data
because it lowers their processing burden. Cost savings
privacy and security issues, thus accelerating the
on hardware and maintenance, worldwide availability,
development of cloud computing. It enhances data
edibility due to the use of a highly automated process,
security and service availability, as well as the
and scalability are only few of the many advantages.
organization's capacity to manage cloud-based data.
Cloud computing has been embraced by a significant
This article's Section II provides an overview of the
number of major businesses, including IBM, Google,
basic principles of cloud computing. Section III delves
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 401
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

into the fundamentals of blockchain technology, covering cryptocurrency to utilise a blockchain-based method,
topics such as its features, blockchain types, blockchain launching in 2011.
layers, design, operation, and noteworthy applications.
Section IV delves into the underlying principles of II. RESEARCH AIM AND OBJECTIVES
blockchain technology. Section IV discusses the The aim of this research is to determine the use of
advantages of combining cloud computing with blockchain technology in the field of cloud computing
blockchain technology, as well as the suggested and to identify any possible risks or issues associated
architecture. with its adoption. The following goals are listed in order
Users who want improved data storage as a result of importance:
of recent advancements in information processing • To perform a study of the techniques utilised in
technologies have shown an interest in learning more combination with national tourist brand marketing to
about these technologies. Cloud computing is being used promote digital brands.
as an example of best practise in the current business • To characterise the scope of blockchain technology
as a utility model for cloud customers. Cloud users may and its use to the cloud computing sector.
access, share, and trade data from any location at any
• To conduct a security analysis of blockchain
time, independent of their physical location. It suggests,
technology's cloud computing application.
but does not expressly say, that cloud clients have no
direct control over the resources they upload to the • To perform a security study of the most current
cloud server. The cloud provider, according to the terms solution with respect to its ability to maintain the
and conditions, provides services "as-is" and "as- confidentiality, integrity, and authenticity of public
information.
available" on a first come, first served basis. As we go
farther into the "information era," the volume, speed III. CLOUD COMPUTING
with which information is transmitted, and diversity of
In today's Internet era, the web hosts millions of
information available on the internet will skyrocket. Data
websites. A stack of servers is needed to administer
may be collected from a variety of sources, including
the hosted site, which is prohibitively costly. The traffic
mobile devices, sensors, archives, and social media
rates of these servers must stay constant, and they must
platforms. As a consequence of this kind of data
be continuously monitored and maintained. Additional
explosion, significant research issues emerge, such as
staff will be needed to set up and manage these servers.
'how to effectively and optimally manage enormous
Each piece of data will be kept in a data centre. As a
quantities of data and find new preservation methods
result, continuing efforts to maintain the server and
for unlocking information.' Millions of transactions are
related infrastructure, as well as the employees, may
handled every day, including sensitive heterogeneous
divert our attention away from our commercial goals.
and homogenous data that does not jeopardise end-
We're using "Cloud Computing" to avoid this time-
user service quality. As a consequence of ongoing
consuming maintenance. "Cloud computing is a
problems in information processing units, the creation
technique for storing, managing, and analysing data from
of alternative financial markets for the next generation
any place on the globe through a network of remote
of financial technology will be feasible, allowing for the
computers. It functions in the same way as a local server
secure use of network technology and user
or personal PC". Cloud computing services, such as
communication. Blockchain technology has been
data storage and application delivery, are delivered over
proposed as a solution to financial security problems.
the internet to an organization's devices. Cloud
According to its creators, it is a distributed ledger system
computing provides many advantages by connecting
that enables more secure online transactions. The idea
data centres, resources, and servers through the internet.
of blockchain technology has been discussed around
Pay-per-use regulations apply to these services. The
the globe since 2008. Bitcoin was the first
services are available on a global scale and at a

402 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

significantly reduced cost, which promotes employee as well as cloud computing frameworks. The section
collaboration. The cloud's software will be automatically on blockchain and cloud computing covers several
updated, making management easy. Additionally, the theoretical frameworks and techniques in connection
client of the service will retain ownership over the cloud- to these technologies.
based documents. Additionally, it is subject to certain
limitations. Due to the adaptability of cloud data, various A. Blockchain Technology
security and privacy issues, as well as vulnerabilities to This section discusses the basic structure and
attack, must be addressed. When a large number of operation of the blockchain idea. Blockchain
users is present, the cloud may suffer downtime. architecture is being developed for a variety of
Cloud computing provides a diverse range of applications, including cloud computing, edge
services that may be roughly classified into three delivery computing, and fog computing. Additionally, it will be
modes. The last option is Software as a Service (SaaS), included into a second methods and provides for large-
which is comparable to a hosted programme that is scale modelling. It has been used in combination with
made accessible to customers through the internet for cloud computing to build a more secure system during
the purpose of doing their duties. A large number of the past few years.
individuals may access a wide variety of services when Origins of Blockchain: Blockchain technology is
an organisation manages whole programmes or projects a decentralised architecture based on cryptographically
on a single cloud-based software platform. Cloud- signed transactions. It is a block-by-block system. Each
based service customers have no control over the block is encrypted. The legitimacy of transactions should
infrastructure that hosts such services. Software as a be verified and evaluated at each point of failure. It
service providers include Amazon Web Services, incorporates many facets of the peer-to-peer (P2P)
SalesForce.com, and Google Mail. The second product paradigm. This method avoids the expenses associated
is Platform as a Service (PaaS) (PaaS). On the cloud with transaction authorisation via the use of a broker.
service provider's platform, we will be able to deploy The growth of blockchain technology is expected due
our application as well as a suite of programming to the fact that this blockchain technique offers robust
languages. SaaS and PaaS are distinguished by the fact and scalable security for its end systems. Moreover,
that SaaS hosts the whole application in the cloud, while hackers have a tough time exploiting transaction system
PaaS hosts the application's platform. Pay-as-you-go vulnerability. As a consequence, transactions become
SaaS is more costly than Pay-as-you-go PaaS. The more convenient and straightforward. The following
most well-known use of PaaS technology is Google's image 1 depicts the basic components of a peer-to-
search engine. The third service is IaaS, which enables peer (P2P) blockchain architecture.
customers to get direct network access to resources Hashes: It is a necessary component of the
like as storage, computation, and other computing blockchain idea, since it enables a diverse range of use
capabilities. Virtualization is used in IaaS to spread cases. Its main purpose is to encrypt the block's
physical resources over a large number of servers in contents. It is capable of handling data of any scale.
order to meet the resource requirements of cloud Changes to the input may result in changes to the output.
customers. To maximise the effectiveness of SHA-256 is widely used in a wide range of real-time
virtualization, it is essential to create separate virtual applications.
machines that are isolated from both the underlying
hardware and other virtual machines.
IV. LITERATURE REVIEW
It is the purpose of this part to review the literature
on the blockchain technology concept and algorithms,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 403
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• The block's identifier (or) the block's height.


• The hash value of the current block.
• Previous block's hash value
• Merkle hash of the tree's root timestamp
• The block's transaction list's size
Processes in blockchain: Numerous organisations
control the bulk of nodes in blockchain networks. The
nodes communicate with one another depending on the
content of the ledger. As a consequence, the node
agreement issue has an effect on the performance of
the system. The blockchain takes transaction requests
from users in order to carry out its intended purpose.
Figure 1. Blockchain technology in P2P architecture
As a result of the transaction's execution, one or more
Ledgers: It consists of a series of transactions. Each ledgers maintain a permanent record of it. This technique
node copies the ledger, i.e., the ledger. In the guarantees the immutability of the blockchain.
conventional method, ledgers are often maintained using
pen and paper. Similarly, this concept has been used to
justify the adoption of new computer technologies.
Thus, a centralised ledger is used, but it comes with a
number of drawbacks, including a single point of failure,
which results in data loss, and centralised dedicated
transaction verification by a third-party agent.
Blocks: End users give a transaction id to each node
included inside a block. The process's following activities
are carried out using this transaction index. Mid-
operations will not result in transactional process cost
reductions. All committed transactions are queued in a
transaction pool. Mining nodes are responsible for
updating the transaction process at each stage. As a
consequence, a block is the collection of all transactions.
The blockchain technology automatically rejects
erroneous transactions. This method shows the data's
rigidity, since the calculated hash would be substantially
different if a single bit in the block were altered.
Additionally, all nodes share a copy of the hash of each Figure 2: Generic blockchain model
block for added security. This technique eliminates the Blockchain security: In a network environment
possibility of alteration, since each node can check that known as a transactional data and parameter
the hash is same. The illustration shows a blockchain coexistence environment, business logic coexists with
system based on the Merkle tree architecture. transactional data and parameters. In blockchain
The blockchain concept's blocks are composed of transactions, the Asymmetric Key Cryptography
the following components: (AKC) method is often employed. The block of keys,
which consists of the public and private keys, is

404 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

referenced throughout the transaction. The private key B. Authentication- Cloud Computing Insights
is used to verify transaction signatures and is kept Through resource pooling and virtualization, cloud
secret. The public key validates the private key's computing enables the provision of compelling and
signature. attractive computer services. The paradigms of cloud
A. Concept of Bitcoin computing have brought a new concern: security as a
service. A business may provide its clients a range of
Bitcoin is a digital currency system in which each application services. Email and web servers are two of
digital coin is composed of a chain of digital signatures. the most prominent examples of application service
Each owner communicates with the other through digital providers. While the company may have certain
signatures and then transfers money using the hash of restrictions on its services, authorised consumers should
recent and previous transactions. According to their adhere to all offerings. This necessitates the client
ownership, a payee may verify signatures. The graphic creating a security context for each application server
depicts the bitcoin concept. and authenticating prior to using any service. When a
Bitcoin's operation is as follows: user accesses resources across several security
• All nodes are first broadcasted with new transactions. domains, a similar situation happens. If authentication
requires several security credentials, it is not considered
• Each node in the block collects new transactions. a secure, system-coordinated, or manageable
• Each block should have a proof-of-work allocated to approach. Organizations confront similar challenges
it. while migrating to the cloud. Numerous organisations
are given the opportunity to buy such services, requiring
• When a node discovers proof-of-work, a broadcast
message is sent to all nodes in that block.
the usage of a secure system. Access control
management gets increasingly complex and expensive
• Rather than being spent, only legitimate transactions as services grow. The bulk of applications are
are executed. concerned with the operation of the system and the
• Nodes accept blocks in accordance with their hashing value of the organisation. Thus, centralised management
capabilities. of security rules ensures the flexibility and scalability of
authorization systems. Additionally, with a single point
of administration for policies, changing policies becomes
a simple. Compromise of authorization systems has
become much more difficult since protection and
auditing of these systems are handled separately.
C. Blockchain technology parameters
The following factors contribute to the success of
blockchain technology:
E-Cash and its security: e-Cash is a new concept
that is reshaping the world of e-commerce. It just
replaces the previous paper and coin-based techniques.
Credit cards are one of the handiest ways to pay
electronically. This approach requires merchants and
agents to develop a trustworthy connection. The bank
Figure 3: working process of bitcoin or issuer retains the E-cash, which must be requested
by the client when making a payment. In contrast to
online electronic currency, users save offline electronic

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 405
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

cash on a device such as a smart card or other kind of


token. Each of these implementations is either traceable
(identified) or anonymous (untraceable) (untraceable).
The term "identified implementation" refers to the need
for each transaction to be checked and approved by a
third-party, such as a bank. This method adds security
to E-cash transactions by encrypting and authenticating
them using encryption and digital signatures, respectively.
The illustration shows the electronic currency transaction
process, in which organisations such as the bank, the
client, and the merchant should all function in an
atmosphere of mutual confidence.
Figure 5: P2P based cloud architecture

There are two possible methods for integrating


blockchain technology with cloud-based systems:
• Through the integration of blockchain technology and
the cloud, business networks may provide their clients
services such as storage, replication, and access to
transactional databases.
• Integration of security principles may improve cloud-
Figure 4: Workflow of e-cash based task, user, and data management.
Access control: It is a kind of technology that is • The next sections address the challenges and
used to safeguard stored data. Each of these resources requirements for cloud-based blockchain transaction
is critical to the operation's success. The term support in more depth. Every second, an infinite
"information technology" encompasses data, services, number of transactions occur on blockchain networks.
In a dynamic context, the main goal of cloud
and computer systems. To create a trustworthy
computing systems is to offer flexibility and scalability.
environment, the entity's access rights should be unique.
Certain situations need the transfer of access rights from • Encrypted data is stored in data centres, ensuring a
one subject to another. We may demonstrate this by high level of security. As a result, while allocating
looking at the example of selling one's access privileges transactional jobs, it is essential to consider tuning
to another user. Another example is when an employee goals. This means that customers have control over
the storage and processing of their data while using a
who needs access to a Virtual Machine in order to do
cloud service.
a necessary computation outsourced the task to another
employee who required the same machine. • When a network node fails, the system should be
able to find an alternate node; this is referred to as
D. Blockchain integration and security in cloud system resilience and fault tolerance (SFT). As a
computing result, a technique for replicating nodes between data
centres is needed, as is the use of different software
The phrase "cloud computing" refers to large
programmes to do this.
networks of virtualized services, encompassing
hardware and software resources. Data centres, often • Enhancements to the blockchain's security: Centrally
known as data farms, contain many kinds of services. allocated software should be used in a distributed cloud
The image shows a peer-to-peer cloud architecture. environment to allow the implementation of a diverse
set of software applications.

406 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

V. CONCLUSION [5]. L. Zhu, K. Gai, and M. Li, ''Exploring topics in blockchain-


enabled Internet of Things,'' in Blockchain Technology in Internet
Bitcoin and blockchain technology, which allows the of Things. Cham, Switzerland: Springer, 2019, pp. 109 114.
use of a wide variety of Information Processing Units [6]. S. Kumar, N. Darshini, S. Saxena, and P. Hemavathi ''VOTEETH:
(IPUs) in virtual financial transactions, have risen in An E-voting system using blockchain,'' Int. Res. J. Comput. Sci.,
vol. 6, no. 6, pp. 11 18, Jun. 2019.
prominence as a financial technology in recent years.
According to the protocol, customers who utilise [7]. C. Surianarayanan and P. R. Chelliah, Essentials of Cloud
Computing: A Holistic Perspective. New York, NY, USA:
blockchain technology store their data on peer-to-peer Springer, 2019.
(P2P) networks to maximise the use of available [8]. S. Mukherji and S. Srivastava, ''Pros and cons of cloud computing
computer resources. The two most essential methods technology,'' Int. J. Sci. Res., vol. 5, no. 7, pp. 848 851, Jul. 2016
for guaranteeing the security of blockchain transactions [9]. M. R. Prasad, R. L. Naik, and V. Bapuji, ''Cloud computing:
are proof-of-work and proof-of-stake, which are used Research issues and implications,'' Int. J. Cloud Comput. Services
in tandem. The purpose of this article is to examine the Sci., vol. 2, no. 2, p.134, Jan. 2013.
possible applications of blockchain technology in the [10].C. T. S. Xue and F. T. W. Xin, ''Bene ts and challenges of the
adoption of cloud computing in business,'' Int. J. Cloud Comput.,
context of cloud computing, namely. Before we begin, Services Archit., vol. 6, no. 6, pp. 1 15, Dec. 2016.
we discussed how blockchain networks interact with
[11].Kwon, L.; Young-Hyuk, K.; Jae-Gwang, L.; Jae-Pil, L. The
cloud computing platforms. This integrated system's Analysis and Countermeasures on Security Breach of Bitcoin. In
main objective is to create and enhance trust between Proceedings of the International Conference on Computational
the data server, data consumers, and data security Scienceand Its Applications, Guimarães, Portugal, 30 June-3 July
2014; Springer International Publishing:Cham, Switzerland, 2014.
employees. In this session, we discussed the history of
blockchain technology, as well as its advantages and [12].Beikverdi, A.; JooSeok, S. Trend of centralization in Bitcoin's
distributed network. In Proceedings of the 2015 16th IEEE/ACIS
downsides. It was essential to do research on prior International Conference on Software Engineering, Artificial
approaches in order to ascertain the inherent challenges Intelligence, Networking and Parallel/Distributed Computing
associated with this integration. According to the study's (SNPD), Takamatsu, Japan, 1-3 June 2015.

results, research on blockchain-based cloud computing [13].Bonneau, J.; Miller, A.; Clark, J.; Narayanan, A.; Kroll, J.A.;
Felten, E.W. Sok: Research perspectives and challenges for bitcoin
is still in its infancy. When it comes to access restriction, and cryptocurrencies. In Proceedings of the 2015 IEEE
researchers face a variety of difficulties. Communication Symposium on Security and Privacy (SP), San Jose, CA, USA,
between multi-party computations disrupts networks 17-21 May 2015.
as they attempt to compensate for missing data, resulting [14].Christidis, K.; Michael, D. Blockchains and Smart Contracts
in an unexpected financial loss. Additionally, the creation for the Internet of Things. IEEE Access 2016, 4,2292-2303.

of bogus accounts has a detrimental effect on the [15].Huang, H.; Chen, X.; Wu, Q.; Huang, X.; Shen, J. Bitcoin-based
fair payments for outsourcing computation of fog devices. Future
system's scalability. In the future, the created model Gener.Comput.Syst. 2016.
should try to address the issues highlighted so far.
[16].Huh, S.; Sangrae, C.; Soohyung, K. Managing IoT devices using
blockchain platform. In Proceedings of the 2017 19th International
REFERENCES Conference on Advanced Communication Technology (ICACT),
[1]. W. Venters and E. A. Whitley, ''A critical review of cloud Bongpyeong, Korea, 19-22 February 2017.
computing: Researching desires and realities,'' J. Inf. Technol.,
[17].Armknecht, F.; Karame, G.; Mandal, A.; Youssef, F.; Zenner, E.
vol. 27, no. 3, pp. 179 197, Sep. 2012.
Ripple: Overview and Outlook. In Trust and Trustworthy
[2]. Y. Lu, ''The blockchain: State-of-the-art and research challenges,'' Computing; Conti, M., Schunter, M., Askoxylakis, I., Eds.;
J. Ind. Inf. Integr., vol. 15, pp. 80 90, Sep. 2019. Springer International Publishing: Cham, Switzerland, 2015; pp.
163-180.
[3]. D. Yadav and S. Behera, ''A survey on secure cloud-based E-
health systems,'' EAI Endorsed Trans. Pervas. Health Technol., [18].Vasek, M.; Moore, T. There's No Free Lunch, Even Using
vol. 5, no. 20, May 2020, Art. no. 163308. Bitcoin: Tracking the Popularity and Profits of Virtual Currency
Scams. In Proceedings of the International Conference on Financial
[4]. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, ''An overview of Cryptography and Data Security, San Juan, Puerto Rico, 26-30
blockchain technology: Architecture, consensus, and future January 2015; Springer: Berlin/Heidelberg, Gemany, 2015.
trends,'' in Proc. IEEE Int. Congr. Big Data (Big Data Congress),
Jun. 2017, pp.557 564.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 407
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[19].Zhang, J.; Nian, X.; Xin, H. A Secure System for Pervasive [23].Jiao, Y., Wang, P., Niyato, D., & Suankaewmanee, K. (2019).
Social Network-based Healthcare. IEEE Access 2016, 4, 9239- Auction mechanisms in cloud/fog computing resource allocation
9250. for public blockchain networks. IEEE Transactions on Parallel
and Distributed Systems.
[20].Singh, S.; Jeong, Y.-S.; Park, J.H. A survey on cloud computing
security: Issues, threats, and solutions. J. Netw. Comput. Appl. [24].Zhu, L., Wu, Y., Gai, K., & Choo, K. K. R. (2019). Controllable
2016, 75, 200-222 and trustworthy blockchain-based cloud data management.
Future Generation Computer Systems, 91, 527-535.
[21].Kumar, G., Saha, R., Rai, M. K., Thomas, R., & Kim, T. H.
(2019). Proof-of-Work consensus approach in Blockchain [25].Yang, R., Yu, F. R., Si, P., Yang, Z., & Zhang, Y. (2019). Integrated
Technology for Cloud and Fog Computing using Maximization- blockchain and edge computing systems: A survey, some research
Factorization Statistics. IEEE Internet of Things Journal. issues and challenges. IEEE Communications Surveys & Tutorials.
[22].Verma, V. K. (2019). Blockchain Technology: Systematic Review
of Security and Privacy Problems and Its Scope with Cloud
Computing. Journal of Network Security, 7(1), 1-6.

408 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Body Mass Index Prediction Using Logistic Regression


Shanthini Chandrasekar1, Vaishnavi Sriraman2, Suganthi Muthusamy3
1,2,3
Department of Artificial Intelligence and Data Science, Bannari Amman Institute of Technology, Erode,
Tamil Nadu, India
Email: shanthini.ad20@bitsathy.ac.in1, vaishnavi.ad20@bitsathy.ac.in2, suganthi.ad20@bitsathy.ac.in3

Abstract- Body mass index (BMI) is calculated Limitations associated with the BMI are:
by solving a person's height in kilogram (kg)
divided by the square of height in meters. A high • BMI varies by age, sex and race. Hence one's BMI
BMI can indicate the high fatness in the body. BMI can only be compared to those of the same sex, age
screens for weight categories that may lead to and race.
health problems, but it doesn't diagnose the fatness • BMI does not differentiate between muscle and fat
in the body or the health of an individual. Here, we and will therefore underestimate in some and
classify BMI under 6 types such as Underweight, overestimate for others (e.g. An athlete may have a
Normal weight, Pre - obesity, Obesity class I, high BMI because of greater amount of muscle rather
Obesity class II and Obesity class III in our dataset. than fat).
In data analysis, there are several methods to
predict the patients BMI, but here we are going • Disabled or elderly people have less muscle mass
with logistic regression which is one of the several and therefore will have a lower BMI. This does not
methods of machine learning algorithms. We have necessarily mean that their weight is normal or
predicted the BMI by taking height and weight as underweight.
independent variables. Hence by using logistic • Likewise for pregnant women, it may increase during
regression the data set is analysed. Finally the pregnancy and decrease after pregnancy.
accuracy of the BMI data set is found to be 86.4
%. • BMI does not differentiate between body fat
distribution.
Keywords- BMI, Logistic Regression
TABLE I
I. INTRODUCTION CLASSIFICATION OF BMI

The BMI was invented by Belgian polymath Adolphe BMI values Classification
Quetelet in the 1800s, and consequently is sometimes <18.5 Underweight
18.5 – 24.9 Normal weight
known as the Quetelet index. The BMI is calculated 25 – 29.9 Pre – obesity
by dividing your weight in kilograms (kg) by your height 30 – 34.9 Obesity class I
in metres squared (m2). It is expressed as kg/m2. The 35 – 39.9 Obesity class II
BMI is a simple, inexpensive screening tool used to Above 40 Obesity class III
identify possible weight problems for both adults and
II. METHODOLOGY
children. BMI measurement isuseful to assess who
needs further testing to identify health risks such as heart A. Database:
disease. Individuals at risk will need further assessment. The dataset used for prediction of BMI consists
Assessments may include skinfold thickness test, diet, of 2 input variables and 1 output variable. Two input
physical activity level, family history and other variables represent height (measured in cm) and weight
appropriate health screenings. (measured in kg). The target variable is BMI Index
Being either overweight (with a BMI of 25 or above) value (see Table II).
or underweight (with a BMI lower than 18.5) can affect
your health.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 409
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE II However, the most common method of dealing with


CLASSIFICATION OF BMI AND ITS INDEX IN THE DATABASE missing values is by filling them in with the mean,
BMI BMI median or mode value of the respective feature.
BMI values
Classification index Then, we have to extract the independent variables
<18.5 Underweight 0
18.5 – 24.9 Normal weight 1
and dependent variables from the dataset by slicing.
25 – 29.9 Pre – obesity 2 The independent variables have to be extracted in such
30 – 34.9 Obesity class I 3 a way that they have to contribute to the dependent
35 – 39.9 Obesity class II 4 variable or variable that is to be predicted i.e., BMI in
Above 40 Obesity class III 5 our dataset.
And for BMI prediction, we will build a Machine C. Fitting Logistic Regression to the Training
Learning model using the Logistic regression algorithm. set:
Data preprocessing and data visualization gives a better
understanding of the dataset. We will split the dataset into a training set and test
set by importing the train_test_split() function from scikit-
B. Data Pre - processing: learn library. The function takes a loaded dataset as
Data preprocessing is a process of preparing the input and returns the dataset split into two subsets. The
raw data and making it suitable for a machine learning data we use is usually split into training data and test
model. In order to perform data preprocessing, we need data. The training set contains a known output and the
to import some predefined libraries. These libraries are model learns on this data in order to be generalized to
used for importing and managing the datasets, other data later on. We have the test dataset (or subset)
calculations and to visualize the data. Some of the such in order to test our model's prediction on this subset.
libraries in Python are Pandas ( used for importing and In logistic regression, we will do feature scaling
managing the datasets), Numpy ( used for including any because we want accurate results of predictions. We
type of mathematical operation in the code, scientific are importing StandardScaler from scikit-learn that
calculation and also supports to add large, provides Standardize features by removing the mean
multidimensional arrays and matrices), Matplotlib ( 2D and scaling to unit variance.
plotting library and its sub-library pyplot used to plot
The standard score of a sample x is calculated as,
any type of charts).Then the required dataset have to
beimported. After reading the dataset we have to extract z = ( x - u) / s (1)
information from the data. where u is the mean of the training samples or zero
It is very much usual to have missing values in your if with_mean=False, and s is the standard deviation of
dataset. It may have happened during data collection, the training samples or one if with_std=False. Centering
or maybe due to some datavalidation rule, but and scaling happen independently on each feature by
regardless, missing values must be taken into computing the relevant statistics on the samples in the
consideration. We are removing or replacing missing training set. Mean and standard deviation are then stored
values in the dataset to improve accuracy. to be used on later data using transform.
• Eliminate rows with missing data - Simple and Now we will train the dataset using the training set.
sometimes effective strategy. But, fails if many For providing training or fitting the model to the training
objects have missing values. If a feature has mostly set, we will import the LogisticRegression class of the
missing values, then that feature itself can also be sklearn library. After importing the class, we will create
eliminated. a classifier object and use it to fit the model to the
• Estimate missing values - If only a reasonable Logistic Regression.
percentage of values are missing, then we can also
run simple interpolation methods to fill in those values.

410 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

D. Predicting the test result:


Our model is well trained on the training set, so we
will now predict the result by using test set data. Now
we will create the confusion matrix here to check the
accuracy of the classification. To create it, we need to
import the confusion_matrix function of the sklearn
library. After importing the function, we will call it using
a new variable. The function takes two parameters,
mainly y_test( the actual values) and y_pred (the
targeted value returned by the classifier). We can find
the accuracy of the predicted result by interpreting the
confusion matrix.
Fig. 1. Pairplot with height and weight of the dataset
E. Visualising the result:
Then, we have imported the ListedColormap class
of Matplotlib library to create the colormap for
visualizing the result. We have created two new variables
x_set and y_set to replace x_train and y_train for the
training dataset and x_test and y_test for the testing
dataset. After that, we have used the nm.meshgrid
command to create a rectangular grid, which has a
range of -1(minimum) to 1 (maximum). The pixel points
we have taken are of 0.01 resolution. To create a filled
contour, we have used mtp.contourf command, it will Fig. 2. Result of logistic regression on train set

create regions of provided colors In this function, we


have passed the classifier.predict to show the predicted
data points predicted by the classifier.
III. RESULTS AND DISCUSSION
The pairplot gives the relation between values of
height and weight in the dataset as a matrix of plots in
which the diagonal plots are univariate plots. In the
pairplot below,0 represents extremely weak, 1
represents weak, 2 represents normal weight,3
represents overweight, 4 represents obesity and 5 Fig. 3. Result of logistic regression on test set

represents extreme obesity(see Table II). As compared to the graph of the train set, we
conclude that our test set is not contrasting and the
maximum coloured points are similar to the train set
graph. On performing Logistic Regression on the dataset
gives the accuracy of 86.4%.
IV. CONCLUSION
Obesity is the new global epidemic threatening
millions of people. It is found world-wide even in

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 411
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

developed countries and it is mainly due to the Western [3] J. H. Himes, "Challenges of accurately measuring and using BMI
and other indicators of obesity in children", Pediatrics, 2009.
food style and the junk food meals high in carbohydrates
and fat together with high-caloric sweets and other [4] J. S. Garrow and J. Webster, "Quetelet's index (W/H2) as a
measure of fatness", Int. J. Obes, 1985.
luxurious foods. While in developing countries, it
[5] O. B. Oluwole, O. P. Ibidapo, T. A. Adesioye and A. A. Agboola,
spreads due to the main dependence on cheap foods "Diet: Overweight and obesity", Diets and Diseases: Causes and
which are characterized with low-protein and high Prevention, 2016.
calorie content. The result of the study is found to be [6] "Body mass index: Considerations for practitioners", Cdc, 2011.
efficient to predict people's BMI using ML algorithm [7] M. Mohammed, M. B. Khan and E. B. M. Bashier, Machine
(logistic regression). Further analysis can be enhanced Learning Algorithms and Applications, CRC Press, Taylor Francis
by using various types of machine learning algorithms. Group, 2017.
[8] T. M. Mitchell, Machine Learning, McGraw-Hill Education,
REFERENCES 1997.
[1] J.H. Himes et al., "Guidelines for overweight in [9] S. Shalev-Shwatz and S. Ben-David, Understanding Machine
adolescent preventive services: Recommendations from an expert Learning: From Theory to Algorithms, Cambridge University
committee", American Journal of Clinical Nutrition, 1994. Press, 2014.
[2] Z. Mei, L. M. Grummer-Strawn, A. Pietrobelli, A. Goulding, M. [10]F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion,
I. Goran and W. H. Dietz, "Validity of body mass index compared O. Grisel, et al., "Scikit-learn: Machine Learning in Python", vol.
with other body-composition screening indexes for the assessment 12, no. 85, pp. 28252830, 2011.
of body fatness in children and adolescents", Am. J. Clin. Nutr,
2002.

412 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

IoT Based Design for a Smart Plastic Waste Collection


System
Tharun V1, Kowsik J2, Haribharathi S3, Jeevankarthick B4
1,2,3,4
UG Scholar, CSE, Bannari Amman Institute of Technology, Sathyamangalam, Tamilnadu

Abstract- In the present-day world, one of the This causes it to pile up day by day resulting in scatter
main tasks of environmental protection is the or dump in roads. These wastes are ultimately burnt
management and recycling of plastic waste. Plastics due to lack of awareness as well as ignorance,
have become an inevitable material in India in highlighting the prevalent poor waste collection
diverse forms as food packing covers, bags, sachet
mechanism. Additionally, ocean plastic litter has also
etc. Thus, remain in widespread use. The increase
in the amount of population leads to a great increase risen drastically causing threat to marine life.There are
in the production of waste. This has led to the several initiatives taken by several organizations for the
accumulation of plastic wastes from households as proper disposal of plastic wastes. But the majority of
well as shops. An automated communication people are not aware of these industries and this leads
mechanism between the household and waste to the burning or burying of wastes, causing severe
collecting organization, would help to monitor and environmental problems. Hence a study has been done
collect the plastic, for recycling or a centralized by us in the state of Kerala, India. One of the major
disposal. This article proposes an IoT based design challenges for the government is that recycling industries
for partially automating the plastic waste collection in Kerala rejects plastic waste from the municipal waste
mechanism from households. Such a system will collection department. Because it costs additional labor
help the municipality or corporation to monitor and
to segregate plastic and non-plastic waste from the
manage the plastic collection and disposal
respectively in a centralized way. The paper
houses and also for cleaning the recyclable plastic from
discusses block diagram, system architecture, the dirty plastic waste that may contain organic matter.
implementation and working of our proposed Hence it is transported to recycling industries in
model. neighboring states, which is a very costly process.
Keywords- Smart city; plastic waste; Internet Plastic recycling Industries in Kerala are willing to
of things. take plastic waste with some prior conditions: -
I. INTRODUCTION • The Plastic waste must be free of organic matter.
Proper disposal and management of wastes, • The plastic wastes must be washed, cleaned, dried
especially plastic wastes, is becoming a real problem and free from dirty waste.
to humans due to its adverse effects to all living things • Segregation should be done at source level i.e.
in nature. The waste management policy in India is not separation of plastic waste and non-plastic waste.
as effective as in developed countries, where
Improper plastic disposal affects nature dangerously
segregation & collection of plastic and non-plastic
in many ways as global warming, aquatic animal death,
materials from the source site itself is done. Earlier,
poor human health etc. Centralized management of
municipalities in towns and corporations in cities were
plastic waste in a locality can control the adverse effects
responsible for collecting these plastic wastes. But none
of improper plastic disposal. The 3R Principle i.e.
of them is providing a systematic collection and disposal
Reduce Recycle Reuse principle can solve the problem
of waste, thus resulting in the accumulation of wastes.
to certain extent. According to this principle, plastic
waste from homes can be transferred as raw materials
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 413
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

to plastic requisite industries. The primary step should III. PROPOSED DESIGN AND
be the implementation of a systematic collection METHODOLOGY
mechanism of plastic wastes from households as well This section of the paper describes about the system
as shops. Automating the communication between architecture:
households and municipal corporations will improve the
systematic waste collection mechanism. This article
proposes the design of such a mechanism, which will
definitely improve the waste collection system for a
centralized disposal management. Automated
communication is proposed using the latest technology;
Internet of Things (IoT). Recent IoT technology is
integrated to the existing solid waste management
system to make it effective and smarter. A set of things
like tags, sensors, humans etc. are connected to each
other through the internet, to extend the benefit of it
Figure 1: IoT based plastic waste collection system
through communication. It can be internetworking of
connected devices, vehicles, households etc. to store The above-mentioned figure describes the block
and exchange data. It is possible through wired or diagram of our proposed project.
wireless connection, minimizing the user intervention. Due to lack of proper disposal of plastic wastes,
This ability makes it applicable in all fields. For e.g.: most of the people in rural and urban areas are facing
continuous patient monitoring system through sensors plastic waste disposal problems. This problem can be
in the medical domain, while monitoring plant conditions solved to a greater extent by creating a smart, automated
by sensing moisture and soil contents in agriculture. and cost-effective system that enhances the collection
II. IOT IN WASTE MANAGEMENT of plastic wastes at home (with prior conditions) for a
centralized waste management in a locality; thereby
The Internet of Things (IoT) plays a major role in
reducing the improper plastic disposal methods. The
development of smart cities. Smart cities help in
proposal should be implemented on a large scale to be
increasing economic growth and make the lives of
made effective.
people easier and tension free. The rapid increase in
population, better employment facilities and The proposed design is as follows: Fig.1 shows the
industrialization results in urban development like towns design of IoT based systems. A smart and automated
and cities. This raises a severe issue of waste bin will be allocated to each residence for collecting
management to administrative authorities for providing plastic waste from each residence. This smart bin is
an effective waste collection and disposal in an eco- connected to the Internet through a WIFI module, which
friendly way. forms a network of communication between the Server
Researchers proposed certain strategies for a smart and Smart bin. As soon as a user shows his unique
and efficient waste management, as well as the methods RFID tag in front of the RFID reader in the bin, the
to implement it. Works were done for the development user will be authenticated and the lid of the bin will be
of smart garbage systems for collecting trash in opened. The user can dispose of the plastic waste in
developing countries. Even though trash collection has small covers into the Smart Bin, after which the lid
been mentioned by the authorities, governments were closes automatically. An ultrasonic Sensor calculates
not punctual in monitoring the collection and disposal the height of plastic waste in the smart bin. Infrared
system. Smart garbage system was made to solve this Sensor detects the presence of plastic waste in the sides
problem of punctuality in collecting from households, of the smart bin. The calculated height is then sent to
shops, organizations etc. the server through the internet provided through the Wi-

414 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fi Module. Server which in turn updates corresponding and centralized disposal method would control this
necessary information of all users. Server contains problem to certain extent. The proposed system enables
details of all bins and its users i.e. the bin ids, current a smart and automated plastic collection method utilizing
status, location of the bin, history of rewards of each IoT technology. This system could connect residences
bin, etc. A user can see the current status of his bin and and waste collection teams from corporations or
also history of his rewards. Organizations can also read specified organizations, for a semi-automated and fast
the information about bins, users, and reward history collection mechanism. The expected deliverable of this
of the bins in the organization's range. If the bin is full, project would be a smart and automated residential
the message is passed onto the Waste Collection Team plastic waste collection system which is IoT oriented.
who inspects the waste and empties the bin. The reward In order to encourage the use of smart bins, the common
is then sent as E-tokens i.e. money in digital form to the people are expected to reward themselves with E-
corresponding user. tokens. The value of the plastic waste received from
the organization, will motivate e individuals to use the
IV. IMPORTANCE OF PLASTIC WASTE smart bins and the effect would be a plastic free
MANAGEMENT environment in a long time. The advantages of this
There is only one environment and it must be treated project is widely open to collect any plastic oriented
with the respect it deserves. If raw materials have products, because plastic is becoming one of the most
already been extracted then it makes sense to use them dangerous threats to humanity. In future, this system
again if possible. This means that reserves last longer can be expanded to a large scale by including all business
into the future. Moreover, recycling of plastic waste units, industrials, organizations etc. Then it will be so
conserves natural resources, particularly raw materials advantageous and useful for clearing large amounts of
such as oil and energy. The more that is recycled, the plastic wastes from society. Big smart bins can be made
longer will natural resources be available for future and implemented for commercial purposes also.
generations. It means that there is less environmental
impact due to mining, quarrying, oil and gas drilling, REFERENCES
deforestation and the likes. If there are fewer of these [1] Surapaneni, P. &Maguluri, L.,P.,& M. Syamala. (2018) Solid
waste management in smart cities using IoT, International Journal
operations, the environment will be safe from continuous of pure and applied mathematics, Vol. 118, No.7, 635-640.
destruction and degradation.
[2] Joni, K., Haryanto&Rohim, D., F. (2017). Smart Garbage Based
Another positive effect of recycling on the on Internet of things, Journal of Physics: Conference Series, Vol
953, No.1, pp. 012139.
environment is that it may reduce emissions of
substances such as carbon dioxide (CO2) into the [3] Hasan, B. M., Yeazdani, A., M., M., Istiaque, L. M., &
Chowdhury, R. M. K. (2017). Smart waste management system
atmosphere. Recycling of plastic wastes will also save using IoT (Doctoral dissertation, BRAC University).
both ground and surface waters from pollution. This is
because if discarded randomly, they choke gutters and
even find their way into water bodies that serve as
sources of drinking water for communities and towns.
They also help to breed leachate that can seep into the
ground thereby contaminating groundwater bodies as
well.
V. CONCLUSION AND FUTURE SCOPE
Plastic wastes in town and rural areas are currently
burning or throwing to the environment, causing long
term hazard and pollution. Proper collection mechanism

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 415
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Emotion Detection Sentiment Analysis using NLP and


ML along with Speech Recognition and Speech
Synthesis
Ms. Harshada U. Dhamapurkar1, Ms. Anu T. Thomas2
1
B.Sc.(IT) Graduate, S.I.E.S. (Nerul) College of Arts, Science and Commerce
2
HoD, Department of IT, S.I.E.S. (Nerul) College of Arts, Science and Commerce

Abstract- The aim of the research paper is to classifier, Supervised ML algorithms, Emotion
perform Emotion Detection Sentiment Analysis on Detection Sentiment Analysis
human speech input data using Natural Language
Processing which involves Machine Learning for I. INTRODUCTION
training the ML model in order to detect the Natural Language Processing also popularly known
emotion of the real-time input of the user taken as NLP is a component of Artificial Intelligence (AI). It
through the microphone and give the final output
is a technology that enables computers to understand,
in the form of both text and speech. The final output
interpret, as well as manipulate human language. It is
will display the results of speech-to-text converted
text output recognized/predicted by the system and the ability of a computer program to understand human
its corresponding emotion that is being detected language in both the form of audible speech and the
by the trained model. In order to decide which ML text of a language. The applications of NLP can be
algorithm should be used to train and build the ML seen in many different fields today. People might not
model for performing emotion detection sentiment realize, but they have been using certain applications of
analysis the research paper will primarily do a NLP for a long now in their day-to-day lives, wondering
comparative study on four different supervised how? If you've ever asked Siri or Alexa a question,
Machine Learning algorithms for classification then there you go, you have interfaced with NLP!
namely Multinomial Naive Bayes classifier, Linear
SVM, Logistic Regression and Random Forest Sentiment analysis is a computational process for
classifier and further compare on the basis of their detecting the emotions/sentiments of the text data. It is
respective accuracies which algorithm will give a study of people's emotions through the analysis of
the highest accuracy. The algorithm that achieves text data expressed by different individuals. Sentiment
the highest accuracy would be further used to analysis can be used in various application like for finding
develop the machine learning model which would sentiments of social media tweets, products, hotels, and
be used for emotion detection sentiment analysis. movie reviews but here in this research paper it is
In order to convert speech to text and vice versa
specifically used to study and detect the emotion/
speech recognition and speech synthesis
sentiment of the text data that is converted from user's
technologies would be used for the study. The
purpose of this research paper is to put forward a speech to text using speech recognition. There are
beautiful collaboration of the newly emerging different types of sentiment analysis namely Fine-grained
technologies like natural language processing , sentiment analysis , Emotion Detection Sentiment
sentiment analysis, machine learning, speech Analysis, Aspect- based sentiment analysis and Intent
recognition and speech synthesis . analysis. In this research paper emotion detection
Index Terms-Natural Language Processing, sentiment analysis is taken up.
Machine Learning, Speech Recognition, Speech Machine learning is the ability of machines i.e.
Synthesis, Linear SVM, Multinomial Naive Bayes computers to learn and improve from their past
Classifier, Logistic Regression, Random Forest experience or data without being explicitly programmed.

416 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Machines learn from past experience, identifies patterns language(speech) into text. It is a technology that enables
(pattern recognition), and predict the output. So to be a computer to capture the words which are spoken by
precise, machine learning also known as ML is the humans with a help of a microphone. These words are
ability of machines i.e. computers or computer further recognized by a speech recognizer and the end
programs to learn from the past behavior of data and system outputs the recognized words by converting them
to predict future outcomes without being explicitly into text. The process of speech recognition is a
programmed to do so. ML algorithms are constantly combined process of different steps such as voice input,
analyzing and learning from the data to improve their digitization, acoustic model, language model, speech
future predictions and outcomes automatically. There engine. There are different libraries that can be used
are various applications of ML that we see in our day- for speech recognition in python like apiai, assemblyai,
to-day lives such as Facebook newsfeed, product google-cloud-speech, pocketsphinx, watson-
recommendation used by shopping portals, Facebook developer-cloud, wit, Speech Recognition.
photo auto-tagging feature, and many more. Over here for this research paper the Speech
The text that is generated from speech to text Recognition library is being installed in order to perform
conversion using speech recognition is now taken as speech recognition to convert speech into text. An active
input further perform sentiment analysis on it in order internet connection is required for this to work.
to classify the sentence based on its sentiments. However, there are certain offline Recognition systems
Sentiment analysis is basically a process of as well such as pocketSphinx, but the problem is it has
computationally identify and further categorize opinions a very rigorous installation process that requires several
from a piece of the text and determine the sentiments/ dependencies. That is why Google Speech Recognition
emotions of the text data. Following are the steps that is one of the easiest to use.
would be done to perform sentiment analysis : Recognizing speech requires audio input. The
Step 1 : The very first step would be the step of SpeechRecognition makes retrieving this audio input
tokenization. Tokenization is nothing but dividing your easy. Instead of having to build scripts for accessing
paragraph into different set of statements or your microphones and processing audio files from scratch ,
statement into different set of words. SpeechRecognition will to the needful job quick in few
minutes. The SpeechRecognition library support many
Step 2 : The second step would be cleaning the APIs and thus is very flexible. Hence , its flexibility and
data. It means to remove all the special characters that ease-of-use make it an excellent choice for any python
do not add value to the analytics part . project. Well, SpeechRecognition has a Recognizer
Step 3 : The third step would be of removing the class which is basically where the magic happens.
stop words (for e.g. : the , was , a ). There is no need Everything connected to speech recognition is inside
of words that do not add any meaning to the analytics this class. It contains instances which are used to
result. recognize speech and each instance contains 7 methods
that recognize speech from any audio source using
Step 4 : The fourth step is of classification. In this
various APIs.
step supervised algorithm for classification is applied.
This is where the machine learning part comes into • Recognize_bing(): this method uses Microsoft Bing
picture. One can model their data with bag of words or Speech API.
even use Lexicons which are nothing but a dictionary • Recognize_google(): this method uses Google Speech
of pre classified set of words and then further test it on API
the analyzing statement.
• Recognize_google_cloud(): this method uses Google
Speech recognition is a technology which enables Cloud Speech API.
the recognition as well as translation of spoken

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 417
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Recognize_houndify(): this method uses Houndify PI system and uses them. The different text-to-speech
by SoundHound. synthesizers it uses are SAPI tts , NSSpeechSynthesizer
• Recognize_ibm(): this method uses IBM Speech to tts and espeak tts. The SAPI tts synthesizer is installed
Text API. on Windows XP, Windows Vista, 8,8.1 and 10
(Speech Application Programming Interface is an API
• Recognize_sphinx(): which is developed by Microsoft to allow speech
In this research paper recognize_google() is used. synthesis within windows application). NS Speech
Working with microphone: To work with Synthesizer tts synthesizer is installed on Mac OS X
microphone, we will have to install Pyaudio library in 10.5 and 10.6. espeak tts synthesizer is installed on
python. To record audio using the microphone a Ubuntu Desktop Edition 8.10,9.04 and 9.10In this
Microphone class is used. The Microphone class is used research paper the gTTS library is used for text to speech
to take the user input from microphone instead of any conversion.
audio file or any other source. So , here the microphone II. LITERATURE REVIEW
is used as the source using Microphone class. In order TABLE I
to capture the input from the microphone listen() method S.No Name of Year Name of Review
is used. author And source research
paper
1. Walaa 2014(https:/ Sentiment This research paper aims at doing
For taking the input of the user we will use speech Medhat, /www.scien analysis a survey in order to give nearly
Ahmed cedirect.co algorithms full image of sentiment analysis
recognition technology. The text is converted into Hassan, m/science/a and techniques and related fields with
speech it is called text-to-speech conversion where the Hoda
Korashy
rticle/pii/S2
090447914
applicatio
ns: A
details in brief . The major
contribution of this paper consists
input is taken in the form of text. Here first the input 000550#s00 survey of sophisticated categorizations of
1) large number of recent trend of
text is analyzed, processed, understood and then the research in the field sentiment
analysis and its related areas .
text is converted into digital audio giving the output in 2. Samar 2018 A Survey In this research paper survey the
Al- (https://ieee of Textual main focus is on textual emotion
the form of speech. This process of converting/ Saqqa, xplore.ieee. Emotion detection as a task of sentiment
Heba org/abstract Detection analysis, The research paper
generating spoken language by machine on the basis of Abdel- /document/ explores latest state of art
written input is termed as speech synthesis. In other Nabi
Arafat
, 8486405) approaches for emotion detection
in text through the survey and also
words speech synthesis (text-to-speech) is simulation Awajan discusses about their classification
according to the techniques used ,
of human speech which is computer-generated. In that emotional models used and also
the different types of datasets
text in human language is converted into human-like used. The research paper
highlights the limitations of these
speech in audio form There are many present / available recent works and suggests
possible future research in order to
to convert the text input into speech output in python 2 fulfill these gaps in this
python libraries used for speech synthesis are gTTS 3. Amanpre 2016 A review
increasingly developed field.
This research paper focuses on
and pyttsx3. gTTS text-to-speech conversion library et Singh,
Narina
(https://ieee
xplore.ieee.
of
supervised
discussing the efficiency of
supervised ML algorithms in
offers online speech synthesis and the pyttsx 3 text-to- Thakur org/abstract machine terms of the speed of learning ,
,Aakanks /document/ learning accuracy , risk of overfitting
speech conversion library offers offline speech ha 7724478) algorithms measures and complexity. The
Sharma major objective of this paper is to
synthesis. The gTTS is a python library. It is used to give a comparison with state of art
ML algorithm .
interface with Google Translate's text to speech API.
This library in order to function properly requires The table gives a brief of various works done in the
continuous internet connection and is very easy to use . field of ML and sentiment analysis.
This library supports many languages including English
III. RESEARCH METHODOLOGY
,Hindi, German and many more. On the other hand ,
the pyttsx3 (Text-to-speech x-platform) is a python Overall Incremental model approach is being
library can perform speech to text conversion offline considered. Let us first know what an incremental model
and does not require internet connection. It looks for is : Incremental Model Incremental model refers to the
the TTS engines that must be pre-installed on your process of software development wherein the

418 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

requirements are divided into multiple standalone Processing data. The term refers to converting data
modules of SDLC. In this particular model each module from a given form to a more usable and desired form
goes through different phases like : requirements, design, making the data more meaningful as well as informative.
implementation and finally testing .Every subsequent This entire process can be automated using ML
release of the module further adds functions to the algorithms , mathematical modelling and statistical
previous release. The process is continued until the knowledge .
complete system is achieved. Iterative model does not After the complete process the output can be
really need a full list of requirements before starting the obtained which would be in any form. It depends upon
process. The development process starts with the the task that are performed and the requirements of the
requirements of the functional part , which can be machine. The process needs to be performed in a
later expanded. The process is repetitive and also allows structured manner. The diagram depicts the steps to
newer versions of the product for every cycle. Each perform this:
iteration includes the development of a separate
component of the system which is added to the 1) Collection : This is a crucial part to have data of
functional developed earlier. good quality and accuracy. The data can be in two
forms : primary or secondary.
For the comparative study between the four machine
2) Preparation: The collected data can be in raw form
learning algorithms namely Multinomial Naive Bayes that can't be directly fed to the machines. The
classifier, Linear SVM, Logistic Regression and preparation can be done either manually or with an
Random Forest classifier a secondary dataset is being automatic approach.
used from Kaggle. The emotions dataset for NLP
3) Input : The prepared data now can be in the form
(https://www.kaggle.com/praveengo vi/emotions-
that might not be machine-readable, to convert this
dataset-for-nlp). It is a secondary labelled dataset which data to readable from some conversion algorithms
consists of sentences and their corresponding emotions are needed.
separated by a ";". This dataset is being used to train
4) Processing : This is the step in which algorithms
the ML models with the above mentioned algorithms
and ML techniques are required to perform the
to find out which algorithm would give the maximum
instructions give.
accuracy so that it can be used to develop a ML model
which is to be used for emotion detection sentiment 5) Output : This is the step in which the desired output
analysis . is acquired by machine in a meaningful manner which
can be understood easily by the user
In this research paper algorithms are being used.
6) Storage : This is the last step in which the obtained
These algorithms are being trained using a secondary output and all useful information are saved for future
dataset and then their accuracies are found out and on use.
the basis of accuracy the algorithm that gives the highest
accuracy will be taken to train the ML model which IV. RESULTS AND DISCUSSIONS
would be used for emotion detection sentiment analysis Now first we take a look at the machine learning
in which input is in the form of speech and output is in part .We have taken a secondary dataset for developing
the form of both speech and text which will consist of a model for performing emotion detection sentiment
user speech to text converted text output and its analysis on it. train.txt is the name of the dataset. Let us
corresponding emotion that is detected dynamically and explore the dataset first. Following is the snippets of
would be printed onto the screen. Following are the 4 code where we are exploring the dataset. The emotions
machine learning algorithms that have been used dataset train.txt is a labelled dataset. It contains target
namely: Multinomial Naïve Bayes classifier, Linear values that are category variable. The dataset contains
SVM, Logistic Regression, Random Forest Classifier. sentences which depicts different emotions. The labels
of emotions of every sentence are being labelled into
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 419
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the dataset separated by a semi colon " ; ". Now let us


explore the dataset in more depth.

Fig. 1. The above figure depicts snippet of code wherein we


are exploring the dataset .

The very first thing we do is that we import all the


necessary libraries that are required. After that comes
the step of importing the dataset. The dataset originally
contains six emotions namely: anger, fear, joy, love,
sadness, surprise. But if we see in the code the surprise
emotion is being excluded from the data set. The reason
is the emotion surprise has the least and minimum value
of 572. Because of this it results in decreasing the
accuracy of the algorithms when we move forward. So
in order to increase the efficiency and accuracy of the
algorithms the emotion of surprise is being excluded
from the dataset. Now that we have cleared this issue
of the dataset we can move froward. Coming back the
point, that the very first step is of importing the necessary
libraries and then we import the dataset . After importing
the dataset is being displayed .We can see that there
are two columns into the dataset one is of the input
which includes the sentences and the other is of the
corresponding emotions of the text. After that various
basic commands are being used to see the data type of
the dataset , viewing the first 10 and last 10 rows of the
dataset, viewing the information about the dataset,
grouping the emotions and checking the count of the
emotions we notice that joy emotion has the highest
count. Further we visualize the dataset by using pie chart
and bar graph . In this way we get to know more about
the dataset to get a in depth and clearer idea of the
dataset. Now that we have got an idea about the dataset
we move forward towards the NLP and ML part.
Sentiment analysis is done using natural language
processing and for that we first need to process or clean
the data. The cleaning of the data is done by making all

420 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the letters in lowercase(HELLO ' hello) form after that


removing the punctuation marks(! , . , ; etc. ) is done
and lastly stop words (like: a, I, the etc.) as all of these
do not add any meaning to the sentiment part of the
sentence.

Fig. 3. The figure depicts the process of lemmatization and


two assumptions w.r.t to the dataset.

Now comes the part of feature extraction. After the


text data is cleaned and is precise and free of errors
each emotion can be depicted by a group of keywords.
Feature extraction is the process in which some
parameters are extracted from the data which can be
presented in the form of numbers. We will be using the
count vector feature extraction technique here. Machine
understands numbers and be need numeric data for
math. Now for that we divide/split our dataset into
training and testing parts which is done before doing
feature extraction.

Fig. 2. The figure depitcs the process of cleaning of data by


making all letters lowercase, removing punctuations and
symbols and removing stopwords.

After the above process is done the next step of


lemmatization is taken up. Lemmatization is the process
Fig. 4. The figure depicts the snippet of code for encoding
in which the words are converted into their root or base process followed by splitting of dataset into 70:30 ratio.
form in order to get a proper insight for example the
words in plural form or past tense etc. should be Count vectors feature extraction in which we
converted to their root/base word . Also, with that we transform our "emotions" in the dataset into an array
also consider 2 assumptions here. Assumption 1 is that which consists of count of each words in it. Here we
hardly any word would have letters repeated more than go with the intuition that the text/sentence which conveys
two times that too consecutively and to do that the similar emotions might have similar/same words
following code is being used to revert repetition of letters repeated again and again. This is like a direct approach.
in the words . This assumption may not be accurate but
might prove to be helpful in some correction.
Assumption 2 is that consider the idea that if a particular
word is appearing one time only in the entire dataset
Fig. 5. The figure depicts the code for count vector feature
then it probably has no significant influence in detecting extraction
the emotion/sentiment of the text. So the following code
Now that we have finished with the feature
is written to remove such words that are rarely occurring
extraction, here comes the step of Training our models.
in the dataset. They can be generally words which are
Here the machine learning algorithms comes into the
proper nouns or some insignificant words.
picture.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 421
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

using supervised machine learning algorithm for building


a classification model and also that here we are using
the train_test_split() method to split the dataset into ideal
70:30 ratio. When we split the dataset using this method
we often observe that every time we run the code over
the same dataset the accuracy changes by some decimal
point. Remember that this is not a bug or error but in
fact is a feature of this method. If we want to avoid this
we can use the K-folds cross validation method to
Fig. 6. Sentiment analysis embrace this feature .In Here we have not used K-fold
We use the Multinomial naïve bayes classifier cross validation. This research takes the feature of the
algorithm, linear SVM algorithm, Logistic regression train_test_split() which can also be called a loophole/
algorithm and Random Forest classifier algorithm. drawback as an important observation that is to be
noted and can be considered for future updates. Further
these codes are integrated with the GUI using tkinter
to display the accuracies. Now the emotion detection
model can be developed trained with Linear SVM
algorithm and integrated with a GUI using tkinter along
with speech recognition and speech synthesis to convert
speech from text, sense the emotion using the emotion
detection sentiment analysis model and give the output
in the form of both speech and text to give the following
output .

Fig. 8. The figure depicts the output of emotion detection


sentiment analysis using NLP and ML with speech
recognition and speech synthesis.

V. CONCLUSION
The aim of the research paper was achieved which
is raising awareness about the newly emerging
technologies in today time. Here various technologies
Fig. 7. The above figure depicts the snippet of code for like speech-to-text conversion (Speech recognition)
training supervised ML algorithms and fetching their
corresponding accuracies. along with text-to-speech conversion (Speech
Out of the four linear SVM achieves the highest Synthesis), natural language processing (Emotion
accuracy of 90.5 %. And hence this algorithm would detection Sentiment analysis), and machine learning
be used further to develop ML model using Linear SVM comes into the picture. The purpose of this research
for emotion detection sentiment analysis. Here we are paper was to put forward a beautiful collaboration of
the above newly emerging technologies.
422 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [9] RudyPrabowo,MikeThelwall , "Sentiment analysis: A combined


approach" , April 2009
[1] M.I. Jordan,T.M. Mitchell , "Machine learning: Trends,
perspectives, and prospects" , 17 Jul 2015. [10]Samar Al-Saqqa; Heba Abdel-Nabi; Arafat Awajan , "A Survey of
Textual Emotion Detection" , 2018
[2] Xian-Da Zhang , "Machine Learning" , 23 May 2020
[11]Gobinda G. Chowdhury, "Natural language processing" ,January
[3] Mitchell TM. "Machine learning" New York: McGraw-Hill; 1997 2005
[4] Hetal Bhavsar, Amit Ganatra, "A Comparative Study of Training [12]Prakash M Nadkarni, Lucila Ohno-Machado, Wendy W
Algorithms for Supervised Machine Learning", September 2012 Chapman, "Natural language processing: an introduction",
[5] Osisanwo F.Y., Akinsola J.E.T., Awodele O., Hinmikaiye J. O., September 2011
Olakanmi O.,Akinjobi J., "Supervised Machine Learning [13]Christopher D. Manning,Julia Hirschberg, "Advances in natural
Algorithms: Classification and Comparison", 3 June 2017 language processing" , 17 July 2015
[6] Hoda Korashy, Ahmed Hassan, Walaa Medhat, "Sentiment [14]Razno, Maria, "Machine learning text classification model with
analysis algorithms and applications: A survey", December 2014 NLP approach" , 18 April 2019
[7] Ronen Feldman , "Techniques and applications for Sentiment [15]Aakanksha Sharma, Narina Thakur, Amanpreet Singh , "A review
Analysis", 1 April 2013 of supervised machine learning algorithms", March 2016
[8] Doaa Mohey El-Din MohamedHussein , "A survey on sentiment
analysis challenges" , October 2018

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 423
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Novel Approach For Home Security System


Abinav Gowtham N1, ]Jaisuriya Y2, Mrs.Shanmugapriya S3
1,2
UG Scholar , 3Assistant Professor
1,2,3
Department of Computer Science and Engineering,
Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai.
Email: abinavgowthamn@gmail.com1, yjaisuriya4@gmail.com2, s.shanmugapriya@velhightech.com3

Abstract- Technologies are developing rapidly on a standalone embedded system and we can use it
every day, security systems plays a major role in anywhere. In this system we are going to use Raspberry
today's world. There are various security systems pi as main controller along with web camera or Pi
which uses biometric but we proposed a system camera. This system can identify house owner and
which uses face recognition like we use in our
relatives and friends faces by training priory. If the
smart phones. We use the same concept to unlock
detected face at door is matched with existing dataset
our door using Raspberry Pi and AI where the
images of the trusted persons are trained, in it will automatically unlock the door. Otherwise it sends
addition to it we are also developing an android the captured face to owner through cloud database.
application through which the door can be Which means user can identify from anywhere who is
controlled from a remote location and also enable present at his door and also he can control the door. If
us to control home appliances too which are an unknown person is trying to unlock the door without
connected to home Wi-Fi. the permission of the owner, the system automatically
Keywords: Raspberry Pi, Facial Recognition, sends the information to the nearby police station.
Camera, Vibration Sensor, Door Lock.
II. RELATED WORKS
I. INTRODUCTION "Raspberry Pi Based Home Automation Using Wi-
Advancements in technology push us to change the Fi, IOT & Android for Live Monitoring"[1]- This
existing day to day objects into smart systems. To project mainly focuses on controlling the Devices
change and modernize any object we need to eliminate connected in the door with a Smartphone or a Remote.
its drawbacks and add extra functionality. When it The exact power consumption of a Room or a Hall is
comes to security systems, we can't blindly trust the updated to the live monitoring system happening. This,
old and conventional security methods. Some of the device is based on few Sensors and Detectors which
major drawbacks in conventional door lock are that are to be embedded with the Raspberry Pi. The updates
anyone can open that by duplicating the key and we are stored in Database server. We are using Python,
need to present over door if we want our friends and Android and Web Application or Website. The Login
family to enter our house. To overcome these type of System in the website and UI can be customized with
drawback, today lot of security systems available in additional feature to the device by the user as per the
market like fingerprint door access system, voice need.
controlled door access system. Likewise Face "Raspberry Pi based Interactive Smart Home
recognition is one of the advanced features to access Automation System through E-mail using Sensors"[3]-
the door. Today we are use facial recognition to unlock Atomization of all the devices is the main goal of this
the smart phones. Past years, we can't use camera other paper i.e. home appliances through E-mail using
than smart phone and computer. But in last few years Raspberry Pi, as well as the sensors like PIR, LPG,
presence of raspberry pi enables to access image temperature sensors are used in the system for security
processing with any portable embedded systems. With purpose. So with the help of this system the problems
use of Raspberry pi we can perform facial recognition coming in our day to day life are avoided. The algorithm

424 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

is developed by the default programming language of dynamically. It has been designed as an Android cell
Raspberry Pi (i.e)Python. The current status of the phone application, which communicates in a local
devices is E-mailed to the newly generated Email Id by network with an Arduino board. A miniaturized
the system. In the E-mail Id the output is stored. The residence was built to test it in a real case scenario for
switching action of the devices and sensors are indicated accessing the system. The findings suggested that the
by LEDs. system works relatively well; but in some instances the
"Smart Surveillance System using Raspberry Pi and system could not recognize the content or the image
Face Recognition"[6]-This paper suggest the Smart properly.
Surveillance System using Raspberry Pi and Image "MIA-My Intelligent Assistant"[2]-In this paper we
Processing. The activities based on motion is recorded can just ask our doubts, if it is a general or arithmetic,
by Traditional surveillance systems, this reduce the error no problem Mia will talk to you by replying the answer.
caused due to motion detection and serves the purpose Mia is an automatic answering machine. It is a smart
of facial recognition. To capture the image of the motion machine called Raspberry Pi which works using a smart
detected by the PIR Sensor the Raspberry Pi camera low cost SBC. We can speak to this machine which
module is used. This system will monitor when motion will be recording our speech. Based on the query given
detected by the system and checks the faces image to the machine which convert it into text and will search
captured by face recognition, and alerts if the detected for the result in the internet. The machine can be
face is not in the database. answered back to the query in speech format with the
"Voice Recognition Based Home Automation help of a text to speech converter. This makes the
System for Paralyzed People"[8]-The key objective of project smarter. For working out the project we use
our project is to design a system for physically sound card, Google API's, Python, Wolfram Alpha
handicapped persons to control and operate home Engine and Shell Scripting.
appliances by their own voice in their wheel chair. Both "Home Automation Systems - A Study"[10]-With
these features are present in our project which has the the increase in population and consumption of energy,
capability to replace current technologies. The design there is a huge need for energy conservation in every
of the low cost voice recognition based home way possible. The major reasons for loss of energy is
automation system for the physically challenged people the inability to access and control the application from
suffering from quadriplegia or paraplegia (who cannot a remote location. To give instructions to the systems,
move their limbs but can speak and listen) to control a web or an android application is used by user. A host
the various home appliances just by his/her voice of communication methods such as Wi-Fi, GSM,
commands according to their need and comfort. We Bluetooth, ZigBee can be make used by this system.
also implemented a messaging concept. In this whenever Different controlling devices and configurations can be
the patient or the person needs a help and pronounce found in existing systems. Such systems have been found
as help, a message will be sent to their family member. already in many places for a wide variety of applications.
The final system can gives a great assistance to the A survey of all such systems is given by this paper.
physically challenged people without any need of others. "Home Automation System Using Raspberry Pi"[3]-
"Voice Recognition Based Home Automation This system consists of an Messaging API which sends
System Using Android And Arduino"[9]-This paper text Messages to the user about the changes in house
proposes the development of a home automation voice and using the FTP server and he can access the
command system. The system was modelled by some raspberry pi. The system includes the monitoring and
of the UML elements in a flexible way, and towards remote controlling of home appliances and security
any residence structure is adapted. That means that, which can do as the Raspberry pi.
without the help any technician user can able to add
and remove electrical devices into the system
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 425
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III EXISTING SYSTEM B) MODULES


In existing system, uses face recognized door unlock CAMERA
system with virtual assistant which is also used to control
the home appliances. It can identify the person present The camera is used for facial recognition where the
at the door is known or unknown. If the person detected person at the door step is identified.
as unknown person it will send the image of the person
to owner via SMS or email. But these can't be
controlled from a remote location.
IV. PROPOSED SYSTEM
To overcome the above problems, we proposed a
system, the details are sent as an E-Mail or SMS to the In our system we use Web Camera here alternate
owner where the raspberry pi is connected to the cloud to it we can also use any type of camera connected to
database through home Wi-Fi. The information from Raspberry Pi. The facial features from the image
the database is shared to an android application which captured by our camera is done through an algorithm
we have developed. The user can control through his/ known as HOG(Histogram Oriented Gradient).
her android application. When if anyone tries to break VIBRATION SENSOR
the lock the vibration sensor will send an E-Mail to the
nearest police station. The vibration sensor is used to detect any vibration
that poses while any stranger trying to break the door
A) BLOCK DIAGRAM lock. The sensor will sense that and passes the
information to the cloud database immediately through
home Wi-Fi via Raspberry Pi. The status of the vibration
is given to the program so that message of breaking of
the door lock is passed to nearby police station.

Fig1: Block diagram of the system work flow

In this block diagram, Raspberry pi is connected


with a camera. The face of owner, relatives and friends
are trained in various angle and different environments RASPBERRY PI
in Raspberry pi and stored dataset. Raspberry pi Raspberry Pi is used to integrate the whole
connected to cloud via WiFi or LAN connection. When components of our project. We program the raspberry
the person detected as known person the door is pi to perform all the operation using Python as language
unlocked by Raspberry pi using solenoid lock connected support and Linux as the OS platform. This raspberry
with door. It can also be controlled manually by user pi is made to connect to connect to a home's Wi-Fi
via mobile application connection.

426 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig 3: Raspberry Pi interfaced with all the modules


ANDROID APPLICATION
In this module we interfaced all the module and we
Android application is developed in order to provide
checked it was working are not. If it is working well,
remote access to the door lock and control the door
the android application also interfaced and checked
for known and unknown persons. The notification also
based on recognition of image from the camera,
comes to the android application which uses Firebase
raspberry sends the image of unknown person through
as the cloud database to store the informations. The
e-mail and notify the user of the android application
application consists of two buttons known and
and the user can be able to control the door from the
unknown. If the user press the known then the door
application.
gets unlocked and if unknown the door won't be
unlocked. VI. CONCLUSIONS
V. EXPERIMENTAL RESULTS In this paper we build the system to overcome the
drawbacks of our existing conventional door lock
In fig:2, we interfaced camera with the raspberry pi
systems to provide advanced security feature for every
and checked if the raspberry pi is able to get the picture
home cost effectively. The future enhancements of the
from the camera when the camera is turned on. For
project includes implementation of power backup
this purpose, we are using this camera. We use HOG
through batteries, usage of iris scanner to provide more
for the face recognition and the face in the camera is
accurate results and for faster detection. This helps
recognized based on the model trained. If the face is
owner of the house to stay out without any tension of
recognized it shows the name and if it is not trained
theft incidents.
face then the raspberry pi identifies it as unknown.
VII. REFERENCES
[1] Prof.Prashant Rathod, Syed Khizaruddin, Rashmi
Kotian,ShubhamLal, "AGesture-toEmotionalSpeech Conversion
byCombining Gesture Recognition and Facial Expression
Recognition".International Journal of Computer Science Trends
and Technology (IJCST) - Volume 5 Issue 2, Mar - Apr 2017.
[2] Er. Sheeba Babu1 , Akhil S Nair 2 , Akhil S R3 , Allan Abraham4
and Ashish Anil Abraham5,"MIA-My Intelligent Assistant".
International Journal of Advanced Research in Computer and
Communication Engineering Vol. 5, Issue 4, April 2016.

Fig 2: Facial Recognition


[3] Shruti G. Suryawanshi1 , Suresh A. Annadate2, "Raspberry Pi
based Interactive Smart Home Automation System through E-
In fig:3, we interfaced raspberry pi with the camera mail using Sensors"International Journal of Advanced Research
in Computer and Communication Engineering Vol. 5, Issue 2,
and vibration sensor. If we tap the vibration sensor then
February 2016.
it sends the signal to the raspberry pi of the vibration
status and the level of response of the vibration sensor
can be adjusted

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 427
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[4] ShubhangKhattar,Anisha Sachdeva, Rishi Kumar, Richa Gupta, [9] Dennis Brown Germiniasi da Silveira, br Marlon José do Carmo
"Smart Home With Virtual Assistant Using Raspberry Pi" ,2019 2, "VOICE RECOGNITION BASED HOME AUTOMATION
IEEE 9th International Conference on Cloud Computing, Data SYSTEM USING ANDROID AND ARDUINO".Proceedings
Science & Engineering (Confluence) of XVIII ENMC - National Meeting on Computational Modeling
and VI ECTM -Meeting on Materials Science and Technology
[5] N.Sugumaran, G.V.Vijay, E.Annadevi, "Smart Surveillance
Salvador, BA - 13-16 October 2015.
Monitoring System using Raspberry pi and pir sensor",
International Journal of Innovative Research in Advanced [10]Satish Palaniappan, Naveen Hariharan, Naren T Kesh,
Engineering (IJIRAE) Issue 04, Volume 4 (April 2017) Vidhyalakshimi S, Angel Deborah S. "Home Automation Systems
- A Study"International Journal of Computer Applications (0975
[6] Chinmaya Kaundanya, Omkar Pathak, Akash Nalawade,
- 8887) Volume 116 - No. 11, April 2015.
SanketParode,"Smart Surveillance System using Raspberry Pi
and Face Recognition", International Journal of Advanced [11]Arpita Yekhande1, Prof. Kapil Misal2, "HOME
Research in Computer and Communication Engineering Vol. 6, AUTOMATION SYSTEM USING RASPBERRY PI",
Issue 4, April 2017. International Research Journal of Engineering and Technology
(IRJET).
[7] Senthil Kumaran Varatharajan, Viswanathan Nallasamy, "Voice
Based Home Automation Using Bitvoicer".International Journal
on Recent Researches in Science, Engineering and Technology,
Vol.5, Issue 2,February 2017.
[8] N. Prathima, P. Sai Kumar, SK. Lal Ahmed , G. Chakradhar,
"Voice Recognition Based Home Automation System for
Paralyzed People", International Journal for Modern Trends in
Science and Technology Volume: 03, Special Issue No: 02, March
2017.

428 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Plant Disease Identification by Analysing Leaf Images:


A Survey Report
Priya S. Patil1, Mahendra A. Pund2
1
Lecturer, IT Dept., Govt. Poly., Yavatmal, PG Student, Lecturer, Government Polytechnic, Yavatmal, 2Assistant Professor,
1,2
Department of Computer Science and Engineering Prof. Ram Meghe Institute of Technology and Research, Badnera,
Amravati, Maharashtra - 444701, India.
Email :patil.priya2289@gmail.com1, mapund@mitra.ac.in2

Abstract : Agriculture field is the primary LR, Linear Regression; HSV, Hue, Saturation, and
resource of livelihood in country like India. Plant Value; SOM, Self-Organizing Map; DNN, Deep
are affected by diseases due to environmental Neural Network; CNN, Convolutional Neural
change or insects which adversely affect the food Network; RBF, Radial Basis Function Network.
productivity and degrade both the quantity and the
quality of food. Early detection of disease is I. INTRODUCTION
important otherwise spreadable diseases may affect The Agricultural field acts as backbone of developing
the entire farm. Late identification of disease may countries line India. Plants are very important as they
cause huge economic loss to farmers and
act as essential resource of food productivity for human
subsequently to the economy of country. Some
challenges need to face during plant disease beings. In many countries farmers use traditional
identification and classification. These are uneven methods for farming due to various reasons like lack of
background during image acquisition, awareness about recent technologies, high cost etc. It
segmentation and classification. By observing the have been observed that plants are frequently get
symptoms the infected disease get identified and affected by diseases, may be due to environmental
then only control mechanism is applied. This change or insects. These diseases are of various
survey gives detail information about plant categories like bacterial diseases, virus diseases and
diseases, disease detection and classification using fungal diseases. 80% of plants are affected by fungal
traditional method, machine learning approach and like organisms[52]. Diseases having spreadable nature
deep learning approach. This survey also conclude
may spread from one plant to other and subsequently
that traditional method and machine learning
to the entire farm. Diseases adversely affect the plant
approach are not as efficient as deep learning
approach. Machine learning approach gives better and reduce the quality and quantity of food productivity.
results compare to traditional method but deep Early detection of disease is very challenging task. Even
learning method delivers superior results compare if it is detected earlier, it is difficult to control as its
to both traditional and machine learning method. spreadable nature is varied according to environmental
conditions. Manually these diseases are identify by
Keywords: SVM, Support Vector Machine;
SIFT, Scale-invariant feature transform ; ANN, observing symptoms on plant's leaf or steam etc.
Artificial Neural Network; SURF, Speeded Up Generally, Farmers are not having deep knowledge
Robust Features; NN, Neural Network; HOG, about these plant diseases and need to search for farm
Histogram of an Oriented Gradient; KNN, K- specialist. Symptom observation is properly done by
Nearest Neighbors; BOVW, Bag of Visual Word; expert person having knowledge about this field.
DT, Decision Tree; BPNN, Back Propagation Traditional method of physical analysis and expert
Neural Network; RF, Random Forest; GLCM, opinion is time consuming. Also, for accurate advice
Gray-Level Co-Occurrence Matrix; NB, Naïve finding the farm specialist in rural area is very difficult
Bayes; PNN, Probabilistic Neural Network; ML, task. Monitoring big farm by specialist is costly and
Machine Learning; RGB, Red Green Blue; DL,
time consuming. Many time farmers prefer to use
Deep Learning; HIS, Hue, Saturation and Intensity;

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 429
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

pesticides to reduce the effect of disease without fungal disease. Leaf spot is the common symptom
confirming types of disease. Improper and unlimited found in bacterial disease infection.
use of pesticides again adversely affect the plant health, B . Viral Disease: Viral diseases are hard to identify
food productivity and subsequently to the human lives. and analyze. Symptoms of viral disease infection are
With increasingly rapid evolution of technology , it would Mosaic leaf pattern, Crinkled leaves, Yellow leaves,
be much better if we have learning based technique to Plant stunting.
identify disease in plants automatically without having C. Fungal Disease: Generally, wide range of vegetables
domain knowledge. is get affected by fungal diseases. It can cause huge
In recent years, AI based Machine learning damage of plants. Common fungal diseases are
Anthracnose, Botrytis rots, Downy mildews,
techniques gives good performance in image processing
Fusarium rots, Powdery mildews, rust, Rhizoctonia
applications [43]. Machine learning techniques are use rots, Sclerotinia rots, Sclerotiumrots etc.
to train the system so that it can learn automatically and
improve the results with its own experiences [8]. Figure shows the leaf images of disease infected
Machine learning and Deep learning based detection plants.
and classification of disease can guide the farmer to
take the necessary action to control it, without having
expertise knowledge. Machine learning and deep
learning techniques are more accurate and less time
consuming compare to traditional method. It does need
to have domain knowledge about the field. Issues faced Fig. 1 Fig. 2 Fig. 3
by researchers in this field are unavailability of dataset Bacterial Disease Fungal Disease Viral Disease
for every disease, background noise in captured image,
II. METHODOLOGY
low resolution images, texture property of plant leafs
that vary according to environmental change. A. MACHINE LEARNING TECHNIQUE :
AI is superset of Machine learning which in turn Plant disease detection and classification can be
superset of Deep learning. The deep learning provides perform into two major steps, digital image processing
extended features compared to ML. DL provides an and machine learning. First step of image processing
automatic feature extraction for computer vision tasks, consist of image capturing, noise removal, image
unlike traditional and machine learning approaches. The segmentation and feature extraction. Second step of
main advantage of deep learning is that it does not machine learning performs feature selection and
worry about domain expertise as no feature engineering classification. Machine learning model uses extracted
is required. This image based Deep learning methods feature to categorize the plant of disease based on image
delivered excellent results for disease identification and features. These two major steps are break down into 6
classification, compared to traditional methods. sub steps, represented in fig 4.
PLANT DISEASES & IT'S SYMPTOMS : Image Image Image
Acquisition Preprocessing Segmentation
Plant diseases are categorized into 3 types as
bacterial, viral and fungal diseases.
Disease Feature
A. Bacterial Diseases: These diseases are spread by Identification Classification
Extraction
bacteria. They can be splashed about by rain or
carried by wind, birds or insects. Plants affected by Fig. 4. Machine Learning Approach
bacterial diseases shows the symptoms that include
overgrowth of plant, leaf spots, scabs and cankers. Above figure shows the general approach to detect
Bacterial infection symptoms are similar to that of and classify the plant disease.

430 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A. Image Acquisition: Pictures of leaves are capture improve the diseases control mechanism. The principal
using camera or comparative gadgets. Leaves component analysis (PCA) based algorithm disease
affected with diseases are used in the dataset. Size detection achieved 95% accuracy while the coefficient
and resolution of image are important parameter and of variation (CV) based algorithm achieved 85%
relates to efficiency of system.
accuracy. Vijai Singh proposed a soft computing
B . Image Preprocessing: Image preprocessing technique for identifying early disease detection [57].
includes the different operations like image resizing, An experiment is performed by Jobin Francis on HSV
noise removal, image filtering etc. Unwanted noises images of pepper plant and K-Means Clustering
are removed from image. Method [19] used to classify the healthy and unhealthy
C. Segmentation: Image segmentation is the process plant. Anand, R., Veni, S., & Aravinth, J. performed an
of splitting the image into several components or experiment on Brinjal Leaves to detect the leaf spot
sections. The foreground is isolated from the [3]. Sachin D. Khirade made use of Otsu Threshold
background or densely packed areas of pixels, Algorithm and Back propagation Network to detect
depending on color or shape similarities. Image diseases [34]. P. R. Rothe [55] carried out research on
segmentation can be implementing with different
and used thePattern Recognition Techniques to identify
methods like edge detection, k- mean clustering, Ostu
thresholding etc.
disease. Again, Image processing technique is used by
Ms. Kiran R. Gavhale to detect unhealthy Region of
D. Feature Extraction: It is use for extracting feature Citrus Leaf. Wan MohdFadzil performs Border
set. Feature extraction can be perform using Segmentation techniques [21] technique on orchid leaf.
Histogram of oriented gradients, Speeded-up robust
John William Orillo performed Back propagation
features, color and texture features, Local binary
patterns (LBP)etc. Artificial Neural Network on rice plant for identification
of disease [45]. Haiguang Wang proposed to detect
E. Classification: Classification is the process of grape and wheat diseases using PCA, RBF, SVM [73].
grouping data based on similarities. This step classifies
A Statistical Approach adopted by Nurul Hidayah Tuhid
the disease that the leaves are having. Different types
to identify orchid disease using RGB color [71]. Jayme
of models are available for classification purpose like
NB Classifier, Nearest Neighbor, Support Vector Garcia presented a detailed survey on plant disease
Machine (SVM), DT, Boosted Trees, RF, NN, detection using K-means clustering and Back
Logistic Regression etc. Propagation Neural Network. Diagnosis and
classification of grape leaf diseases using neural
B. A SURVEY OF MACHINE LEARNING networks is performed by Sanjeev S Sannakki [63].
TECHNIQUE Thi-Lan Le [37] proposed a fully automatic leaf-based
Nikos Petrellis developed a mobile application to plant identification method on Vietnamese medicinal
identify plant diseases like Downy Mildew, Powdery plant. Noor Ezan Abdullah proposed a work on
Mildwes [49]. Xanthoula Eirini Pantazi developed a characterization of watermelon leaf diseases using Fuzzy
model using Support vector machine and trained it using logic [4]. Chopda, J., Raveshiya, H., Nakum, S., &
8 images of training set to identify Powdery Mildew, Nakran made use of Decision Tree Classifier for Cotton
Black rot and Downy Mildew [48]. Trimi Neha Tete Crop Disease Detection.
was made use of K- means clustering and Neural
C. DEEP LEARNING TECHNIQUE :
Networks to detect the plant diseases [68]. Sourabh
Shrivastava used image retrieval concept to detect the Deep Learning given superior results compare to
plant diseases. Punnarai Siricharoen used SVM and conventional machine learning approaches. Deep
shape normalization for monitoring disease using texture learning is nothing but the subset of machine learning
andshape attribute [62]. A robotic application is which uses neural network i.e. interconnected web of
developed by Noa Schor to control the pesticides and nodes, called neuron. These are similar to neurons found

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 431
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

in brain accept input, perform complex computation ,CNN (CaffeNet) etc. It has been found that, most of
and product desired results. Unlabeled datasets are used the researchers perform an experiment on plant village
by neural network to extract the patterns from it by Dataset.
optimizing input parameters and then make predictions After Survey of hundreds of research, it is observed
by classifying them into fitting class. Deep learning that each researcher used a different way in his research
performs the process of learning the feature by using to detect and classify the diseases. By comparing the
given input. Convolutional Neural Network can accuracy parameter, we can say that GoogleNet, Cifer
automatically extract the features from given input and 10, Multi Channel CNN Models are giving better results
forward it to further layers for classification. It proven compare to other deep learning models. Based on
the significant improvement in the field of computer Dataset used, number of classes and result accuracy,
vision. CNN is composed of Convolutional, RELU and various researches are compare as shown in the Table
Pooling layer followed by fully connected layer that no.3.
enables classification. The Convolutional layer extract
features from input images based on weights and biases. During survey various research issues are found like
RELU stands for Rectifier Linear Unit, used to remove proper classification [17], Uneven Background [19],
negative pixel value of feature map by making them to Factor affecting image acquisition [23], Proper
zero. The function of pooling layer is to reduce the Segmentation [27], Accuracy [27], Reliability [30],
dimensionality of image. Deep learning can be utilized Time Consuming [49], Noise Removal [57], Designing
in agricultural field for various purposes like plant issues [65].
disease detection, weed detection, fruit detection etc. E. COMPARISON BETWEEN ML AND DL
Deep learning technique can work with large dataset APPROACH
and can produce superior results with right standards.
Machine Deep
Image Image Learning
Image Learning
Acquisition Preprocessing Approach Approach
Segmentation Input
Image
Feature
Feature Extraction
Disease Extraction & Automatic
Identif ication Categorization Feature
Categorization Extraction And
Categorization
Fig. 5. Deep Learning Approach
Result
D. A SURVEY OF DEEP LEARNING Prediction

TECHNIQUE Fig. 6. ML and DL Approach for Plant Disease Detection and


Classification
Deep learning is the recent technology use to detect
and classify plant diseases. Various deep learning models Deep Learning is the subset of Machine Learning
are available to solve agricultural problems and that gives but the major difference comes on how to present data
excellent results. Various researchers make use of to the system. Machine learning technique uses
different deep learning model to classify the diseases. algorithms to parse data, learn from that data, and make
Available models are MobileNet, R-CNN, DNN GAN accurate decision. Deep learning technique consists of
architecture, GoogleNet, Inception structure, many layers of algorithms called "artificial neural
Mutichannel CNN, AlexNet, SVM, 9-layer deep network" that can learn from trained data and make
CNN, Two-head network using pre-trained intelligent decisions based on what it is learned. Machine
model,InceptionV3 CNN using hierarchical approach Learning technique focuses on manual feature extraction
Faster R-CNN, CNN, Dense NetsCNN (VGG), Alex while in Deep Learning feature extraction is done
Net,ResNet50 with R-FCN, GoogleNet Cifar10 automatically [36].

432 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Figure 3 shows the visual representation about the and built model is used to categorize the plant name
working difference between Machine Learning and and type of infected disease. Both methods are use for
Deep Learning model. Machine Learning approach prediction of disease in plant, but Deep Learning
requires applying two separate algorithms for feature approach provides better accuracy compare to
extraction and categorization process. In Deep Learning Machine Learning approach.
approach, feature patterns are automatically extracted
TABLE I: Disease Detection and Classification Using Machine Learning Approach

Author Name Year Image Dataset Segmentation Classification Feature Extraction ClassifierAccuracy
Technique Algorithm
Reza, Z.N.(2016) 2016 Own dataset Hue Based SVM Color and texture SVM 86%
Segmentation
Sandika, B.(2016) 2016 Collected Dindori in Traditional RF,P NN,BPNN ,SV M Thresholding andimage RF 86%
Nashik district 900 appx. filling
Sarangdhar, A.A 2017 Collected form Buldhana Color transform and SVM Color moment , texture SVM 83.26%
(2017) district appx. 900 images thresholding Gabor filter
Ramesh, S.,(2018) 2018 Data set consists of 300 K-Means Clustering ANN Color and texture ANN Training 99%
images Testing 90%
Sumit Nema(2018) Self dataset creation k-means clustering SVM color, texture and edge Given in the formof
2018 Standard Deviation
Shima Ramesh 2018 Own training Dataset Not Specified RF HOG RF - 70.14%
(2018)
Budiarianto Suryo PlantVillage Not Specified K-means, DT, NB Complex genetic RF may improve if
Kusumo (2018) 2018 and Nearest Neighbor features number of tree
larger
Jayraj Chopda 2018 Training dataset Thresholding technique Decision Tree Texture, color Increased but not
(2018) Classifier Algorithm specified
Aman Sehgal Back spread is used to Traditional segmentation NN,SVM,RF,NB,DT Color and texture SVM -72.92% RF-
(2019) 2019 preparing database 71.88% NB-70.57%
DT-64%
Nikhil Shah(2019) 2019 Own dataset Traditional BPNN Texture Relative error 0.051
S.M. Jaisakthi Plant village Grab cut, Global SVM, Random Threshold, Textual,
(2019) 2019 Thresholding, Semi- Forest, AdaBoost GLCM Algorithm SVM 93.035%
Supervised technique
Eftekhar Hossain 2019 Arkansas Reddit-plant k-nearest neighbor KNN,GLCM GLCM algorithm, KNN 96.76%
(2019) datasets color, texture
Benjamin Doh 2019 Kaggle dataset K-mean ,Model-Based SVM, ANN Texture, color, Shape, SVM93.12% ANN
(2019) segmentation phenotypic Features 88.96%
Amrita S. Tulsham 2019 Own Dataset Region based K-mean SVM-Existing KNN- GLCM Algorithm SVM 97.6 % KNN
(2019) Segmentation Proposed 98.56%

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 433
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE II : Disease Detection and Classification Using Deep Learning Approach

Name of Authors Year Dataset Model Used Accuracy


Name of Crop Dataset Name No. of No. of
Classes Images
Sladojevic et al., 2016 5 crop species Internet 13 2589 CNN (CaffeNet) 96.30%
Xihai Zang 2017 Maize Plant Village 9 500 GoogleNet Cifar10 98.9%
98.8%
Fuentes et al., 2017 Tomato Own 9 5000 ResNet50 with R-FCN 85.98%
Wang et al., 2017 Apple black rot Plant Village 4 2086 VGG 16 90.40%
Halil Durmus et al., 2017 Tomato Plant leaf Plant Village 10 18000 Alex Net 95.65%
Edna Too et al., 2017 14 crop species Plant Village 38 54000 DenseNets 99.75%
Robert Luna et al., 2018 Tomato Own 4 4923 Faster R-CNN, CNN 91.67%
Ferentinos 2018 25 crop species Open Dataset 58 87848 CNN (VGG) 99.53%
Joana Costa et al., 2019Apple, Peach,Tomato Plant Village 16 24000 InceptionV3 CNN using 97.74%
hierarchical approach
Sijiang Huang et al., 2019 8 crop species Plant Disease 19 40000 U-Net, Two-head network 98.07%,
using pre- trained model 87.45%
Geetha ramani et al., 2019 14 crop species Plant Village 39 61486 9-layer deep CNN 96.46%
Rishabh Yadav et al., 2019 7 crop species Plant Village 23 8750 AlexNet, PSO, SVM 97.39%
Andre Abade et al., 2019 14 crop species Plant Village 38 54000 Mutichannel CNN 99.59%
Peng Jiang 2019 Apple Real World(ALDD) 5 26377 INAR-SSD 78.80%
Andras Anderla et al., 2019 12 crop species Plant Disease 42 79265 GAN architecture 93.67%
J.S.H. Al-bayati et al. 2020 Apple Plant village 6 2539 DNN, SURF, GOA 98.28%
Davinder Singh 2020 13 species Plant village 27 2598 MobileNet ,R-CNN 70.53%

120.00%

100.00%

80.00%

60.00%

40.00%

20.00%

0.00%

Fig. 7. Result Accuracy obtained by Machine Learning Technique

Figure 7 and Figure 8 represents the result accuracy of deep learning is far more than machine learning
obtained by Machine Learning Technique and Deep technique and its average accuracy rate ranges
Learning Technique respectively. Comparing both between85%-100%.
figures, we can conclude that accurate prediction rate

434 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

120.00%
100.00%
80.00%
60.00%
40.00%
20.00%
0.00%

Fig. 8. Result Accuracy Obtained by Deep Learning Technique

CONCLUSION using k-means clustering method. In 2016 international conference


on recent trends in information technology (ICRTIT) (pp. 1-
In this survey, we focused on Traditional 6).IEEE.
Methodology, Machine Learning technique and Deep [4] Abdullah, N. E., Hashim, H., Yusof, Y. W. M., Osman, F. N.,
Learning Technique for plant disease detection and Kusim, A. S., & Adam, M. S. (2012, September). A
characterization of watermelon leaf diseases using Fuzzy Logic.
classification. Image preprocessing, segmentation, In 2012 IEEE Symposium on Business, Engineering and Industrial
feature selection and classification are four major steps Applications (pp. 1-6). IEEE.
to identify disease. Based on survey, it is concluded [5] Alias, N., Nashat, S., Zakaria, L., Najimudin, N., & Abdullah, M.
that region based K-mean for segmentation and SVM Z. (2011, November). Classification gel electrophoretic image of
&ANN for classification gives good results. Considering DNA Fusarium graminearum featuring support vector machine.
In 2011 IEEE International Conference on Signal and Image
deep learning technique, it is concluded that Processing Applications (ICSIPA) (pp. 109- 114). IEEE.
Convolutional Neural Network gives better
[6] Al Bashish, D., Braik, M., &Bani-Ahmad, S. (2010, December).
performance in plant disease detection and classification. A framework for detection and classification of plant leaf and
On comparing result accuracy parameter, it is clearly stem diseases. In 2010 international conference on signal and
image processing (pp. 113- 118). IEEE.
observed that deep learning provides better accuracy
that machine learning. During survey, it is also observed [7] Balakrishna, K., & Rao, M. (2019). Tomato plant leaves disease
classification using KNN and PNN. International Journal of
that every researcher came up with different dataset Computer Vision and Image Processing (IJCVIP), 9(1), 51-63.
which is not publicly available for other researchers and
[8] Bajpai, G., Gupta, A., & Chauhan, N. (2019, July).Real Time
hence, its not possible to test new algorithm with other's Implementation of Convolutional Neural Network to Detect Plant
dataset for comparison purpose. Diseases Using Internet of Things. In International Symposium
on VLSI Design and Test (pp. 510-522). Springer, Singapore.
REFERENCES [9] Barbedo, J. G. A. (2013). Digital image processing techniques for
[1] Al-bayati, J. S. H., & Üstünda?, B. B. (2020). Evolutionary detecting, quantifying and classifying plant diseases. SpringerPlus,
Feature Optimization for Plant Leaf Disease Detection by Deep 2(1), 660.
Neural Networks. International Journal of Computational [10]Buades, A., Le, T. M., Morel, J. M., & Vese, L. A. (2010). Fast
Intelligence Systems, 13(1), 12-23. cartoon+ texture image filters. IEEE Transactions on Image
[2] Arsenovic, M., Karanovic, M., Sladojevic, S., Anderla, A., & Processing, 19(8), 1978- 1986.
Stefanovic, D. (2019). Solving current limitations of deep learning [11]Costa, J., Silva, C. and Ribeiro, B., (2019). Hierarchical Deep
based approaches for plant disease detection. Symmetry, 11(7), Learning Approach for Plant Disease Detection. In Iberian
939. Conference on Pattern Recognition and Image Analysis (pp. 383-
[3]Anand, R., Veni, S., &Aravinth, J. (2016). An application of image 393). Springer, Cham.
processing techniques for detection of diseases on brinjal leaves

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 435
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[12]Chopda, J., Raveshiya, H., Nakum, S., & Nakrani, V. (2018, [27]Huang, S., Liu, W., Qi, F. and Yang, K., 2019, August. Development
January). Cotton Crop Disease Detection using Decision Tree and Validation of a Deep Learning Algorithm for the Recognition
Classifier. In 2018 International Conference on Smart City and of Plant Disease. In 2019 IEEE 21st International Conference on
Emerging Technology (ICSCET) (pp. 1-5). IEEE. High Performance Computing and Communications; IEEE 17th
International Conference on Smart City; IEEE 5th International
[13]da Silva Abade, A., de Almeida, A.P.G. and de Barros Vidal, F.,
Conference on Data Science and Systems (HPCC/SmartCity/
2019. Plant Diseases Recognition from Digital Images using
DSS) (pp. 1951- 957). IEEE.
Multichannel Convolutional NeuralNetworks.
[28]Hossain, E., Hossain, M. F., & Rahaman, M. A (2019, February).
[14]de Luna, R. G., Dadios, E. P., & Bandala, A. A. (2018, October).
A color and texture based approach for the detection and
Automated image capturing system for deep learning-based
classification of plant leaf disease using KNN classifier. In 2019
tomato plant leaf disease detection and recognition. In TENCON
International Conference on Electrical, Computer and
2018-2018 IEEE Region 10 Conference (pp. 1414-1419). IEEE.
Communication Engineering (ECCE) (pp. 1- ). IEEE.
[15]Doh, B., Zhang, D., Shen, Y., Hussain, F., Doh, R. F., &Ayepah,
K. (2019, September). Automatic Citrus Fruit Disease Detection [29]Iqbal, Z., Khan, M. A., Sharif, M., Shah, J. H., urRehman, M.
by Phenotyping Using Machine Learning. In 2019 25 th H., & Javed, K. (2018). An automated detection and classification
International Conference on Automation and Computing (ICAC) of citrus plant diseases using image processing techniques: A
(pp. 1-5). IEEE. review. Computers and electronics in agriculture, 153, 12-32.

[16]Durmus, H., Günes, E. O., &K?rc?, M. (2017, August). Disease [30]Jaisakthi, S.M., Mirunalini, P. and Thenmozhi, D., 2019,
detection on the leaves of the tomato plants by using deep learning. February. Grape Leaf Disease Identification using Machine
In 2017 6th International Conference on Agro-Geoinformatics Learning Techniques. In 2019 International Conference on
(pp. 1-5). IEEE. Computational Intelligence in Data Science (ICCIDS) (pp. 1-6).
IEEE.
[17]Ferentinos, K.P., 2018. Deep learning models for plant disease
detection and diagnosis. Computers and Electronics in Agriculture, [31]Jhuria, M., Kumar, A., & Borse, R. (2013, December). Image
145, pp.311-318. processing for smart farming: Detection of disease and fruit
grading. In 2013 IEEE Second International Conference on Image
[18]Fuentes, A., Yoon, S., Kim, S.C. and Park, D.S., 2017. A robust Information Processing (ICIIP-2013) (pp. 521-526). IEEE.
deep- learning-based detector for realtime tomato plant diseases
and pests recognition. Sensors. [32]Kumari, C. U., Prasad, S. J., & Mounika, G. (2019, March). Leaf
Disease Detection: Feature Extraction with K-means clustering
[19]Francis, J., & Anoop, B. K. (2016, March). Identification of leaf and Classification with ANN. In 2019 3rd International
diseases in pepper plants using soft computing techniques. In Conference on Computing Methodologies and Communication
2016 conference on emerging devices and smart systems (ICEDSS) (ICCMC) (pp. 1095- 1098). IEEE.
(pp. 168-173). IEEE.
[33]Kusumo, B. S., Heryana, A., Mahendra, O., & Pardede, H. F.
[20]Fang, Y., & Ramasamy, R. P. (2015). Current and prospective (2018). Machine learning-based for automatic detection of corn-
methods for plant disease detection. Biosensors, 5(3), 537-561. plant diseases using image processing. In 2018 International
[21]Fadzil, W. N. W. M., Rizam, M. B. S., Jailani, R., & Nooritawati, Conference on Computer, Control, Informatics and it Applications
M. T. (2014). Orchid leaf disease detection using border (IC3INA) (pp. 93-97). IEEE.
segmentation techniques. In 2014 IEEE Conference on Systems, [34]Khirade, S. D., & Patil, A. B. (2015). Plant disease detection
Process and Control (ICSP2014) (pp. 168- 173). IEEE. using image processing. In 2015 International conference on
[22]Geetharamani, G., & Pandian, A. (2019). Identification of plant computing communication control and automation (pp. 768-771).
leaf diseases using a nine-layer deep convolutional neural network. IEEE.
Computers & Electrical Engineering, 76, 323-338.
[35]Khan, J. F., Adhami, R. R., & Bhuiyan, S. M. (2008). Color
[23]Gavhale, K. R., Gawande, U., & Hajari, K. O. (2014, April). image segmentation utilizing a customized Gabor filter. In IEEE
Unhealthy region of citrus leaf detection using image processing SoutheastCon 2008 (pp. 539-544). IEEE.
techniques. In International Conference for Convergence for
[36]Loey, M., ElSawy, A., & Afify, M. (2020). Deep Learning in
Technology-2014 (pp. 1-6). IEEE.
Plant Diseases Detection for Agricultural Crops: A Survey.
[24]Gulhane, V. A., &Kolekar, M. H. (2014, December). Diagnosis International Journal of Service Science, Management, Engineering,
of diseases on cotton leaves using principal component analysis and Technology (IJSSMET), 11(2), 41-58.
classifier. In 2014 Annual IEEE India Conference (INDICON)
[37]Le, T. L., Tran, D. T., & Hoang, V. N. (2014, December). Fully
(pp. 1-5). IEEE.
automatic leaf-based plant identification, application for
[25]Gröll, K., Graeff, S. and Claupein, W., (2007). Use of Vegetation Vietnamese medicinal plant search. In Proceedings of the fifth
indices to detect plant diseases. symposium on information and communication technology (pp.
[26]Gibson, G. J., Otten, W., Filipe, J. A., Cook, A., Marion, G., & 146- 154).
Gilligan, C. A. (2006). Bayesian estimation for percolation models [38] Maniyath, S.R., Vinod, P.V., Niveditha, M., Pooja, R., Shashank,
of disease spread in plant populations. Statistics and Computing, N. and Hebbar, R., 2018, April. Plant disease detection using
16(4), 391-402 machine learning. In 2018 International Conference on Design

436 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Innovations for 3Cs Compute Communicate Control (ICDI3C) [50]Pujari, J. D., Yakkundimath, R., & Byadgi, A. S. (2015). Image
(pp. 41-45). IEEE. processing based detection of fungal diseases in plants. Procedia
Computer Science, 46, 1802-1808.
[39]Molina, J. F., Gil, R., Bojacá, C., Gómez, F., & Franco, H. (2014).
Automatic detection of early blight infection on tomato crops [51]Phadikar, S., &Sil, J. (2008, December). Rice disease identification
using a color based classification strategy. In 2014 XIX using pattern recognition techniques. In 2008 11th International
Symposium on Image, Signal Processing and Artificial Vision Conference on Computer and Information Technology (pp. 420-
(pp. 1-5). IEEE. 423). IEEE.
[40]Mewes, T., Waske, B., Franke, J., & Menz, G. (2010, June). [52]Rezende, V.C., Costa, M., Santos, A. and de Oliveira, R.C., 2019,
Derivation of stress severities in wheat from hyperspectral data October. Image Processing with Convolutional Neural Networks
using support vector regression. In 2010 2nd Workshop on for Classification of Plant Diseases. In 2019 8th Brazilian
Hyperspectral Image and Signal Processing: Evolution in Remote Conference on Intelligent Systems (BRACIS) (pp. 705-710).
Sensing (pp. 1-4). IEEE. IEEE.
[41]Meunkaewjinda, A., Kumsawat, P., Attakitmongcol, K., & [53]Ramesh, S. (2018, September). Rice Blast Disease Detection
Srikaew, A. (2008). Grape leaf disease detection from color and Classification Using Machine Learning Algorithm. In 2018
imagery using hybrid intelligent system. In 2008 5th international 2nd International Conference on Micro-Electronics and
conference on electrical engineering/ electronics, computer, Telecommunication Engineering (ICMETE) (pp. 255-259). IEEE.
telecommunications and information technology (Vol. 1, pp. 513-
[54]Reza, Z. N., Nuzhat, F., Mahsa, N. A., & Ali, M. H. (2016,
516). IEEE.
September). Detecting jute plant disease using image processing
[42]Moshou, D., Bravo, C., Oberti, R., West, J., Bodria L., and machine learning. In 2016 3rd International Conference on
McCartney, A., & Ramon, H. (2005). Plant disease detection Electrical Engineering and Information Communication
based on data fusion of hyper- spectral and multi-spectral Technology (ICEEICT) (pp. 1-6). IEEE.
fluorescence imaging using Kohonen maps. Real- Time Imaging, [55]Rothe, P. R., & Kshirsagar, R. V. (2015, January). Cotton leaf
11(2), 75-83. disease identification using pattern recognition techniques. In
[43]Nazki, H., Yoon, S., Fuentes, A., & Park, D. S. (2020). 2015 International Conference on Pervasive Computing (ICPC)
Unsupervised image translation using adversarial networks for (pp. 1-6). IEEE.
improved plant disease recognition. Computers and Electronics [56]Ratnasari, E. K., Mentari, M., Dewi, R. K., & Ginardi, R. H.
in Agriculture, 168, 105117. (2014, September). Sugarcane leaf disease detection and severity
[44]Nema, S., & Dixit, A. (2018). Wheat Leaf Detection and estimation based on segmented spots image. In Proceedings of
Prevention Using Support Vector Machine. In 2018 International International Conference on Information, Communication
Conference on Circuits and Systems in Digital Enterprise Technology and System (ICTS) 2014 (pp. 93-98). IEEE.
Technology (ICCSDET) (pp. 1-5). IEEE. [57]Singh, D., Jain, N., Jain, P., Kayal, P., Kumawat S., & Batra, N.
[45]Orillo, J. W., Cruz, J. D., Agapito, L., Satimbre, P. J., & Valenzuela, (2020). PlantDoc: a dataset for visual plant disease detection. In
I. (2014, November). Identification of diseases in rice plant (oryza Proceedings of the 7th ACM IKDD CoDS and 25th COMAD
sativa) using back propagation Artificial Neural Network. In 2014 (pp. 249-253).
InternationalConference on Humanoid, Nanotechnology, [58]Sehgal, A., &Mathur, S. (2019, June). Plant Disease Classification
Information Technology Communication and Control, Using SOFT COMPUTING Supervised Machine Learning. In
Environment and Management (HNICEM) (pp. 1-6). IEEE. 2019 3rd International conference on Electronics, Communication
[46]Pourazar, H., Samadzadegan, F., & DadrassJ avan, F. (2019). and Aerospace Technology (ICECA) (pp. 75-80). IEEE.
Aerial multispectral imagery for plant disease detection: [59]Shah, N., & Jain, S. (2019, February). Detection of Disease in
radiometric calibration necessity assessment. European Journal Cotton Leaf using Artificial Neural Network. In 2019 Amity
of Remote Sensing, 52(sup3), 17-31. International Conference on Artificial Intelligence (AICAI) (pp.
[47]Prajapati, H. B., Shah, J. P., & Dabhi, V. K. (2017). Detection 473-476). IEEE.
and classification of rice plant diseases. Intelligent Decision [60]Saradhambal, G., Dhivya, R., Latha, S. and Rajesh, R., 2018.
Technologies, 11(3), 357- 373. Plant disease detection and its solution using image classification.
[48]Pantazi, X. E., Moshou, D., Tamouridou, A. A., &Kasderidis, S. International Journal of Pure and Applied Mathematics, 119(14),
(2016, September). Leaf disease recognition in vine plants based pp.879-884.
on local binary patterns and one class support vector machines. [61]Sun, G., Jia, X., & Geng, T. (2018). Plant diseases recognition
In IFIP International Conference on Artificial Intelligence based on image processing technology. Journal of Electrical and
Applications and Innovations (pp. 319- 327). Springer, Cham. Computer Engineering, 2018.
[49]Petrellis, N. (2017, May). A smart phone image processing [62]Siricharoen, P., Scotney, B., Morrow, P., & Parr, G. (2016,
application for plant disease diagnosis. In 2017 6th International September). Texture and shape attribute selection for plant
Conference on Modern Circuits and Systems Technologies disease monitoring in a mobile cloudbased environment. In 2016
(MOCAST) (pp. 1-4). IEEE. IEEE International Conference on Image Processing (ICIP) (pp.
489-493). IEEE.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 437
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[63]Sannakki, S. S., Rajpurohit, V. S., Nargund, V. B., & Kulkarni, P. [70]Tilva, V., Patel, J., & Bhatt, C. (2013). Weather based plant
(2013, July). Diagnosis and classification of grape leaf diseases diseases forecasting using fuzzy logic. In 2013 Nirma University
using neural networks. In 2013 Fourth International Conference International Conference on Engineering (NUiCONE) (pp. 1-5).
on Computing, Communications and Networking Technologies IEEE.
(ICCCNT) (pp. 1-5). IEEE.
[71]Tuhid, N. H., Abdullah, N. E., Khairi, N. M., Saaid, M. F.,
[64]Schikora, M., Schikora, A., Kogel, K. H., Koch, W., &Cremers, Shahrizam, M. S. B., & Hashim, H. (2012). A statistical approach
D. (2010). Probabilistic classification of disease symptoms caused for orchid disease identification using RGB color. In 2012 IEEE
by Salmonella on Arabidopsis plants. INFORMATIK 2010. Control and System Graduate Research Colloquium (pp. 382-
Service Science-NeuePerspektivenfür die Informatik. Band 2. 385). IEEE.
[65]Thomas, S., Kuska, M. T., Bohnenkamp, D., Brugger, A., Alisaac, [72]Wang, G., Sun, Y., & Wang, J. (2017). Automatic image-based
E., Wahabzada, M., & Mahlein, A. K. (2018). Benefits of plant disease severity estimation using deep learning.
hyperspectral imaging for plant disease detection and plant Computational intelligence and neuroscience.
protection: a technical perspective. Journal of Plant Diseases
[73]Wang, H., Li, G., Ma, Z., & Li, X. (2012, October). Image
and Protection, 125(1), 5-20.
recognition of plant diseases based on backpropagation networks.
[66]Too, E. C., Yujian, L., Njuki, S., & Yingchun, L. (2019). A In 2012 5th International Congress on Image and Signal Processing
comparative study of fine-tuning deep learning models for plant (pp. 894- 900). IEEE.
disease identification. Computers and Electronics in Agriculture,
[74]Yadav, R., Rana, Y.K. and Nagpal, S., 2018, November. Plant
161, 272-279.
Leaf Disease Detection and Classification Using Particle Swarm
[67]Tulshan, A.S. and Raul, N., 2019, July. Plant Leaf Disease Optimization. In International Conference on Machine Learning
Detection using Machine Learning. In 2019 10th International for Networking (pp. 294-306). Springer, Cham.
Conference on Computing, Communication and Networking
[75]Zhang, X., Qiao, Y., Meng, F., Fan, C., & Zhang, M. (2018).
Technologies (ICCCNT) (pp. 1-6). IEEE.
Identification of maize leaf diseases using improved deep
[68]Tete, T.N. and Kamlu, S., 2017, September. Plant disease convolutional neural networks. IEEE Access, 6, 30370-30377.
detection using different algorithms. In Proceedings of the Second
[76]Zellnig, G., Möstl, S., & Zechmann, B. (2013). Rapid
International Conference on Research in Intelligent and Computing
immunohistochemical diagnosis of tobacco mosaic virus disease
in Engineering, 10, 103-106).
by microwave- assisted plant sample preparation. Microscopy,
[69]Thangadurai, K., & Padmavathi, K. (2014, February). Computer 62(5), 547-553.
visionimage enhancement for plant leaves disease detection. In
2014 world congress on computing and communication
technologies (pp. 173-175). IEEE.

438 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fashion Online Shopping System Using Python


Kotoju Rajitha1, Leela Chandana Daki2
1
Asst Professor, 2UG Scholar
1,2
Department of Computer Science and Engineering, Mahatma Gandhi Institute of Technology, Hyderabad, India

Abstract-This is a project for Apparel Online Easy to pick hard to find products: Online
shopping system. The basic idea is that customers Shopping provides a great chance and helps us to find
can buy products online, the administrator can collectibles and hard to find items, due to a wide range
enter his credentials and create an account and of selection of items which online stores provide.
then generate the receipt of the products
purchased. The Online Shopping system enables No Time Limit: The customers can shop as long
vendors to set up online shops, customers to as they want unless the server of the website is crashed.
browse through the shops, and a system
Price Comparisons: The customers can easily
administrator to approve and reject bidding
requests and maintain lists of product purchases.
compare prices of products through online shopping
Also, the bidding system is also introduced in order as they need not move from one place to know the
to provide an additional chance for the customers price of other stores, this is possible through Internet.
to purchase products which are limited in stock. Reviews: Many online stores provide a facility to
Our online shopping mall will use the internet as give feedback to the products which are purchased by
the sole method for selling goods. Shopping will
them, which helps the new customer to decide whether
be highly personalized and provides lower prices
to buy the product or not. Unlimited
than most competitors. This website will be useful
for anyone who wants to purchase items Selection: Online stores provide more selection of
throughinternet. items than a normal physical shop.
Keywords: Apparel, Bidding Low Price: Online shops doesn't require any
I. INTRODUCTION buildings or warehouses and other facilities such as
workers, electricity etc. which in turn requires a lot of
Online shopping is a process wherecustomers expenditure. Hence, they sell their products at a very
directly buy goods and services over the Internet. With less price in comparison to thenormal shops.
the increase of computer usage and Internet access,
Online Shopping is becoming more popular way of A. Existing System
doingshopping. There are a good number of models existing for
Following are some of the main reasons for online Online Shopping System, but in existing systems, they
shopping to becomepopular: have only basic features of a Shopping websites and
has combination of categories 2 such as Clothing,
Shopping Convenience: These shops are available
Electronics, Sports, Grocery, Body care etc. In existing
24/7 which means customers can shop day and night
systems there is no feature of Bidding.
while relaxing at their home.
Browse instead of Driving: Travelling to different B. Proposed System
shops at different places is an expensive task and The aim of the proposed system is to give a user a
consumes time. In case of Online Shopping, customers user-friendly interface to connect with the new trend
can sit at comfort of their homes and can shop from that evolved around the world. This system is developed
many different shops even if they are located in a different using basic with web development technology and
city or a different country. hiding the essential functionalities that are not necessary

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 439
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

for the users to know. This system is administeredusing can login to the system else the user must register to the
an admin. Here the admin can add several categories system. Then can perform operations such as selecting,
or features to the Fashion Online Shopping System. bidding, order, check bid status, review, etc., The admin
The main feature of this proposed system is to give is eligible to perform operations such as uploading the
feedback and reviews by other customer to know the product, accept or reject the bid, etc.,
quality of the product. The other added feature in this
proposed system is "Bidding". By adding this feature, III. REQUIREMENTS OF PROJECT
we get a solution to the products that are not available D. Hardware Requirements
in our Online Shopping System. If the need for a product
RAM: 1 Gb or more.
is high for the customer, he/she can bid the product and
wait for the response of the admin. If the admin approves Hard disk: 100 Gb or more.
the bid value, the customer can proceed and continue Processor: Any Update Processor.
with the payment to buy the required product.
E. Software Requirements
II. DATAFLOW DIAGRAM
Operating System: Windows Environment.
Technology: Java (1.7/1.8)
Web Technologies: Html, JavaScript, CSS
Web Server: Tomcat 7/8
Server-side Lang: J2EE
Database: DB-2
IV. SOFTWARE TOOLS USED
F. Java
Java is a programming language created by James
Gosling from Sun Microsystems in 1991. The first
publicly available version of Java (Java 1.0) was released
in 1995. Over time new enhanced versions of Java have
Fig.1 Dataflow diagram been released. The current version of Java is Java 1.7
C. Dataflow Diagram Description which is also known as Java 7. From the Java
programming language, the Java platform evolved. The
Data flow diagram is a graphical representation that Java platform allows that the program code is written
depicts information flow and the transforms that are in other languages than the Java programming language
applied as data move from input to output. The basic and still runs on the Java virtual machine.
form of a data flow diagram, also known as a data flow
graph or a bubble chart. Data flow diagram may be G. JavaScript
used to represent a system or software at any level of Java Script is Netscape's cross-platform, object-
abstraction. The transformation of data from input to based scripting language for client server application.
output, through processed, may be described logically JavaScript is mainly used as a clientside scripting
and independently of physical components associated language. This means that JavaScript 4 code is written
with the system. Here the customer can perform two into an HTML page. When a user requests an HTML
operations either registering into the system or login to page with JavaScript in it, the script is sent to the browser
thesystem. If the user is an existing customer, then he and it's up to the browser to do something with it.

440 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

JavaScript can be used in other contexts than a Web K. CSS


browser. Netscape created server-side JavaScript as CSS Stands for "Cascading Style Sheet." Cascading
a CGI-language that can do roughly the same as Perl style sheets" are used to format the layout of Web pages.
or ASP. Fortunately, mostbrowsers can handle They can be used to define text styles, table sizes, and
JavaScript nowadays, but of course some browsers other aspects of Web pages that previously could only
do not support some bits of script. be defined in a page's HTML. The basic purpose of
H. Java Server Pages CSS is to separate the content of a web document from
itspresentation (that is written using Cascading Style
JSP technology enables you to mix regular static html Sheets). There are lots of benefits that one can extract
with dynamically generated content from 6 servlets. through CSS like improved content accessibility, better
Separating the static html from the dynamic content flexibility and moreover, CSS gives a level of control
provides a number of benefits over servlets alone. JSP over various presentation characteristics of the
is easy to learn and allows developers to quickly document. It also helps in reducing the complexity and
produce wed sites and application in an open and helps in saving overall presentation time. CSS gives the
standard way. JSP is based on java, an object-oriented option of selecting various style schemes and rules
language. JSP offers a robust platform for web according to the requirements and it also allows the
development. same Html document to be presented in more than one
I. Servlets varying style.
The Java web server is Java Soft own web Server. V. RESULTS
The Java web server is just a part of a larger framework,
intended to provide you not just with a web server, but
also with tools. To build customized network servers
for any Internet or Intranet client/server system. Servlets
are to a web server, how applets are to the browser.
Servlets provide a Java-based solution used to address
the problems currently associated with doing server-
side programming, including inextensible scripting
solutions, platform specific APIs, and incomplete Fig. 2 Home Page
interfaces. Servlets are objects that conform to a specific
interface that can be plugged into a Java-based server.
Servlets are to the server-side what applets are to the
client side - object byte codes that can be dynamically
loaded off the net.
J. HTML
HTML stands for Hyper Text Markup Language. It
is used to design web pages using markup language.
Html is the combination of Hypertext and Markup Fig. 3 Order Placed

language. Hypertext defines the link between the web VI. CONCLUSION
pages. Markup language is used to define the text
document within tag which defines the structure of web Online shopping is becoming more popular day by
pages. This language is used to annotate text so that a day with the increase in the usage of World Wide Web
machine can understand it and manipulate text known as www. Understanding customer's need for
accordingly. online selling has become challenge for marketers.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 441
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Specially understanding the consumer's attitudes VIII. REFERENCES


towards online shopping, making improvement in [1] Andrew, J. R and Vanitha, S. (2004). A typology of online
thefactors that influence consumers to shop online and shoppers based on shopping motivations, Journal of Business
working on factors that affect consumers to shop online Research Vol. 57 PP. 748-757

will help marketers to gain the competitive edge over [2] Amit, B. Sanjoy, Ghose. (2004). A latent class segmentation
analysis of e-shoppers, Journal of Business Research. Vol.57,
others. PP.758- 767.
VII. FUTURE SCOPE [3] Boudraeu, M.C and Watson R.T (2006). "Internet Advertising
Strategy Alignment" Internet Research. Vol.16 (1), PP.23-37
It is suggested to further improve the system reported [4] Cho and Jinsook. (2004). Likelihood to abort an online transaction:
in this study using more variables (e.g., Multilingual Text, Influences from cognitive evaluations, attitudes, and behavioural
Artificial Intelligence - Natural Language Processing variables. Information & Management, Vol.41, PP. 827- 838.
etc.) to get a clearer understanding of their client's needs. [5] Creswell, J.( 1994) Research design: Qualitative and quantitative
A variety of data mining techniques can also be used approaches, London Press: Sage.
by researchers to simplify customer perceptions and [6]Alba, J., Lynch, J., Weitz, B., Janiszewski, C., Lutz, R., Sawyer,
attitudes. Every day, every hour and every minute, tera- A., & Wood, S. (1997). Interactive home shopping: Consumer,
retailer, and manufacturer incentives to participate in electronic
bytes of data gets generated from millions of shoppers, marketplaces. Journal of Marketing, 61, 38-53.
yet retail managers/ business executives always grapple
with relevant information that can help retailers/
researchers design strategies to generate customer
loyalty. Some of the world's largest retailers such as
Wal-Mart, Tesco's, Carrefour etc. utilize this data to
generate certain knowledge that can help them in
modelling and predicting customer behaviour and further
in order to know their customers better.

442 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Comparative Study of Three Symmetric Key Fusion


Algorithms DES-Blowfish, DES-RC6 and BlowfishRC6
Dr. Dube H.V.1, Dr. Amale B.B.2, Prof. Galande C.S.3
1,2,3
Department of Computer Science, PVP College Pravaranagar, Loni-413713 (MS) India.
Email: dubehvd72@gmail.com1, aba292005@gmail.com2, csgalande@yahoo.co.in3

Abstract- Network and Internet applications are Experimental Design


growing very fast, since the need to secure these
applications are very fast. Encryption algorithms We implemented the algorithms according to their
play a main role in information security systems. standard specifications in Java jdk 1.6 with Windows-
Data must be encrypted before it is transmitted. 7 environment and a tool has designed, which calculates
Differentiate one fusion encryption algorithm from the encryption time decryption time in ms (milliseconds)
another are its ability to secure the protected data. of each algorithm .The text file have been encrypted
This paper provides a comparison between three and decrypted with the designed tool and their execution
of the most common fusion encryption algorithms: time is calculated. Also required the symmetric key
DES-Blowfish, DES-RC6 and BlowfishRC6 algorithms (DES, Blowfish and RC6).
algorithms. The comparison has been conducted
by running several encryption settings to process Performance metrics
different sizes of data blocks to evaluate the
The performance metrics are encryption time
algorithm's encryption/decryption speed.
Simulation has been conducted using Java (milliseconds), decryption time (milliseconds) and
language. throughput (Mb/sec.). The performance metrics
analyzed and discussed by the researchers regarding
Keywords:-DES, RC6,Blowfish, Cryptography,
encryption algorithms are discussed below [2][3]:
Asymmetric Key, key size, Throughput, Public key,
Private Key, Symmetric Key. Encryption Time: It is the time that an encryption
algorithm takes to produce a cipher text from a plain
INTRODUCTION
text. Encryption time is used to calculate the throughput
The world is becoming more interconnected with of an encryption process. In other words, it indicates
the advent of the Internet and new networking the speed of the encryption process. The encryption
technology. There is a large amount of personal, time is generally calculated in milliseconds. It is the time
commercial, military, and government information on taken by an encryption algorithm to encrypt the data.
networking infrastructures worldwide. Network Less is the encryption time; more will be performance
security is becoming of great importance because of of that algorithm.
intellectual property that can be easily acquired through
Decryption Time: It is the time that an encryption
the internet. The architecture of the internet, when
algorithm takes to produce a plain text from a cipher
modified can reduce the possible attacks that can be
text. Decryption time is used to calculate the throughput
sent across the network. Knowing the attack methods,
of a decryption process. In other words, it indicates
allows for the appropriate security to emerge. Many
the speed of the decryption process. The decryption
businesses secure themselves from the internet by means
time is generally calculated in milliseconds. It is the time
of firewalls and encryption mechanisms. . Security is
taken by an encryption algorithm to decrypt the data.
needed for user authentication and access control over
Less is the decryption time; more will be performance
the internet. [1]
of that algorithm.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 443
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Throughput: The throughput of the encryption Table 2Times and Throughput of Encryption and Decryption

scheme is calculated as the total plain text in encrypted Data Encryption Time Decryption Time
Throughput of
Encryption
Throughput of
Decryption
(KB) (In Millisecond) (In Millisecond)
in Kbytes divided by the encryption time in milliseconds. 100 46 31
(Kb/Millisecond)
2.17
(Kb/Millisecond)
3.23
The unit of throughput is MB/Sec. More is the 200
300
62
78
62
78
3.22
3.84
3.23
3.85
throughput; more will be the performance. The 400 110 93 3.64 4.30
500 140 94 3.57 5.31
throughput of the encryption scheme is calculated as 600 141 125 4.25 4.8
700 171 141 4.09 4.96
the ratio of total plain text by encryption time. 800 219 156 3.65 5.13
900 234 171 3.84 5.26
Throughput of Encryption Algorithm = Tp (Kbytes)/ 1024 265
Avg. Time
187 3.86
3.613
5.47
4.554
Et (Milliseconds)
The result of RC6DES reading is same developed
Where; in Java. DES has key size of 56 bits, block size of 64
Tp: Total Plain Text (Kbytes) bits and 16 rounds.RC6 has key size 128 bits( variable
length), block size 128 bits and 18 rounds. So the DES
Et: Encryption Time (Milliseconds) has fixed length key size and RC6 has variable length
Experimental Result-I (DES-Blowfish) of key size. In security view the fusion of this algorithm
is less because DES has less key size. The key size
The following table 1 the Encryption and Decryption increases the security also increases [5] [6]. So we
Time and Throughput for Fusion DES-Blowfish combine Blowfish and RC6 algorithm in experiment-
Algorithm. III.
Table 1Times and Throughput of Encryption and Decryption
Decryption Throughput of Throughput
Experimental Result-III (BlowfishRC6)
Encryption
Data Time Encryption Decryption
Time (In
(KB)
Millisecond)
(In (Kb/Millisecond) (Kb/Millisecond) The following table 3 shows the Encryption and
Millisecond)
100 62 46 1.61 2.17 Decryption Time and Throughput for Fusion Blowfish
200 78 62 2.56 3.23
300 94 78 3.19 3.85
RC6 Algorithm.
400 124 109 3.22 3.66
500 141 109 3.54 4.59
Table 3Times and Throughput of Encryption and Decryption
600 141 125 4.25 4.8 Decryption Throughput of Throughput
700 188 156 3.72 4.48 Encryption
Data Time Encryption Decryption
800 202 171 3.96 4.67 Time (In
(KB) (In (Kb/Millisecond) (Kb/Millisecond)
900 218 187 4.12 4.81 Millisecond)
Millisecond)
1024 280 203 3.65 5.04 100 32 31 3.125 3.23
Avg. Time 3.382 4.13 200 46 32 4.34 6.25
300 78 62 3.85 4.84
The result of existing DES-Blowfish (Published in 400 93 78 4.30 5.13
World of Computer Science and Information 500 109 94 4.58 5.31
600 124 109 4.84 5.50
Technology Journal ISSN: 2221-0741 vol. 1 No. 3 700 156 124 4.48 5.64
800 156 141 5.13 5.67
88-91 2011) is develop in VB and above reading is 900 187 156 4.81 5.76
same developed in Java. DES has key size of 56 bits, 1024 218 172 4.69 5.95
Avg. Time 4.4145 5.328
block size of 64 bits and 16 rounds. Blowfish has key
size 128 bits (variable length), block size 64 bits and The above table 3shows the encryption and
16 rounds. So the DES has fixed length key size and decryption time is more superior to above experimental
Blowfish has variable length of key size. In security view result- I and II
the fusion of this algorithm is low level of data security Result Discussion of Fusion algorithms
because of key size [4].
The following table 4 shows throughput of encryption
Experimental Result-II (DES-RC6) and throughput of decryption of DES-Blowfish, DES-
The following table 2 shows the Encryption and RC6 and BlowfishRC6 algorithms.
Decryption Time and Throughput for Fusion DES-RC6
Algorithm.
444 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 4 Throughput of Encryption and Throughput Decryption REFERENCES


Throughput of Throughput [1] Cryptography and Network Security by- AtulKahate- Tata
Algorithm
Encryption Decryption McGraw-Hill Publication Company Limited .
Name
(Kb/Millisecond) (Kb/Millisecond)
DES-Blowfish 3.382 4.13 [2] "Wireless Security Handbook,". Auerbach Publications 2005.
DES-RC6 3.613 4.554 [3] William Stalling, "Cryptography and Network Security Principles
BlowfishRC6 4.4145 5.328 and Practice 5th Edition", Pearson.
[4] Dube H.V. and Dr. SagarJambhorkar, Performance Analysis of
Fusion DES and Blowfish Algorithms, National Conference on
Emerging Trends in Computer Science and Computer
Application Page no 25-32, ISBN 978-93-5137-872-3.
[5] Dube H.V. and Dr. SagarJambhorkar, Performance Evaluation of
Fusion DES and RC6 Algorithms in Web Security , National
Conference on "Preventive measures avoid the Cyber Crimes,
Page no 63-71, ISBN 978-93-83414-51-2
[6] Dube H.V. and Dr. SagarJambhorkar, A Novel approach for
BlowfishRC6 fusion Algorithms for web Security, International
Conference on Recent Trends and Challenges in Science &
Technology.
Figure 1Throughput Descryption for DES-Blowfish, DES-RC6
and BlowfishRC6 algorithms.

CONCLUSION
The result suggests that the decryption time and the
throughput of decryption time for BlowfishRC6 are
better of existing than DES-Blowfish and DESRC6
algorithm. Due to its minimum encryption and maximum
decryption throughput it gives better performance. It is
shown graphically in figure 1.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 445
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Hand Gesture Recognition Using Sensors for Deaf-


Mute People
Shanmugapriya S1, Shalini TB2, Ramya M3
1
Assistant Professor, 2,3U. G Student,
1,2,3
Department of Computer Science and Engineering,
Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai.
Email: s.shanmugapriya@velhightech.com1, tgsbha@outlook.com2, ramyaramya1812@gmail.com3

Abstract- Human creatures have a normal people to communicate more effectively with each other
capacity to see, tune in and connected with the and with normal people.This non-verbal language
outside environment. Tragically, there are a few contains special rules and grammar’s for expressing
individuals who are differently abled and don’t have effectively [2].
the capacity to utilize their senses to the leading
degree conceivable. They communicate with others Sign language could be a sort of dialect that uses
using their hand gestures and the facial hand movements, facial expressions and body dialect
expressions. We proposed the technique using to communicate with others. It is most important by the
glove which can change over communication via deaf and people who can hear but cannot speak
gestures to discourse yield. Some people are easily [3].Sign languages are the native languages of the
to get the information from their motions. The Deaf and dumb community and they provide full access
remaining people are not able to understand their
to communication. The impaired people sign languageis
way of conveying the message. In arrange to
overcome the complexity; the artificial mouth
encompassed by numerous myths and misinterpretations
speaker is presented for the dumb people which
are based on the movement sensor. According to
the dumb people, for every motion they have a
meaning and database stores the templates. The
template database is given it to the microcontroller
and the motion sensor is fixed in their hand. The
motion sensors get accelerated and give the signal
to the microcontroller, then it matches the motion
with the database to produce the speech signal and
displays the output in serialmonitor.
Keywords: Hand gloves, Microcontroller, LCD
display, Speaker, Sensors. Typically Sign recognition is related as image
understanding. This poses a genuine communication
I. INTRODUCTION between the deaf community and the rest of the society,
The sign language is an important way of as a problem yet to be fully solved.
communication for deaf-dumb people. In sign language II. RELATEDWORKS
each hands movement has a specific meaning. So, the
complex meanings can be explained by the help of Sign dialect plays a major role for dump people to
combination of various basic elements. Sign language communicate with ordinary people. It is very complicate
is a gesture-based language used to communicate with for mute people to convey their message to normal
the deaf and dumb people [1]. It is a non-verbal people. So, the solution for this problem is to convert
language that is commonly used by deaf and dumb the sign language into speech output[4].

446 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The Support Vector Machine paper gives a premise the handssign language into an oral language. The device
for the improvement of sign language acknowledgment is connected to a glove on the inside, with flex sensors
framework, utilizing support vector machine, where the in each finger, and data is collected and processed using
signs displayed by dumb people will be converted into a methodology that includes the following stages:
an observable format for a blind person [5]. (i) KS data adjustment, (ii) comparison of model’s
Every day we are watching many people who are choice between CHC evolutionary Algorithm and
facing illness like deaf, dumb and blind etc. They face Decremental decrease Optimization Procedure3 to
difficulty to interact with others. It explains a new characterize the finest one. Hence, the K- Nearest
technique of virtual talking without sensors. An image Neighbours (KNN) as classifier (iii) is actualized [10].
processing technique called Histogram of gradient
(HOG) along with artificial neural network (ANN)has III. EXISTINGSYSTEM
been used to train the System[6]. In existing framework, the module was created for
Impaired people face many problems in dumb person utilizing flex sensor, there user hand is
communicating with normal people with difficulties in connected with the flex sensors. On this module the
dealing with the communication technology. The goal flex sensor responds to bend each finger individually.
of this paper is to design a desktop human computer The previous system comprises of flex sensor interfaces
interface application that is used to facilitate on fingers and the message will be sent to the mobile
communication between normal people, “deaf/dumb” based on the flex sensed in each finger. Each flex sensor
and blind people[7]. will have a particular message. User can give less signs,
it is not flexible to operate, this system had some time
Sign language recognition mainly addresses to delay will happen in sending message, this system
facilitate deaf and dumb person’s life style. The proposed expense is more, sometimes, this system does not
system captures a hand gesture using camera. Image produce message correctly, and power consumption is
processing of captured gesture is done. Amplified audio high. These are some of the cons in the existing system.
corresponding to each processed gesture is the output
of this paper[8]. IV. OUR MODEL
Sign language is complex to understand but the To overcome the above problems, we proposed a
complete language which involves the hand’s movement, system, the values are obtained using MEMS sensor
facial expressions, and body movements. Sign language and Flex sensor which is more flexible and accurate for
plays an important core communication media to the measuring hand movements. By taking the value, the
people which cannot speak. It is not a universal language microcontroller starts to react with speech, each MEMS
because every country has its own sign language. Every sensor ANGLE holds unique voice stored in kit and
nation has it’s possessed language structure for their for each sign it will play unique voice output. The goal
sign language, word orders and pronunciation. The of this project is to develop a device that recognizes
issues arise when people try to communicate by using sign language and allows people with speech
their sign language with the people who are unaware of impairments to communicate with others who don’t have
this language grammar. To detect the sign language by it, as a result, the communication gap between them
using the hand gestures and then converted into textual will be narrowed.Hand gestures are significant because
or verbal form which will can be understood by any they represent the user’s views in less time than other
person i.e., recognizes the result for each sign[9]. gestures (arm, face, head, and body).Through When
compared to existing systems, users can provide more
We present an electronic glove system that is able signs, allowing for easier interaction between deaf and
to detect numbers of sign language in order to automate dumb people, it is flexible to operate and wear, these
the process of communication between an impaired systems have voice playback also, power consumption
persons and normal persons. This is done by translating

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 447
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

is low compared to the previous system, and this system


will produce the clear output. These are the pros in
ourmodel.
A) SYSTEMARCHITECTURE

If the body of the component bends, then it increases


the resistance of the flex sensor. They can also be used
as door sensors, robot whisker or a primary component
in creating sentient stuffed animals.
MEMS SENSOR
Microelectromechanical system (MEMS) is the
innovation of tiny devices, particularly those with moving
parts. MEMS sensor is a combination of both electrical
and mechanical devices. When the MEMS sensor
Fig1: Architecture diagram of Microcontroller connections
detects a change in direction, it will activate the 8
channels playback pins, which will play the voice stored
This system is developed using both flex and MEMS in the pin. These sensors are used to detect and measure
sensors for measuring the hand gestures. The environmental forces such as pressure, and then they
microcontroller is a low power gadget which receives respond to the pressure that is obtained via mechanical
motion performed by the user. The primary work of operations.
this paper is to introduce an issue that will interpret
motions to every text and sensibility voice. The
interpreter makes use of a glove-based technique along
with the sensors. The diagram shows that the That signal is at that point intensified to produce a
microcontroller connected to the power supply, LCD steady output signal in computerized, 4-20mA or VDC.
and the audio playback device which allows two flex
sensors and MEMS sensor can be attached to the glove VOICE PLAYBACK DEVICE
and connected to the microcontroller. Audio playback The act of producing a sound or video recording,
device consists of microphone-to record the voices and especially in order to check a recording. When you
a speaker-sensors, to give output. connect speakers, Bluetooth speakers, headphones
orother audio devices to your computer you can select
B) MODULES FLEX SENSOR
which device you want to use by default. The recording
It is made up of carbon surface on a plastic strip so played, especially to begin with time it is listened
when this strip is twist or avoid at the point the resistance after being recorded.
of this flex sensor is changed. People can calculate
the degree of flexure or the bend radius using resistance.

In this voice playback gadget, sound is put away


and controlled as a stream of discrete numbers, each
number speaking to the air pressure at a specific time.

448 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The numbers are generated by a microphone connected VI. CONCLUSIONS


to a device called an ANALOG TO DIGITAL In this paper we build the system to ease the difficulty
CONVERTER. in communicating with those having speech and vocal
V. EXPERIMENTALRESULTS disabilities. It is used to provide an application to the
society to establish the ease of communication between
In fig:2, we interfaced flex sensor with the Arduino the deaf and mute people by using the flex and MEMS
and checked if the flex sensor is bend mean it was shown sensor. Hand Gesture system gives us a creative,
in serial monitor. When the flex sensor is pressed, it ordinary, straightforward technique for correspondence
indicates that the device wants to be turned on. For with the PC which is progressively notable to the
this purpose, we are using this flex sensor. people.
REFERENCES
[1] Nan Song, Hongwu Yang, “A Gesture-to- Emotional Speech
Conversion by Combining Gesture Recognition and Facial
Expression Recognition”,2018 First Asian Conference on
Affective Computing and Intelligent Interaction (ACIIAsia).
[2] Ashish S. Nikam Dept, Dwarka das J. Aarti G. Ambekar, “Sign
language recognition using image-based hand gesture
recognitionTechniques”.2017 IEEE Online International
Fig 2: Interface flex sensors with Microcontroller Conference on Green Engineering and Technology (IC-GET).

In fig:3, we interfaced Arduino with the MEMS [3] Channaiah Chandana K, Nikhita K, Nikitha P3, Bhavani N K,
Sudeep J, “Hand Gestures Recognition System for Deaf, Dumb
sensor and if we changed the angle mean it was showed and Blind People”. International Journal of Innovative Research
output in serial monitor. in Computer and Communication Engineering, May2017.
[4] S. Vigneswaran, “Hand Gesture Recognition and Voice Conversion
System for Dump People”, 2019 IEEE 5 th International
Conference on Advanced Computing and Communication
System(ICACCS).
[5] K. Revanth, “Comprehensive SVM based Indian Sign Language
Recognition”, 2019 IEEE International Conference on System,
Computation, Automation & Networking (ICSCAN).
[6] Hema B N, Sania Anjum, Umme Hani, “Sign Language and Gesture
Fig 3: Interface MEMS sensor with Microcontroller Recognition for Deaf and Dumb people”. International Research
In fig:4, we interfaced both the module and we Journal of Engineering & Technology (IRJET), Mar 2019.

checked it was working are not. If it is working well, [7] Reda, M. M., Mohammed, N. G., & Abdel Azeem Abul Seoud,
R. A, “SVBiComm: Sign-Voice Bidirectional Communication
the 8channel voice play back also interfaced and System for Normal, “Deaf/Dumb” and Blind People based on
checked basedon inputs of flex & mems sensor, it will Machine Learning”, 2018 1 st International Conference on
produce the voice output byspeaker. Computer Applications & Information Security(ICCAIS).
[8] Prof. SupriyaPawar, “Real Time Sign Language Recognition using
Python”. International Journal of Innovative Research in
Computer and Communication Engineering, Mar2018.
[9] Aishwarya Jawalkar, Samarth Sathe, SulaxmiRaskar, “Two Way
Communication Systems using Speech and Sign Language:
Survey”. ISSN:2321-9653; IC Value:45.98; SJ Impact
Factor:6.887 Volume 7, Issue 1, Jan 2019.
[10]Paul D. Rosero-Montalvo, Pamela Godoy-Trujillo, Edison
Flores-Bosmediano (2018) IEEE. “Sign Language Recognition
Based on Intelligent Glove Using Machine Learning Techniques”.
Fig 4: Voice playback

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 449
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[11]Geethu G Nath, Anu V S, “Embedded Sign Language Interpreter [14]Ashish G. Bairagi, Y. D. Kapse, “Survey on Sign Language to
System for Deaf and Dumb people”, 2017 International Speech Conversion”, Jan 2018 International Journal of Innovative
Conference on Innovation in Information Embedded and Research in Computer and Communication Engineering.
Communication System(ICIIECS).
[15]Rajesh George Rajan, M Judith Leo, “A Comprehensive Analysis
[12]Shivashankara Ss, “American Sign Language Recognition System: on Sign Language Recognition System”, Mar 2019 International
An Optimal Approach”, 2018 International Journal of Image, Journal of Recent Technology and Engineering(IJRTE).
Graphics and Signal Processing.
[13]Mahesh Kumar N B, “Conversion of Sign Language into Text”,
2018 International Journal of Applied Engineering Research.

450 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Using Random Forest Algorithm to Predict Differential


Diagnosis of Erythemato-Squamous Diseases
Syed Nisar Hussain Bukhari1, D.S. Oberoi2
1,2
National Institute of Electronics & Information Technology, NIELIT, J&K, India
Email: nisar@nielit.gov.in1, oberoi@nielit.gov.in2

Abstract-Differential diagnosis of Erythmato- planus, pityriasis rosea, chronic dermatitis, and pityriasis
Squamous Diseases (ESD) is a major challenge in rubra pilaris are the six types of ESD. The disease usually
the field of dermatology. Histopathological tests and causes skin redness (also known as erythema), which
clinical tests are very much time consuming, is caused by the loss of skin cells, specifically squamous
expensive, and difficult for dermatologists to detect
cells. The most common causes are either genetic or
the disease easily. Various bioinformatics based
studies have been conducted to predict the disease
environmental factors. The disease is most common
but accuracy has remained the major challenge in during certain stages of life, such as late childhood or
all those studies. In this paper, we have proposed early adolescence. The problem of differential diagnosis
a random forest based machine learning model to is regarded as a difficult one in dermatology because
detect a particular case of Erythmato-Squamous one disease type may exhibit features of another at the
Disease more accurately. The model has been outset, but in later stages, it has its own distinct
evaluated based on different performance metrics characteristics. The problem becomes more difficult as
like Accuracy, Sensitivity and Specificity. To make they share many histopathological and clinical features
sure that model is reliable we conducted K-fold [2]. In order to perform the disease diagnosis, usually
cross validation technique. The dataset for the clinical and histopathological checks are performed on
problem has been retrieved UCI Machine
patients. Non-invasive examination of symptoms such
Learning repository maintained by Center for
Machine Learning and Intelligent Systems at the as size, location, and presence of colour, pustules, and
University of California, Irvine. The model shall of other features is used in clinical tests. Histopathological
great help to dermatologist to predict the particular tests necessitate the extraction of skin samples, i.e.,
class of the disease efficiently. biopsies, in order to identify the most likely viral sources.
Such an approach is very much time consuming,
Keywords- Machine Learning; Classification;
Random Forest; Classifier; Dermatology; expensive, and difficult for dermatologists to detect the
Erythmato-Squamous Diseases. disease easily. According to the literature, the differential
diagnosis of ESDs is widely discussed as a Machine
I. INTRODUCTION Learning problem. Machine learning in healthcare is
The skin is the largest organ in the human body, becoming more widely used nowadays. In this paper,
covering a 20-square-foot area. The skin protects us we have proposed a machine learning model based on
from heat, cold, UV radiation, infections and aids in random forest to detect a particular case of Erythmato-
the production of vitamin D and regulation of body Squamous Disease efficiently and accurately.
temperature. Among other diseases skin disease is one II. LITERATURE REVIEW
of the most common diseases these days. One such
disease which is posing a great challenge to Several studies have been done using different
dermatologists is Erythmato-Squamous Diseases machine learning techniques to predict a class
(ESD) [1]. Differential diagnosis of Erythemato- Erythmato-Squamous Diseases (ESD). The studies
Squamous Diseases (ESD) is a significant challenge in conducted are illustrated in table 1.
dermatology. Psoriasis, seboreic dermatitis, lichen

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 451
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE 1 • Lichen planus (72)


LITERATURE REVIEW
Author Year Method Accuracy
• Pityriasis rosea (49)
decision tree • Chronic dermatitis (52)
80.33% and
Chang et.al [3] 2009 and neural
92.62%
networks • Pityriasis rubra (20)
Polat and C4.5 and one-
2009 96.71%
Gunes[4] against-all B) Data Preprocessing
Ubeyli[5] 2009 CNN 97.77%
Ubeyli and
2010
K-mean
94.22% Data pre-processing is the process of preparing raw
Dogdu[6] clustering
data for use with a machine learning model. It is the
Lekka fuzzy
2010 97.55% first and most important step in developing a machine
andMikhailov[7] classification
Xie and Wang[8] 2011
IFSFS and
98.61%
learning model. In the current study the dataset was
SVM checked against missing values. The data normalization
85% for
AdaBoost and outlier handling was performed.
A.A.L.C. Eczema 95%
BayesNet J48,
Amarathunga et 2015 for Impetigo
MLP C) Model Building
al[9] 85% for
NaiveBayes)
Melanoma.
Maghooli, K et (CRISP-DM) In the current study we have used random forest
2016 94.84%
el [2] methodology classifier. It is a supervised learning algorithm. The
Ensemble "forest" it generates is an ensemble of decision trees
Chaurasia, V et el 96.93% for
2020 Echnique
[10]
(Bagging)
ET trained using the "bagging" method. The bagging method
is based on the notion that combining learning models
III. PROPOSED METHODOLOGY which improves the overall outcome. The (random
This section shall discuss the proposed methodology forest) algorithm determines the outcome based on the
in details. The various phases of the proposed predictions of the decision trees. As illustrated in Fig.
methodology are mentioned as below. 1, it predicts by averaging the output of various trees.
As the number of trees increases, so does the precision
A) Retrieval of Data
of the outcome. The following steps illustrate the
The dataset used to examine skin diseases and working of a random forest algorithm:
classify different types of erythematous-squamous
1. Selection of random samples from dataset.
diseases was obtained from the UCI Machine Learning
Repository [11]. The dataset contains 34 features, 33 2. Create decision tree for each randomly selected
of which are linearly valued and one of which is nominally sample and note down the prediction results from each
valued. If any diseases are found in the patient's family, decision tree.
the attribute family history (f11) is set to 1, otherwise it 3. Perform voting for all predicted result.
is set to 0. Rest of the attributes (both clinical and 4. Select prediction result with majority votes as a final
histopathological) have values assigned in the range from prediction.
0 to 3 (0 = absence of disease; 1, 2 = comparative
intermediate values for disease; 3 = highest
value).Erythemato-squamous disease is classified into
six classes (dependent variables), with 366 cases and
34 characteristics (independent variables).The following
are the six classes along with the number of instances
belonging to that class in the dataset.
• Psoriasis (112)
• Seborrheic dermatitis (61)

452 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2) Sensitivity: It is also known as True Positive Rate


and is defined as shown in Eq.2.
sensitivity= TP/(TP + FN) (2)
3) Specificity: It is also known as True Negative Rate
and is defined as shown in Eq.3.
Specificity =TN/(TN + FP) (3)
4) K-Fold Cross validation: Cross-validation is a
statistical method for estimating the skill of a machine
learning model, that is, to determine how reliable and
consistent the model is. The procedure has a single
parameter called k that refers to the number of groups
into which a given data sample is to be divided, which
is why it is also known as k-fold cross-validation. In
the current study we have choosen k=5 and as such
we call it 5-fold cross-validation.
Fig. 1. Working of random forest mdoel used in the present
study IV. RESULTS
A) Model Evaluation A) Results in terms of performance metrics
The model evaluation was done using binary used:
classification performance evaluation metrics such as In the current study the random forest model used
accuracy, sensitivity and specificity. These metrics were shows good accuracy than existing methods. The model
calculated from a generic confusion matrix as shown in achieved an accuracy of 99.13% on test data set which
fig. 2.Any classifier can have four possible outcomes is overall good and can be treated as a reliable model
which are true positive (TP), true negative (TN), false for predicting Differential Diagnosis of Erythmato-
positive (FP) and false negative (FN).The performance Squamous disease. Results are illustrated in table II
evaluation metrics used in the current study are defined below.
by using these outcomes. They are briefly describes as TABLE II
under. MODEL EVALUATION RESULTS

Model Accuracy Sensitivity Specificity


Random
99.13% 0.99 0.97
Forest

B) Results in terms of K-Fold cross validation


To check model robustness and issues like overfitting
and underfitting, we used a technique call K-fold cross
validation. We divided the dataset into five (05) folds
(k=5) where four folds are used to train the model and
one fold is held out as a test in such a way that each
fold acts as a test set at least once and remaining folds
Fig. 2. Confusion Matrix are used to train the model. The accuracy of each run
1) Accuracy: Accuracy of a model is mathematically is illustrated in table III and an accuracy of was 99.0 %
defined as shown in Eq.1. was recorded as an average accuracy of five runs.
Accuracy=TP+TN/ (TP+FP+TN+FN) (1)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 453
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE III [2] Maghooli, K., Langarizadeh, M., Shahmoradi, L., Habibi-
5-FOLD CROSS VALIDATION RESULTS Koolaee, M., Jebraeily, M., & Bouraghi, H. (2016). Differential
Diagnosis of Erythmato-Squamous Diseases Using Classification
Run No. Accuracy and Regression Tree. Acta informatica medica: AIM: journal of
1 99.01% the Society for Medical Informatics of Bosnia & Herzegovina:
2 99.23% casopis Drustva za medicinsku informatiku BiH, 24(5), 338-
3 98.78% 342. https://doi.org/10.5455/aim.2016.24.338-342.
4 99.10% [3] Chang CL, Chen CH. Applying decision tree and neural network
5 98.88% to increase quality of dermatologic diagnosis. Expert Systems
Average with Applications. 2009 Mar 1; 36(2):4035-41.
99.00%
Accuracy [4] Polat K, Güne? S. A novel hybrid intelligent method based on
C4. 5 decision tree classifier and oneagainst-all approach for
V. CONCLUSION multi-class classification problems. Expert Systems with
Applications. 2009 Mar 1; 36(2):1587-92.
In this study, a prediction model based on random
forest for the prediction of a particular case of [5] Übeyli ED. Combined neural networks for diagnosis of
erythemato-squamous diseases. Expert Systems with
Erythmato-Squamous Disease has been proposed. The Applications. 2009 Apr 1; 36(3):5107-12.
dataset used in the current study for the examination of
[6] Übeyli ED, Do?du E. Automatic detection of erythemato-
skin diseases and to classify various types of squamous diseases using k-means clustering. Journal of medical
Erythematous-Squamous diseases (ESD) was obtained systems. 2010 Apr 1; 34(2):179-84.
from the UCI Machine Learning. The proposed model [7] Lekkas S, Mikhailov L. Evolving fuzzy medical diagnosis of
efficiently and accurately predicts the particular case of Pima Indians diabetes and of dermatological diseases. Artificial
Intelligence in Medicine. 2010 Oct 1; 50(2):117-26.
ESD. The model achieved an accuracy of 99.13% on
the test dataset. The robustness of the proposed model's [8] Xie J, Wang C. Using support vector machines with a novel
hybrid feature selection method for diagnosis of erythemato-
robustness as well as overfitting and underfitting was squamous diseases. Expert Systems with Applications. 2011
evaluated using repeated 5-fold cross-validation May 1; 38(5):5809-15.
technique and an average accuracy of 99.00% was [9] Amarathunga AA, Ellawala EP, Abeysekara GN, Amalraj CR.
recorded. Expert system for diagnosis of skin diseases. International Journal
of Scientific & Technology Research. 2015 Jan; 4(01):174-8.
REFERENCES [10]Vikas Chaurasia, Saurabh Pal. Skin Diseases Prediction: Binary
[1] A. M. Elsayad, M. Al-Dhaifallah and A. M. Nassef, "Analysis Classification Machine Learning and Multi Model Ensemble
and Diagnosis of Erythemato-Squamous Diseases Using CHAID Techniques. Research J. Pharm. and Tech 2019; 12(8):3829-3832.
Decision Trees," 2018 15th International Multi-Conference on Doi: 10.5958/0974-360X.2019.00656.5.
Systems, Signals & Devices (SSD), 2018, pp. 252-262, doi: [11]Dua, D. and Graff, C. (2019). UCI Machine Learning Repository
10.1109/SSD.2018.8570553. [http://archive.ics.uci.edu/ml]. Irvine, CA: University of
California, School of Information and Computer Science.

454 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

An Outline on Focal Conception of Machine Learning


Reddamma. K1, Bhargavi. T2
1,2
Department of Computer Science And Engineering, VEMU Institute of Technology, Chittoor, India
Email: reddamma575@ gmail.com1, leelavathibhargavi4@gmail.com2

Abstract: Machine learning is an application of It is the learning in which machine can learn by its
Artificial intelligence that provides systems the own without being explicitly programmed. It is an
ability to automatically learn and improve from application of AI that provide system the ability to
experience without being explicitly programmed. automatically learn and improve from experience. Here
It focuses on the development of computer
we can generate a program by integrating input and
programs that can access data and use it learn for
themselves. If programming is automation, then
output of that program.
machine learning is automating the process of ML is a subset of AI. ML refers to systems that can
automation. It consists of Supervised learning, learn by themselves. ... Deep Learning is ML but applied
unsupervised learning, semi-supervised learning to large data sets. Most AI work now involves ML
and reinforcement learning . In this paper because intelligent behavior requires considerable
discussed about 5 essential Machine Learning
knowledge, and learning is the easiest way to get that
techniques. The main role of Machine Learning
algorithms use historical data as input to predict
knowledge.
new output values. Artificial intelligence as a field actually includes a lot
Keywords: Machine Learning, Deep Learning, more than machine learning, it's just that recently a lot
Supervised learning, unsupervised learning, semi- challenges that were considered very hard have been
supervised learning, Reinforcement learning solved using ideas from machine learning. Machine
learning is actually used for many applications that might
I. INTRODUCTION not be thought of as artificial intelligence. It is also one
Machine learning automates analytical model of the principal technologies underpinning *data
building. It uses methods from neural networks, science*.Machine learning (and deep learning) definitely
statistics, operations research and physics to find hidden helps to develop "AI," however, AI doesn't necessarily
insights in data without being explicitly programmed have to be developed using machine learning - although,
where to look or what to conclude. A neural network machine learning makes "AI" much more convenient
is a kind of machine learning inspired by the workings network.
of the human brain. It's a computing system made up of Machine learning is an application of artificial
interconnected units (like neurons) that processes intelligence (AI) that enables systems to learn and
information by responding to external inputs, relaying advance based on experience without being clearly
information between each unit. The process requires programmed. Machine learning focuses on the
multiple passes at the data to find connections and derive development of computer programs that can access
meaning from undefined data. data and use it for their own learning.
Machine learning is an application of artificial Artificial Intelligence and Machine Learning are much
intelligence (AI) that provides systems the ability to trending and also confused terms nowadays. Machine
automatically learn and improve from experience without Learning (ML) is a subset of Artificial Intelligence. ML
being explicitly programmed. It focuses on the is a science of designing and applying algorithms that
development of computer programs that can access are able to learn things from past cases. If some
data and use it learn for themselves. behaviour exists in past, then you may predict if or it

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 455
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

can happen again. Means if there are no past cases There are four types of machine learning:
then there is no prediction. Supervised learning: (also called inductive
Artificial Intelligence and Machine Learning are much learning) Training data includes desired outputs. This is
trending and also confused terms nowadays. Machine spam this is not, learning is supervised.
Learning (ML) is a subset of Artificial Intelligence. ML Unsupervised learning: Training data does not
is a science of designing and applying algorithms that include desired outputs. Example is clustering. It is hard
are able to learn things from past cases. If some to tell what is good learning and what is not.
behaviour exists in past, then you may predict if or it
can happen again. Means if there are no past cases Semi-supervised learning: Training data includes
then there is no prediction. a few desired outputs.
ML can be applied to solve tough issues like credit Reinforcement learning: Rewards from a
card fraud detection, enable self-driving cars and face sequence of actions. AI types like it, it is the most
detection and recognition. ML uses complex algorithms ambitious type of learning.
that constantly iterate over large data sets, analyzing Supervised learning is the most mature, the most
the patterns in data and facilitating machines to respond studied and the type of learning used by most machine
different situations for which they have not been explicitly learning algorithms. Learning with supervision is much
programmed. The machines learn from the history to easier than learning without supervision.
produce reliable results. The ML algorithms use
There are mainly 3 major areas of ML:
Computer Science and Statistics to predict rational
outputs. Supervised Learning
In supervised learning, training datasets are provided
to the system. Supervised learning algorithms analyse
the data and produce an inferred function. The correct
solution thus produced can be used for mapping new
examples. Credit card fraud detection is one of the
examples of Supervised Learning algorithm.
Unsupervised Learning
Unsupervised Learning algorithms are much harder
because the data to be fed is unclustered instead of
datasets. Here the goal is to have the machine learn on
its own without any supervision. The correct solution
of any problem is not provided. The algorithm itself
finds the patterns in the data. One of the examples of
supervised learning is Recommendation engines which
are there on all e-commerce sites or also on Facebook
friend request suggestion mechanism.
Reinforcement Learning
This type of Machine Learning algorithms allows
software agents and machines to automatically determine
the ideal behaviour within a specific context, to maximise
its performance. Reinforcement learning is defined by

456 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

characterising a learning problem and not by Logistic regression is considered the simplest and
characterising learning methods. Any method which is most basic classification algorithm. A logistic regression
well suited to solve the problem, we consider it to be algorithm can take more than one input, and use the
the reinforcement learning method. Reinforcement data to estimate the probability of an event occurring.
learning assumes that a software agent i.e. a robot, or a An interesting use of this algorithm can be seen in
computer program or a bot, connect with a dynamic predicting university admittance results. The algorithm,
environment to attain a definite goal. This technique in this case, analyzes two test scores to estimate the
selects the action that would give expected output university admittance probability.
efficiently and rapidly. The output is a probable number between zero and
5 Essential Machine Learning Techniques are : (I) one. The number 'one' represents absolute certainty in
REGRESSION, (2)CLASSIFICATION, (3) the admittance of the student, but any number greater
CLUSTERING, (4) DECISION TREES,(5) than 0.5 predicts the student will be accepted by the
NEURAL NETWORKS university.
II. REGRESSION IV. CLUSTERING
Regression methods are used for training supervised Clustering algorithms are unsupervised learning
ML. The goal of regression techniques is typically to methods. A few common clustering algorithms are K-
explain or predict a specific numerical value while using means, mean-shift, and expectation-maximization. They
a previous data set. For example, regression methods group data points according to similar or shared
can take historical pricing data, and then predict the characteristics.
price of a similar property to retail demand forecasting. Grouping or clustering techniques are particularly
Linear regression is considered the simplest and most useful in business applications when there is a need to
basic method. In this case, a dataset is modeled using segment or categorize large volumes of data. Examples
the following equation: include segmenting customers by different characteristics
(y=m*x+b) to better target marketing campaigns, and
recommending news articles that certain readers will
It is possible to train a regression model with multiple enjoy. Clustering is also effective in discovering patterns
pairs of data, such as x, y. To do this, you need to in complex data sets that may not be obvious to the
define a position, as well as the slope of the line, with a human eye.
minimal distance from all known data points. This is the
line that best approximates the observations in the data, V. DECISION TREES
and can help make predictions for new unseen data. The decision tree algorithm classifies objects by
III. CLASSIFICATION answering "questions" about their attributes located at
the nodal points. Depending on the answer, one of the
Classification algorithms can explain or predict a branches is selected, and at the next junction, another
class value. Classification is an essential component for question is posed, until the algorithm reaches the tree's
many AI applications, but it is especially useful for "leaf", which indicates the final answer.
eCommerce applications. For example, classification
algorithms can help predict if a customer will purchase Decision tree applications include knowledge
a product, or not. The two classes in this case are "yes" management platforms for customer service, predictive
and "no". Classification algorithms are not limited to pricing, and product planning.
two classes and can be used to classify items into a A typical example of decision trees is identifying the
large number of categories. insurance premium that should be charged based on an
individual's situation. The decision tree can define a

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 457
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

complex map of criteria such as location, types of VIII. REFERENCE


insured events, environmental conditions, etc., and [I] Y. Bengio, "Learning deep architectures for AI", Foundations and
determine risk categories based on claims submitted trends in Machine Learning, vol. 2, pp. 121-127, 2009.
and amounts spent. The system can then evaluate new [2] S. B. Kotsiantis, "Supervised Machine Learning: A Review of
claims for insurance coverage, categorizing them by risk Classification Techniques", Informatica, vol. 31, pp. 249-268,
2007.
category and potential financial damage.
[3] P. Harrington, Machine Learning in action, Shelter Island, New
VI. NEURAL NETWORKS York:Manning Publications Co., 2012.
[4] X. Zhu and A. B. Goldberg, "Introduction to Semi-Supervised
Neural networks mimic the structure of the brain: Learning", Synthesis Lectures on Artificial Intelligence and
each artificial neuron connects to several other neurons, Machine Learning, vol. 3, pp. 1-130, 2009.
and together millions of neurons create a complex [5] A. Mosavi and A. R. Varkonyi-Koczy, "Integration of Machine
cognitive structure. Neural networks have a multilayer Learning and Optimization for Robot Learning", Advances in
structure: neurons in one layer transmit data to several Intelligent Systems and Computing, vol. 519, pp. 349-355, 2017.
neurons on the next, and so on. Ultimately, the data
reaches the output layer, where the network makes a
decision about how to solve a problem, classify an
object, etc. Due to the multi-layer nature of neural
networks, their field of study is known as "deep
learning".
Neural networks are used for a wide variety of
business applications. In healthcare, they are used in
the analysis of medical images, to speed up diagnostic
procedures and search for drugs. In the
telecommunications and media industries, neural
networks can be used for machine translation, fraud
detection, and virtual assistant services. The financial
industry uses them for fraud detection, portfolio
management and risk analysis.
VII. CONCLUSION
In this paper, we study about Machine Learning
technique used in mainly industrial purpose and to
training is the most important part of Machine Learning.
Choose your features and hyper parameters carefully.
Machines don't take decisions, people do. Data cleaning
is the most important part of Machine Learning.

458 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Security Issues: A Case Study


Aswani Podili1, N.S.Lohitha2
1,2
UG Student, CSE, Vemu Institute of Technology,p.Kothakota, Chittoor
Email: Paswani789@gmail.com1, nslohitha125@gmail.com2

Abstract- Network security has become more prevent and monitor unauthorized access, modification
important to computer users, organizations and the in system, misuse, or denial of a computer network and
military. With the advent of the internet, security network-accessible resources.
became a major concern and the history of security
allows a better understanding of emergence of II. IMPORTANCE OF NETWORK
security technology. The entire field of network SECURITY
security is vast and in an evolutionary stage. The
range of study encompasses a brief history dating System and network technology is a key technology
back to internet's beginnings and the current for a wide variety of applications. Security is crucial to
development in network security. This paper aims networks and applications. Although, network security
to provide a broad review of network security and is a critical requirement in emerging networks, there is
also elaborates the literature study on network a significant lack of security methods that can be easily
security. implemented.
Keywords - Network Security, Cloud Computing, There exists a "communication gap" between the
Sensor Networks, Internet of Things, developers of security technology and developers of
Authentication, Confidentiality. network. The protocols of different layers can be easily
I. INTRODUCTION combined to create stacks which allow modular
development. The implementation of individual layers
The world is becoming more interconnected with can be changed later without making other adjustment.
the advent of the internet and new technologies. There allowing flexibility in development Network security
is a large amount of personal, commercial, military and does not only concern the security in the computers at
government information on networking infrastructures each end of the communication chain When. developing
worldwide. Network security is becoming great a secure network, the following need to be considered:
importance because of intellectual property that can be
easily acquired through the internet. 1. Access:
Network Security is a broad term that covers a Authorized users are provided the means to
multitude of technologies, devices and processes. In its communicate to and from a particular network.
simplest term, it is a set of rules. Basically network
2. Confidentiality:
security involves the authorization of access to data in
a network, which is controlled by the network admin. Information in the network remains private.
It has become more important to personal computer
3. Authentication:
users, and organizations. If this authorized, a firewall
forces to access policies such as what services are Ensure the users of the network are who they say
allowed to be accessed for network users. So that to they are.
prevent unauthorized access to system, this component
4. Integrity:
may fail to check potentially harmful content such as
computer worms or Trojans being transmitted over the Ensure the message has not been modified in transit.
network. Network security consists of the provisions
and policies adopted by a network administrator to

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 459
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

5. Non- repudiation: data to it from his all neighbouring node. Selective


modification, forwarding or dropping of data can be
Ensure the user does not refute that he used the done by using this attack.
network.
7. Sybil: This attack related to the multiple copies of
III. TYPES OFATTACKS malicious nodes. The Sybil attack can be happen due
to malicious node shares its secret key with other
This section describes the basic class of attacks
malicious nodes. In this way the number of malicious
which can be a cause for slow network performance, node is increased in the network and the probability
uncontrolled traffic, viruses etc. Attacks to network from of the attack is also increases. If we used the multipath
malicious nodes. Attacks can be categories in two: routing, then the possibility of selecting a path
"Passive" when a network intruder intercepts data malicious node will be increased in the network.
traveling through the network, and "Active" inwhich an
intruder initiates commands to disrupt the network's Passive Attacks
normal operation. The names of some passive attacks are traffic
analysis, Eavesdropping, and Monitoring.
Active Attacks
1. Traffic analysis: In the traffic analysis attack, an
Some active attacks are spoofing attack, Wormhole attacker tries to sense the communication path
attack, Modification, Denial of services, Sinkhole, and between the sender and receiver. An attacker can
Sybil attack. found the amount of data which is travel from the
1. Spoofing: When a malicious node miss-present his route of sender and receiver. There is no modification
identity, so that the sender change the topology. in data by the traffic analysis

2. Modification: When malicious node performs some 2. Eavesdropping: This is a passive attack, which
modification in the routing route, so that sender sends occurred in the mobile ad-hoc network. The main
the message through the long route. This attack cause aim of this attack is to find out some secret or
communication delay occurred between sender and confidential information from communication. This
receiver. secrete information may be privet or public key of
sender or receiver or any secrete data.
3. Wormhole: This attack is also called the tunnel
attack. In this attack an attacker receives a packet 3. Monitoring: In this attack in which attacker can
at one point and tunnels it to another malicious node read the confidential data, but he cannot edit the data
in the network. So that a beginner assumes that he or cannot modify the data .
found the shortest path in the network.
IV. ATTACKS ON AUTHENTICATION
4. Fabrication: A malicious node generates the false
routing message. This means it generate the incorrect
Authentication is the process of verifying the identity
information about the route between devices. of a given user or client. In other words, it involves
making sure that they really are who they claim to be.
5. Denial of services: In denial of services attack, At least in part, websites are exposed to anyone who
malicious node sending the message to the node and
is connected to the internet by design. Therefore, robust
consume the bandwidth of the network. The main
aim of the malicious node is to be busy the network
authentication mechanisms are an integral aspect of
node. If a message from unauthenticated node will effective web security.
come, then receiver will not receive that message There are three authentication factors:
because he is busy and beginner has to wait for the
receiver response. • Something you know such as a password or the
answer to a security question. These are sometimes
6. Sinkhole: Sinkhole is a service attack that prevents referred to as "knowledge factors".
the base station from obtaining complete and correct
information. In this attack, a node tries to attract the

460 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Something you have, that is, a physical object like a 1. Access control:
mobile phone or security token. These are sometimes
If threat actors can't access your network, the
referred to as "possession factors".
amount of damage they'll be able to do will be extremely
• Biometrics or patterns of behaviour. These are limited. But in addition to preventing unauthorized
sometimes Something you are or do, for example, access, be aware that even authorized users can also
your referred to as "inherence factors". be potential threats. Access control allows you to
increase your network security by limiting user access
and resources to only the parts of the network that
directly apply to individual users' responsibilities.

Fig2(b): Network Security Controls


Fig1: Types of authentication attacks
2. Anti-malware software:
V. NETWORK SECURITY TOOLS Malware, in the form of viruses, trojans, worms,
ANDTECHNIQUES: keyloggers, spyware, etc. are designed to spread
Cyber-crime is on the rise, and methods of through computer systems and infect networks. Anti-
infiltration are getting smarter and sneakier. Evenwith malware tools are a kind of network security software
the most basicnetwork security, you can effectively deter designed to identify dangerous programs and prevent
a huge host of malware, viruses, and hacking attempts. them from spreading. Anti-malware and antivirus
Overall, network security is critical to preventing data software may also be able to help resolve malware
breaches, which can take a huge toll on your business's infections, minimizing the damage to the network.
credibility and finances. Here are 14 different network
security tools and techniques designed to help you do 3. Anomaly detection:
justthat: It can be difficult to identify anomalies in your
network without a baseline understanding of how that
network should be operating. Network anomaly
detection engines (ADE) allow you to conclude your
network, so that when breaches occur, you'll be alerted
to them quickly enough to be able to respond.
4. Application security:
For many attackers, applications are a defensive
vulnerability that can be exploited. Application security
helps establish security parameters for any applications
Fig2(a): Network Security Basics that may be relevant to your network security.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 461
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

5. Data loss prevention (DLP): segmentation allows you to grant the right access to the
Often, the weakest link in network security is the right traffic, while restricting traffic from suspicious
human element. DLP technologies and policies help sources.
protect staff and other users from misusing and possibly 11. Security information and event management
compromising sensitive data or allowing said data out (SIEM):
of the network.
Sometimes simply pulling together the right
6. Email security: information from so many different tools and resources
As with DLP, email security is focused on shoring can be prohibitively difficult - particularly when time is
up human-related security weaknesses. Via phishing an issue. SIEM tools and software give responders the
strategies (which are often very complex and data they need to act quickly.
convincing), attackers persuade email recipients to 12. Virtual private network (VPN):
share sensitive information via desktop or mobile
device, or inadvertently download malware into the VPN tools are used to authenticate communication
targeted network. Email security helps identify between secure networks and an endpoint device.
dangerous emails and can also be used to block attacks Remote-access VPNs generally use IPsec or Secure
and prevent the sharing of vital data. Sockets Layer (SSL) for authentication, creating an
encrypted line to block other parties from
7. Endpoint security: eavesdropping.
The business world is becoming increasingly bring 13. Web security:
your own device (BYOD), to the point where the
distinction between personal and business computer Including tools, hardware, policies and more, web
devices is almost non-exist. Unfortunately, sometimes security is a blanket term to describe the network
the personal devices become targets when users rely security measures businesses take to ensure safe web
on them to access business networks. Endpoint security use when connected to an internal network. This helps
adds a layer of defence between remote devices and prevent web-based threats from using browsers as
business networks. access points to get into the network.

8. Firewalls: 14. Wireless security:


Firewall function much like gates that can be used Generally speaking, wireless networks are less
to secure the borders between your network and the secure than traditional networks. Thus, strict wireless
internet. Firewalls are used to manage network traffic, security measures are necessary to ensure that threat
allowing authorized traffic through while blocking access actors aren't gaining access.
to non-authorized traffic.
9. Intrusion prevention system:
Intrusion prevention systems (also called intrusion
detection) constantly scan and analyse network traffic/
packets, so that different types of attacks can be
identified and responded to quickly. These systems
often keep a database of known attack methods, so as
to be able to recognize threats immediately.
10. Network segmentation:
Figure3: Security Factors
There are many kinds of network traffic, each
associated with different security risks. Network

462 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

NETWORK SECURITY in BUSINESS: LITERATURE REVIEW


Network security threats: Mohammad Nazi in [2] has used hybrid anomaly
detection technique with the k-means clustering. WSN
Network security threats can come from both inside are simulated using Optimized Network Engineering
your business (anemployee usingtheir access to Tool (OPNET) simulator and the resultant dataset
compromise the business) and outside your business consists of traffic data with end to end delay data which
(a hacker with the intent of stealing your data). These has been clustered using WEKA 3.6. In this experiment,
threats can also present as a result of inadequate it has been observed that two types of anomalies namely
protections being put in place, as well as human error misdirection and black hole attacks were activated in
or negligence (such as opening an unknown email and the network
clicking on an attachment which then downloads
malware to the computer). Venkata Sabetha in [13] proposed a new system
with Information Gain (IG) and Triangle Area based
Network security goals: KNN algorithm is for selecting more discriminative
Based on the type, size of your business, the features. Then the Greedy k-means clustering algorithm
particulars of your network security goals will differ to was combined with SVM classifier to detect Network
other small-to-medium businesses, even within the same attacks.
industry. Make it an aim to define and list your network Harmeet Kaurl in [15] designed a model to reduce
security goals, with attention being paid to what areas the delay in the network and to produce an end to end
need to be better secured, and with considerations data in good speed. A simulated WSN using SPEED
being made to any past breaches. For example, a protocol was used. It was concentrating on two different
company who had their network breached may want performance parameters throughput and energy
to increase employee's password security, set up mobile consumption for analysis. BCO (Bee Colony
device management so that compromised devices can't Optimization) algorithm was used to give better results
join the network, and separate the mainand guest with high throughput and low energy consumption.
network servers.
CONCLUSION
Network security plan:
In this paper, we have evaluated that net security is
You can now come up with a network security plan an important field that is getting more and more attention
that will address what was highlighted within the as the internet expands. The security threats and internet
network security goals you set out for your company. protocol should be analysis to determine the necessary
This should include indicating specific roles any security technology. The security technology consists
employees will play during the roll out of these of mostly software based, as well as various hardware
procedures (HR, team leaders, and IT) and if the devices. In addition network Security consists of the
changes will be made in-house or will be outsourced to provisions made in an underlying computer network
an external IT team. infrastructure, policies adopted by the network
Network security policy: administrator to protect the network and the network-
accessible resources from unauthorized access and the
You should now have the knowledge and effectiveness (or lack) of these measures combined
frameworks in place to begin creating a network together.
security policy for your business. This needs to outline
rules for computer network access, determine how rules Safety of the network is just as important as securing
and regulations are enforced, and lay out the ins and the computers and encrypting the message. Points that
outs of the basic company security procedures and must be considered when developing a secure network
network security environment. are:

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 463
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

1) Confidentiality: Information in the network remains REFERENCES


private 1] Shi-Jinn Horng, Ming-Yang, Yuan-Hsin Chen, Tzong-Wann Kao,
2) Authentication: Ensure the users of the network Rong-Jian Chen, Jui- Lin Lai, CitraPerkasa, "A novel intrusion
detection system based on hierarchical clustering and support
are who they say they are
vector machines", Elsevier Computer Network, pp.306-313,
3) Integrity: Ensure the message has not been modified 2010.
in transit [2] Mohammad "Hybrid Anomaly Detection using K-Means
Clustering in Wireless Sensor Networks", Centre for Security,
4) Authorization (access): providing authorized users Theory and Algorithmic Research, pp. 1-17, 2014.
to communicate to and from a
[3] Y.-J. Shen and M.-S. Wang, "Broadcast scheduling in wireless
5) Non- repudiation: Ensure the user does not refute sensor networks using fuzzy hopefield neural network," Expert
that he used the network. Systems with Applications, Vol. 34, No. 2, pp. 900-907, 2008
[4] Y. Wang, M. Matrons, and L.-S. Peh, "Predicting link quality
An effective network security plan should be using supervised learning in wireless sensor networks," ACM
developed with the understanding of security issues, SIGMOBILE Mobile Computing and Communications Review,
potential attackers, needed level of security, and factors Vol. 11, No. 3, pp. 71-83, 2007.
that make a network vulnerable to attack. Tools to [5] Reda M. Elba, Elsayed A. Salami, Tarek E. Mahmoud M. Fahmy,
"A hybrid network intrusion detection framework based on
reduce the vulnerability of the computer to the network random forests and weighted k-means" Ain Shams Engineering
include encryption, authentication. Journal, vol 4, pp.753-762,2013.
[6] LeventKoc, Thomas Achi, Shahram Sant, "A network intrusion
detection system based on a Hidden Naïve Bayes multiclass
classifier", Elsevier, pp.13492-13500, 2012.

464 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Importance of Cloud Computing and Internet of things


in Healthcare Systems
Dr. Kamini Solanki1, Dr. Abhishek Mehta2
1,2
Associate Professor, Faculty of IT and Computer Science, Parul University
Email: abhishek.mehta7067@paruluniversity.ac.in2

Abstract-Distributed computing can be In this paper creator present distributed


characterized as the appeal presence of the PC computing and web of things in medical care and
innovation, basically for putting away the its degree. IoT application is mostly utilized in
information, for figuring the force, shorn of for medical services by the emergency clinic and
unswerving information the board by the insurance agencies for the help of patients.
administrator. Distributed computing can be
Keywords: Cloud computing in health care
normally characterized as the capacity stock for
system, iot in healthcare system, advantages and
information of uncountable number of clients of the
disadvantages in healthcare system, future scope,
innovation administrations.
present condition, applications.
The Internet of things (IOT) is an
interconnected registering gadget. It inter I. INTRODUCTION
connected various sorts of machine and items like Here in this report the applications and various
mechanical, computerized, human and so on It gives embedded features of cloud computing and internet of
the special identifier (UID) and usefulness to move
things in health care system are mentioned. IOT is the
information on web without human connection.
connecting link between the physical objects that consist
Distributed computing is an arising field in an electronic feature develop within it which in sense
software engineering. It is intended to convey helps the people to increase the communication between
number of figuring administrations by means of
specialists and patients and also with references to the
organized like web.
present and the developing infrastructure of the society.
The web of things has made it feasible for-off As per the analysis between todays condition of
the nursing of patients on the fast access in the healthcare system and the future one the approaching
medical care stream by burning-through the less era would be quite well developed and systematic then
measure of time, unchecking the potential for the
the present one. As a result, the treatment given to the
wellbeing of the patients with respect to their
wellbeing, and furthermore promising the experts
patients would also be at the best level and the condition
to give the best degree of therapy for the patients. of the patient would be better and would also receive
Because of IOT the correspondence between the more convenient treatment due to IOT in healthcare
patients and specialists have gotten very simple systems. With the help of IOT the advancements would
and in less measure of time. Accordingly, the be able to notice in the medicines, the gene therapies,
fulfillment level of the patients has expanded and the surgeries and in many other contents in
the answer for patient's concern has likewise healthcaresector.
opened up. Because of IOT the expenses in medical
services frameworks have gotten critical alongside In the term of cloud computing the word 'cloud' can
the extraordinary outcomes. be defined as the symbol of internet. In the past decades
we needed the computer server at specific location only
IOT is without a doubt changing the medical
to operate our applications and software's. But today
services industry by rethinking the space of
gadgets and individuals communication in
with the help of internet and overview to cloud
conveying medical care arrangements. computing we can access our applications anywhere
and at any time. Not only for accessing purpose but

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 465
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

also for storing data it is very useful. Asaresult,in the communicatingapplications, high developed software's
field of medical also the use of cloud computing is at and also by the ideologicalthoughts spread through
high range. It is used by the specialists for surgery worldwideweb.
purpose for therapy, operations, etc. With the help of
cloud computing the internal structure of body could
be display in easy manner and which helps the doctors
to do their task more specifically and appropriately.
Many of the companies are using cloud computing for
their operation and as per the study the level of
healthcaresectorwouldalsobeincreasedinupcomingdays.
There are two ways of building IOT:
1. Form a separate internetwork including only physical
objects.[1]
Figure 2: cloud Data
2. Make the Internet ever more expansive, but this
requires hard-core technologies such as rigorous cloud III. MAIN APPLICATION OF IOT IN
computingandrapidbigdatastorage(expensive).[1] MEDICALFIELD

II. CLOUD & HEALTHCARE In the hospitals and also in various other field of
health sector the main challenge faced is the storing of
medical data, at the most for X-ray, images and other
related pictorial data. At the date many of the Healthcare
locations are having their own Picture Archival and
Communication Systems (PACS) due to this they are
archiving the records related to any of patient. As it is
beneficial but it also consists of one drawback namely
the high cost for storage, it goes up to billions of
terabytes of the records. As the solution for this issue
have also been discovered that is the cloud which
provides storage-as-a- service. As a result, many of
the specialists can see the x-rayof their patient at any of
Figure 1: Common IOT HEF platform including local storage
the location viaINTERNET.
and cloud storage platforms

The acceptance of the cloud technology is spreading


at an exponential pace. The driving force behind the
widespread of cloud technology mainly comprises of
its cost effectiveness and multiple benefits which comes
with its use. For the best healthcare organizations cloud
computing provides a quickand beneficial level of
service as compare to the interior efforts provided.
Some phase of this(medical services) has to been
doneinparticularrangeorlevelbutforratherphasesitrequires Figure 3: Functional Platform of Cloud Computing
the strong financial support , high technology ,strong There has been a lot riding on the cloud and both
processors and the experts which a cloud providers Microsoft and Google are investing heavily in the
can bring to healthcare sector by its various technology [2]. But technology for the sake of it and

466 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

without any specific implications is going to be counter submitted in easy and simple manner. Due to IOT it
productive in the healthcare Industry. The two examples has made the specialist to be more careful and to be in
mentioned are just a minute part which has been utilized contact with their patients and to keep them always
but for sure in the upcoming duration there would be active regarding their health and services. The collection
more sectors in healthcare would access this (cloud) in done by the IOT appliances made it easier to the
the healthcare. The main motive of healthcare physicians to study the patient's problem and to give
organizations is to provide a proper care, high them the best treatment to receive the best result in the
technology in short, the business for the betterment of patients'health.
the people.
C. IOT for Hospitals
Rather than offering the cloud as a cover to just earn
money in healthcare industry they should provide a time Rather than monitoring patients' health, there are
to spend of its beneficial part which can help to develop many other areas where IOT devices are very useful in
the healthcare system and should offer in that manner hospitals. IOT devices attached with sensors which are
or else the cloud accessing level would be low only in used for tracking real time location of medical
the healthcare sector as compare to other service equipment like wheelchairs, defibrillators, nebulizers,
sectors. oxygen pumps and other monitoring equipment.[1]
Efficiency of medical staff at different locations can also
IV. USE OF IOT IN HEALTHCARESECTOR be analysed at the time.
A. IOT forPatients The spread of infections is a major issue for patients
in hospitals. IOT-enabled hygiene monitoring devices
Devices in the form of wearables like fitness bands help in preventing patients from getting infected. IOT
and other wirelessly connected devices like blood devices also help in asset management like pharmacy
pressure and heart rate monitoring cuffs, glucometer inventory control, and environmental monitoring, for
etc. give patients access to modified attention. These instance, checking refrigerator temperature, and
devices can be tuned to remind calorie count, exercise humidity and temperature control [1].
check, blood pressure variations, heartbeat rate and
much more. D. IOT for Health InsuranceCompanies
IOT has changed the lifestyle of the people's The various types of chances are given and operated
especiallyelderly ones; it provides the quick respond by the health insurers e.g. IOT connected intelligence
to their problems and to be solving them in convenient devices. Insurance companies can influence data
duration. With the help of IOT if there occurs any of captured through health monitoring devices for their
mis-match to the regular health treatment then an alert underwriting and claims operations.[1] This data will
mechanism is been delivered to the family members and enable them to detect fraud claims and identify
also to the health providers due to which the situation prospects for copywriting. IOT devices bring direct
could be taken under cover easily and also by saving connectivity between insurers and customers in the
thetime. underwriting, pricing, claims handling, and risk
assessment processes. In the light of IOT-captured
B. IOT forPhysicians data-driven decisions in all operation processes,
With the help of the various equipment's mentioned customers will have appropriate visibility into underlying
by the IOT such as home monitoring and other wearable thought behind every decision made and process
devices it has become easy to the physicians to handle outcomes.
their patient more easily and conveniently. The patient's The insurers might offer the reward for the customers
loyalty can be seen by the physicians regarding their for using the IOT appliances to keep their regular
treatment any if any sudden help require could be activities on the right track and to follow all healthcare

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 467
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

treatments properly. Due to which the claims of the performance of the specialists and patient experience
insurers get reduce easily and significantly. Due to the for healthcare.
information stored by the insurers with the help of IOT The major advantages of IoT in healthcare consist
helps the company to increase their claims. of as followspoints:
• Price Reduction: IOT provides patient monitoring
in real time, thus significantly cutting down
unnecessary visits to doctors, hospital stays andre-
admissions
• Modified Treatment: It enables physicians to make
evidence-based informed decisions and brings
Figure 4: Format of Data Science absolute change in the patients'health.

V. USE OF IOT IN HEALTHCARE SECTOR • Faster Disease Solutions: Regular patient


monitoring and real time data helps in diagnosing and
The production of healthcare-specific IOT products curing the diseases at an early stage or even before
opens up huge opportunities. And the large amount of the disease develops based on symptoms occurring
data generated by these connected devices holds the in the patients'health.
potential to transform healthcare. • Active Treatment: Continuous health monitoring
IOT has a four-step architecture that is basically opens the doors for providing proactive or positive
stages in a process. All four stages are interconnected medicaltreatment.
in a manner that data is captured or processed at one • Drugs and Equipment Management:
stage and yield the value to the next stage. Innovative Management of drugs and medical equipment is a
values in this process bringsolutions and deliver major challenge in a healthcare industry. Through
outstanding business aspects. connected devices, these are managed and utilized
efficiently with reduced costs.[4]
Step 1: First step consists of deployment of
interconnected devices that includes sensors, actuators, • Error Reduction: Due to the data generated through
monitors, detectors, camera systems etc. These devices IOT devices it not only helps in effective decision
collect the data. making but also provide smooth healthcare operations
with reduced errors, waste and system costs
Step 2: Usually, data received from sensors and
other devices are in analogue form, which need to be
aggregated and converted to the digital form for further
data processing.
Step 3: Once the data is digitized and aggregated,
this is pre- processed, standardized and moved to the
data centre or Cloud.
Step 4: Final data is managed and analysed at the
required level. Advanced Analytics, applied to this data,
brings actionable business insights for effective decision-
making.[1]
IoT is redefining healthcare by giving better care, Figure 5: Cloud Computing Platform

modified treatment results and reduced costs for patients,


and better processes and workflows, improved

468 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VI. FUTURE SCOPES OF IOT connectivity software's or functions in the devices allow
INHEALTHCARE hospital personnel to spot early signs of illness in the
patients.
A. RemoteMonitoring
Customized software and devices will read data from C. Data Analysis
medical cards of patients in real time and help doctors IOT devices can collect report and analyses the
in conducting a better analysis of patient's health [4]. extensive data collected in short time, deleting the need
of its storage. Which would allow healthcare providers
B. Wearables in focusing on exact data required to treat the patient?
Different gadgets that can regularly monitor for daily Due to this data driven signs it would speed up and
activities of the patients and store the data that is make it easy for the doctors to do the decision-making
available in the market. These devices inform patients task for their patient.
about their physical activities. They can also help in
preventing emergency, as patient's information would D. Alerts andTracking
be sent to the doctor immediately [4]. Timely alerts can be critical in case of life-threatening
circumstances. IOT allows medical devices to gather
C. High QualityMonitoring essential data and transfer it to doctors in real time.
Due to an IOT can help in providing functions and The reports provide perfect opinion on the patient's
controllers to various important equipment in the condition, irrespective of location or time [4].
hospital. As the equipment are critical while treatment,
any defect in them can be fatal. Connecting these devices E. LowerCosts
will enable the staff to monitor their working easily. The connected devices and wearables will allow
Defects in the devices can also be figured out in real patients to connect with doctors from their homes. The
time; thus, reducing the chances of improper regular visit for different tests and check-ups will be
treatment[4]. minimized. This will save cost and time of patients on a
daily basis.
VII. FUTURE BENEFITS OF IOT
INHEALTHCARE F. Medication Management
A. Better Supervision and Reporting With the help of smart wireless pill bottles, tracking
medication schedule will become easy. This will help
Real-time supervision through IOT devices can save people who forget to take their medications on time.
lives in medical emergencies such as asthma attacks, The IOT enabled medication management processes
heart failures etc. [4]. The connected device can collect will also provide doctors with analytics for offering better
important data on patient's health and transfer it to the care to the patients.[4]
physician in real time. A study conducted by Centre for
Connected Health policy suggests that there was a 50% VIII. FUTURE CHALLENGES OF IOT IN
reduction in re-admission rate of patients due to remote HEALTHCARE Healthcare IOT is not without
supervision[4]. challenges.IOT-enabled connected devices capture
B. End-to-End Connectivity huge amounts of data, including sensitive information,
giving rise to concerns about data security.
IOT can operate the workflow of patient care with
the help of healthcare mobility solutions. It provides IOT explores new dimensions of patient care through
interoperability, machine-to-machine communication, real- time health monitoring and access to patients'
and data movement and information exchange while health data.This data is a goldmine for healthcare
making healthcare delivery more productive. Different stakeholders to improve patient's health and experiences

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 469
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

while making revenue opportunities and improving REFERENCES


healthcareoperations. [1] https://www.wipro.com/en-IN/business-process/what-can-iot-
do-for-healthcare-/
With the increase in the market for healthcare IOT,
the challenges are bound to increase. Unauthorized [2] https://www.wipro.com/en-IN/blogs/dr-vikram-venkateswaran/
cloud-computing-in-healthcare/
access to connected devices can cause harm to
[3] https://images.app.goo.gl/SuiiXruPuNuSnsMU9
thepatient's safety. Thus, proper authentication and
authorization will be necessary to achieve success [4] https://www.theselfemployed.com/article/future-of-iot-in-
healthcare/
withIOT.
[5] https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/
CONCLUSION How- IoT-is-improving-the-healthcare-industry
[6] https://images.app.goo.gl/jbxtrfmMwXwBtVx68
The cloud computing and IOT play an important
role in healthcare system by performing the business of
care for the peoples. By using IOT in Healthcare the
treatment level would be best and also convenient to
patients as well as to the doctors.
As per the today's condition of the healthcare it could
be more developed by increasing the use of cloud in it.
Likewise, in other fields the medical field too can utilize
the cloud in it and can modify and invent new
technologies for the best care and service of the
peoples.
If the proper use is done of IOT in medical sector
then it can take the medical sector to the top level along
with best results and innovative technologies.

470 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Smart Glass with Navguide System for Visually


Impaired People
Mrs.S.Shanmuga Priya1, Mrs.M.Queen Mary Vidya2, Rashmi Sai Sree M3, Pavithra M4
1,2
Assistant Professor, 3,4UG Student, Department of Computer Science and Engineering
1,2,3,4
Vel Tech High Tech Dr. Rangarajan Dr. Shakuntala Engineering College, Avadi
Email: s.shanmugapriya@velhightech.com1, rashmimadireddy@gmail.com3, pavithramunirathinam2001@gmail.com4

Abstract - In today's world communication plays technology and are using it daily. We can use this
a vital role through speech and text. To access the technology to assist them in recognizing obstacles and
information, vision plays a significant role. In our help in navigation. Our project proposes a wearable
paper the implementation of Smart Guiding System system that uses an android phone and a camera which
for visually challenged. The vision-less people can
will generate instructions which, within the sort of audio
gather information through hearing ability. Instead
commands transmitted through headphones, will assist
of reading through them, the smart glass allows
them to hear the contents of the text images and the user in taking appropriate actions. However, there's
helps them to overcome with travelling difficulty. no primary method to calculate foot clearance. Recently
Where we use ETA [Electronic Travel Aid], there has been an increased interest the evolution of
Augmented Reality, Optical Code Recognition portable sensor devices for measuring critical
[OCR] and Text to Speech Synthesizer [TTS] parameters of human movement. This project is made
techniques for system integration. We also use to assist the blind in order that they'll walk easily in stair
Obstacle Avoiding Algorithm ,Ultrasonic sensors areas and avoid obstacles using special detection
and Vibration sensing for detecting small and sensors. The system is fitted with an ultrasonic sensor.
transport obstacles while navigating the user while The ultrasonic sensors fitted with the shoe this system
travelling .This OCR and TTS techniques helps to provides obstacle data to the blind person. And camera
read the text easily and helps to identify the objects
also we used its works for finding the text element and
like bus name and bus number in bus stand. Thus,
we serve a consumer device for helping the visually that content convert to audio using by frequency. Blind
impaired people to travel safely. people not find out Path identification, so we
implemented IOT system for find location like Google
Index Terms - ETA [Electronic Travel Aid],OCR
map. Thus, the system provides complete guidance and
[Optical Code Recognition], TTS[Text to Speech
protection to a visually impaired person under various
Synthesizer], Pi camera, Ultrasonic sensor.
circumstances.
I. INTRODUCTION
II. RELATED WORKS
Globally, it is estimated that at least 2.2 billion people
have a vision impairment or blindness, of which at least A. Literature Survey
1 billion of them have a vision impairment that could Jinqiang Bai, Shiguo Lian, Zhaoxiang Liu, Kai
have been prevented or addressed yet. These people Wang, Dijun Liu "Smart Guiding Glasses for
include those with moderate or severe distance vision Visually Impaired People in Indoor
impairment due to unaddressed refractive error, Environment"
cataract, glaucoma, corneal opacities, and diabetic
retinopathy and near vision impairment caused by This paper proposes the smart guiding device in the
unaddressed presbyopia. Population growth and ageing shape of a pair of eyeglasses for visually impaired people
will increase the risk of vision impairment. Now a days by using ETA (Electronic Travel Aids).In this paper
everyone and even blind people are familiar with the multi-sensor fusion based obstacle avoiding algorithm

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 471
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

is proposed, which uses both the depth sensor and This paper proposes the incorporates signboard
ultrasonic sensor for detecting small obstacles, and detection, face detection and surface texture detection
transparent obstacles before them. The prototype to address issues related to mobility of a visually
consisting of a pair of display glasses and several low- impaired people. Localization module implemented using
cost sensors is developed to improve the blind people's GPS and IMU helps to support navigating the people.
travelling experience their surroundings This paper In this paper, they explained their initial implementation
presents a smart guiding device for visually impaired of various image processing tasks. They focused on
users, which can help them move safely and efficiently the exploration for the choice of algorithms, design
in complicated environment. The depth image and the decisions, and various implementation decisions. They
multi-sensor fusion based algorithms were used for explained the challenges and results of implementing
detecting of small and transparent obstacle avoiding for the applications on an embedded platform (Zed board)
navigating the visually impaired people. for prototyping.
Rithika.H, "Image Text To Speech Conversion Shripad Bhatlawande, Manjunatha
In The Desired Language By Translating With Mahadevappa, Jayanta Mukherjee, Mukul
Raspberry Pi" Biswas, Debabrata Das and Somedeb Gupta
This paper proposes the device basically can be used "Design, Development and Clinical Evaluation
by visually impaired people who do not know English of the Electronic Mobility Cane for Vision
and want it to be translated to their native language. Rehabilitation"
The main propose in this paper is the speech output This existing system provides obstacle detection and
which is available in 53different languages translated way-finding assistance to the visually impaired people
from English. This paper implements the prototype which by using Electronic Mobility Cane (EMC).This paper
helps user to hear the contents of the text images in explains about the cane which constructs the logical
their desired language. It involves extraction of text from map of the surrounding environment to deduce the
the bare image and converting the captured text to priority information. This paper conveys the priority
translated speech in the user desired languages. This information to the visually impaired people by using
paper explains the system done with Raspberry Pi and intuitive vibration, audio or voice feedback. The other
a camera module by using the concepts of Tesseract features of the EMC are staircase detection and also
OCR [optical character recognition] engine, Google provide information about the floor status. It consists
Speech API [application program interface] which is of a low energy embedded system with ultrasonic
the Text to speech synthesis and the Microsoft translator sensors and safety indicators. In order to verify its
to the device. This relieves the visually impaired people design and to assess its ability to assist the people in
as they can use this device to hear the English text in their daily-life mobility the EMC was exposed to series
their own desired language by hearing it through of clinical evaluations
speaker. This device helps users to hear the images
being read in their desired language for exact visually Hsueh-Cheng Wang, Laura Giarre?, Daniela
impaired people. Rus "Enabling Independent Navigation for
Visually Impaired People through a Wearable
Rajesh Kedia, Yoosuf K K, Pappireddy Vision-Based Feedback System"
Dedeepya, Munib Fazal,"MAVI: An Embedded This paper proposes the wearable system to provide
Device to Assist Mobility of Visually Impaired" awareness for visually impaired people .This paper
This paper proposes the concept that device uses includes some system with a camera, an embedded
an RGB camera and image processing techniques to computer and a hepatic device to deliver feedback to
recognize the surrounding objects around them and the visually impaired people when an obstacle is
inform or alarm the visually blind people accordingly. detected. In this paper some of the techniques like

472 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

computer vision, motion planning or capturing for Code Recognition [OCR] and Text to Speech
identifying walk able space, plan step-by-step a safe Synthesizer [TTS] techniques for instead of reading
motion trajectory in the space, recognize and locate through them, the smart glass allows them to hear the
certain types of objects around them. The components contents of the text images and also helps them to
communicate using the LCM (Lightweight overcome with travelling difficulty. We also use Obstacle
Communications and Marshaling) package. The Avoiding Algorithm, Ultrasonic sensors and Vibration
algorithms are implemented in C++ with OpenCV and sensing for detecting small and transport obstacles while
the Point Cloud Library (PCL). These descriptions are navigating the user while travelling.
communicated to the visually impaired person wearing
the device through vibrations through vibrators. They A. System Architecture:
presented results from generic feedback on obstacles In this architecture diagram, the smart glass obtain
and descriptions of identified useful objects. image text as input through camera which is affixed or
mounted and pass the input text image to the ADC
B. Existing System [Analog to Digital Convertor] transmits the signal inputs
In existing system, a front ultrasonic sensor detector to the hardware components. The received signal from
is a device that senses foot clearance when the visually camera processes through Text to Speech conversion
impaired people going upwards typically and back technique and produces voice as output to the user
ultrasonic sensor that senses foot clearance when they through speaker or headphones. Navigation is possible
are going downwards typically as an indicating blind for the visually impaired person through Ultrasonic
person. But here there are many other new techniques sensors by providing navigating voice system to the
used to find foot clearance identified.In Existing system user.
no way does this system guarantee if a blind person
use this, he will be able to walk similar to a normal
person because system requires time to process the
sensor values and guide them so they need to be walking
at an appropriate speed so as to allow the system to
process and guide them, it won't be similar to a normal
person. The visually impaired person should normally
be on its straight path, as per their feeling, until system
guides them to turn in any direction, otherwise it was
noticed that some kind of avoidance of an obstacle may
happen to them.
III. PROPOSED SYSTEM
In proposed system, the communication between
blind people is possible using the camera for finding
text elements that content convert to speaker using by B. Modules
frequency so easily studied for blind people. Blind
1) Pi Camera for Text Capturing:
people not find out Path identification, so we
implemented IOT system for find location like Google
map. Navigating and Text to Speech Conversion are
highly aimed in this Project. All information is sending
to audible device, so it is easy to find everything.
Navigating the visually impaired people we use ETA
[Electronic Travel Aid], Augmented Reality, Optical

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 473
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The Pi camera module may be a portable light weight TH = 0.69 x ( A + B ) x C


camera that supports Raspberry Pi. It linked with Pi = 0.69 x 1015 x 103 x 0.1 x 10-6
using the MIPI camera serial interface protocol. It is
commonly utilized in image processing, machine = 70.0 x 10-3
learning or in surveillance projects like surveillance = 70 ms
drones since the payload of camera is incredibly less.
Pi is also used as normal USB webcams which are 4) Speaker for Hearing Aid:
used along with computer Speaker affixed in smart glass have an internal
2) Ultrasonic Sensor for Navigation: amplifier which consequently requires a adequate power
supply, which may be by power supply often via an
Ultrasonic sensor works on the principle which is AC adapter, batteries, or a USB port(Able to supply
similar to radar or sonar [Used in aircrafts and ships] up to 2.5W DC, 500mA at 5V). The input signal
which evaluates attributes of the target object by connector is often a 3.5 mm jack plug (color-coded
interpreting the echoes as radio or sound waves lime green per the PC 99 standard); RCA Connectors
respectively. Ultrasonic sensors generate high frequency and a USB port supplies both signal and power (require
sound waves and emit echo which is received back by additional circuit, and only suitable for use with a
the sensor. Ultrasonic sensors calculate the time interval computer). Battery powered wireless Bluetooth
between transmitting signal and receiving echo to speakers requires no connections. When external
determine the distance to an object or obstacle. speakers are connected, they disable the work of built-
in speakers. Alter Lansing claims to have creative
computer. A speaker consists of an electromagnet (a
metal coil which produces a magnetic field when
electricity flows through it) and a fixes permanent
magnet.

3) Ultrasonic pulse oscillator:


The oscillation pulse can be calculated by using the
following formula. Actually, with the parts, that is
different from the calculation.

5) Text to Speech Synthesis Technique:


Text-to-speech synthesis [TTS] is the automatic
conversion of a text which is obtained from the captured
image through camera into speech that resembles as
closely as possible a native speaker [user who is visually
impaired] of the language reading that text. Text-to
= 0.69 x B x C
speech synthesizer (TTS) is the technology which lets
TL= 0.69 x B x C computer speak to you and gives you a virtual
= 0.69 x 15 x 103 x 0.1 x 10-6 environment.
= 1 x 10-3
= 1 ms

474 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

transparent objects. The multi-sensor fusion based


method is applied, and which utilizes the depth camera
and the ultrasonic sensor. Firstly, compute the moving
direction based on the depth image.
V. CONCLUSION
This project the design and architecture of a new
concept of Smart Electronic Travel Guiding system for
blind people. The benefit of the system is the fact that it
can prove to be very cheap cost solution to billions of
visually impaired people worldwide. The interaction of
IV. EXPERIMENTAL OUTCOME: various working units results in a real-time system that
examines position of the user who is visually impaired
A. Experiment Model: and provides dual feedback making navigation more
secure and safe through voice as output.
REFERENCES
[1]. Jinqiang Bai, Shiguo Lian, Zhaoxiang Liu, Kai Wang, Dijun Liu
"Smart Guiding Glasses for Visually Impaired People in Indoor
Environment" International Journal of Innovative Technology
and Exploring Engineering (IJITEE), April 2019
[2] Rithika.H , B. Nithya santhoshi "Image Text to Speech
This Smart Glass includes a depth camera for Conversion in The Desired by Translating with raspberry pi"
IEEE International Conference on Computational Intelligence
acquiring the depth information of surroundings of and Computing Research 2016
visually impaired people, an ultrasonic rangefinder
[3]. Sandeep Musale, Vikram Ghiye, "Smart Reader for Visually
consisting of an ultrasonic sensor and a MCU (Micro Impaired," IEEE Xplore International Conference on Inventive
programmed Control Unit) for calculating the obstacle Systems and Control, June 2018.
distance, an embedded CPU (Central Processing Unit) [4]. Deepthi Jain B, Shwetha M Thakur and K V Suresh, "Visual
board acts as main processing module, which does Assistance for Blind using Image Processing", April 2018.
operations like depth image processing, data fusion, [5]. Shalini Sonth, Jagadish S. Kalliman, "OCR based facilitator for
AR rendering and guiding sound synthesis a pair of the visually challenged", International Conference on
Optimization Techniques, Dec. 2017.
glasses to display the visual enhancement information
[6] Ani R, Effy Maria, J Jameema Joyce, "Smart Specs: Voice
and an earphone or speaker to play the guiding sound Assisted Text Reading system for Visually Impaired Persons
to the user. Using TTS Method", Nov 2017.
[7]. Pranab Gajanan Bhat, Deepak Kumar Rout, "Vision Sensory
B. Navigating the Visually Impaired People: Substitution to Aid the Blind in Reading and Object Recognition,"
IEEE International Conference on Image Information Processing
(ICIIP), March 2018.
[8]. Sandesh Chinchole, Samir Patel, "Artificial Intelligence and
Sensors Based Assistive System for the Visually Impaired
People," IEEE Xplore International Conference, Dec 2017.
[9]. Vikky Mohane, Chetan Gode, "Object Recognition for Blind
people Using Portable Camera", March 2016.
[10].Sonal I Shirke, Swati V Patil, "Portable Camera Based Text
Ultra-sonic sensors capture the signals by using the Reading of Objects for Blind Persons," International Journal of
depth camera projects the infrared laser for measuring Applied Engineering Research vol 13, no- 17 pp. 12995- 12999,
2018.
the distance. This infrared laser can pass through

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 475
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Breast Cancer Histopathology Using CNN


S.Venkata lakshmi1, K.Pavithra2
1,2
Vemu Institute of Technology, CSE Department
Email: sibbalalakshmi@gmail.com1, kpavithra537@gmail.com2

Abstract- Breast cancer is a global health existing diagnostic methods. Present diagnostic methods
concern, with approximately 30 million new cases range from breast examination, mammography,
projected to be reported by 2030. While efforts are ultrasound, magnetic resonance imaging (MRI) to
being channeled into curative measures, histopathology. Histopathology is based on the
preventive and diagnostic measures also need to
morphological changes in hematoxylin and eosin (H &
be improved to curb the situation. Convolutional
Neural Networks (CNNs) are a class of deep
E) stained tissue . Though deemed the gold standard in
learning algorithms that have been widely adopted cancer diagnosis, it is still not absolute, as it is subject
for the computerized classification of breast cancer to bias, oversight, and even misinterpretation by the
histopathology images. In this work, we propose a attending pathologist . Since there exist clinical audits
set of training techniques to improve the in ensuring minimum diagnostic errors, these require
performance of CNN-based classifiers for breast inputs from several other pathologists which makes
cancer identification. We combined transfer verification of diagnosis expensive and time-consuming.
learning techniques with data augmentation and More so, audits are mostly done on randomly selected
whole image training to improve the performance reports due to the large volumes of patients ; as such,
of the CNN classifier. Instead of conventional realizing a perfect diagnostic accuracy is challenging.
image patch extraction for training and testing, we
Advanced machine learning algorithms such as deep
employed a high-resolution whole-image training
and testing on a modified network that was pre-
convolution neural networks (CNNs) have the potential
trained on the Imagenet dataset. Despite the to overcome these issues by learning the complex
computational complexity, our proposed classifier features of cancer morphology and perform automated
achieved significant improvement over the classification between benign and malignant tumors
previously reported studies on the open-source The underlying idea behind machine learning is to
BreakHis dataset, with an average image level
train computer-based models to recognize patterns in
accuracy of about 91% and patient scores as high
as 95%.
the training data and make sound predictions on future
data. Among the various machine learning algorithms,
Clinical Relevance- this work improves on the CNNs have, in recent times, proven to be efficient in
performance of CNN for breast cancer image segmentation, recognition, and classification. The
histopathology image classification. An improved
major advantage of CNNs is their ability to learn inherent
Breast cancer image classification can be used for
the preliminary examination of tissue slides in
patterns in the input data devoid of feature engineering.
breast cancer diagnosis. CNNs, in the basic sense, consists of several stages of
learnable filters that are convolved with the input data
I. INTRODUCTION (image, audio, or video) followed by a multilayer
The global trend in reported breast cancer-related perceptron (MLP) network. The convolutional filters
deaths and cases has increased significantly in recent and the MLP are interfaced by non-linear activation
years. About 2.1 million new cases and 627,000 deaths functions such as rectified linear unit (ReLU), sigmoid,
were reported in 2018 as against 1.7 million new cases or hyperbolic tangent. Training CNNs from scratch
and 521,900 deaths in 2012. While it is important to more often tends to be time- consuming and requires
improve preventive and therapeutic methods to reverse several modifications to the hyperparameters and the
this deleterious trend, it is equally essential to improve overall network architecture. More so, the requirement

476 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

of large amounts of labeled datasets can be challenging seventeen pre-trained layers were imported from the
in the medical field; thus, pre-trained networks on other AlexNet, of which five are learnable. The imported
recognition tasks are employed. This approach to layers were appended with three fully connected layers
training is referred to as transfer learning. and a dropout layer, as shown in Figure 1. In all the
network contains 7,949,444 learnable parameters out
II. METHODS of which about 1,288,192 are imported from the pre-
A. The Proposed CNN Architecture trained AlexNet. The images in the BreakHis dataset
were high-resolution images of size 460 x 700. We
Our network's architecture was obtained by
chose to supply the whole images at the input of the
importing pre- trained layers from the AlexNet , which
network. Despite the computational complexity this
was designed and trained to classify 1.2 million natural
imposes on the network, it gives the network a better
images into 1,000 classes as a part of the ImageNet
overview of the image to be able to make a sound
challenge . The rationale here is to be able to teach our
decision on the type of tumor involved in each case,
network to finetune and appropriately apply the
thus improving the overall classification accuracy.
previously learned weights to our task. A total of

Figure 1. A schematic of the proposed CNN network architecture and its components.

The BreakHis dataset consists of 7,909 microscopic level accuracy of 89.6 ± 6.5 by extracting smaller image
biopsy images (2,480 benign and 5,429 malignant) at patches from the original high-resolution images in the
four magnification levels (40x, 100x, 200x, and 400x) dataset for training a CNN and then combining these
obtained from 82 patients who were referred to the patches for the final classification. N. Bayramoglu et al.
P&D lab. The patients who consented to their [12] employed a magnification invariant approach in
participation in this study approved by the institutional training a multitask CNN to predict the magnification
review board had their breast tissue samples taken and levels in addition to the task of discriminating benign
processed as described in . From a classification from malignant tissue images. They reported that mixing
standpoint, the images in the BreakHis dataset are different magnification levels did not degrade the
characterized by large interclass similarity and intraclass network performance (83.25% and 82.13%
variability, as illustrated in Figure 2. Images in panels A recognition rate for single and multitask networks,
and B appear to be similar but are from different classes. respectively). Zahangir et al. also proposed an Inception
whereas images in panels C and D are from different Recurrent Residual Convolutional Neural Network
classes but appear to be similar. A and C are from the approach for binary and multi-class classification and
same class, while B and D are also from the same class produced accuracies between 92% and 96% and
but appear to be different. These images further highlight patient scores between 94% and 96.76%. This
the challenges in accurately classifying them. approach, however, did not separate the training and
The dataset has been used in several notable machine test data at the patient level; hence the algorithm could
learning studies that attempt to classify the images into have learned features peculiar to a patient tissue other
malignant and benign tumors. Spanhol et al. achieved a than breast cancer.
patient-level accuracy of 88.6 ± 5.6% and an image-

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 477
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

regularized using the L2 norm with a penalty factor of


A B 0.001. The model was trained on a 3.6 GHz processor
workstation running Ubuntu linux. The training
environment was configured to a single CPU which
resulted into a training time of approximately 1,200
C D minutes on an average.
D. Performance Metrics
Figure 2. Representative images from the BreakHis dataset
showing a typical case of interclass similarity and intraclass We used the following metrics to systematically
dissimilarity. A and B appear to be similar but are from ascertain the performance of our network and compare
different classes. C and D are also from different classes but
appear to be similar. A and C are from the same (benign) it with the previously reported studies.
class while B and D are also from the same class (malignant).
Patient score: The patient score measures the
In this paper, we present a combination of training accuracy with which all images from an individual patient
techniques that we used to improve the performance were classified. It is computed as shown in Equation 1,
of CNN on the dataset mentioned above. Our approach where Nrec is the number of images that were correctly
is magnification invariant and utilizes entire images rather classified for the patient under consideration and Np is
than splitting them into smaller patches. the total number of images from that patient.
B. Data Allocation and Augmentation Average patient score: This score is computed
We divided the BreakHis dataset at the patient level as an average from all individual patient scores as given
into a training set and test set as follows: images from 8 by Equation 2.
out of the 82 patients were reserved for the test set Magnification level accuracy: The magnification
while the remaining 74 patients were used in the training level accuracy is the accuracy with which images from
set. It was made sure that images from patients in the each magnification category are classified and is
test set were not included in the training set. Images computed by Equation 3. Where NMrec is the number
from all magnification levels were included in the training/ of images at each magnification level that was correctly
test data since the classifier was meant to be classified and NMall is the total number of images at
magnification invariant. To further increase the size of each magnification level.
the training set and reduce the risk of overfitting, the
dataset was augmented by applying reflections in the III. RESULTS AND DISCUSSIONS
X-axis, reflection in the Y-axis, and a reflection in both A. Results
X- and Y-axes on each image in the training set. This
increased the number of images in the training set by Table I presents the magnification level accuracies
four-fold (a total of 28,384 images). This was then obtained for five trials using our network along with the
divided in the ratio 8:2 for training and validation, average values. Our network was able to achieve
resulting into 22,707 images for training and 5,677 for 95.27% accuracy for the 40x images. The accuracy
validation. for other magnifications were: 88.57% for 100x,
93.49% for 200x and 89.15% for 400x magnification.
C. Network Training A detailed comparison of our CNN's performance with
The above network was implemented in MATLAB previously published studies using the BreakHis dataset
using the Deep Learning toolbox. The network was (using the same training/test split as proposed in ) is
trained for seven epochs using the stochastic gradient shown in Figure 3. From the chart, it is evident that our
descent with momentum method and a learning rate of model outperformed all the existing models by as high
0.001. A mini batch size of 128 and a validation as 9% for the 40x, and 200x magnifications, and by
frequency of 80 was employed. The model was 7% and 3% for the 400x and 100x magnifications,

478 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

respectively. Our model was able to achieve an average TABLE I. MAGNIFICATION LEVEL ACCURACY ACHIEVED
BY OUR CNN CLASSIFIER FOR FIVE RANDOM TRIALS
magnification level accuracy of 91.6% which, to our
knowledge, is the highest reported classification Magnification Level Accuracy (%)
Trials 40x 100x 200x 400x
accuracy in the studies performed using the BreakHis trial_1 97.85 87.50 95.35 88.83
dataset based on the used protocol to date. trial_2 91.94 82.59 91.63 86.17
trial_3 96.24 90.63 94.42 94.68
The patient scores for 8 randomly selected patients
trial_4 95.16 88.39 94.88 87.23
from the dataset; 4 from each class were computed. trial_5 95.16 93.75 91.16 88.83
This performance metric measures the accuracy with MEAN 95.27 88.57 93.49 89.15
which a new patient's image obtained through the same DEVIATION 1.18 2.41 1.40 1.84
or similar preparation process will be classified by our
model. Our network recorded accuracies ranging from
100% to 65%. Further probing into the poor performing
patients revealed that the specific stage of tumor class
from which this test case was drawn was
underrepresented in the dataset. This means that if the
dataset is enlarged to give a better representation of
this class based on tumor stages, we could improve on
the performance further. Table II provides the patient
Figure 3. A chart comparing the magnification level
scores aggregated at the magnification level. From the accuracies of our classifier with previous studies on the
table, it can be observed that the network records a BreakHis dataset.
patient score of about 96.35% on the 40x images, TABLE II. MAGNIFICATION LEVEL PATIENT SCORES
OBTAINED BY OUR CNN CLASSIFIER FOR FIVE RANDOM
83.46% on the 100x, 93.27% on 200x and 85.58% TRIALS
on the 400x images. Figure 4 shows the comparison of
Magnification Level Patient Score %
the outcome of our model to that of previously reported trial 40x 100x 200x 400x
efforts based on patient scores. Compared to previously trial_1 97.86 79.39 94.51 84.77
reported efforts, our model improved the patient score Trial_2 91.96 74.22 90.82 81.10
for the 40x and 200x images by 6.3% and 6.9%, trial_3 96.07 87.76 94.24 93.17
respectively. trial_4 98.61 86.10 95.22 83.67
trial_5 97.25 89.83 91.56 85.18
B. Discussion MEAN 96.35 83.46 93.27 85.58
Deviation 1.87 5.33 1.66 3.04
We presented a practical strategy to improve the
outcome of CNN-based classifier for differentiating
malignant breast cancer tumors from benign ones using
histopathology images. Unlike traditional approaches
that extract patches to augment the dataset, we
employed simple reflection operations to augment our
dataset and trained a pretrained model using high
resolution (large 460x700) breast cancer histopathology
images.
Figure 4. A chart comparing magnification level patient
scores of our classifier with previously published efforts.

Similar studies were conducted by Spanhol et al. in


which the networks were trained and tested on image
patches. Our approach of training on high resolution

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 479
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

large images provided the network with a better hyperparameters may further improve the performance
overview of global features needed to perform the of our classifier which remains the topic of future
classification task. As a result, our classifier achieved investigations.
an average magnification level accuracy of 91.62% and
an average patient score of 89.66 which is a 6% REFERENCES
improvement in magnification level accuracy and a 2% [1] American Cancer Society. Breast Cancer Facts & Figures 2019-
2020. Atlanta: American Cancer Society, Inc. 2019.
improvement in terms of patient scores.
[2] L. A. Torre, F. Bray, R. L. Siegel, and J. Ferlay, "Global Cancer
We believe that the significant improvement in the Statistics , 2012," vol. 65, no. 2, pp. 87-108, 2015.
performance of our model can be attributed to the [3] M. Veta, J. P. W. Pluim, P. J. Van Diest, and M. A. Viergever,
network training process that utilizes whole images other "Breast cancer histopathology image analysis: A review," IEEE
than patches. Extracting patches from an image to train Trans. Biomed. Eng., vol. 61, no. 5, pp. 1400-1411, 2014.

the network, as presented in, may be helpful from an [4] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina
Toutanova BERT: Pre-training of Deep Bidirectional
architecture complexity point of view. However, this Transformers for Language Understanding (2018).
approach introduces inconsistencies into the dataset as
[5] Seonhoon Kim, Jin-Hyuk Hong, Inho Kang and Nojun Kwak:
a malignant image might contain regions that are benign Semantic Sentence Matching with Densely-Connected Recurrent
or regions that do not carry any information regarding and Co-attentive Information, (2018).
the type of tumor. These regions when extracted will [6] Diederik P. Kingma and Jimmy Ba: Adam: A Method for
be labeled with the label of their source and might Stochastic Optimization, (2014)
adversely affect the features the model associates with [7] Shen Li, Zhe Zhao, Renfen Hu, Wensi Li, Tao Liu, and Xiaoyong
each class. Du: Analogical Reasoning on Chinese Morphological and
Semantic Relations. In Proceedings of the 56th Annual Meeting
Despite the significant improvements in the of the Association for Computational Linguistics (Vol 2: Short
Papers) Association for Computational Linguistics, 138-143.
performance, we do not wish to overlook the fact that
this performance is not satisfactory from the clinical [8] Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean:
Efficient Estimation of word Representations in Vector Space,
perspective. It is, in fact, possible to further improve (2013).
the outcome of classification based on the selection of
several optimal hyperparameters. However, considering
the complexity of the network and the number of
parameters involved, finding the optimal
hyperparameters is very challenging and warrant a more
systematic approach.
IV. CONCLUSION
In this work, we presented a more efficient training
strategy that involves a combination of transfer learning
data augmentation and high-resolution whole-image
training. This approach resulted in a magnification level
classification accuracy of upto 95.27% and upto
96.35% accuracy in terms of patient scores. These
results indicate a significant 6% improvement of average
classification accuracy over the existing methods. Our
proposed network is an important step forward
towards a more reliable and high-fidelity automated
diagnosis of brast cancer histopathology images. We
believe that a more appropriate choice of critical

480 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Department of Electrical & Electronics Engineering

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 481
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

482 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Novel Management System of Energy in Hybrid


Wind Solar Microgrid Operated with Battery
K. Prathibha1, MV Bramhananda Reddy2, Gowtham Chendra3, M. Jyothsna Devi4
1,2,3,4
Sri Venkateswara Engineering College, Tirupati

Abstract: This paper proposes an efficient The system design depends on the type of energy
energy management system for battery-based conversion system and the type of converters used at
hybrid wind-solar- microgrid. The wind and solar different locations in the system; this needs a lot of
energy conversion systems and battery storage technical attention and has attracted research in this area
system have been developed along with power
[7-9].
electronic converters, control algorithms and
controllers to test the operation of hybrid microgrid. A hybrid energy system was simulated and the
The power balance is maintained by an energy performance for different practical load demand profile
management system for the variations of renewable and weather data was studied [10]. The simulation
energy power generation and also for the load system of a coordinated control for microgrid energy
demand variations. This microgrid operates in management in standalone and grid connected modes
standalone mode and provides a testing platform is discussed [11]. A hybrid wind-solar-battery ESS
for different control algorithms, energy
system is simulated to test the state of charge (SOC)
management systems and test conditions. A real-
time control is performed by rapid control control [12].
prototyping to test and validate the control A scaled hardware prototype with battery SOC
algorithms of microgrid system experimentally. The control scheme to improve the DC grid voltage control
proposed small-scale renewable energy based for stand-alone DC microgrid was developed. [13].
microgrid can be used as a test bench for research
and testing of algorithms in smart grid applications. A hardware prototype of a low-cost hybrid stand-
alone power generation system was developed [14].
Index Terms Energy management system,
hybrid system, microgrid, solar energy, standalone
The objective of this research work is to design and
system, wind energy. develop a small-scale wind-solar-battery renewable
energy based microgrid. An energy management system
I. INTRODUCTION is proposed to maintain the power balance in the
There have been global initiatives for the promotion microgrid and provides a configurable and flexible
of self-sufficient renewable energy systems. This initiative control for different scenarios of load demand variations
has led to the development of renewable power and variations in the renewable energy sources. The
generating systems which are capable of providing self- proposed system can be tested in real time environment
sufficient power generation with the use of more than with the use of rapid control prototyping. This test bench
one renewable source of energy [1-2]. The most allows the validation of control algorithms in real time
commonly used hybrid renewable energy sources are and therefore develop efficient renewable energy
solar and wind energy [3-4]. management systems.

Both these sources of energy are intermittent in The rest of the paper is organized as follows; Section
nature; therefore, the use of an energy storage system II illustrates the complete system design, converter
(ESS) is standard in stand-alone applications [5-6]. In topologies and control techniques in detail. Section III
hybrid renewable energy systems; there are multiple describes the hardware setup and the rapid control
control techniques to provide an efficient power transfer. prototyping. Following that, the experiments on the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 483
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

microgrid and various results are discussed in Section irradiance is shown in Fig. 3. The characteristics are
IV. Lastly, this paper ends with conclusions and shown for different values of irradiance ranging from
discussions in Section V. 400W/m2 to 1200W/m2 at a constant temperature of
250C. For 1000 W/m2, the power reaches a maximum
II. SYSTEM DESCRIPTION of 66Wp at 17.6 V.
The proposed system is shown in Fig. 1. It can be The power at the PV panel is
divided into three parts; i) solar and wind based
renewable energy sources supported by a battery Ppv = VI (1)
storage system along with their converters connected where, V is the voltage across the terminals of the
to the DC bus, ii) the load side inverter and single- PV panel and I is the current through it. The flow chart
phase load, iii) real time controller implementing the of the MPPT algorithm is shown in Fig. 4.
energy management system. The wind energy
conversion system consists of a permanent magnet
synchronous generator (PMSG) based wind turbine.
The solar photovoltaic (PV) panel is operated with
maximum power point tracking (MPPT) when the
power generated by both PV and wind are less than
the load demand. When the power generated is more
than the demand, the excess power is supplied to the
battery and when it is no longer safe for the battery to
be charged, the MPPT is turned off. The battery storage
system is used to maintain the energy balance in the
Fig 2. Solar energy conversion system with controller.
system. An energy management system is used to control
the power flow under different conditions in order to
supply to the load through a single-phase inverter.

Fig 3. Effect of Irradiance on PV array performance at T =


25 0 C.

Fig 1. Components of small-scale wind-solar-battery


microgrid with EMS.

A. Solar Energy Conversion System (SECS)


The SECS consists of a solar PV panel, a DC-DC Fig 4. MPPT algorithm flow chart.
boost converter and an MPPT controller as shown in
Fig. 2. Depending on state of charge of the battery The MPPT algorithm in PV system keeps the PV
storage system, the MPPT is operated under MPPT panel voltage near to MPP voltage. The P&O method
mode or under off-MPPT mode of operation. The P- is used; the required change in the duty cycle (D) is
V characteristics of the solar panel with effect of calculated based on the change in power (P) and the

484 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

change in voltage (V). First the voltage is perturbed


and output power is calculated, if the power increases,
then voltage is increased further, if the power decreases, where Q, is the battery capacity and Ibat is the battery
then the voltage is reduced. current.
B. Wind Energy Conversion System (WECS)
The WECS consists of a wind turbine, a PMSG, a
DC-DC boost converter and controller. The power
extracted from the wind is [15].
Pw =0.5Av3Cp(,) (2)
where  is the air density in kg/m3, A is the area
swept by the rotor blades in m2, and v is the wind
velocity in m/s. Cp is the power coefficient and is a
function of tip speed ratio (TSR, ) and pitch Fig 6. Wind energy conversion system with controller.

angle (). The battery operates in two modes; charging and


A variable speed wind turbine is used in this system. discharging, this depends on the power generated by
The characteristics of the wind turbine is shown in Fig. both solar and wind. The battery also operates in these
5; the Cp for various wind speeds at different pitch two modes based on the energy constraints which are
angles. A permanent magnet synchronous generator is determined by [16] the SOC limits
selected for its low maintenance and low operational SOCmin ≤ SOC ≤ SOCmax (4)
cost. The generator output is dependent on the wind
speed.

Fig 7. Battery Energy Storage System with controller.

Fig 5. Mechanical characteristics of wind turbine for different D. Load Side Control
wind speeds.
The DC microgrid is connected to a single-phase
The three-phase output of the generator is rectified resistive load through a single-phase inverter with a
using a diode rectifier and then the voltage level is controller shown in Fig. 8. A R-L filter is used at the
increased with the help of a DC-DC boost converter inverter output to filter the undesired harmonic content.
as shown in Fig. 6. The outer loop PI controller is used to regulate the
C. Battery Storage System (BSS) voltage and the inner loop PI controller regulates the
current.
The BSS consist of a lead acid battery and a
bidirectional DC-DC buck-boost converter. This
converter is responsible in maintaining the DC bus
voltage through a PI controller as shown in Fig. 7. The
state of charge (SOC) [16] is given as

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 485
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

then the MPPT controller is switched to off-mode and


this reduces the solar power generation as the total
power generation is more than the demand and the
excess generated power can no longer be utilized to
charge the battery and any further power requirement
at the load is now supplied by the battery. When the
power generated by the solar and wind energy sources
do not meet the load demand, the power deficit is
supplied by the battery until the SOC reaches SOCmin,
once this is reached then load shedding needs to done
in order to maintain power balance as the power supply
is less than demand.

Fig 8. Single phase inverter with filter for AC load control.

E. Energy Management System (EMS)


The EMS is the primary controller which coordinates
and controls all control action in the microgrid system.
All the controllers of the converters in the previous
sections operate based on the EMS control mode. The
boost converter of the solar energy conversion system
operates in two modes depending on the power
generation; MPPT mode/ off-MPPT mode. The
Battery bidirectional converter operates in charging or
Fig 9. Energy Management System.
discharging mode and maintains the DC bus voltage
constant, the DC-DC boost converter of the wind III. EXPERIMENTAL SETUP AND RAPID
energy conversion system operates in boost mode. CONTROL PROTOTYPING
The power in the microgrid must be balanced under The rapid control prototyping of the renewable
different generation of power from renewable energy energy based microgrid is implemented experimentally
sources and load demand conditions. The power using a DSPACE DS1104 controller board as shown
balance equation is given as follows in Fig.10. The DSPACE controller is a real-time
Pw + Ppv = PL + Pbat (5) hardware powered by a PowerPC microprocessor and
supported by Texas Instruments TMS320F240 digital
The various modes of operation of the energy signal processor (DSP). The common control functions
management system are presented in the flowchart in for are pre-defined in the DSP processor therefore there
Fig. 9. is no requirement of compiling a new user defined code.
There are four modes of operation of the energy Also, by using Simulink Real-Time Workshop library
management system. Each mode of operation depends the programs are compiled directly from the C-code
on two conditions; one is the power generation and for the PowerPC processor.
second is the state of charge of battery. The desired The pulse with modulation (PWM) and serial
mode of operation is when the power generated from peripheral interface are provided by DSP processor
the SECS and WECS are more than the load demand. and the encoder interface and A/D modules are
During this operation, the battery is charged until controlled by PowerPC processor. Thus, this DS1104
SOCmax, if the SOC of the battery reaches SOCmax,

486 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

board is an efficient real time controller which can be Table I

used for closed loop control applications. Parameters of Hardware Equipment


Equipment Parameter Value
The small scale microgrid consists of a controllable PMSG Nominal Power 60 W
Nominal Voltage 24 V
fan blower with which variation in wind speed can be Nominal Current 4.2 A
achieved, this provides the necessary input to the 60W Rated Speed 6000 rpm
PMSG based wind turbine. Industrial lamps are used Stator Resistance RS 0.64 Ω
Stator d axis 0.16 mH
to vary the irradiation levels for a commercial 70W solar inductance, Ld
PV panel. A standard 12V, 24Ah lead acid battery is Stator q axis 0.16 mH
inductance, Lq
used. Appropriate power electric converters for PV Pole pairs, p 3
panel, generator, battery and load are selected. Flux Linkage, ψ 0.024 Wb
Coefficient of 0.37×10 -6
Necessary encoders, line filter inductors, low power friction, Kg N.m.s/rad
variable load module, interface and voltage and current Moment of Inertia, Jg 2×10 -6 kg.m2
measuring equipment are utilized. A list of parameters PV Module Nominal Power 70 W
Open Circuit Voltage 24 V
of the hardware equipment is provided in Table I. Maximum Power 17.6 V
Point Voltage
Short-Circuit Current 6A
Current at MPP 3.98 A
Battery Voltage 12 V
Capacity 24 Ah
DC Bus and RL Filter DC-bus voltage 50 V
reference, VDC
Filter resistance, R 0.7 Ω
Filter inductance, L 32 mH

In Fig. 11, the functions of the controller are clearly


represented in the schematic diagram. The RCP
accommodates the variations in the user inputs,
variations in the control functions and variations in the
hardware operations in real time. The DSPACE
controller receives the voltage and current measurements
from solar and wind energy conversion systems, battery
storage system and load end along with the speed of
the PSMG, wind speed measurement and solar
irradiance measurement provided by the encoder,
Fig 10. Rapid control Prototyping of the renewable energy
anemometer and pyranometer respectively, these
based microgrid. measurements are given to the energy management
system and control algorithms for the calculation of
power at different locations of the microgrid and to
assess the control action to be taken to maintain the
energy balance in the system and also generate the
necessary PWMs to the power electronic converters.
Set references such as irradiance values to maintain the
intensity of the solar lamps and also the wind speed
values to maintain the speed of the blower in order to
test performance of the microgrid for the variations in
the renewable energy sources, these set references are
sent through the controller. In the MATLAB

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 487
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

environment, both the controller design and would not occur in a practical situation. But the load is
implementation is executed and also the storage and kept fixed in order to observe the performance
plotting of results is done. The stored results can also operation of the renewable energy conversion systems
be analysed at a later time. and the battery storage system for the variations in the
power generated from the renewable energy sources,
this will be difficult to observe if the load is constantly
changing.

Fig 12. Wind speed and solar irradiance levels.


Fig 11. Schematic diagram of controller functions.
The power balance is achieved by the energy storage
IV. EXPERIMENTAL RESULTS device by maintaining a constant DC bus voltage of
50V as shown in Fig. 13. The generator speed for
There were two case scenarios that were carried
different variations of wind speed is shown in Fig. 14.
out on the hybrid renewable energy microgrid. The first
case was performed at a constant load condition and
the solar and wind energy was varied. The second case
was carried out for variations in load demand with
constant renewable energy sources. The runtime for
the experiment results for both cases is 70s.
A. Variations in Renewable Energy Sources with Fig 13. DC Bus Voltage for constant load with variable
a Constant Load renewable energy sources.

The objective of the first case is to deliver a constant The power at different locations of the microgrid is
power to the load for different generating conditions. shown in Fig. 15, till 10s, the battery is charged as the
The solar irradiance is varied by switching the lamps power generated by both the solar and wind energy
on/off and thus providing different irradiance levels. The conversion systems exceed the load demand, after 10s
wind speed is varied by varying the speed of the fan the discharging starts and the level of discharge varies
blower. The irradiance is varied by 1000W/m2, 800W/ at different instants depending on the difference in the
m2, 400W/m2 and 600W/m2 at the start, 20s, 30s and power deficit from the renewable energy sources.
50s respectively, the wind speed was varied by 12m/s,
8 m/s, 11m/s, 7 m/s and 11 m/s at the start, 10s, 20s,
40s and 60s respectively as shown in Fig. 12.
Though the variations in the wind speed and solar
irradiance are only step variations which can never
Fig 14. PMSG speed for constant load with variable renewable
happen in the real world as the meteorological conditions energy sources.
are always changing. These values are selected in such The power deficit is met by the battery, and the state
a manner that they vary between the possible maximum of charge of the battery clearly shows the charging and
and minimum range of operation of the PV panel and discharging rate in Fig. 16. The voltage is kept at
WT in order to check the system operation for these constant at the load terminal as shown in Fig. 17; for
variations. Also, in this case, the load is kept fixed which

488 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

few instances the load voltage drops marginally as the


battery discharge rate is higher between 40s to 60s.

(b) Load voltage from 5.6s to 5.7s

(a) PMSG Power

(c) Load voltage from 22.2s to 22.3s


(b) PV Power

(c) Battery Power (d) Load voltage from 44.7s to 44.8s

(d) Load Power


(e) Load voltage from 67.5s to 67.6s
Fig 15. power at different locations of the microgrid for
constant load with variable renewable energy sources. Fig 17. Load Voltage for constant load with variable
renewable energy sources.

B. Variations in Load with Constant Renewable


Energy Sources
In the second case scenario, the solar and wind
power generation is kept constant with the solar
irradiance kept constant at 800W/m2 and the wind
Fig 16. State of charge of battery for constant load with
variable renewable energy sources.
speed kept constant at 11m/s as shown in Fig. 18. The
power balance is achieved by the energy storage device
which maintains a constant DC bus voltage at 50V as
shown in Fig. 19. The generator speed is constant at a
speed of 5280 rpm as the wind speed is maintained
constant shown in Fig. 20.

(a) Load voltage

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 489
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig 18. Wind speed and solar irradiance levels. (b) PV Power

Fig 19. DC bus voltage for constant renewable energy sources (c) Battery Power
with variable load.

(d) Load Power


Fig 20. PMSG speed for constant renewable energy sources Fig 21. Power at the microgrid for constant renewable energy
with variable load. sources with variable load.

The load is varied at every 10s and the performance The microgrid operates for a variable load but the
of the microgrid is tested for a variable load demand. voltage is kept constant at the load terminal as shown
The power at different location of the microgrid is shown in Fig. 22. For both lower load demands and higher
in Fig. 21. Initially the load demand is 100W and the load demands, the energy management system
power generated from the renewable sources is slightly maintains the power balance when the power from the
less than the demand and this is met by the battery. renewable energy sources is constant. For lower load
After 10s until 40s, the demand is lower and during this demands, the battery is charged and for higher load
time the battery is charged from the excess power demands, the battery discharges and the variations in
generation. After 40s, the demand is more than the the SOC of the battery is shown in Fig. 23.
supply and the battery supplies the additional power
required.

(a) Load Voltage

(a) PMSG Power

(b) Load Voltage from 17.3s to 17.4s

490 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

system. This test bench provides a platform in which


future tests can be performed for different case scenarios
and control algorithms for research in the field of hybrid
renewable energy microgrid systems.
REFERENCES
(c) Load Voltage from 24.6s to 24.7s [1] Atika Qazi et al., "Towards Sustainable Energy: A Systematic
Review of Renewable Energy Sources, Technologies, and Public
Opinions", IEEE Access, vol. 7, pp. 63837 - 63851, May, 2019.
[2] Trieu Mai et al., "Renewable Electricity Futures for the United
States" IEEE Trans. on Sustainable Energy, vol. 5, no. 2, pp.
372-378, Apr. 2014.
[3] M. H. Nehrir et al., "A Review of Hybrid Renewable/Alternative
Energy Systems for Electric Power Generation: Configurations,
(d) Load Voltage from 46.2s to 46.3 Control, and Applications" IEEE Trans. on Sustainable Energy,
vol. 2, no. 4, pp. 392-403, Oct. 2011.
[4] Pranav M.S et al., "Hybrid Renewable Energy Sources (HRES) -
A Review" International Conference on Intelligent Computing,
Instrumentation and Control Technologies (ICICICT) 2017,
pp.162-165.
[5] Xiaotong Song et al., "Reliability Varying Characteristics of PV-
ESS-Based Standalone Microgrid", IEEE Access, vol. 7, pp.
(e) Load Voltage from 63.8s to 63.9 120872- 120883.

Fig 22. Load Voltage for constant renewable energy sources [6] A.A. Jamali et al., "Energy storage systems and their sizing
with variable load. techniques in power system- A review" IEEE Conference on
Energy Conversion (CENCON), 2015, pp.215-220.
[7] Caisheng Wang et al., "From hybrid energy systems to microgrids:
Hybridization techniques, configuration, and control", IEEE PES
General Meeting, USA, pp. 1-4, Jul. 2010.
[8] Saroja Kanti Sahoo et al., "Control Techniques in AC, DC, and
Hybrid AC-DC Microgrid: A Review", IEEE Journal of Emerging
and Selected Topics in Power Electronics, vol. 6, iss. 2, pp. 738-
Fig 23. State of charge of battery for constant renewable 759, Jun. 2018.
energy sources with variable load [9] Venkata Yaramasu et al., "High-power wind energy conversion
systems: State-of-the-art and emerging technologies", Proceedings
V. CONCLUSIONS of the IEEE, vol. 103, iss. 5, pp. 740-788, May, 2015.
A small-scale experimental hybrid solar-wind-battery [10] Caisheng Wang and M. Hashem Nehrir, "Power Management of
renewable energy based microgrid with energy a Stand-Alone Wind/Photovoltaic/Fuel Cell Energy System",
IEEE Trans. Energy Conversion, vol. 23, no. 3, pp. 957-967,
management system is developed and implemented. Sept. 2008.
Experiments were conducted to test the effectiveness [11] Quanyuan Jiang, et al., "Energy Management of Microgrid in
of the proposed energy management system for different Grid-Connected and Stand-Alone Modes", IEEE Trans. Power
variations in the renewable energy sources and different Systems, vol. 28, no. 3, pp. 3380-3389, Aug. 2013.
variations in the load demand. The energy management [12]Xiangjun Li, et al., "Battery Energy Storage Station (BESS)-
system and control algorithms were implemented using Based Smoothing Control of Photovoltaic (PV) and Wind Power
Generation Fluctuations" IEEE Trans. Sustainable Energy, vol.
rapid control prototyping in DSPACE controller. The 4, no. 2, pp. 464-473, Apr. 2013.
experimental results show that the system is flexible and [13 Byung-Moon Han, "Battery SoC-based DC output voltage control
accommodates the different variations in the renewable of BESS in stand-alone DC microgrid" 2016 IEEE Region 10
energy sources and in the load. The controller allows Conference (TENCON) 22-25 Nov. 2016, pp. 1445-1449.
the effective implementation of the energy management

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 491
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[14] C. Kalaivani, et al., "A standalone hybrid power generation


system", 2017 International Conference on Computation of
Power, Energy Information and Communication (ICCPEIC): 22-
23 Mar. 2017 pp.800-806.
[15]F. Blaabjerg, et al., "Power electronics as efficient interface in
dispersed power generation systems," IEEE Trans. Power
Electron., vol. 19, no. 5, pp. 1184-1194, Sep. 2004.
[16]S. X. Chen, et al., ''Sizing of energy storage for microgrids,'' IEEE
Trans. Smart Grid, vol. 3, no. 1, pp. 142-151, Mar. 2012.

492 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Reactive Power Optimization Control for Using Dual-


Tank DBSRC
C.L.Sravanthi1, E .Neeraja2
1,2
Assistant Professor, EEE Department, SITAMS.
Email: sravanthi.sitams@gmail.com1, neeraja107309@gmail.com2

Abstract-Compared to the traditional LC-type (EPS), dual phase shift (DPS), and triple phase shift
dual active bridge (DAB) series resonant (TPS) [3]. In addition, the PWM plus phase-shift
converter, the DAB series resonant converter with modulation was often used to improve the efficiency of
dual tanks has a larger power transmission range, the converter [7]. Besides, a direct current slew rate
wider voltage gain, and broader soft switching
control method was proposed in [8], which was verified
range. However, this new proposed converter has
to be effective than the PWM plus phase-shift method.
a larger reactive power than the traditional one, so
its efficiency is affected. Therefore, the model of Besides, different kinds of resonant tanks were added
the reactive power is first derived, the control to the DAB topology to extend the soft switching region,
object is defined as the minimum reactive power, and thus, kinds of resonant DAB converters were
and then, a new control scheme for reactive power proposed. Among those, dual active bridge series
optimization based on function monotonicity is resonant converter (DBSRC) is the most attractive,
proposed in this article. At the same time, all which is referred to as conventional DBSRC for short
switches operate with the zero voltage switching, here, as shown in Fig. 1(a). Compared with the DAB
so the efficiency of the converter is improved. At converter, the conventional DBSRC enables the
last, a 500-W prototype is built, and the simulation inductor current close to sinusoid by adding a capacitor
results and experimental results verify the
in series with the inductor, so the dc component of the
feasibility of the optimal control scheme.
transformer is reduced and the eddy loss is relatively
Index Terms-Dual active bridge (DAB), reactive smaller [9].
power optimization, series resonant converter, zero
voltage switching (ZVS).

I. INTRODUCTION
BIDIRECTIONAL dc-dc converters are widely
used in fuel cell system [1], [2]. Among all of the
bidirectional con- verter topologies, the dual active
bridge (DAB) dc-dc converter has got wide attention
due to its advantages of galvanic isolation, high power
density, bidirectional power flow, and symmetrical
structure [3], [4]. Improving power transmission
efficiency and power density of the DAB converter is
of great significance for reducing nonrenewable
resource consumption [5], [6]. In order to broaden the Fig. 1. Two kinds of DBSRC. (a) Topology of the conventional
DBSRC. (b) Topology of the dual-tank DBSRC.
soft switching range of the DAB converter and to reduce
circuit loss, many studies introduced the in-bridge However, this type of converter faces the same
phase-shift angle based on single phase shift (SPS), problems as the traditional DAB converter. For
and thus proposed various phase-shift modulation example, the soft switching range becomes narrow when
methods successively, such as extended phase shift the converter operates under light load conditions, and

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 493
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the reactive power becomes large when the Since reactive power significantly contributes to
transformer's primary and secondary voltages do not circuit loss, many studies about reactive power
match. optimization control for DAB converters have been
An LC-type DBSRC with dual tanks was proposed conducted. DPS and EPS modulations are introduced
in [10], which is referred to as dual-tank DBSRC, as to reduce the reactive power or backflow of the
shown in Fig. 1(b). The dual-tank DBSRC exhibits better converter in [12]-[14]. In [18], the nonactive power
characteristics than the traditional one based on same based on extended DPS modulation is used as
phase-shift modulation, such as a larger power optimization object, and the phase-shift trajectory for
transmission range, wider voltage gain, and soft switching minimum nonactive power loss was obtained with the
range. There exhibit a substantial reactive power in the method of lookup table. In [20], a reactive power
majority of resonant converters [11]. Since the dual- optimization control algorithm based on three-level
tank DBSRC has two resonant tanks, the reactive modulation was presented. The core of the control
power processed in resonant tanks will be increased strategy is using the Lagrange multiplier method to obtain
inevitably. Once the reactive power transmitted the conditional extreme value. However, when the model
becomes large, the current peak value flowing through of the converter is more complicated, the Lagrangian
the switches will become large, so the power loss of function obtained by this method will be more
the converter will increase, and its efficiency will complicated, and the analytical solution of the
decrease inevitably. conditional extremum may not be obtained. Harrye et
al.[21] provided an idea for reactive power optimization
The definition of reactive power varies in many control algorithm based on TPS. It is only necessary to
articles. In [12]-[14], reactive power was calculated use a control flowchart to perform phase-shift angle
by the port voltage and the inductor current, which were searching point by point in the control range and
usually in different phases in a switching period. It was compare them to determine the control point
defined as backflow power to the source. In [15], the corresponding to the minimum reactive power. Using
apparent power of the inductor in the DAB was defined this method, the control point with minimum reactive
as its reactive power since the inductor did not consume power can be easily found, which is less difficult than
active power. In [16], the reactive power was more the method mentioned in [20]. Because searching the
accurately defined as the apparent power of the inductor optimization points is not in the direction that reactive
without fundamental frequency assumption, which was power declines, the searching speed is not the fastest.
seen as the total reactive power consumption at the Inspired by the abovementioned optimization methods,
converter bridges. a new control scheme for reactive power optimization
In [17], [18], reactive power was defined as the at a given active power output is proposed in this article.
power that was delivered back to the source and from II. OPERATION PRINCIPLE
the load. In [18], nonactive power was regarded as
more accurate than reactive power since current and The topology of the dual-tank DBSRC is derived
voltage were both nonsinusoidal shapes in the DAB. from the traditional DBSRC. The dual-tank topology
Reactive power or nonactive power is caused by the is shown in Fig. 1. A, B, C, and D are, respectively, the
phase difference between the primary/secondary voltage midpoints of four bridge legs, and they are called leg A,
and current of the transformer. Under sinusoidal leg B, leg C, and leg D here. Cin1 and Cin2 are two
conditions, complex power is defined as the product voltage-dividing capacitors with the same capacitance
of voltage and current phasor. Therefore, active power value and connected in series in the Vin side. The central
is the real part of the complex power and reactive power tap from the primary winding of the transformer is
is the imaginary part [19]. In this article, the complex connected to the midpoint O of Cin1 and Cin2. Lr1 and
power method will be adopted. Cr1 constitute resonant tank 1, and Lr2 and Cr2 constitute
resonant variables as AD and AB. The upper and lower

494 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

switches in the same bridge leg operate complementally characteristics. Therefore, it will be analyzed in detail
with 50% duty ratio. Taking into account the need for below.
bidirectional power flow, the phase-shift angle AD According to (12), the relationship between
between the bridges is defined as the phase difference normalized active powers with the phase-shift angle
between the driving signals of S1 and S7, and its range under different tap coefficients is shown in Fig. 4. It
is  < AD < ; The phase shift angle AB is defined as can be seen that as AB increases from 0 to , the
the phase difference between the driving signals of S1 active power curves under different tap coefficients will
and S3, and its range is 0 < AB < 2. between point A get closer. When SPS control is used, that is, when
and O, and u2 represents the voltage between point O AB = , the active curves under different tap coefficient
and B. u3 represents the voltage of point D and C. will completely overlap. In addition, the more the tap
i1, i2, and i3 represent the currents flowing through the coefficient x deviates from 0.5, the larger the
resonant tank 1, the resonant tank 2, and the secondary transmittable range of active power is. Since the
side of the transformer; iin represents the current flowing normalized voltage gain is consistent with the normalized
out of Vin; and iT represents the current flowing along active power, the more x is deviated from 0.5, the wider
the transformer tap. iC in1 and iC in2 represent, the voltage gain range is.
respectively, the charging currents of the capacitors Cin1
and Cin2. The operation modes have been described in According to (13), the reactive power curves of the
[10], and will not be described here. dual-tank DBSRC under different tap coefficients are
shown in Fig. 5 when Qpu is 0.1, 0.3, and 0.5. From
III. STEADY-STATE ANALYSIS Fig. 5, the following conditions hold:
The fundamental analysis method is applied to this 1) When the reactive power is taken as a certain fixed
converter, and only the fundamental components of value Q0, the reactive power curve will gradually
voltages and currents shrink when the degree of asymmetry of the
transformer tap increases, that is, the |x 0.5| increases.
2) When the transformer tap coefficient x takes a certain
fixed value, the smaller the reactive power, the smaller
the range of phase-shift angles covered by the
reactive curve.
3). A fixed active power value corresponds to a curve in
the AD AB plane, and the intersection of the active
power curve and the reactive power curve determines
the steady-state operating point of the circuit.
Therefore, the contraction of the reactive curve is
not conducive to the intersection of the two curves.
The tap coefficient x close to 0.5 is undoubtedly
Fig. 2. Steady-state waveforms of the dual-tank DBSRC.
advantageous for providing a sufficient phase-shift
angle range for the control strategy.
A. Power Transmission Characteristics
From (10), it is found that the input voltage Vin, the
resonant reactance X, the voltage gain M, the
transformer tap coefficient x, and the two phase-shift
angles AD and AB together determine the magnitude
of the power and the direction of transmission. Among
Fig. Relationship between reactive power and the tap
them, the tap coefficient x related to the topology is an coefficient x.
important parameter affecting the power transmission

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 495
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

B. Soft-Switching Characteristics IV. OPTIMIZED CONTROL STRATEGY


The inequality constraint for ZVS of each switch of A. Reactive Power Minimization Control
the dual- tank DBSRC is given in [10].

Fig. 6. Relationship between ZVS condition and x and M.

It can be seen that when the tap coefficient x and


the voltage gain M satisfy certain conditions, the
inequalities in (16) will always be true. Here, the
following conditions need to be met:

Thus, region1 represents an area that the ZVS implemented by iterative optimization, that is, the
condition of legs A and B are both satisfied, where the control point is gradually moved in the direction of
voltage gain is less than 1. Also, it can be found that the reducing the reactive power. First, it needs to be
four bridge legs could not satisfy the ZVS condition in determined whether the objective function is an
(17) at the same time. If the parameters M and x are increasing function or a decreasing function. According
selected in region 1, ZVS of both leg A and leg B can to (27), the increasing or decreasing feature of the
be guaranteed, and leg C and leg D can realize ZVS by interval in which the control point (AD and AB) is
adjusting phase-shift angles. Therefore, only the third located can be judged.
inequality in (16) needs to be considered in designing There are a few questions that need to be explained.
the control scheme at this time. The design process is First, PI regulator is used to make the output voltage
greatly simplified. track the reference value, so it is necessary to ensure
that the output voltage has reached the given value
before entering the loop process for the reactive power
optimization control. Second, in order to reduce the
hard switching loss of the converter during the transient
process, the initial operating point of the converter should
be moved into the ZVS range as soon as possible.
Therefore, it needs to be judged whether the initial

496 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

phase-shift pairs (AD0 and AB0) of the converter satisfy amplitude and phase information of voltage and current.
the ZVS condition. If ZVS is met, go directly to the Especially, the control signal generated by optimal
process of finding the minimum reactive power value; if control algorithm will produce a certain delay.
the ZVS condition is not met, according to Fig. 7, it is Therefore, in order to improve the response speed and
known that AD0 should be moved to the right until control effect of the converter, the look-up table method
ZVS is satisfied, and therefore a new phase-shift pairs can be used for control during the experiment. The
(AD1 and AB1) are obtained, which will act as the optimal control point corresponding to the minimum
initial phase-shift angle of the reactive power value of reactive power is calculated in advance and
minimization flow. Then the derivative value of reactive recorded in the look-up table. During the experiment,
power corresponding to  AD1 (here, Q J ( AD ) the controller can query the table according to the real-
represents the derivative of reactive power) is used to time working condition, and the required control angle
judge the monotonicity of the function, and thereby find can be quickly obtained.
the optimal control point along the decreasing direction.
V. SIMULATION VERIFICATION
In order to verify the feasibility of the proposed
control strategy, MATLAB is used for simulation and
analysis. First, according to the reactive power
minimization algorithm given in Fig. 9, the corresponding
M function is written to simulate the reactive power
minimization process. Then, an initial value AD0 of
phase-shift angle and a normalized active power value
P0,pu are given as the input quantities of the M function,
Fig. 11. System control block diagram
and the function performs optimization process and
B. System Control Scheme outputs the final optimized control angle (AD and AB).
The complete system control block diagram is given Finally, the optimal control point obtained is plotted in
in Fig.11. First, the difference between the output the same coordinate plane with the normalized active
voltage Vo and the reference value Vo-ref is sent to the power value, the reactive power con- tour, and the soft-
PI regulator, and the steady-state output of the regulator switching boundary, and it is judged whether the point
is used as the initial value AD0 of the phase-shift angle satisfies the original design intention.
between the bridges. Then, this initial value AD0 is sent The dynamic process of the reactive power during
to the flowchart for the reactive power minimization the execution of the optimization controller is observed
control described in Fig. 9. At the same time, using the under a fixed voltage gain and a fixed active power. An
input voltage Vin, the output voltage reference value initial phase-shift angle AD0 is assumed, and this point
Vo-ref , the sampled output voltage Vo, and the sampled is used as the starting point.
output current Io, the voltage gain M, and the normalized Then, the control point moves in the direction of
active power P0, pu at this time can be calculated, and decreasing reactive power from the starting point. After
these calculation results are also used for reactive power setting the searching step, the program will automatically
minimization control. Finally, the phase-shift angles AD execute the optimization process, and output the optimal
and AB generated by the reactive power minimization control point (AD, AB) and the corresponding
algorithm are sent to signal generator to generate trigger minimum reactive power at that time. At the same time,
signals for the dual-tank DBSRC. the minimum normalized reactive power Qm and the
Since the circuit operates in the high-frequency number of cycles n are recorded at each time. Here,
switching state, even if the sampling period is set to be taking M = 0.5, P 0,pu = 0.5 as an example, the
very short, the digital controller cannot obtain real-time corresponding.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 497
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig: Current 1 output

VI. SIMULATION RESULT


Fig: Voltage 2 output

Fig: Current 2 output

VII. CONCLUSION
Compared with the conventional DBSRC, the dual-
tank DBSRC adds two resonant elements and two
voltage-dividing capacitors, which will increase the
Fig: Simulation circuit
circuit cost. However, for the switches of the tap-side
bridge legs of the dual-tank DBSRC, the voltage
OUTPUT WAVE FORMS stresses are reduced by half and the soft-switching range
is significantly enlarged. More importantly, the output
power of the dual-tank DBSRC is much higher than
the traditional one under same phase-shift modulation.
Although the dual-tank DBSRC exhibits larger reactive
power, the reactive power can be limited to a minimum
by the optimization algorithm proposed above.
Therefore, reducing the reactive power of the dual-tank
DBSRC is taken as the research object in this article.
Fig: Voltage 1 output Based on EPS modulation, an optimal control scheme
for minimizing reactive power is proposed. Based on
the mathematical model of active power and reactive
power, a new optimization control algorithm based on
function monotonicity is introduced and verified by
498 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

simulation and experiment. The following conclusions


are drawn:
1. When the tap coefficient x of the transformer is taken
to be different, it will affect the active power, reactive
power, voltage gain, and soft-switching range.
Therefore, when selecting the tap coefficient x, it is
necessary to take into account the integration of
various variables
2. The reactive power optimization control strategy
proposed can gradually move the control point to the
position where the reactive power is the smallest in
the soft-switching range. Simulation and experimental
results prove that the reactive power optimization
control strategy can effectively reduce the reactive
power of the dual-tank DBSRC, enabling the ZVS
operation of all switches at different voltage gain and
power levels, so that the efficiency of the converter
is improved.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 499
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Review on Various Multilevel Inverter Topologies for


Solar Photovoltaic and Wind Systems
C.Dinakaran1, Dr.T.Padmavathi2
1
Research Scholar, Department of Electrical and Electronics Engineering,
2
Assistant Professor, Department of Electrical, Electronics and Communication Engineering
1,2
GITAM Institute of Technology, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, India
Email: dina4karan@gmail.com1, ptadi@gitam.edu2

Abstract- The combination of multilevel inverter sources [3]. The graphical representation of
with renewable energy source power generation photovoltaic and wind power conversion is shown in
is paid more attention among the researchers, figure 1 and figure 2 respectively.
because multilevel inverters are widely accepted
power converters in for high-power applications. The two-level inverters are mostly used in utility
The conventional multilevel inverters are highly applications and small-scale industries. For high-power
implemented in industries, and the success of this applications, two-level inverters are not suitable, and it
has motivated to create newer topologies with the produces high voltage stress, high temperature, and low
reduced overall power electronics components. In efficiency. Multilevel inverters are the best choice for
this paper, recent multilevel inverter topologies high-power and large-scale grid-connected renewable
with reduced number of switches are taken into energy system, and it produces low total harmonics
account and to find a suitable topology for
distortion and low maintenance [4]. From DC voltage
photovoltaic (PV) and wind energy applications.
source to various levels of inverter and corresponding
Finally, this paper gives a pathway for the upcoming
researchers to consider the design issues and output voltage waveforms are shown in figure 3 (a)-
challenges in the development of new multilevel (d). The first multilevel inverter is a patent on 1974 by
inverter topologies. a baker (author of the multilevel inverter), and the
cascaded connection of H-bridge produce synthesized
Keywords-Multilevel inverter, Photovoltaic
system, Wind energy power conversion, Reduced
staircase waveform as explained [5]. The series
switches, Pulse width modulation, Control connection of isolated dc sources can be added together
techniques, Reduced switch topology, Grid to generate stepped waveform that is detailed in, and
integration, Renewable energy the same author has introduced a new configuration
that uses a single dc source with splitting capacitors
I. INTRODUCTION and clamped diode to generate a stepped waveform
The present fossil fuels power generation is not able which is presented in the patent on 1981 [6]. Followed
to meet power demand due to limitations of high fuel by this, Nabae has introduced a new multilevel inverter
cost, environmental pollutions (CO2 emission), lower which replaced clamped diode with clamped capacitor
generation efficiency, and unavailability of fuels. In order [7].
to resolve these problems, renewable energy source-
based power generations are encouraged by developing
and developed countries [1]. The photovoltaic (PV)
and wind energy power conversion systems are
considered as alternative energy sources due to their
natural ambiguity in climate variations [2]. The several
power converter topologies, control techniques, and Fig. 1. Representation of various power conversion stages for
maximum power tracking methods are introduced to photovoltaic system
harvest the highly efficient power from renewable energy
500 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

5-level inverter topology is proposed in, and this


topology has numerous advantages like simple
structure, single input source, elimination of clamping
diodes and capacitor banks. Independent dc link
voltage control, maximum power point tracking with
Fig. 2. Representation of various power conversion stages for
wind energy each panels in different conditions, and high-power
quality output voltage to the grid are proposed with
quasi Z source-CHB in and a new modulation technique
is proposed to mitigate the voltage harmonics in CHB
multilevel inverter [12]. Feasible multistring topology
for PV system is proposed. CHB topology is widely
used in PV applications due to independent voltage
control, MPPT tracking in each string, increasing
efficiency, increasing reliability, and reducing leakage
current [13]. Other than these, by adding magnetic
coupling in each h-bridge module to mitigate the input
current harmonics including interharmonics, PV-
Fig. 3. (a) Input DC voltage (b) Two-level inverter, (c) Three- connected CHB topology is facing over modulation
level inverter and (d) mlevel inverter of single-phase leg with
corresponding output voltage waveform
problem due to non-uniform variation of irradiations
[14]. In order to eliminate this problem, a new
These inverters are widely used in low-power to decoupled active and reactive power control strategy
high-power applications, which include automotive is implemented for large-scale PV systems [15].
application, traction application, variable speed drive,
renewable energy conversion, and utility interfacing Especially Solar and wind energy are the two major
which include HVDC, FACTS, active filter [8]. renewable sources gaining more and more interest
Multilevel inverters are more suitable for large drive among power electronics as well as power system
applications because it provides volt-ampere-rated and/ research community instead of their high dependence
or high-voltage motor drives with higher efficiency on varying environmental conditions [16]. This requires
because these devices can be switched at minimum new power converter technologies for desired
frequency, power factor is close to unity, NPC is used operation, control, and power management, in order
as a rectifier to convert generated ac to dc, no EMI to enhance the power quality and to yield utmost power
problem or common-mode voltage/current problem from RESs [17].
exists, and no charge unbalance problem results when The essential part of renewable energy power
the converters are in either charge mode or drive mode conversion system is an inverter which converts the DC
[9]. Various renewable energy sources are available, power to AC as required by the grid/loads [18]. A
but most of the multilevel inverters are presented for conventional two/three level inverter is mostly used in
PV and wind energy, in this way this paper also focuses small scale industries and utility applications. However,
on PV and wind energy conversion with multilevel the output of these inverters contain more harmonics,
inverter topologies and also on PV and wind energy hence the usage of expensive and bulky low pass
conversion systems [10]. Wind energy power passive filters are desired before feeding the power to
conversion using NPC topology is more suitable for the utility grid [19]. Further, high voltage stress and high
back-back operation. Various PV inverters are available switching loss forbears the application of these inverters
in industry, even though for large-scale power plants, in high power application. Consequently multilevel
the multilevel inverters provide high efficiency and low inverters (MLIs) are evolved as best substitute for
maintenance [11]. Hybrid renewable energy source for medium and high power conversion systems [20]. The

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 501
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

concept of MLI topology was first introduced in the and cost of the inverter are reduced, and also observed
early 1975 followed by different variations of it [21]. that capability of extension to generate more levels in
These MLIs continue to receive more and more the output voltage using fewer power switches are
attention because of their high voltage operation verified with symmetrical and asymmetrical
capability, low switching losses, high-efficiency and low configurations for simulation and experimental results.
electromagnetic interference [22]. MLIs have the ability Ajoya Kumar Pradhan et.al (2019), Investigation
to meet the increasing demand of power rating with on "Design and Simulation of Cascaded and Hybrid
improved power quality through subsequent reduction Multilevel Inverter with reduced number of
in the harmonic distortion [23]. MLIs are capable of semiconductor switches", they main focused on higher
producing a high-quality staircase ac voltage from number of level with reduced switches associated with
different connection of power semiconductor switches gate driver circuit and analyised the number of switches
and single/several dc voltages through low switching in the proposed topology is reduced there by the cost
frequency operation and thus mostly preferred for of the inverter is reduced, switching loss and the
medium and high power conversion systems [24]. The conduction loss also reduced. To get the power quality
input dc sources can be a battery, fuel cell, must be lowered slightly inorder to ensure that the
supercapacitor, renewable energy system, etc. A current drawn from transformer/rectifier sources remain
generic block diagram with possible integration of positive and verified with symmetrical and asymmetrical
different sources with MLI is shown in figure 4 MLIs configuration for simulation and experimental results.
are widely used in various applications such as large
electric drive, renewable energy conversion, traction, Lei Wang et.al (2017), has studied about "Novel
electric vehicle, active power filter, HVDC, and FACTs. Cascaded switched a Diode Multilevel Inverter for
Renewable Energy Integration", the objective of their
research work is Two stage Cascaded switched diode
multilevel inverter is proposed for medium voltage
renewable energy integration to reduce the number of
switches along with its gate drivers. They observed that
the installation space, circuit size, cost of a multilevel
inverter are reduced and control complexity. They
concluded that simulation and experimental results
demonstrate that the control multilevel inverters for
Renewable Energy Integration with improved control
performances.
Kishor Thakre et.al (2019), studied about "A
Fig. 4. Possible Energy Sources with reduced switch MLI
Modified Circuit for Symmetric and Asymmetric
based system Multilevel Inverter with reduced Components Count",
they mainly focused to generate a large number of
II. LITERATURE REVIEW
voltage levels with less number of components to
Seyed Hadi Latifi Majareh et.al (2019), conducted minimize the power loss and improves the efficiency of
Investigation on "Design, Analysis and Implementation the inverter. They proved that large number of voltage
of a generalised Topology for Multilevel Inverters with levels with minimum possible switches and they
reduced Circuit devices", and proposed a new summarized simulation and experimental results are
configuration of Multilevel Inverters by increasing the analyzed to validate the performance of investigated
number of output levels and by decreasing the number topology.
of power switches, power diodes, driver circuits and
DC voltage sources and found that the installation space
502 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Vishal Anand & Varsha Singh (2020), investigated consists of four switches S1-S4, four complimentary
on "Compact Symmetrical and Asymmetrical Multilevel switches S11-S41 and clamping diodes D1-D6. Here the
Inverter with reduced Switches", they concentrated on phase voltage is calculated between points a and n.
design of hybrid multilevel inverter topology and Every switch of the leg is connected to the clamping
identified that increases the power quality of the inverter diodes D1-D6 which decreases voltage rating. It
at reduced THD as well as DC sources can easily generates five voltage levels -Vdc/4 to +Vdc/4 as well
replaced by Renewable Energy Sources with the proper as -Vdc/2, 0, +Vdc/2. Voltage / high power applications.
controller to maintain adequate voltages for each voltage
source. Finally concluded that efficiency is increased
and THD is reduced, Validated by both simulation &
experimental setup.
III. CONVENTIONAL MULTILEVEL
INVERTER TOPOLOGIES

Fig. 6. Single Phase Conventional Diode Clamped MLI

Table 1 below gives the switching states to generate


Fig. 5. Classification of Conventional MLI five level output of DC MLI. For instance, to generate
Conventional MLI topologies are extensively used 0V Upper two switches S3, S4 and lower two switches
in various industrial and grid connected renewable S11, S21 are on. This is one of the popularly used
energy applications. The popularity of these topologies topology in medium
is outstanding to several advantages such as lower Table 1 Switching States of Five Level DC MLI

harmonic distortion, lower switching losses, modular Output


S1 S2 S3 S4 S11 S 21 S 31 S41
structure and ease of control as illustrated in figure 5. Voltage
Vdc/2 1 1 1 1 0 0 0 0
Classical MLI topologies are categorized into three Vdc/4 0 1 1 1 1 0 0 0
types: 0 0 0 1 1 1 1 0 0
-Vdc /4 0 0 0 1 1 1 1 0
a. Diode clamped MLI (DC MLI) -Vdc /2 0 0 0 0 1 1 1 1
b. Flying Capacitor MLI (FC MLI)
c. Cascaded H-Bridge MLI (CHB MLI)
A. Structural Configuration of Diode Clamped
MLI
Diode clamped is also referred to as neutral point
clamped MLI. Figure 6 shows five level neutral point
clamped topology. In a five level it consists of four
capacitors of high value and DC link voltage is divided
equally among the four capacitors. Mid-point is chosen
as reference or neutral point. The single phase five level

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 503
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

B. Structural Configuration of Flying Capacitor


MLI

Fig. 8. Single Phase Conventional CHB MLI

An H- bridge produces three output voltage levels


shown in Table 3. Table 4 gives the output voltage
synthesis of two H-bridges. It is widely used in battery
powered applications, grid integration systems and
Fig. 7. Single Phase Conventional Flying capacitor MLI standalone PV systems.
Table 3 Phase Voltage of Singel H-Bridge
Single phase FC MLI is shown in figure 7. It consists
of four capacitors C1-C4 which has equal magnitude Van S1 S2 S3 S4
and voltage rating and splits the DC bus into four equal 1 1 0 0
0
0 0 1 1
voltages. This topology consists of four switches S1- V 1 0 1 0
S4, four complimentary switches S11-S41 and flying or -V 0 1 0 1
clamping capacitors C5-C10 which is used to clamp the Table 4 Switching States of Five Level CHB MLI
voltage across each switch.
Van Cell - 1 Cell – 2
Table 2 Switching States of Five Level FC MLI 0 0
Output 0 V -V
S1 S2 S3 S4 S11 S21 S 31 S 41
Voltage -V V
Vdc/2 1 1 1 1 0 0 0 0 V 0
V
Vdc/4 1 1 1 0 1 0 0 0 0 V
0 1 1 0 0 1 1 0 0 2V V V
-Vdc /4 1 0 0 0 1 1 1 0 -V 0
-Vdc /2 0 0 0 0 1 1 1 1
-V
0 -V
-2V -V -V
Table 2 gives the switching states of five level FC
MLI. For instance, to generate 0V Upper two switches MLIs are suitable for high-voltage applications
S1, S2 and lower two switches S11, S21 are on. This because of their ability to synthesize output voltage
topology is used in high frequency applications. waveforms with an improved harmonic spectrum and
attain higher voltage with a limited maximum device
C. Structural Configuration of Cascaded H- rating. With the proper arrangement of power switching
Bridge MLI semiconductor devices and voltage sources, a multilevel
Single phase five level cascaded H bridge topology output can be produced. An overview of three
is shown figure 8. It consists of two cells, each having a conventional MLI types, i.e., diode clamped MLI (DC
H-bridge. Each H bridge contains four unidirectional MLI), flying capacitor MLI (FC MLI), and cascaded
switches and a DC source. H-bridge MLI (CHB MLI) are summarized in Table
5.

504 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 5 Classification & features of Conventional MLI The phase output voltage is synthesized by the sum
Diode Flying Cascaded of four inverter outputs, Van=Va1+Va2+Va3+Va4.
Parameters Clamped Capacitor H-Bridge Each inverter level can generate three different voltage
MLI MLI MLI
outputs, +V_dc, 0, and -V_dc, by connecting the dc
Switch
Count in source to the ac output side by different combinations
terms of 2(Ni-1) 2(Ni-1) 2(Ni-1) of the four switches, Sa1,Sa2, Sa3,and Sa4.
Number of
level (Ni) V. PWM TECHNIQUES
Number of
1 1 (Ni-1)/2 Figure 10 shows the Pulse width modulation (PWM)
DC Sources
Number of (Ni- control strategies development concerns the
0 0
diodes 1)*(Ni-2) development of techniques to reduce the total harmonic
Number of Ni*(Ni- distortion (THD). It is generally recognized that
(Ni-1) 0
capacitors 1)/2
Clamping Clamping
increasing the switching frequency of the PWM pattern
Only reduces the lower-frequency harmonics by moving the
Zero level diodes capacitors
semiconductor
generation and and
switches/diode
switching frequency carrier harmonic and associated
switches switches sideband harmonics further away from the fundamental
IV. CASCADED MULTILEVEL INVERTER frequency component. While this increased switching
frequency reduces harmonics, resulting in a lower THD
A cascaded multilevel inverter consists of series by which high quality output voltage waveforms of
single phase H-bridge inverter units. The general desired fundamental R.M.S value and frequency which
function of this multilevel inverter is to synthesize a are as close as possible to sinusoidal wave shape can
desired voltage from several separate dc sources which be obtained.
may be obtained from batteries, fuel cells, or solar cells.
The ac terminal voltages of different level inverters are
connected in series. Unlike the diode-clamp or flying-
capacitors inverter, the cascaded inverter does not
require any voltage-clamping diodes or voltage-
balancing capacitors as shown in figure 9.

Fig. 9. Three Phase- Three leg Cascaded H-bridge Fig. 10. PWM carrier technique (triangular carrier)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 505
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The quality of the output waveform will develop with VI. SIMULATION RESULT
increase in switching frequency. Higher switching The proposed method has been tested in simulation
frequency can be employed for low and medium power (MATLAB/SIMULINK) results are shown Fig. 13.
inverters, whereas, for high power and medium voltage
applications and switching frequency is of the order of
1 kHz.
To compare the performance of phase and level-
shifted modulation schemes, it is assumed that the
average switching frequency of the solid-state devices
is the same for both schemes. One of the most important
problems in controlling a VSI with variable amplitude
and frequency of the output voltage is to obtain an output
waveform as much as possible of sinusoidal shape
employing simple control techniques. Harmonics caused
by non-sinusoidal voltage feeding involve power losses,
electromagnetic interference (EMI), and pulsating Fig. 13 Simulation Circuit for Cascaded H - Bridge Five Level
torques in ac motor drives. Harmonic reduction can Inverter

then be closely related to the performance of an inverter


with any switching strategy, Line and Phase voltages
are shown in figure 11 & 12.

Fig. 14 PWM Signal for Cascaded H - Bridge Five Level


Inverter

Fig. 11. Line Voltages

Fig. 15 Output Voltage for Cascaded H - Bridge Five Level


Inverter

Fig. 16 THD for Cascaded H - Bridge Five Level Inverter


Fig. 12. Phase Voltages

506 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

CONCLUSION IEEE Trans. Power Electron., vol. 32, no. 2, pp. 1070-1087,
Feb. 2017.
In the application of Renewable energy sources [9] S. S. Lee, M. Sidorov, C. S. Lim, N. R. N. Idris, and Y. E. Heng,
Cascaded H-bridge Inverters are the most suitable one. "Hybrid cascaded multilevel inverter (HCMLI) with improved
In photovoltaic power systems or Hybrid power symmetrical 4-level submodule", IEEE Trans. Power Electron.,
vol. 33, no. 2, pp. 932-935, Feb. 2018.
systems having multiple sources by using a cascaded
H-bridge Inverter all the sources are connected to single [10]N. Sandeep and U. R. Yaragatti, "A switched-capacitor-based
multilevel inverter topology with reduced components"' IEEE
Inverter since this topology require different DC sources Trans. Power Electron., vol. 33, no. 7, pp. 5538-5542, Jul. 2018.
for achieving Multilevel output. Since the component [11]M. A. Memon, S. Mekhilef, M. Mubin, and M. Aamir, "Selective
required is less so losses are reduced and cost is also harmonic elimination in inverters using bio-inspired intelligent
reduced thereby the efficiency is increased. Increasing algorithms for renewable energy conversion applications: A
review,'' Renew. Sustain. Energy Rev., vol. 82, pp. 2235-2253,
the levels reduces Total Harmonic distortion so at higher Feb. 2018.
levels the THD is reduced and the power quality is
[12]N. Arun and M. M. Noel, "Crisscross switched multilevel inverter
improved. using cascaded semi-half-bridge cells,'' IET Power Electron., vol.
11, no. 1, pp. 23-32, Jan. 2018.
REFERENCES
[13]A. Kshirsagar, R. S. Kaarthik, K. Gopakumar, L. Umanand, and
[1] Seyed Hadi Latifi Majareh, Farzad Sedaghati, Majid Hosseinpour K. Rajashekara, "Low switch count nine-level inverter topology
and Seyed Reza Mousavi Aghdam, "Design, Analysis and for openend induction motor drives", IEEE Trans. Ind. Electron.,
Implementation of a Generalised Topology for Multilevel vol. 64, no. 2, pp. 1009-1017, Feb. 2017.
Inverters with reduced circuit devices", IET Power Electronics,
Vol. 12, Issue 14, PP. 3724-3731, 2019, DOI: 10.1049/iet- [14]V. N. R., A. R. S, S. Pramanick, K. Gopakumar, and L. G.
pel.2019.0405. Franquelo, "Novel symmetric six-phase induction motor drive
using stacked multilevel inverters with a single DC link and neutral
[2] Ajoy Kumar Pradhan, Sanjeeb Kumar Kar, Mahendra Kumar point voltage balancing,'' IEEE Trans. Ind. Electron., vol. 64, no.
Mohanty and Navneet Behra, "Design and Simulation of 4, pp. 2663-2670, Apr. 2017.
Cascaded and Hybrid Multilevel Inverter with reduced number
of Semiconductor Switches", International Journal of Ambient [15]W. Zhao, Z. Chen, D. Xu, J. Ji, and P. Zhao, ``Unity power
Energy, Taylor & Francis, PP. 1-11, 2019, DOI:10.1080/ factor fault-tolerant control of linear permanent-magnet vernier
01430750.2019.1583127 motor fed by a floating bridge multilevel inverter with switch
fault,'' IEEE Trans. Ind. Electron., vol. 65, no. 11, pp. 9113-
[3] Lei Wang, Q.H.Wu and Wenhu Tang, "Novel Cascaded Switched 9123, Nov. 2018.
- Diode Multilevel Inverter for Renewable Energy Integration",
IEEE Transactions on Energy Conversion, Vol. 32, No. 4, PP. [16]B. Ge, Y. Liu, H. Abu-Rub, and F. Z. Peng, ``State-of-charge
1574-1582, 2017, DOI:10.1109/TEC.2017.2710352 balancing control for a battery-energy-stored quasi-Z-source
cascaded-multilevelinverter-based photovoltaic power system,''
[4] Kishor Thakre, Kanungo Barada Mohanty, Aditi Chatterjee and IEEE Trans. Ind. Electron., vol. 65, no. 3, pp. 2268-2279, Mar.
Vinaya Sagar Kommukuri, "A Modified Circuit for symmetric 2018.
and asymmetric Multilevel Inverter with reduced components
count", International Transactions on Electrical Engineering [17]A. Kumar and V. Verma, ``Performance enhancement of single-
System, Wiley, Vol. 29, Issue 6, PP. 1-17, 2016, DOI: 10.1002/ phase grid-connected PV system under partial shading using
2050-7038.12011 cascaded multilevel converter,'' IEEE Trans. Ind. Appl., vol. 54,
no. 3, pp. 2665-2676, May/Jun. 2018.
[5] Vishal Anand and Varsha Singh, "Compact Symmetrical and
asymmetrical Multilevel Inverter with reduced switches", [18]M. Hammami and G. Grandi, ``A single-phase multilevel PV
International Transactions on Electrical Engineering System, generation system with an improved ripple correlation control
Wiley, Vol. 30, Issue 8, PP. 1-20, DOI: 10.1002/2050-7038.12458. MPPT algorithm,'' Energies, vol. 10, no. 12, pp. 20-37, Dec.
2017.
[6] U. Akram, M. Khalid, and S. Shafiq, "An innovative hybrid wind
solar and battery-supercapacitor microgrid system Development [19]J. S. M. Ali and V. Krishnasamy, ``Compact switched capacitor
and optimization", IEEE Access, vol. 5, pp. 25897-25912, 2017. multilevel inverter (CSCMLI) with self-voltage balancing and
boosting ability,'' IEEE Trans. Power Electron., vol. 34, no. 5,
[7] S. S. Lee, "A single-phase single-source 7-level inverter with pp. 4009-4013,May 2019.
triple voltage boosting gain", IEEE Access, vol. 6, pp. 30005-
30011, 2018. [20]S. Rahman, M. Meraj, A. Iqbal, and L. Ben-Brahim, ``Novel
voltage balancing algorithm for single-phase cascaded multilevel
[8] R. R. Karasani, V. B. Borghate, P. M. Meshram, H. M. inverter for post-module failure operation in solar photovoltaic
Suryawanshi, and S. Sabyasachi, "A three-phase hybrid cascaded applications,'' IET Renew. Power Gener., vol. 13, no. 3, pp. 427-
modular multilevel inverter for renewable energy environment", 437, Feb. 2019.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 507
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[21]M. S. Irfan, A. Ahmed, and J.-H. Park, ``Power-decoupling of a [23]K. Yang, X. Lan, Q. Zhang, and X. Tang, ``Unified selective
multiport isolated converter for an electrolytic-capacitorless harmonic elimination for cascaded H-bridge asymmetric multilevel
multilevel inverter,'' IEEE Trans. Power Electron., vol. 33, no. 8, inverter,'' IEEE J. Emerg. Sel. Topics Power Electron., vol. 6, no.
pp. 6656-6671, Aug. 2018. 4, pp. 2138-2146, Dec. 2018.
[22]Z. Yang, J. Sun, X. Zha, and Y. Tang, ``Power decoupling control [24]M. Sharifzadeh, H. Vahedi, R. Portillo, L. G. Franquelo, and K.
for capacitance reduction in cascaded-H-bridge-converter-based Al-Haddad, ``Selective harmonic mitigation based self-elimination
regenerative motor drive systems,'' IEEE Trans. Power Electron., of triplen harmonics for single-phase five-level inverters,'' IEEE
vol. 34, no. 1, pp. 538-549, Jan. 2019. Trans. Power Electron., vol. 34, no. 1, pp. 86_96, Jan. 2019.

508 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Improvement of Power Quality in Grid Connected


Distribution Systems using AI based Controller
Naga Hymavathi Ulli
Assistant Professor, EEE Department, SCET, Narsapur

Abstract: One of the most serious problems with and dynamic states, the distribution system has poor
electrical distribution networks is the deterioration power quality. These issues are typically caused by the
of power quality. The employment of non-linear existence of reactive and imbalanced loads. A VSC
devices such as switching devices and power STATCOM provides a reliable and efficient technique
electronics converters is one of the primary causes
of providing shunt compensation in a line, which can
behind this. Non-linearity has a negative impact on
the utility of the power supply, system efficiency,
assist improve power quality. Various control
power factor decrease, and so on. Because the approaches, such as the synchronous reference frame
reactive power increases as the power factor theory, are available to determine the reference currents
decreases and it makes no contribution to energy for the DSTATCOM (SRFT). The ANN and ANFIS-
transmission, it must be compensated. The control based approaches may detect and model nonlinear
techniques for a Three-Phase Distribution Static systems, resulting in a better source current waveform
Compensator (DSTATCOM) based on Artificial and, as a result, higher power quality.
Neural Network (ANN) and Adaptive Neuro Fuzzy
Inference System (ANFIS) are proposed in this The SRFT approach is compared to ANN and
study. This is used to compensate for reactive ANFIS-based algorithms in this research. The ANN-
power as well as current-related power quality based control approach is efficient and feasible because
concerns such as harmonics. The SIMULINK it can recognize and simulate such nonlinear systems.
toolbox is used to simulate these control However, the ANFIS-based technique outperforms the
approaches in the MATLAB environment. The ANN-based technique in terms of producing a superior
simulation results adequately show the performance source current waveform. When compared to the other
of these approaches, and it is discovered that mentioned techniques, the step size calculated by
ANFIS achieves source current waveforms with ANFIS learns quicker and has a lower static error in
less distortion than ANN.
the estimation of the basic weights. The comparison
Keywords: Power Quality Compensation findings of ANN and ANFIS are evaluated, and it is
MATLAB DSTATCOM Synchronous Reference discovered that ANFIS performs better than ANN.
Frame Theory; Adaptive Neuro Fuzzy Inference
System; Artificial Neural Network; II. SYSTEM CONFIGURATION
I. INTRODUCTION The circuit diagram in Fig. 1 is that of the
DSTATCOM system. A three-phase three-wire
Power quality is still one of the most important distribution system has a reactive load linked to it. A
features of any power distribution system. It must adhere Voltage Source Controller connects the DSTATCOM
to IEEE 1547 standards throughout the several levels to a DC bus (VSC). Three insulated-gate bipolar
of the power system, which include generation, transistors (IGBTs) with diodes coupled anti parallel
transmission, distribution, and use. Power quality issues are used to produce the VSC. The alternating current
have significantly risen as a result of the widespread and direct current sides are linked to a point of common
usage of autonomous and power electronic-based coupling and loads. For supplying pulses, a Pulse Width
equipment in an electric distribution system. Because Modulating controller was employed.
of insufficient reactive power throughout both the steady

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 509
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. CONTROL ALGORITHM Load Current Direct


Phase A Phase B Phase C Current
The DSTATCOM provides compensating reactive -5.03E-08 -1.07E-02 1.07E-02 0.00E+00
power for power quality correction based on the 6.46E-04 -2.17E+00 2.17E+00 1.12E-30
demands of the load. The formalized paraphrase 7.57E+00 -7.57E+00 -3.29E-04 1.24E-24
DSTATCOM is managed by a number of algorithms. -1.32E+01 7.52E+00 5.69E+00 4.87E-19
3.90E+00 -1.36E+01 9.74E+00 1.98E-15
In this case, we employ a traditional technique to create 1.34E+01 -1.34E+01 7.94E-15
-2.55E-04
the data and two Artificial Intelligence-based control 1.37E+01 1.32E-03 -1.37E+01 1.02E-13
algorithms to improve the outcomes.. -4.31E+00 1.36E+01 -9.33E+00 1.72E-13
5.28E-01 -1.37E+01 1.32E+01 4.65E-13
-1.36E+01 -5.13E-04 1.36E+01 1.29E-09

= (2)

The resultant current is then compared to the source


current using a hysteresis current controller to generate
Fig. 1. Fundamental Line diagram of the DSTATCOM system
Pulse Width Modulation (PWM) signals. These signals
are subsequently sent to the main circuit.
A. SRFT Algorithm
B. Artificial Neural Network (ANN) trained on
The SRFT algorithm is sometimes referred to as the data obtained by SRF Method
d-q based algorithm. This technique is used to generate
pulses for the DSTATCOM's operation. The ground Artificial Neural Network is contained of three
terminal provides these pulses. Clarke Transformation layers. Firstly, the input layer followed by the hidden
is used to convert a-b-c to 0 reference frame, and Park layer and finally the output layer as shown in Fig. 2.
Transformation is used to convert 0 to d-q frame.

= (1)

After obtaining the desired currents in the d-q frame,


the quadrature current is discontinued, and direct current
Fig.2. Neural network structure
is added to the error signal produced by the
Proportional Integral (PI) control. This error signal is The Network is trained using the Feed Forward
produced by combining a 200V reference with a DC Back Propagation Leven berg Marquardt algorithm
link voltage. The d-q reference frame was then with three phase load current as the input for the ANN
converted back to the a-b-c frame by setting the block shown in Fig. 3.
quadrature current to zero. This technique is known as
Reverse Park Transformation.

Fig.3. Simulation model of ANN controller

We utilised the tangent sigmoid activation function


to generate hidden layer output. There are 10 neurons
in this buried layer. The output layer neurons are taught
to provide output using a linear activation function.

510 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

200001 data points were acquired from the SRF benefit over ANN is that ANFIS has a substantially
control algorithm, with 70% of this data being utilised superior learning ability.
for training, 15% for testing, and 15% for validation. A fuzzy inference system is made up of four parts: a
The performance of the network is analyzed by its fuzzification interface, a rule base, an inference
mean square error (MSE). Its equation is as follows: mechanism, and a defuzzification interface. It is further
subdivided into five levels, as seen in Fig. 5. Layer 1
(3) represents the load currents and delivers the input to
where xfi represents the calculated output and xoi Layer 2, which executes the fuzzification process by
denotes the desired output and N signifies the number making sharp numbers fuzzy. Layer 3 is the layer that
of training samples compares output to input. Layer 4 defines the
normalization layer, which is used to calculate the
The best validation performance Mean Square Error normalization firing strength for a given rule. Layer 5
(MSE) obtained is 5.98251e-8. The data samples used defines the defuzzification layer, which is responsible
for the process of training is shown in Table I. for turning fuzzy data to crisp ones and providing the
TABLE I. DATA USED TO TRAIN ANN necessary output direct current. As a result, accuracy
improves. The ANFIS structure was trained using
epochs of 10 and triangular membership functions.
There are 78 nodes with 27 linear and 27 non-linear
characteristics. There are a total of 200001 training data
pairs. For the training, 27 fuzzy rules were employed.
The MSE achieved during training is 0.000041.

Fig.4. Error histogram of ANN

The importance of the proposed algorithm is that it


needs less time for training the data that has been
obtained from the SRFT algorithm, although more
memory is required. Training stops when generalization
does not improve further, as shown by an increase in
the MSE of the validation samples.
C. Adaptive Neuro Fuzzy Inference System
(ANFIS) trained on data obtained by SRF
Method
The Adaptive Neuro Fuzzy Inference System (a)
(ANFIS) is essentially a family of artificial neural
networks that are functionally comparable to fuzzy
inference systems that combine the non-linear and
adaptive, non-time invariant problem-solving
characteristics of artificial neural networks with the
crucial principles of proximal reason and information
analysis as provided by fuzzy set theory. Their overall (b)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 511
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

simulate this DSTATCOM model. Figure 8 (a) depicts


the control circuit design for the approaches used (b).
The following methods are implemented using the
MATLAB SIMULINK block set. The simulation is run
in discrete mode with an ode23s solver and a maximum
step size of 5e-06.
(c)
Fig.6. Optimized membership function for input variables (a) IV. RESULT AND DISCUSSION
input1, (b) input2, and (c) input3
The behaviour of the DSTATCOM in upgrading the
power quality of the aforesaid distribution system utilising
ANN and ANFIS control algorithms may be noticed
by observing the waveforms of the various parameters
after compensation.
A. Results obtained using ANN based controller
Fig.7. Training error for 10 epochs
Figure 9 depicts the simulation results when the
DSTATCOM is controlled by the ANN control
algorithm and is coupled to the common coupling point.
The source current is about a sine wave in this case.
Furthermore, at the point, the source current and
voltage are in phase with each other. As a result, the
source current maintains a power factor of one. The
source current has a total harmonic distortion (THD)
of 1.65 percent.
(a)
B. Results obtained using ANFIS based
controller
Figure 10 depicts the outcomes of regulating the
DSTATCOM using an ANFIS-based method. The
source current and voltage at the common coupling point
are also in phase here. As a result, the unit power factor
is obtained. The total harmonic distortion of the source
(b)
current observed is 1.51%, which is less than what is
Fig. 8. Control circuit diagram of (a) ANN algorithm and (b)
ANFIS algorithm produced using ANN.
III. MATLAB SETUP OF DSTATCOM
ARRANGMENT
The MATLAB Simulink model includes a
DSTATCOM system that is congruent with the system
plan shown in Fig.1 and includes the source, load,
DSTATCOM, and control blocks. The first section of
the circuit is essentially a distribution system circuit with
inductance and resistance as well as a diode that makes
the entire system a nonlinear load. The previously stated
SRF, ANN, and ANFIS-based theories are used to

512 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

THD is determined using the amplitudes of the


harmonics; hence Fourier analysis is a useful tool for
determining THD. The power GUI block's FFT
Analysis is used to determine THD for source current
and source voltage. When compared to the ANN
control method, the ANFIS control method produces
superior waveforms with fewer THD. The THD graph
for ANFIS exhibits higher distortion than the one
generated using ANFIS.

Fig 9. Waveforms obtained using ANN control algorithm

C. Comparison between ANN and ANFIS


control algorithms
Total Harmonic Distortion (THD) is a metric that is
used to compare the results of the two control
techniques. THD is defined as the equivalent root mean
square (RMS) voltage of all harmonic frequencies
divided by the fundamental frequency's root mean
square voltage.

THD =
Fig.10. Waveforms obtained using ANFIS control algorithm
Vn_rms is the RMS voltage of the nth harmonic.
The outcomes of the traditional approach, SRFT
Vfund_rms is the RMS voltage of the fundamental control algorithm, and the artificial intelligence-based
frequency control algorithms, ANN and ANIFIS, were compared.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 513
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 11. THD Using ANN control algorithm

Fig.13. Comparison analysis of SRFT, ANN and ANFIS control


algorithm on the basis of Settling Time, Peak Overshoot and
Rise Time
TABLE III. SIMULATION PARAMETERS

Shunt Capacitor Capacitance 1500e-06 F,


and Initial Voltage 156 V
Sampling Time 5e-06 s
Fig.12. THD Using ANFIS control algorithm PI Controller (Proportional,
0.4, 50
TABLE II. COMPARISON RESULTS OF THD OBTAINED IN Integral)
THE DISTRIBUTION SYSTEM Source Inductance 2e-06 H
DSTATCOM Rise Peak Settling THD Convergence
Load Inductance 0.003 H
Control Time Overshoot Time Rate Shunt Inductance 0.002 H
Algorithm Source RMS Voltage 110 V
SRFT 0.001 4.55 0.0142 1.75% High
ANN 0.0013 4.42 0.0139 1.63% Low
ANFIS 0.0014 4.02 0.0135 1.51% Low V. CONCLUSION
To enhance power quality adjustment, we applied
Artificial Neural Network (ANN) and Adaptive Neuro
Fuzzy Inference System (ANFIS) control approaches
in this article. DSTATCOM has been successfully
operated using SRF theory, ANN, and ANFIS-based
approaches. When compared to the ANN approach,
the ANFIS control methodology significantly enhanced
DSTATCOM performance. The ANFIS-based
methodology employs both Fuzzy Logic and the ANN
algorithm, resulting in improved accuracy and decreased
THD in source current under varied load situations. The
usefulness of the stated techniques is demonstrated
through MATLAB simulation and test results.
As a result, ANFIS has shown to be a more efficient
and effective approach for controlling the DSTATCOM
in order to enhance power quality. A significant reduction
in THD can be detected as ANFIS decreases the THD
computed using ANN as previously described, hence
reducing the influence of harmonics. This is how
enhanced performances and power quality are
produced.
514 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFRENCES [5] Bhim Singh and Sabha Raj Arya, "Back-Propagation Control
Algorithm for Power Quality Improvement using DSTATCOM,"
[1] Bhim Singh and Jitendra Solanki, "A Comparison of Control IEEE Transactions on Industrial Electronics, vol. 61 ,No. 3 , pp.
Algorithms for DSTATCOM," IEEE TRANSACTIONS ON 1204 - 1212, March 2014.
INDUSTRIAL ELECTRONICS, VOL. 56, NO. 7, pp. 2738 -
2745, JULY 2009. [6] B. Singh, A. Chandra and K. Al-Haddad, Power Quality: Problems
and Mitigation Techniques, John Wiley and Sons, U.K., 2015.
[2] Alka Singh and Bhim Singh, "Power Quality Issues related to
Distributed Energy Source Integration to Utility Grids,"Annual [7] Ankita Arora and Prerna Gaur,"Comparison of ANN and ANFIS
IEEE India Conference (INDICON), December 2010. based MPPT Controller for grid connected PV systems," Annual
IEEE India Conference (INDICON), December 2015.
[3] R. Deepak Singh, T. Praveen Kumar, Dr.K.Sumanth," Simulation
of SRF Based DSTATCOM With Grid Connected PV Generation [8] Manoj Badoni, Alka Singh and Bhim Singh, "Adaptive Neuro
System Using Fuzzy Logic Controller For Reactive Power Fuzzy Inference System Least Mean Square Based Control
Management," International Journal of Advanced Research in Algorithm for DSTATCOM," IEEE Transactions on Industrial
Electrical, Electronics and Instrumentation Engineering, Vol 5, Informatics, vol. 12, no. 2, pp. 483 - 492, April 2016.
NO.7, pp 6493-6501,July 2016. [9] Yang Xiao-ping, Zhong Yan-ru and Wang Yan," A Novel Control
[4] H. Prasad and T. D. Sudhakar, "Power Quality Improvement by Method for DSTATCOM Using Artificial Neural Network,"
Mitigation of Current Harmonics using D - STATCOM," Third CES/IEEE 5th International Power Electronics and Motion
International Conference on Science Technology Engineering & Control Conference, August 2006.
Management (ICONSTEM), March 2017.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 515
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Analysis and Modification of A Smart Light and


Movement Regulator
Benjamin. O. Ezurike1, Stephen. A. Ajah2, Uchenna Nwokenkwo3, Udora. N. Nwawelu4, Philip Eze5
1,2,3,5
Department of Mechanical/ Mechatronic Engineering, Alex Ekwueme Federal University, Ndufu Alike,
Ebonyi State, Nigeria
4
Department of Electronic Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria
Corresponding author: ben4oke2000@yahoo.com1

Abstract: - The analysis and modification of a turning the room light ON. The people in the place are
smart light and movement regulator is presented. counted using sensors and immediately displayed on 7
The main purpose of the study was to create a segment display at the entrance door. The continuous
controller-based system that would count the
requirement of automatic home appliances in today's
amount of guests as well as turning the room light
world is very important because it helps to create safety
ON each time a visitor comes in. This system
calculates how many persons going into a room like consciousness and awareness. As a result, the need
offices and classrooms per time. This function is developing a device that would ensure that whoever
implemented using PIR and LDR. Seven-segment comes in and goes out of a place is monitored,
display unit is placed outside the room to show all necessitated this research. This also helps to ensure that
the persons that entered the place. This visitor the room is not heavily congested per time. If the counter
counter indicates an additional person whenever is entered by someone, the lights in that particular room
someone enters the room and at the same time will be switched ON. The lights would automatically
turns the lights in the room ON. And in a reverse go OFF whenever the room is empty. These tasks are
way, visitors counter will decrease whenever done by the program coded in the microcontroller 8051
someone exits the room using LDR sensor. and shown on the 7 segments show unit. The sensors
Whenever there is nobody inside, the relay
send signals to the microcontroller and these signals
interface which is smart, turns off the light.
are controlled by the software which is stored in ROM.
Keywords: Arduino, sensor, visitor counter, Bio- Microcontroller 8051 simultaneously scanning the
directional, Microprocessor. Passive Infrared Ray receivers, anytime there's a
I. INTRODUCTION movement across the passive infrared ray collector, then
the Passive Infrared will send a signal to the receiver
The necessity to have a system which will and be obstructed, this obstacle is sensed by the
spontaneously control the lighting arrangement of an Microcontroller. [1] The operation sequence is
area and capable of checking the amount persons in a controlled by a program which is a set of instructions
room on its own is has over stayed. Fire outbreaks that coded in the microcontroller so that the system can read
occur in various homes originate when the occupants and interpret them. The light-dependent resistor (LDR)
are either sleeping or not around the house. The sensor does the work of reducing the amount of persons
designed system can check every person present in such allowed to enter per time. Also, whenever a visitor
places like; offices, conference hall, sports venue, etc. passed through the door (where the LDR is installed)
The whole circuit has been designed to be user-friendly the number of visitors is restricted according to the
with its operation and the working principle self- number of people that left the house or room. The
explanatory. This project would be useful to both obstruction is sense and communicated to the
technology developers and the general public at large. microcontroller through the LDR transmitter. [2] The
The work which was aimed at using a controller-based microcontroller will then signal to the relay to switch
algorithm that will count the figures coming in as well as OFF the lights whenever there are no persons present.

516 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The Programmed chamber light controller with guest


counter, not only put ON and OFF the lighting system,
but can a turn on the fan automatically whenever there
is someone sitting inside the room. [3] This invention is
to save energy and is readily available and eco-friendly.
Whenever someone comes inside the chamber the
counter automatically increases by one [4] thereby
prompting the light to come ON and vice-versa when
the person or anyone in the place leaves. Consequently,
whenever there is no one available in the room, the
illuminating gadget carefully goes off. These are all
Fig. 1: System Block Diagram
shown on the Liquid Crystal Display (LCD) [5]. The
modification to the system was the application of A. Principle of operation
ultrasonic sensors which detects objects at long distance The PIR and LDR antennas are positioned at both
as compared to the conventional method that makes the entry and exit points. As such, it is configured in a
use of an IR sensor. This new design is also innovative manner which ensures one is fixed at the back of the
as it allows the user to operate the machine with the other. This is to ensure the sensors are able to capture
use of (RF) technology instead of having to be present the person at the uninterruptedly. Moreover, the
at a particular location to operate the system [6] This antennas must not be found at the same time-the reason
machine can be used successfully in areas which makes the sensors should be restricted only to the entrance
sure that everyone is checked and monitored.[7] This and exit area. As a result of the time delay algorithm
automated global Machinery is exceptionally best-in- which is minute, the 7-segment display keeps refreshing
class and we lean toward things to be done to avoid time lag at any point in time.
consequently with no human interference and likewise
assists with decreasing human assistance. This has also Mathematical model
reduced time and resources been expended to know From Ohms law;
the number of persons entry a place which was been
V=IR (1)
done manually before now. [8]
Hence,
II. METHODOLOGY
R=V/I (2)
The following materials are used to design the circuit;
Where; R is resistance, V is voltage, I is current
1. LM358 IC
For a number of given resistors, the equivalent of
2. IR Transmitter with receiver Pair the resistors is given as;
3. Resistors
4. Capacitors
5. Light Emitting Diode
The mathematical expression of capacitance is
C=QV (5)
Where C is the capacitance, Q is the charge, and V
is the Voltage
The output voltage to the system can be calculated
based on Faraday's law of induction below:

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 517
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. RESULTS AND DISCUSSION


A. Experimental Results
Where Vs is the secondary voltage, is the rate of
change of magnetic flux, Ns is the number of loop in the The research work was experimented and tested
secondary coil. with a PIR and LDR sensing targets model. The
efficiency of the sensors is calculated using equation
(11), i.e

Where Vp is the primary voltage, Np is the number PIR sensing efficiency (E) =
of loop in primary coil. Where E is the sensing efficiency
Analysis and Design of the Power Supply Unit MD = sensor measured detection, and ED = sensor
To calculate the value of the filter capacitor, we expected detection.
apply the equation: Sensing error = measured detection - expected
detection
LDR Sensing distance covered is calculated using
Fr = Frequency of ripples = 100Hz (50Hz + 50Hz) equation (12) =
RL = Minimum Load resistance for the output B. For Sensor Height
The expected detection is 110cm
To achieve the desire accuracy, error is calculated
The design display interface is a seven segment
using equation (a)
display (SSD) the calculation is obtained as follows:
Table 1: Sensor Height
For SSD, Rs= R1 to R4
Measured Expected Error in
detection in (cm) detection in (cm) (cm)
250 110 140
200 110 90
150 110 40
IS = IF 100 110 -10
50 110 -60
Where Vcc (voltage common collector) is the higher
voltage with respect to the ground; VF (forward voltage)
voltage required to activate the LED and produce an
output; VS (supply voltage), IS (supply current), IF
(forward current).

Where E is the sensing efficiency, MD is the sensor


measured detection, and ED is the sensor expected
detection.
Sensing error = measured detection - expected
detection Fig. 2: System's PIR Sensing Chart.

The target height at which the sensor is installed is


given as 200cm
518 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

From equation (a)

From 4.1 the sensor was tested at different height


to obtain the desire height for installation. In order to
minimize error in sensing, 200cm measured height was
used and 71.8% efficiency was achieved at the
increment and decrement section. The PIR sensor and
Fig. 4. LDR Sensing Distance
LDR sensor were installed at the same height in the
opposite side of the single door. The chosen height helps The distance at which the two sensors detect the
the sensor to detect both a tall or short visitor entering presence of human is analyzed in figure 4.3. From this
the room. graph, the maximum distance at which the sensor
detects visitors entering or leaving the room is 3m. Any
visitor within this range is sensed by PIR sensor or LDR
sensor. Anybody that passes the above range cannot
be detected by the sensors. This is to avoid counting
people that are passing by and to prevent counting
people within the room when they are walking around
the room. The LDR sensor varies with force that comes
with the light that consequently hits it, further enabling it
as a light sensing circuit. Relay controls the switching
process with the help of information from the
Analysis of already existing system's ultrasonic sensor microcontroller. And PIR sensor works based on
chart. motion or movement of the visitor.
Ultrasonic sensing Efficiency = 63.6% IV. CONCLUSION AND
From the chart in figure 4.2 the already existing RECOMMENDATION
system sensing efficiency is 63.6%. The designer only Automatic room light controller with visitor counter
considered the height of adult people entering the room. can be used in developing economies for smarter homes.
This device has error in counting visitors that are short This not only controls the crowd, ensures that whoever
in height. Since system does not count children it also enters a particular room during an event is accounted
affects adults that are short. The existing system's sensor for. It is recommended that additional rays be added to
was installed at the height of 250cm. When visitors are the design to enable it allow more people pass especially
entering or leaving the room, it only sees people within in a hugely crowded event.
the specified height. The cause of this problem was Table 2: Distance
because the sensing error is higher than the expected
detection height for the count. Time Speed Distance
(second) (m/s) (m)
C. Sensing Distance 2 3.5 2.5
3 4.0 6
The distance at which the sensor captures presence 4 4.5 9
of human is calculated using this formula below: 5 5.0 12.5
6 5.5 16.5

But time = decrementing or incrementing time, and


speed = individual movement speed.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 519
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [8] Y. w. Bai, C. F. J and Y. T. taipei and Ku, "Automatic room light
intensity detection and control using a microprocessor and light
[1] G. Smith, "Introduction to Arduino," 2011. sensors," Automatic room light intel, pp. 34-40, 2013.
[2] C. &. A. C. Subhankar, "Bidirectional Visitor Counter system [9] Dr.S.Deepa, Y.R.Saravanakumar, P.Kirubakaran, K.Vijaykumar
with Automatic Room Light Controller and Arduino as the master and M.Tharun, "Bidirectional Visitor Counter with Automatic
controller.," International Journal of Scientific and Research, pp. Room Light Controller," International Research Journal of
20-25, 2016. Engineering and Technology (IRJET), vol. 08, no. 04, p. 3, 2021.
[3] G. Waradkar, H. Ramina, V. Maitry, T. Ansurkar and A. r. a. P. [10] c. thomas, "Automatic room controller with bidirectional visitor
Das, "automatic room light controller using a bidirectional visitor counter," International journal of current engineering and scientific
counter.," Imper j. Interdisc, vol. 4, no. 2, 2016. research (ijcesr), vol. 6, no. 2, p. 5, 2019.
[4] M. Umar, F. Aamna, Shakoor and A. Siddique, "Automated room [11] P. D. S. P. Rasal, "Implementation of Visiting Counter,"
light controller with visitor counter uising arduino," Advances in International Journal of Emerging Trends in Electrical and
science technology and engineering systems, pp. 10-15, 2016. Electronics (IJETEE - ISSN: 2320-9569, vol. 7, no. 2, p. 6, 2013.
[5] S. e. a. A. Dey, "Design of controllable bidirectional visitor [12] Anon, "solar led street lights using ultrasonic sensor," 2017.
counter," Int. J. Innov. Res. Elct Electro, Instru. Cont. Engg., pp. [Online]. Available: https://www.researchgate.net/publication/
133-136, 2016. 317649190_Solar_Led_Street_Lights_using_Ultrasonic_Sensor.
[6] K. S. N. A. mathur, "bidirectional visitor counter electronics for [Accessed 06 01 2021].
you," 2016. [Online]. Available: http://www.scribd.com/doc/ [13] C. P., "PIR sensor basics and applications," 2011. [Online].
49533576/BiDirectional-VisitorCounter. Available: https://www.elprocus.com/pir-sensor-basics-
[7] P. K. Shah and M. P. Savaliya, " Automatic room light controller applications/. [Accessed 4 3 2021].
with bidirectional visitor counter," Int. J. ICT Res. Develop,
2015.

520 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Electrical Car Using Solar Energy


Dr.G. Balaji1, S.Rathinavel2, M.Risheeba3, K.Nisha4
1
Professor, Paavai Engineering College
2
Assistant Professor, Paavai Engineering College
3,4
Student, Paavai Engineering College

Abstract: In our ecosystem mostly Gasoline Electric Cars instant torque, creating strong and smooth
engine cars are used by the public which have high acceleration. They are also around three times as
cost of refueling that cause emission of greenhouse efficient as cars with An Internal Combustion Engine.
gases. In this way to reduce the automotive
emission which causes the Greenhouse gases, an Electric Cars are significantly quieter than
alternative technology is needed. The most conventional internal combustion engine automobiles.
convenient way is to use renewable energy They do not emit harmful pollutants, giving a large
sources. In this scenario we provide an alternative reduction of local air pollution, and, can give a significant
fuel for vehicles by using renewable energy reduction in total greenhouse gas and other emissions.
resources. Among the various resources available, They also provide for independence from foreign oil,
we design a solar power controlled motor device which in several countries is cause for concern about
for automotive application.
vulnerability to oil price volatility and supply disruption.
In this project, the Electric Car is the way to
alter the energy source. Sunlight is the main source
Electric Vehicles (EVS) like the nissan leaf, chevy
of energy to obtain light energy which is converted volt, and tesla model s are becoming more and more
into electricity. Amount of energy obtained from popular because of their high mpg ratings, their
the source may vary from time-to-time. The vehicle convenient ability to be plugged-in and recharged, and
chosen for the experiment is Marathi Omni. The the frustrating and unpredictably wild increases in the
solar panels are placed on the top of the car. Energy price of a gallon of gasoline. The cost of filling up your
obtained from the solar panel is given to the charge tank is decreased to charging your vehicle's batteries
controller. Charge controller can prevent with electrical energy, and the savings are even more
overcharging and also the over discharging of the dramatic when that energy comes from your own solar
battery. Output of the charge controller is given to power system.
the Valve Regulated Sealed Lead-Acid Battery.
Then the Valve Regulated Sealed Lead-Acid The first practical electric cars were produced in
Battery is given to the Motor through Driver the 1880. Electric cars were popular in the late 19th
circuit which controls speed of the Motor. century and early 20th century, until advances in internal
Battery charging time through charge controller combustion engines, electric starters in particular, and
is four to five hours and the Electric Car travels mass production of cheaper gasoline vehicles led to a
for the distance of about 150Km with the speed of decline in the use of electric drive vehicles. The energy
30 to 40 Km/hr. Thus the proposed system of crises of the 1970 and 1980 brought a short-lived
automotive vehicle helps to achieve zero pollution, interest in electric cars although those cars did not reach
zero noise effect and fuel consumption. the mass marketing stage, as became the case in the
INTRODUCTION 21st century.
A solar car is a solar vehicle used for land transport.
1.1 ELECTRIC CAR Solar cars only run on solar power from the sun. Solar
An Electric Car is an Automobile that is propelled thermal energy which converts solar energy to heat, pv
by one or more Electric Motors, using electrical energy cells directly convert sunlight into electricity.
stored in rechargeable batteries. Electric Motors give
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 521
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

To keep the car running smoothly, the driver must The first solar family car was built in 2013 by
monitor multiple gauges to spot possible problems. Cars students in the netherlands. This vehicle is capable of
without gauges almost always feature wireless telemetry, 550 miles on one charge during sunlight. It weighs 850
which allows the driver's team to monitor the car's pounds and has a 1.5kw solar array. Solar vehicles
energy consumption, solar energy capture and other must be light and efficient. 3,000 pound or even 2,000
parameters and thereby freeing the driver to concentrate pound vehicles are less practical. Stella lux the
on driving. predecessor to stella broke a record with a 932 mile
Solar cars combine technology used in aerospace, single charge range. The dutch are trying to
bicycle, alternative energy and automotive industries. commercialize this technology. During racing stella lux
The design of a solar vehicle is severely limited by the is capable of 700 miles during daylight. At 45mph stella
amount of energy input into the car. Most solar cars lux has infinite range. This is again due to high efficiency
have been built for the purpose of solar car races. Some including a coefficient of drag of 16.
solar cars are designed also for public use list of The average family who never drive more than 200
prototype solar-powered cars miles a day would never need to charge from the mains.
They would only plug in if they wanted to return energy
Solar cars depend on a solar array that uses
to the grid. Solar cars are often fitted with gauges and/
Photovoltaic Cells (PV Cells) to convert sunlight into
or wireless telemetry, to carefully monitor the car's
electricity. Unlike solar thermal energy which converts
energy consumption, solar energy capture and other
solar energy to heat for either household purposes,
parameters. Wireless telemetry is typically preferred as
industrial purposes or to be converted to electricity,
it frees the driver to concentrate on driving, which can
PV Cells directly convert sunlight into electricity. When
be dangerous in such a small, lightweight car. The solar
sunlight strike pv cells, they excite electrons and allow
electric vehicle system was designed and engineered
them to flow, creating an electric current. PV Cells are
as an easy to install (2 to 3 hours) integrated accessory
made of semiconductor materials such as silicon and
system with a custom molded low profile solar module,
alloys of indium, gallium and nitrogen. Crystalline silicon
supplemental battery pack and a proven charge
is the most common material used and has an efficiency
controlling system.
rate of 15-20%.
As an alternative, a battery-powered electric vehicle
The design of a solar car is severely limited by the may use a solar array to recharge; the array may be
amount of energy input into the car. Solar cars are built connected to the general electrical distribution grid.
for solar car races and also for public use list of prototype
solar-powered cars. Even the best solar cells can only A solar vehicle is an electric vehicle powered
collect limited power and energy over the area of a completely or significantly by direct solar energy.
car's surface. This limits solar cars to ultralight Usually, Photovoltaic (PV) cells contained in solar
composite bodies to save weight. Solar cars lack the panels convert the sun's energy directly into electric
safety and convenience features of conventional vehicles energy. The term "solar vehicle" usually implies that solar
energy is used to power all or part of a vehicle's
Chinese solar panel manufacturer hanergy plans to propulsion. Solar power may be also used to provide
build and sell solar cars equipped with lithium-ion power for communications or controls or other auxiliary
batteries to consumers in china. Hanergy says that five functions.
to six hours of sunlight should allow the cars' thin-film
Solar vehicles are not sold as practical day-to-day
solar cells to generate between 8-10kwh of power a
transportation devices at present, but are primarily
day, allowing the car to travel about 80km on solar
demonstration vehicles and engineering exercises, often
power alone. Maximum range is about 350km (217
sponsored by government agencies. However, indirectly
mi.).
solar-charged vehicles are widespread and solar boats
are available commercially.

522 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Recharging can take a long time and in many places to promote the introduction and now adoption in the
there is a patchy recharging infrastructure. For long mass market of new electric vehicles depending on
distance driving, many cars support fast charging that battery size and their all-electric range.
can give around 80% charge in half an hour using public The world's all-time top selling highway-capable
rapid chargers. While battery cost is decreasing fairly electric car is the nissan leaf, released in December
rapidly, it is still relatively high, and because of this, most 2010, with more than 250,000 units sold worldwide
electric cars have a more limited range and a somewhat through december 2016. The tesla model s, released
higher purchase cost than conventional vehicles. Drivers in June 2012, ranks second with global sales of over
can also sometimes suffer from range anxiety- the fear 158,000 units through December 2016. The model s
that the batteries will be depleted before reaching their has been the world's top selling plug-in car for two years
destination. in a row, 2015 and 2016.
The dell-winston school solar car challenge is an The first solar family car was built in 2013
annual solar-powered car race for high school students. researchers at case western reverse university, have
The event attracts teams from around the world, but also developed a better solar car which can recharge
mostly from american high schools. The race was first more quickly, due to better materials used in the solar
held in 1995. Each event is the end product of a two- panels.
year education cycle launched by the winston solar car
team. In japan, kaiton ii from the goko high school was
built for 2013 world solar challenge and owl was built
In odd-numbered years, the race is a road course for the 2015 world solar challenge in the cruiser class
that starts at the dell diamond in round rock, texas the by kogakuin university.
end of the course varies from year to year. In even-
numbered years, the race is a track race around the As of december 2015, there were over 30 models
texas motor speedway. Dell has sponsored the event of highway legal all-electric passenger cars and utility
since 2002. vans available for retail sales, mainly in the north
america, china, japan, and western european countries.
There are other distance races, such as suzuka, Cumulative global sales of highway-capable light-duty
phaethon, wgc (wsr/jisfc/wsbr) and the world solar rally pure electric vehicles passed the one million unit
in taiwan. Suzuka and wgc is a yearly track race in milestone in September 2016. About 61% of the global
japan and phaethon was part of the cultural olympiad stock of 2 million light-duty plug-in electric vehicles by
in greece right before the 2004 olympics. the end of 2016 were pure electric cars and vans.
Venturi eclectic is a ventri automobiles built the Venturiastrolab is a venturiautomobiles is building
flanking not closed three seater eclectic as prototype in the open two seater astrolab since 2006. Range with
2006. Range with solar charging only in 7 kilometers solar charging only in 18 kilometers per day. Range
per day. Range with fully charged accumulator is 50 with fully charged accumulator is 110 kilometers. Top
kilometres. Top speed 50km/hr. Price middle of the speed 120 km/hr.
road was announced but serial production never started.
There is also a small electric car with the name eclectic The world solar challenge features a field of
2.0 from the same company existing. competitors from around the world who race to cross
the australian continent, over a distance of 3,000
Since 2008, a renaissance in electric vehicle kilometres (1,900 mi). Speeds of the vehicles have
manufacturing has occurred due to advances in batteries steadily increased. So, for example, the high speeds of
and energy management, concerns about increasing oil 2005 race participants led to the rules being changed
prices, and the need to reduce greenhouse gas for solar cars starting in the 2007 race and 2014 also.
emissions. Several national and local governments have
established tax credits, subsidies, and other incentives

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 523
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

In italy, p-mob with an eu project led by fiat from 500 metres (1,600 ft) stretch, and is the average of
May 2010 to April 2013 a complete solar car with two runs in opposite directions.
three seats was developed. This small car have four In germany, hochschule bochum is a solar vehicle
wheel drive. Range with solar charging only is 20 built in 2015 to cross the desert of tanami in australia.
kilometers per day. Range with fully charged Range with fully charged accumulator is 50 kilometers.
accumulator is 120 kilometers. The car have a solar roof with 160 wp and in a box
In australia, solar spirit 3 with three seat was built below the roof 1943 wp solar panels for extension
by tafe south australia for the 2011 world solar during driving breaks.
challenge. Sun swift v (eve) from the university of new Power core suncruise with 2 seats was built by
south wales was built for the 2013 and 2015 worls hochschule bochum for 2015 world solar challenge.
solar challenge. Maximum power created on its 3m2 solar roof is 870
The american solar challenge, previously known as wp. Car is equipped with two wheel hub electric engines
the 'north american solar challenge' and 'sunrays usa', and comfort electronics. Top speed is 120km/h. Range
features mostly collegiate teams racing in timed intervals with solar charging only is up to 600 kilometers per
in the united states and canada. This race also changed day. Range with fully charged accumulator is up to 1100
rules for the most recent race due to teams reaching kilometers.
the regulated speed limits. The most recent american The four seater stella lux was built as successor of
solar challenge took place on July 21-28, 2014 from stella for the 2015 world solar challenge by eindhoven
austin, texas to minneapolis, minnesota. university. With a top speed of 125 km/h and an
The south african solar challenge is an epic, bi-annual, european range of 1000 kilometers it is substantial
two-week race of solar-powered cars through the length achievement with respect to common electric vehicles.
and breadth of south africa. Teams will have to build
their own cars, design their own engineering systems 1.2 OBJECTIVE OF PROJECT
and race those same machines through the most • To evaluate the energetic feasibility of an electric car
demanding terrain that solar cars have ever seen. The automatic charging system. At what speed the car
2008 race proved that this event can attract the interest can contribute electricity of power the automatic
of the public, and that it has the necessary international charging the car battery during operation in the
backing from the fia. specification.

Guinness world records recognize a land speed • To evaluate the electricity generation of an electric
car system in comparison to an automatic recharge
record for vehicles powered only by solar panels. This
system.
record is currently held by the sky ace tiga from the
ashiya university. The record of 91.332 km/h (56.75 1.3 ORGANIZATION OF PROJECT
mph) was set on 20 August 2014 at the shimojishima
Chapter 2: Deals with electric car and solar system.
airport, in miyakojima, okinawa, japan. The previous
record was held by the university of new south wales Chapter 3: Deals with charge controller, battery,
with the car sunswift iv. Its 25-kilogram (55 lb) battery driver and differential motor.
was removed so the vehicle was powered only by its Chapter 4: Deals with proposed system.
solar panels.
Chapter 5: Deals with electric car using solar system
The record of 88.8 km/h (55.2 mph) was set on 7 and it's benefits
january 2011 at the naval air base hmas albatross in
nowra,breaking the record previously held by the Chapter 6: Deals with conclusion and future scope
general motors car sunraycer of 78.3 kilometres per
hour (48.7 mph). The record takes place over a flying

524 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2.1 Block Diagram In this project, the electric car is been charged
We decided to do something that would be benefited through renewable energy. Energy obtained from the
to the world environment. The greater importance of solar panel is given to the charge controller. Instead of
the environment in the world lead to an opportunity for internal combustion engine, solar car uses the
students. With the economy trying to get out of the worst combination of solar panel and electric motor powered
depression, there are plenty opportunities for us to help by stored battery system. In our project, we are using
out. This is our opportunity to contribute a greener and a vrsla ( valve regulated sealed lead acid battery). The
more efficient planet. The main aim of our project is to motor used here is the differential motor. The motor
save our environment from pollution. gets supply from batteries and vehicles moves. The
battery is discharging upto 90% and the battery is been
charged through solar and it is used to run the motor
and at the same time battery can be charged from solar.
An extra benefit to building the electric car is that, it
can also show how much it is cheaper it would be to
convert regular car into an electric car rather than
driving in the gasoline engine.
2.2 Valve Regulated Sealed Lead-Acid
(VRSLA) Battery
Vrsla battery stands for valve regulated lead-acid
battery commonly known as sealed lead-acid battery,
Figure 2.1 block diagram of proposed system gel battery or maintenance free battery which is a type
For that, electric car would be the best fit. This of lead-acid rechargeable battery. There are three
electric car has zero pollution, zero noise effected and primary types of vrsla batteries such as sealed vr wet
no fuel consumption. In the recent years, india has cell, agm (absorbed glass mat) and gel. Due to their
increasing encouraged a cleaner environment and less construction the gel and agm types of vrsla can be
dependence on foreign oil. Block diagram of proposed mounted in any orientation and do not require constant
system is show in figure 4.1 maintenance. Maintenance free batteries are used in
The price of fuel has increased significantly over the large portable electrical devices and off-grid systems
past few years and there seems to be no turning back. even though they require regular functional testing. The
In our ecosystem, most gasoline cars are used by the outer view of vrsla battery is shown in the figure 4.2
public which have high cost of refuelling that causes
emission of greenhouse gases. To reduce the automotive
emission, an alternative technology is needed. The
environment has also been more focus throughout the
worlds in past few years and it seems that cleaner
alternative have been steadily on the rise with no end in
sight.
In our project, the electric car is the way to alter the
energy source. In this project we are using solar panel,
charge controller, vrsla battery, driver circuit and
differential motor. Source of energy obtained from light Figure 2.2 valve regulated sealed lead acid battery

energy is converted into electricity.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 525
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2.3 Driver Circuit braces and can be moved by these braces. When the
Driver is an electrical circuit or electronic component same load "w" placed on each rack then braces (shackle)
used to control another circuit, such as a high-power is pulled up the second rack would be lifted at the same
transistor, liquid crystal display (lcd). They are used to distance, this will prevent the pinion gear does not rotate.
regulate current flowing through a circuit. Often used, But if a greater burden placed on the left rack and pinion
for a specialized integrated circuit that controls high- buffer will then be drawn up along the gear rack rotates
power switches in switched-mode power converters. the load gets heavier, which is attributed to differences
in prisoners who are given the pinion gear, so the smaller
An amplifier can also be considered a driver for the burden will be lifted. The raised rack spacing is
loudspeakers, or a constant voltage circuit that keeps proportional to the number of turns pinion gear. in other
an attached component operating within a broad range words that rack gets custody larger still and while
of input voltages. The driver stage of a circuit requires prisoners who received a smaller load will move. This
different characteristics to other circuit stages. For principle is used in the planning of differential gears.
example in a transistor power amplifier, the driver circuit
requires current gain, for the ability to discharge, and CONCLUSION
low output impedance to avoid distortion. 3.1 Conclusion
2.4 Differential Motor The solar cell based electric vehicle has developed
A differential is a gear train with three shafts that has and validated through hardware model. The solar cell
the property that the angular velocity of one shaft is the produces 1000 Watts power which is applied to
average of the angular velocities of the others, or a fixed differential dc motor. The differential dc motor rating of
multiple of that average. 1250w, 2500 Rrpm is controlled by driver circuits. The
driver circuit perform with high ripple rejection which
is controlled by pulse width modulation technique. In
battery simultaneously, both charging and discharging
takes place. When the battery of the vehicle is fully
charged, it can run continuously at an average speed of
30-40 km/h.. The electric vehicle has been satisfactorily
completed the prototype that vehicle can run in normal
surface with an entire power of 660kg. Through this
project, we increase the mileage of the vehicle. Our
Figure 2.4 differential motor
project is eco-friendlily and causes no air pollution.
Table 2.1 specification of differential motor
REFERENCES
S.No Specification Range
1 Power 3hp, 1500w 1. G.G.Acosta,R.J.Delavega,. A.Gachenr.C.Leegstra, R.E.Romero,
2 Rated Voltage 60v S.R.Rossi, G.Santillán, M.A.Spina, C.Verucchi, and "some issues
3 Rated Current 12a on the design of a solar vehicle based on Hybrid Energy System",
4 Rated Speed 2500rpm International Journal of Energy Engineering, Vol 2(1) Pp 15-
21,2012.
5 Rated Torque 112w, 210nm
6 No Load Current 1.6a 2. I.Arsie,M.Marotta, C.Pianese, G.Rizzo and M.Sorrentino,
"Optimal Design of a Hybrid Electric Car with Solar Cells" IEEE
The basic principle of the differential gear unit can Transactions on Vehicular Technology, Vol. 48, No. 6, November
be understood by using equipment that consists of two 1999.
gears pinion and rack. Both rack can be moved in the 3. G.Rizzo*, "Automotive Applications of Solar Energy" IEEE
vertical direction as far as the weight rack and slip Control Systems Magazine, Vol. 27, No. 2, Pp. 60-70,2007.

resistance will be lifted simultaneously. Placed between


the tooth pinion rack and pinion gear connected to the

526 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4. Ms. Bhusaripriyagovind, Ms. Chavandeepikalimchan, Ms. 10. Giannouli M and Yianoulis P, "Study on the Incorporation of
Kadam Pratibhadattatray, Mr.A.B.Vitekar, "A Hybrid Photovoltaic Systems as an Auxiliary Power Source for Hybrid
Piezoelectric-Solar Based Power Generation System", and Electric Vehicles", Journal of Solar Energy 86, Pp 441-451,
International Journal of Advanced Research in Computer and 2012.
Communication Engineering Vol. 4, Issue 3, March 2015.
11. Xiang-Yu Kang snd Zhi-Junguo, "Modeling and Analysis of
5. T.Balamurugan, Dr.S.Manoharan*, "Design of Solar/Electric Vehicle with Wind-Solar Photovoltaic Hybrid Generating
Powered Hybrid Vehicle (Sephv) System With Charge Pattern System", IEEE Transactions on Vehicular Technology, Vol. 48,
Optimization for Energy Cost", International Journal of No. 6, November 1999.
Engineering and Technology (Ijet),Vol.95(4), Pp. 746-765,2007.
12. Gianfranco Rizzo, Ivan Arsie and Marco Sorrenti, "Hybrid Solar
6. S.Lalouni, E.Matagne, D.Rekioua and T.Rekioua, "Fuzzy Logic Vehicles "in Proceeding of the IEEE and Vol. 95, No. 4, April
Control of Standalone Photovoltaic System with Battery Storage", 2007.
Journal of Power System, Volume 193, Issue 2, , Pp 899-907, 5
13. Algeri La Neuve, and Belgiquefuzzy Logic Control of Stand-
September 2009.
Alone Photovoltaic System with Battery Storage Electrical
7. Gianfranco Rizzo, Ivan Arsie and Marco Sorrentino "Solar Energy Engineering, IEEE Trans. On Energy Conversion, Vol. 17, No. 2,
for Cars: Perspectives, Opportunities and Problems"Certified Pp. 285-294, June 2002.
Journal, Volume 3, Issue 1, January 2013.
14. Chandra Shekharmalvi, Manoj Kumar Gaur and Ranjeet Singh, ,
8. Raghumangu, Krishna Prayaga, Bhavanandanadimpally and Sam "A Study and Design Based Simulation of Hybrid Solar Car" Vol:
Nicaise, "Design, Development and Optimization of Highly 50pp. 243-249,1-4 January 1998.
Efficient Solar Cars IV" in Proceeding of the IEEE , Vol. 95, No.
4, April 2007.
9. Amstutz A and Guzzella L, "CAE Tools for Quasi-Static
Modeling and Optimization of Hybrid Poweretrains", IEEE
Transactions on Vehicular Technology, Vol. 48, No. 6, November
1999.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 527
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

High Step-Up Interleaved Boost Converter for


Distributed Generation Using Renewable and
Alternative Power Sources
K. Sai Priyanka1, G. Mallikarjuna2
1,2
EEE Department, Vemu Institute of Technology
Email: Saipriyanka2208@gmail.com1, mallikarjunavemueee@gmail.com2

Abstract:-This project proposes a novel high EXISTING SYSTEM


step-up inter-leaved boost converter suitable for
distributed generation using renewable and BOOST CONVERTER
alternative power sources. The proposed inter-
leaved boost converter not only lengthens the
lifetime of the renewable power source by reducing
the input-current ripple but also achieves high step-
up conversion. In addition, the voltage stress of
the main switches is lowered due to the lossless
passive clamp circuit. Moreover, satisfying
experimental results are obtained and discussed The conventional step-up converters, such as the
in this paper; the measured full-load efficiency is boost converter and fly back converter, obtain high
94.7%, and the highest measured efficiency of the
voltage gain by adopting an extremely high duty cycle
proposed converter is 97.3%.
or high turns ratio of the coupled inductor. To
Key Words- High step-up conversion, understand the Boost converter, assume that the switch
interleaved boost converter, renewable and is turned on and conducts from 0 to T/2. So during that
alternative power sources. time, the current flows in the inductor (Vs - L - SW).The
INTRODUCTION inductor stores the energy during this period. During
this period, the output voltage and current is maintained
For overcoming energy-shortage and environmental by the filter capacitor (i.e., energy is transferred from
contamination issues, renewable and alternative power capacitor to load).
sources that feature cleanliness and sustainability play
an important role in the world, and have begun to be
employed worldwide for environment protection. The
voltage levels of renewable and alternative power
sources, such as photovoltaic cells and fuel cells, are
generally low. Thus, high-step-up dc-dc converters have
been widely utilized in such renewable energy systems
in order to boost their voltage levels and also show a
block diagram of a typical distributed generation using
renewable and alternative power sources.

528 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

OPERATION PROPOSED SYSTEM


When the switch is on, INTRODUCTION
Some existing converters that utilize coupled
inductors to achieve high-voltage conversion ratio,
which recycle the leakage-inductance energy and lower
the voltage stresses, have been proposed. Interleaved
converter with built-in transformer and interleaved
converter with voltage multiplier module or with coupled
inductor are another superior solution to obtain high
step-up voltage gain and lower input current ripple. The
coupled-inductor deals with large dc magnetizing
current, so the volume of core is larger and an air gap is
required to avoid saturation of core; thus, the cost is
higher and the efficiency is lower.
• The diode D1 is reverse biased, and Vin is applied
across inductor, L1. In addition, windings of the built-in transformer can
be designed to extend the step-up gain, and two diodes
• Current builds up in the inductor to a peak value, either and two capacitors in the proposed converter act as
from zero current in a discontinuous mode, or an initial
an active clamp circuit in order to lower voltage stress
value in the continuous mode.
on the main switches; thus, low-voltage-rated
When the switch turns off, semiconductor devices (such as power MOSFETs and
• The voltage across L1 reverses, causing the voltage diodes) can be adopted in the presented converter. The
at the diode to rise above the input voltage. key characteristics of the proposed converter are listed
as follows:
• The diode then conducts the energy stored in the
inductor, 1) Lowering the input-current ripple and reducing the
conduction losses result in an increased lifetime of
• Hence, Vo is always greater than Vin, making this a the power sources
step-up converter.
2) The converter is capable of achieving high step-up
APPLICATIONS: gain easily.
• The boost topology is very popular for capacitive load 3) By recycling the leakage energy, the voltage stresses
applications such as photo-flashers and battery of clamp diodes are alleviated and the circuit
chargers. efficiency is improved.
• Furthermore, the continuous input current makes the 4) The voltage stresses on the semiconductor
boost a popular choice as a pre-regulator, placed components are substantially lower than the output
before the main converter. voltage. Compared with the existing converter
introduced in and, the proposed high step-up converter
• The main functions being to regulate the input supply
decreases the power switch count and achieves
and to greatly improve the line power factor.
similarly high circuit efficiency without soft-switching
DISADVANTAGES: function and active clamp circuit.

• High peak current flows through to switch.


• Output voltage is highly sensitive to changes in duty
cycle.
• Efficiency is low.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 529
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

BLOCK DIAGRAM AND ITS


COMPONENTS

Fig Solar power conversion

Wind Turbine:
Fig Block diagram of a typical distributed generation using
renewable and alternative power sources. Converting the kinetic energy in wind into clean,
This block diagram explains about the process of renewable electricity. The majority of wind turbines
using renewable and alternative sources of energy. We consist of three blades mounted to a tower made from
are taken two renewable sources one is solar energy tubular steel. There are less common varieties with two
and other is wind energy. blades, or with concrete or steel lattice towers At 100
feet or more above the ground, the tower allows the
For solar energy the output is dc so that we connect
turbine to take advantage of faster wind speeds found
to interleaved boost converter it setup the dc voltage
at higher altitudes.
into high dc voltage and also reduce the ripple currents.
So we can use to dc loads. On the other hand we have Turbines catch the wind's energy with their propeller-
wind energy we get the output as ac hence we need a like blades, which act much like an airplane wing. When
rectifier to convert ac to dc. After connecting to IBC the wind blows, a pocket of low-pressure air forms on
for set up high voltages and we use inverter for one side of the blade. The low-pressure air pocket then
converting dc to ac for ac loads pulls the blade toward it, causing the rotor to turn. This
is called lift. The force of the lift is much stronger than
COMPONENTS AND ITS EXPLANATION the wind's force against the front side of the blade, which
Solar Power: Solar power that converts sunlight is called drag. The combination of lift and drag causes
(Solar radiation) into electricity by using the rotor to spin like a propeller.
semiconductors. When the sun hits the semiconductor
within the PV cell, electrons are freed and bus bars
collect the running electrons which results in electric
current. Solar panels are made up of many solar cells.
Solar cells are made of silicon, like semiconductors
installed in a metal panel frame with a glass casing. They
are constructed with a positive layer and a negative
layer, which together create an electric field, just like in
a battery.
When photons, or particles of light, hit the thin layer
of silicon on the top of a solar panel, they knock
electrons off the silicon atoms.

A streamlined enclosure called a nacelle houses key


turbine components usually including the gears, rotor
and generator -- are found within a housing called the

530 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

nacelle. Sitting atop the turbine tower, some nacelles secondary winding Ns1, a third winding Ns2, and a
are large enough for a helicopter to land on. Another leakage inductor Lk.
key component is the turbine's controller that keeps The gate-driving signals of the two power switches
the rotor speeds from exceeding 55 mph to avoid are inter- leaved with a 180° phase shift, and the
damage by high winds. An anemometer continuously theoretical waveform of the proposed converter
measures wind speed and transmits the data to the operating in (CCM) Continuous conduction mode is
controller. A brake, also housed in the nacelle, stops shown in Figure and Figure shows the corresponding
the rotor mechanically, electrically or hydraulically in operational modes of the equivalent circuit. There are
emergencies. ten main operational modes in one switching period.
Rectifier: Due to the completely symmetrical inter- leaved
topology, operating modes 1-5 and 6-10 are similar.
A rectifier is an electronic device that converts an
In order to simplify the analysis of the proposed
alternating current into a direct current by using one or
converter's operating principle, only modes 1-5 are
more P-N junction diodes. A diode behaves as a one-
analyzed and discussed.
way valve that allows current to flow in a single
direction. This process is known as rectification. VOLTAGE GAIN
Before the development of silicon semiconductor Voltage gain is defined as the ratio of the output
rectifiers, vacuum tube diodes and copper oxide or voltage to the input voltage in DB (or) The difference
selenium rectifier stacks were used. Early radio between the output signal voltage level in decibels and
receivers, called crystal radios, used a "cat's whisker" the input signal voltage level in decibels; this value is
of fine wire pressing on a crystal of galena (lead equal to 20 times the common logarithm of the ratio of
sulphide) to serve as a point-contact rectifier or "crystal the output voltage to the input voltage. The voltage gain
detector". of the proposed converter is described as, It confirms
Inverter: that the proposed converter has a high step-up voltage
gain without an extremely high duty cycle or large turn's
An inverter can be defined as it is compact and ratios for the transformer. The curves of the voltage
rectangular shaped electrical equipment used to convert gain related to the duty cycle in the proposed converter,
direct current (DC) voltage to alternating current (AC) under different turns ratio levels for the built-in
voltage in common appliances. The applications of DC transformer, are shown in Fig.
involve several small types of equipment like solar
power systems. Direct current is used in many of the All of the voltage stresses on the semiconductor
small electrical equipment such as solar power systems, components can be derived by the known voltages of
power batteries, power-sources, fuel cells because the capacitors. The voltage stresses of the power
these are simply produced direct current. switches S1 and

DESCRIPTION AND ANALYSIS OF THE S2 are clamped, and are derived from:
PROPOSED HIGH STEP-UP INTERLEAVED
BOOST CONVERTER
The proposed high-step-up interleaved boost The voltage stresses on diodes D1, D2, D3, and D4
converter is shown in Fig. 2, where L1 and L2 are the are, respectively, given by
energy storage inductors, S1 and S2 denote the power
switches, C1 and C2 are the clamp capacitors, Co is the
output capacitor, D1 and D2 are the clamp diodes, and
D3 and D4 are the rectified diodes. The built-in
transformer consists of a primary winding Np, a

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 531
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Proposed converter has low voltage stresses on its USES OF MATLAB


semiconductor components, and hence, low voltage MATLAB is widely used as a computational tool in
rated power devices, such as MOSFET's and Schottky science and engineering encompassing the fields of
diodes without reverse recovery time, can be employed physics, chemistry, math and all engineering streams. It
for improving circuit efficiency. is used in a range of applications including;
CONDUCTION LOSSES • Signal Processing and Communications
Conduction losses are those voltage and current • Image and Video Processing
products that occur when a MOSFET or a rectifier is
conducting current. This is duty-cycle dependent. • Control Systems
Switching losses occur when the power switch or • Test and Measurement
rectifier is transitioning between the ON state to the • Computational Finance
OFF state and vice versa.
• Computational Biology
An equivalent circuit for analyzing the conduction
losses of the inductors and semiconductor components EXPERIMENTAL RESULTS
in the proposed converter is shown in Fig., in which A 3.5-kW prototype circuit of the proposed high-
rL1 and rL2 are the copper resistances of the inductors, step-up converter has been built and tested. The
rDS1 and rDS2 are the on resistances of the power electrical specifications for the presented converter are
switches, VD1, VD2, VD3, VD4, VD5 and VD6 are shown in Table 3.7 the measured voltage and current
the forward voltages of the diodes, and rD1, rD2, rD3, waveforms of diodes D1 and D2.
rD4, rD5 and rD6 are the forward resistances of the
diodes Photo of the presented converter
MATLAB SOFTWARE The measured efficiency at a full-load condition (3.5
kW) is 94.65%, which is very close to the calculated
INTRODUCTION one (95.3%) at a duty cycle of 0.62. In addition, the
MATLAB is a programming language developed by measured efficiency at a 1-kW load (approximately
Math Works. It started out as a matrix programming one- third full-load) is about 97.32%, which is close to
language where linear algebra programming was simple. calculated one (98.4%) at a duty cycle of 0.62.
It can be run both under interactive sessions and as a Moreover, the measured efficiency of the light-load (300
batch job. This tutorial gives you aggressively a gentle W) is95.03%.
introduction of MATLAB programming language. It is Below
designed to give students fluency in MATLAB
programming language. Problem-based MATLAB PRACTICAL WAVEFORMS:
examples have been given in simple and easy way to
make your learning fast and effective.
FEATURES OF MATLAB
Following are the basic features of MATLAB
• It is a high-level language for numerical computation,
visualization and application development.
• It also provides an interactive environment for
iterative exploration, design and problem solving.

532 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

have demonstrated the functionality of the proposed


converter with the advantages of high step-up voltage
gain, high efficiency, and suitability for renewable and
alternative energy applications.
REFERENCES
[1] J. T. Bialasiewicz, "Renewable energy systems with photovoltaic
power generators: Operation and modeling," IEEE Trans. Ind.
Electron., vol. 55, no. 7, pp. 2752-2758, Jul.2008.
[2] B. Yang, W. Li, Y. Zhao, and X. He, "Design and analysis of a
grid-connected photovoltaic power system," IEEE Trans. Power
Electron., vol. 25, no. 4, pp. 992-1000, Apr.2010.
[3] T. D. Kefalas and A. G. Kladas, "Analysis of transformers working
under heavily saturated conditions in grid-connected renewable-
energy systems," IEEE Trans. Ind. Electron., vol. 59, no. 5, pp.
2342-2350, May2012.
[4] Y.Xiong,X.Cheng,Z.J.Shen,C.Mi,H.Wu,andV.K.Garg, "Prognos-
tic and warning system for power-electronic modules in electric,
hybrid electric, and fuel-cell vehicles," IEEE Trans. Ind. Electron.,
vol. 55, no. 6, pp. 2268-2276, Jun.2008.
[5] H.Tao, J.L.Duarte, andM.A.M.Hendrix, "Line-interactive
UPSusing a fuel cell as the primary source," IEEE Trans. Ind.
Electron., vol. 55, no. 8, pp. 3012-3021, Aug.2008.
[6] R.-J. Wai, W.-H. Wang, and C.-Y. Lin, "High-performance stand-
alone photovoltaic generation system," IEEE Trans. Ind.
Electron., vol. 55, no. 1, pp. 240-250, Jan.2008.
[7] R.-J. Wai and W.-H. Wang, "Grid-connected photovoltaic
generation system," IEEE Trans. Circuits Syst. I, Reg. Papers,
vol. 55, no. 3, pp. 953-964, Apr.2008.
[8] L. Gao, R. A. Dougal, S. Liu, and A. P. Iotova, "Parallel-connected
solar PV system to address partial and rapidly fluctuating shadow
conditions," IEEE Trans. Ind. Electron., vol. 56, no. 5, pp. 1548-
1556, May2009.
CONCLUSION
This paper has proposed a high-step-up interleaved
boost converter for distributed generation using
renewable and alter- native power sources. The analysis
of operational modes, voltage gain, and stresses is
provided, and a 3.5-kW prototype converter has been
developed and tested. The interleaved structure inside
the presented converter reduces the input- current ripple
and distributes the current through each component. In
addition, the lossless passive-clamp circuit recycles the
leakage energy and constrains voltage spikes across
power switches. Furthermore, the measured full-load
efficiency is 94.7% at a rated output power of 3.5 kW,
and the highest efficiency is 97.3% at an output power
of 1 kW. Consequently, satisfactory experimental results

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 533
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Analysing Bi Directional DC -DC Converter Based


Lithium -Ion Battery Charging and Discharging
Systems for Effective Energy Storage
Dr.P.Selvaraj1, Dr.T.Muthukumari2
1
Professor, Sri Venkateswara Engineering College, Tirupati
2
Associate Professor, Jeppiaar Institute of Technology, Chennai

Abstract - Now a days, due to the continuous systems, we can get the continuous Electric energy in
improvements in the energy received from the the periods of peak demand Now a days, grid receive
renewable energy systems It is essential to employ the electric energy from the suppliers and consumers
the battery charging and discharging topologies get the required supply from the grid, there is no energy
with the grid connected system to achieve stability
storage systemToday's electricity grid -- the
and reliability of electrical supply. For this the
bidirectional converter is correct choicefor
interconnected network that delivers electricity from
Charging and discharging of Batteries. In this suppliers to consumers -- has virtually no storage[1].
paper, a bidirectional DC-DC converter for The storage facilities that do exist use pumped
charging and discharging applications by using a hydropower, a system that pumps water uphill to a
PI controller is illustrated. PI controller is reservoir when excess electricity is available and then
connected with the bi directional DC-DC converter lets the water flow downhill through turbines to generate
to obtain both current control and voltage control. electricity when it is needed. While pumped hydropower
The simulation is carried out in MATLAB/Simulink storage works well, it can only be located in very limited
environment. The results obtained are included in areas of the country. The 12 ARPA-E projects that
this Paper and analysed make up the Grid-Scale Ramp able Intermittent
Keywords - Renewable Energy ,Energy storage, Dispatchable Storage (GRIDS) program are aimed at
Lithium ion battery, Bi directional DC-DC developing new energy storage technologies that are
converter comparable in reliability and cost to pumped
I. INTRODUCTION hydropower and are deployable at any location in the
country. These new technologies could enable the
Energy storage system plays important role in storage of vast amounts of electricity anywhere on the
electricity grid. It helps to increase the Electric energy grid across the country. Improved methods for storing
generation from the renewable energy resources. and dispatching electricity would enable the increased
InIndia renewable electric energy system mainly use of renewable electricity generation while maintaining
depends on the availability of solar and wind energy. high reliability in electric supply.Beyond enabling the
Even though both the wind and solar energy are clean increased use of renewable electricity generation,
and renewable, these are un reliable in nature hence improved energy storage technologies have several
we can not get continuous power supply from these benefits:Security: A more efficient grid that is more
resources. As these renewable energy sources become resistant to disruptions.Environment: Decreased carbon
more valuable to our energy economy, more attention dioxide emissions from a greater use of clean
is given in the renewable technologies and its storage electricity.Economy: Increase in the economic value of
systems. Fig1 shows the Single-Phase Full-Bridge wind and solar power and strengthened U.S.
Bidirectional Isolated Buck-Boost DC-DC Converter competitiveness in the clean energy race. Jobs: New
Due to the recent development in energy storage income sources for rural landowners and tax revenues

534 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

for wind and solar development areas. More jobs in particularly with the demand from electric-powered
supporting sectors such as manufacturing, engineering, vehicles(Fig. 1). It is expected that almost 100 GW
construction, transportation and finance. hours ofLi-ion batteries are required to meet the
requirements from consumer utilization and electric-
powered vehicles with the later takes about 50% of
Li-ion battery sale by 2018 [3].in addition, Li-ion
batteries will also be workingto buffer the alternating
and variable green energy supply from renewable
resources, like solar and wind, to even the difference
between energy supply and demand. For example,
additional solar energy producedthroughout the
Figure 1Single-Phase Full-Bridge Bidirectional Isolated daytime can be stored in Li-ion batteries that will supply
Buck- Boost DC-DC Converter
energy at night when sun light is not accessible. Large-
II. LITHIUM-ION BATTERY scale Li-ion batteries for grid application will need next-
generationbatteries to be created at low cost.
In comparing with various types of Batteries, lithium
ion battery has more advantages and it has fast charging
and discharging characteristics.This type of batteries
are attracting morenotice in the past fewdecades. They
are presently the leading mobile powersources for
portable electronic devices, completely usedin cell
phones and laptop computers [1].Li-ionbatteriesare
well thought-out the powerhouse for the personal
digitalelectronic revolution starting from about two
decades ago,generally at the same time when Li- Figure 2 Projection of worldwide lithium demand for
batteries from 2019 to 2030, by type(in metric tons of lithium
ionbatteries were commercialized.Everybody has carbonate equivalent)
already noticed from his/her daily life, the growing
III DESIGNING BIDIRECTIONAL DC-DC
functionality of mobile electronicsalways require for
CONVERTER
better Li-ionbatteries[2]. Forexample, to charge the cell
phone with risingfunctionalities lesscommonly as the Single-phase full-bridge bidirectional isolated buck-
current phone will get better quality of one's life. Another boost DC-DC converter topology (Figure 2) consists
important increasingmarket for Li-ion batteries is of high frequency isolated transformer to give smooth
electric and hybrid vehicles, which need next-generation current, the transformer is usually has the turns ratio
Li-ion batteries with not only more power, more 1:1. entirely 8 IGBTs are turned on using cosine signals.
capacity, more charging rate, extended life, but These signals are having various 1 or 0 according to
alsonoticeablyenhancedsecurityconcert and less cost. direct method algorithm that is shaped to execute the
In India, It is planned to set a very ambitious goal to working requirements. Fig 3 shows the Bidirectional
have one million plug-in hybridvehicles on the road in buck-boost converter circuit Moreover, conditions of
future. There are like plans around the word in switches are denoted by power flow ways. In case of
endorsement of electric and hybrid vehicles as well. power flow 1, A1 and B2 should be turned on, A2 and
The demand for the Lithium ion battery is shown in B1 should be turned OFF. At the same time in case of
Figure 2.The Foreign Policy magazine even available power flow 2, A1 and B2 are in OFF condition, A2 and
an article entitled "The great battery race" to emphasize B1 are in ON condition. The value of resistors R1 and
the worldwide attention in Li-ion batteries [2].The R2 is equal, ie 20ohm. In this work, consequence of
demand for Li- ion batteries increases quickly, snubber capacitors is analysed at the system[4]. The

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 535
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

effect of the snubber capacitors reduces switching across DC source and Lithium ion battery. in the
losses. Thus, performance value of the system is superior beginning it is assumed that, battery has been charged
when the snubber capacitors are employed to 43% and main supply is switching on. consequently
the load is fed from the main supply as well as the battery.
Design of Inductor: After a certain time period, the main supply is switched
The inductor design has a considerable impact on a off and now the load gets the supply from the battery.
system working, such as understanding of balancing From the results wave form we can easily understand
control Zero Voltage Resonant Transition soft switching, that the highestpermissible current in both current control
device switching loss, system volume, inductor power and voltage control scheme is 22 A. At 80% state of
loss, etc… It is essential to optimize the inductance with charge of battery, the value of open circuit voltage is
all the design considerations[3]. The relationship 25.98 V. The Proportional Integral controller (PI)
between inductor peak current Ipeak, minimum current controller has been connected to calculate the reference
Imin, and inductor RMS current IRMS can be written battery current. The main purpose of using the PI
using the following equations . where Ts is the switching controller is to reduce the error between reference
period, ILoad is load current, P is the load power and andmeasured value. When the DC source is connected,
I is the inductor current ripple. battery is in charging mode. The current through battery
??? = 0.5 ??????????? ???? ?????? (1) is 17.6 A, and voltage is 25.98 V. The load voltage is
48 V. when the At the time of disconnecting the DC
source battery starts to supply power to load. The Load
current and load voltages are 16.2 A and 25.6 V. Figure
6-9 shows the simulated results during charging and
discharging of battery is shown in figure the state of
IV. MODELLING OF BIDIRECTIONAL charge of battery during charging and discharging mode
DC- DC CONVERTER of operation is shown in current flow through the battery
and reference current are shown in. Figure illustrates
The circuit diagram of the bidirectional DC-DC
the Battery voltage characteristics. wave form of the
power converter connected with the Lithium ion battery
load voltage is shown in figure 9.
is shown in figure 4 as a simulation model The two
Table :1
Power semiconductor switches(Power MOSFETs) are
turned on in such a way that the converter is working in Parameter Value Parameter Value
steady state mode[6]-[9]. An perfect switch is coupled VH 330-440 V Lf 0.42 µH
VL 24-30 V Lr 5.7 µH
to make or break the main supply during simulation.
fs1 50 KHz Cf 100 µH
The battery employed in model is Lithium-ion type with 20 KHz 45mH
fs2 CH
the voltage rating of 24 V and rated capacity is supposed Np :Ns 8:1 Ci 100µF
to 50 Ah. Discharging parameters are calculated Dd Ts 500 ns CL 390µF
through the nominal parameters of the batteryIt is LB 1 mH Cr1 =Cr2 0.94µF
known that the batteries are charging through following
two modes namely , constant current and constant
voltage. Figure 5 explains the current and voltage control
strategies for charging and discharging.
V. SIMULATION RESULTS
The circuit diagram is simulated using MATLAB/
Simulink platform and the results are obtained. In the
simulink diagram a common load has been connected

536 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Figure 6: State of charge of battery (Lithium-ion)

Figure 3 Bidirectional buck-boost converter circuit

Figure 7: Battery current characteristics actual and reference

Figure 4 Simulation model

Figure 8: Battery voltage characteristics during charging and


Discharging

Figure 5: Control schemes: (a) current control (b) voltage


control

Figure 9: Load voltage characteristics during charging and


Discharging

VI. CONCLUSION
The role of bi directional DC-DC converter in
battery charging and discharging was analysed. the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 537
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

corresponding simulated wave forms using MATLAB [4] K. Suresh and R. Arulmozhiyal, "Design and Implementation of
Bi-Directional DC-DC Converter for Wind Energy System,"
were included in this Paper. From this analysis ,we can Circuits Syst., vol. 7, no. 11, pp. 3705-3722, 2016.
easily understand the importance and ability of
[5] D. Ravi, B. M. Reddy, S. L. Shimi, and P. Samuel, "Bidirectional
bidirectional converter in sharing the power with the dc to dc Converters : An Overview of Various Topologies ,
supply and with the battery. This new algorithm can be Switching Schemes and Control Techniques," Int. J. Eng. Technol.,
implemented in many utilizations like uninterrupted vol. 7, pp. 360-365, 2018.

power supplies (UPS), integrationof renewable energy [6] X. I. E. Jun, Z. Xing, and Z. Chongwei, "Research on Bi-
Directional DC-DC Converter For a Stand-Alone Photovoltaic
with the grid and dc motor speed control Hybrid Energy Storage System," in 2010 Asia-Pacific Power and
Energy Engineering Conference, 2010, pp. 1-5.
REFERENCES
[7] J. Li-jun, Y. Guang-yao, and J. Miao-Miao, "Study of Bi-
[1] E. O. Ogunniyi and H. Pienaar, "Overview of Battery Energy directional DC-DC Converter of Micro-grid Hybrid Energy
Storage System Advancement for Renewable ( Photovoltaic ) Storage System," in 2015 IEEE 10th Conference on Industrial
Energy Applications," in 2017 International Conference on the Electronics and Applications, 2015, pp. 1166-1169.
Domestic Use of Energy (DUE), 2017.
[8] A. Aroliya, S. Gautam, A. Kumar, and V. Shrivastva, "Analysis
[2] W. E. Council, "Energy Storage Monitor Latest trends in energy of Energy Storage System for Wind Power Generation with
storage: 2019," 2019. application of Bidirectional Converter," in 2016 Second
[3] B. Bryant and M. K. Kazimierczuk, "Small-signal duty cycle to International Conference on Computational Intelligence &
inductor current transfer function for boost PWM DC-DC Communication Technology Analysis, 2016, pp. 419-423.
converter in continuous conduction mode," in 2004 IEEE [9] H. R. Karshenas, H. Daneshpajooh, A. Safaee, P. Jain, and A.
International Symposium on Circuits and Systems, 2004,pp.7- Bakhshai, "Bidirectional DC-DC Converters for Energy Storage
10. Systems," in Energy Storage in the Emerging Era of Smart Grids,
2011, pp. 161-178.

538 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Introducing Adaptive Multilevel Inverter as a PV


Generator Interface to Power System
P. Anil1, M. Sekhar2
1
EEE Department, St.Mark College,
2
Head of the Department, St.Mark College
Email: sekharlakshmisuneetha@gmail.com1, sekharlakshmisuneetha@gmail.com2

Abstract- Inverters play important role in OBJECTIVE OF PROJECT


photovoltaic (PV) systems integration into power
grid. Inverter affect power quality (PQ), as well as The integration of solar energy to the power grid is
stability of power grid. PQ become prominent issue a challenging topic nowadays. Many topologies and
for many electricity companies due to widely used control methods have already been proposed such as:
nonlinear loads. In this paper, an Adaptive cascaded H-bridges with separate dc sources; diode
Multilevel Inverter (MLI) is proposed to response clamped (neutral clamped); and flying capacitors
PQ problems in PV systems integrated into power (capacitor clamped).
grid. The approach of this proposed method refers
to the Fourier analysis by following sine waveform Among the various methods, the cascaded H-
with staircase composition. By controlling bridges inverter has many more advantages and is the
according to Fourier analysis, the ouput voltage of most suitable for interfacing PV generation and power
the proposed MLI can acquire a good sinusoidal grid. In this thesis an Adaptive Multilevel Inverter (MLI)
characteristic and the voltage harmonics can be is proposed to response PQ problems in PV systems
offset. Resulted simulations show that total integrated into power grid. The main objective of
harmonic distortion (THD) of Adaptive MLI is proposed method is to achieve low THD inverter is
much better than conventional MLI. how to approach the sine waveform, nearer is better.
INTRODUCTION From the simulations be found the best pattern
The world's solar power capacity grows fantastically approaching sine waveform.
in recent years. According to European Photovoltaic GRID CONNECTED PHOTO VOLATIC
Industry 2014 report, total solar power capacity is about SYSTEM
100 GW in 2012 and it approach 200 GW in 2014.
But, in fact integration of PV systems without battery Grid connected photovoltaic (PV) power
into grid have some potential problems such as power conversion systems are getting more and more attention
quality, voltage stability, and frequency stability. Even in the last decade, mainly due to cost reduction of PV
more, many electricity companies have been facing PQ modules and government incentives, which has made
problems due to widely used nonlinear loads. Power this energy source and technology competitive among
grid will be more harmonic content if both their loads other energy sources.
and supplies are distorted. PHOTOVOLTAIC SYSTEM
Literature Survey Photovoltaic systems (PV system) use solar panels
This standard is the first in the 1547 arrangement of to convert sunlight into electricity. A system is made up
interconnection guidelines and is a benchmark point of of one or more photovoltaic (PV) panels, a DC/AC
reference showing the open accord handle for measures power converter (also known as an inverter), and a
development. Customarily, utility electric power systems tracking system that holds the solar panels, electrical
(EPS grid or utility grid) were not intended to oblige interconnections, and mounting for other components.
dynamic era and capacity at the dissemination level. Optionally it may include a maximum power point

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 539
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

tracker (MPPT), battery system and charger, solar The maximum power that can be drawn from the
tracker, energy management software, solar PV array depends on the operation point of the I ? V
concentrators or other equipment. curve. As it is shown in Figure 2.4, the maximum power
output of one PV array usually occurs around the knee
point of the curve.
MAXIMUM POWER POINT TRACKING
METHOD
The change of environment condition would affect
the output power of the PV array. This characteristic
curve would change for different environment
Fig. Photovoltaic Hierarchy
conditions. Then the core idea of the MPPT technique
is to automatically adjust its output voltage and current
PHOTOVOLATAIC MODULES in terms of VMPP and IMPP under which the PV array
Due to the low voltage of an individual solar cell can output the maximum power.
(typically ca. 0.5V), several cells are wired (see: Copper
in photovoltaic power systems) in series in the
manufacture of a "laminate". The laminate is assembled
into a protective weatherproof enclosure, thus making
a photovoltaic module or solar panel. Modules may
then be strung together into a photovoltaic array.

Fig. Characteristic PV Array Power Curve

P&O Method
In Perturbation & Observation method, the
Fig. A photovoltaic Array is a Linked Assembly of PV modules
operating voltage of the PV array is the value which is
PHOTOVOLATIC ARRAYS to be increased or decreased in the MPPT. In Figure,
A photovoltaic array (or solar array) is a linked it can be seen that when the operating points are on the
collection of solar panels. The power that one module left side of the MPP, increasing the operating voltage of
can produce is seldom enough to meet requirements of the PV array would increase the output power and
a home or a business, so the modules are linked together decreasing the operating voltage would decrease the
to form an array. Most PV arrays use an inverter to output power.
convert the DC power produced by the modules into INVERTERS
alternating current that can power lights, motors, and
other loads. Inverters are the power electronic circuit, which
converts the DC voltage into AC voltage. The DC
source is normally a battery or output of the controlled
rectifier. The output voltage waveform of the inverter
can be square wave, quasi-square wave or low
distorted sine wave. The output voltage can be
controlled with the help of drives of the switches.
Fig.I-V Characteristic Curve under Different Environment
Conditions

540 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

CURRENT SOURCE INVERTERS

Fig.Classification of Inverter Topologies


Fig. Current Source Inverter
Inverters can be broadly classified into two types.
• CSI is fed with adjustable current from a DC voltage
They are-
source of high impedance.
Voltage Source Inverter (VSI)
• The input current is constant but adjustable.
Current Source Inverter (CSI)
• The amplitude of output current is independent of the
When the DC voltage remains constant, then it is load.
called voltage inverter (VSI) or voltage fed inverter • The magnitude of output voltage and its waveform
(VFI). When input current is maintained constant, then depends upon the nature of the load impedance.
it is called current source inverter (CSI) or current fed
inverter (CFI). • The CSI does not require any feedback diodes.
• Commutation circuit is simple as it contains only
VOLTAGE SOURCE INVRTERS capacitors.
• VSI is fed from a DC voltage source having small or
negligible impedance.
• Input voltage is maintained constant.
• Output voltage does not dependent on the load.
• The waveform of the load current as well as its
magnitude depends upon the nature of load
impedance.
• VSI requires feedback diodes.
• The commutation circuit is complicated.
• Power BJT, Power MOSFET, IGBT and GTO with
self-commutation can be used in the circuit.
Fig. Grid Connected Photovoltaic System Configurations

String Topology
The string inverter is a reduced version of the
centralized inverter. In this topology, a single PV string
is connected to the inverter. This improves the MPPT
and the total generated power. Moreover, this
technology also increases the modularity since additional
strings can be added into the system without changing
the inverter dimensions. However, depending on the
Fig. Voltage Source Inverter

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 541
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

size of the string, the MPPT is not optimal because of


partial shading and module mismatch.
Multi-String Topology
In multi-string topology, each PV string has their own
DC-DC converter and the output of the converter are
connected to a common DC bus. The DC bus voltage
will be fed into the DC/AC inverter.
Fig.Topology of the Diode-Clamped Inverter
AC Module Topology
(a) three-level inverter (b) Five -level inverter
The AC module topology is the most suitable one
for the implement of MPPT since one converter is Principle of operation
dedicated for one PV module. In addition, due to the To produce a stair case output, let us consider only
modular structure, the system can be easily enlarged. one leg of five-level inverter, as shown in Figure 3.3 A
Multilevel Inverters single phase bridge with one leg is shown in figure 3.3.
The steps to synthesize the five level voltages are as
follows:
a) Voltage level Van= V dc; turn on all upper switches
S1, S2, S3 and S4.
b) Voltage level Van= V dc/2, turn on the switches S2,
S3, S4 and S1’.
Fig.Typical Inverter Display panel
c) Voltage level Van= 0, turn on the switches S3, S4,
The Inverter is an electrical device which converts S1’and S2’.
direct current (DC) to alternate current (AC). The
inverter is used for emergency backup power in a home. d) Voltage level Van= - V dc/2 turn on the switches S4,
The inverter is used in some aircraft systems to convert S1’, S2’, S3’.
a portion of the aircraft DC power to AC. The AC e) Voltage level Van= - V dc; turn on all lower switches
power is used mainly for electrical devices like lights, S1’, S2’, S3’ and S4’.
radar, radio, motor, and other devices. Applications of Diode Clamped Multilevel
DIODE CLAMPED MULTILEVEL Inverter:
INVERTERS • Static VAR compensation
The main concept of this inverter is to use diodes • Variable speed motor drives
and provides the multiple voltage levels through the
different phases to the capacitor banks which are in • High voltage system interconnections
series. A diode transfers a limited amount of voltage, • High voltage DC and AC transmission lines
thereby reducing the stress on other electrical devices.
Advantages:
• When the number of levels is high enough, harmonic
content will be low enough to avoid the need for filters.
• Efficiency is high due to all devices which are being
switched at the fundamental frequency.
• We are able to control the reactive power flow.

542 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• The control method is easy for a back to back intertie Simulation Results
system.

Disadvantages:
• Excessive clamping diodes are being required when
the number of levels gets high.
• It is hard to do a real power flow control for individual
converter.

FLYIN CAPACITOR MULTILEVEL


INVERTER

Fig. Simulation Model of Proposed Adaptive Multilevel Level


Inverter

From the Simulation model of proposed Adaptive


multilevel inverter is based on the series connection of
single phase H-bridge inverters with separate DC
sources. The topology is discussed. The output phase
voltage is synthesized by the addition of the voltages
Fig. Topology of the Flying Capacitor Multilevel inverter (a)
that are generated by different modules.
three-level inverter (b) Five -level inverter
In this work, two cases are considered to explain
The main concept of this inverter is to use capacitors. the effectiveness of FFT for the operation of a Adaptive
It is of series connection of capacitor clamped switching Multilevel Inverter.
cells. The capacitors transfer the limited amount of
1. THD Analysis with Filter
voltage to electrical devices. In this inverter switching
states are like in the diode clamped inverter. Clamping 2. THD Analysis without Filter
diodes are not required in this type of multilevel inverters. This method is verified by constructing fifteen level
The output is half of the input DC voltage. It is drawback Adaptive multilevel inverter drive with and without filter
of the flying capacitors multi-level inverter. using Simulink/MATLAB, the results obtained are
compared presented. The harmonic content and Total
Harmonic Distortion is compared shown.

Fig. The synthesizing of sine wave by un-linear staircase

Fig. Simulation Model of Pulse Triggering Circuit

From the above figure, the switches in each module


are controlled such that only two of the four switches
are turned on at any time.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 543
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

(a) The switch positions when the gate signal is


1
If is positive and the module is inserted by the
modulation method, then the capacitor will be charged
in this case. If is negative and this module is inserted
by the modulation method, the capacitor C will be
discharged. When the control signal is -1, the inverter Fig. THD Analysis with Filter
operates in the reverse direction.
CONCLUSION
(b) The switch positions when the gate signal is Adaptive MLI has been discussed. The main factor
-1 to achieve low THD inverter is how to approach the
If is positive and this module is inserted by the sine waveform, nearer is better. From the simulations
modulation method, the capacitor will be discharged in be found the best pattern approaching sine waveform.
this case. If is negative and this module is inserted by This paper offers an introduction of Adaptive MLI. So,
the modulation method, the capacitor will be charged. for a better and getting higher impact is needed future
When the control signal is 0, the inverter operates in works. These works cover further observations,
the bypass mode. designing Adaptive MLI controller, and experimental
work. The latest works are needed to verify simulation
results.
FUTURE SCOPE
In this thesis adaptive concept which means
arranging the highest voltage level at the starting and
descending for the next levels is used for the cascaded
Fig. Output Waveform without Filter
H-bridge multilevel inverter.
REFERENCES
[1] R.W. Menzies and Yiping Zhuang, Advanced Static
Compensation Using A Multilevel GTO Thyristor Inverter, IEEE
Transactions on Power Delivery, Vol. 10, No. 2, April 1995.
[2] Jose Rodriguez, Jih-Sheng Lai, and Fang Zheng Peng, Multilevel
Inverter: A Survey of Topologies, Control, and Applications,
Fig. Output Waveform with Filter IEEE Transactions on Industrial Electronics, Vol. 49, No. 4, August
2002.
[3] IEEE Standard for Interconnecting Distributed Resources with
Electric Power Systems, IEEE, 2003.
[4] Feel Soon Kang, Sung-Jun Park, Su Eog Cho, Multilevel PWM
Inverter Suitable for the Use of Stand-Alone Photovoltaic Power
Systems, IEEE Transaction on Energy Conversion, Vol-20, No.
4, December 2005.

Fig. THD Analysis without Filter [5] Erwin Kreyszig Advanced Engineering Mathematics, 9th Edition,
Wiley, New York, 2006.
[6] James Ward Brown and Ruel V. Churchill, Fourier Series, Mc
Graw - Hill International Edition, 7th Edition, New York, 2008.

544 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

An Innovative Methodology for Enhancement of


Reliability of Engineering System using Social Learning
Particle Swarm Optimization (SL-PSO)
Aditya Tiwary1, Praveen Patel2
1,2
IPS Academy, Indore (M.P.)
Email: raditya2002@gmail.com1

Abstract- This paper describes an algorithm for II. RELIABILITY INDICES


optimum modifications for failure rate and repair INTRODUCTION
time for a distribution system. The modifications
are with respect to a penalty cost function System Average Interruption Duration Index
minimization. The cost function has been minimized (SAIDI)
subject to the energy based and customer oriented
indices. Social Learning Particle Swarm
Optimization (SL-PSO) has been used for
optimization. The algorithm has been implemented Customer Average Interruption Duration Index
on a sample radial distribution system. (CAIDI)
Keywords- Failure rate, repair time, distribution
systems, Social Learning Particle Swarm
Optimization (SL-PSO).
Expressions for the evaluation of system failure rate
I. INTRODUCTION and system unavailability for each load point are given
Reliability evaluation of distribution systems is as follows
important from consumer's view-point. Outage
customer oriented and energy based indices are
important for analysis of distribution system.
Considerable research efforts have been devoted to
improve availability of supply due to distribution systems
[1]. Preventive maintenance reduces failure rate whereas Most important energy based indices is average
along with corrective repair availability of supply energy not supplied (AENS) which is given as follows.
increases [2]. Gangel and Ringlee [3] initially presented
modelling concepts for the individual components of
distribution systems for reliability evaluation. Different
techniques for evaluating reliability indices have been where Li is average load connected at ith load point.
discussed in literature [4-13]. III. PROBLEM FORMULATION
This paper describes an algorithm for reliability Objective function is written as follows [14]
improvement of a distribution system using Social
Learning Particle Swarm Optimization (SL-PSO). The
algorithm propose based on Particle Swarm
Optimization is implemented on radial distribution Customer and Energy based indices are as follows:
system. Statistical analysis is also provided.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 545
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

System average interruption frequency index


(SAIFI)
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX
IEEE
Where
Current failure rate of i th segment minimum
achievable failure rate of ith segment modified failure
rate of ith segment NC total number of distributor
segments r0i current repair time for ith segment ri modified
repair time for ith segment ri,min minimum achievable
repair time for ith segment Fig. 2 Swarm sorting and behavior learning in SL-PSO [15]

The objective function as given is minimized subject


IV. SOCIAL LEARNING PARTICLE
to following constraints
SWARM OPTIMIZATION (SL- PSO): AN
OVERVIEW:
In 1921, some British birds were first seen to open
milk bottles in the small town of Swaythling. In the
following 25 years, such observations had been
continually reported from numerous other sites
spreading all over the Great Britain and even some other
areas in the European continent. This is the first evidence
Fig. 1 Main components of the SL-PSO [15]
of social learning, where the birds are believed to learn
to open milk bottles by observations and interactions
with other birds, instead of learning by them [15].
Like the classical PSO, the SL-PSO initializes a
swarm P(t) containing m particles, where m is the swarm
size and t is the generation index. For each particle i in
P(t), it holds a randomly initialized decision vector
(behavior vector) Xi(t), which represents a candidate
solution to the optimization problem. As a reward
feedback from the environment, every particle will be
V. RESULTS AND DISCUSSIONS:
assigned with a fitness value calculated from the objective
function. The swarm is then sorted according to an The SL-PSO algorithm developed in this paper for
increasing order of the particles' fitness values. reliability enhancement has been implemented on a
Consequently, each particle (except for the one with radial distribution system [14].The system has in all
the best fitness value) will correct its behaviors by learning seven load points (LP). The system contains seven
from those particles (demonstrators) which have better feeder segments. Initial parameters for each distributor
fitness values. segment is provided in [14]. Table 1 presents the
statistics of best fitness function values as obtained using
SL-PSO algorithm based on 30 numbers of runs.
Table 2 shows the optimized set of decision variables
along with least values of objective function as obtained
by SL-PSO algorithm. These values are with respect

546 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

to the best run in each case. Table 3 shows un-optimized optimization", Soft Computing for Problem Solving-Advances
in Intelligent Systems and Computing, 816, 2018, pp. 257-272.
and optimized values of the customer and energy based
[12]Aditya Tiwary, "Reliability evaluation of radial distribution
indices. system - A case study", Int. J. of Reliability: Theory and
Applications, 14, 4(55), 2019, pp. 9-13.
VI. CONCLUSION
[13]Aditya Tiwary, "Customer orientated indices and reliability
Customer and energy based reliability indices are evaluation of meshed power distribution system", Int. J. of
of great significance in predictive reliability performance Reliability: Theory and Applications, 15, 1(56), 2020, pp. 10-
19.
assessment of a distribution system. In this paper an
[14]Rajesh Arya, S.C. Choube, L.D. Arya, D.P. Kothari, "Reliability
algorithm for enhancement of reliability of engineering
enhancement of a radial distribution system using coordinated
system using Social Learning Particle Swarm aggregation based particle swarm optimization considering
Optimization (SL-PSO) for optimum modifications for customer and energy based indices" Applied soft computing, 12
(2012) 3325-3331.
failure rate and repair time is proposed. Different
statistics parameters such as average value, standard [15]R. Cheng, Y. Jin, "A social learning particle swarm optimization
algorithm for scalable optimization", Information Sciences, vol.
deviation has been obtained. Optimized values of failure 291, (2015) 43-60.
rates and repair times by the Social Learning Particle Table 1- Statistics of best fitness function values as obtained
Swarm Optimization (SL-PSO) is also obtained. using SL-PSO based on 30 numbers of runs.
Various customer and energy based indices were also Average value of best fitness function 19.0405
calculated based on the optimization technique. values
Standard deviation 0.0251
REFERENCES Minimum value of best fitness 19.0207
[1] D. Elmakias, New Computational Methods in Power System function
Reliability. (Springer International Edition, 2000). Maximum value of best fitness 19.1235
[2] I. Gertsbakh, Reliability Theory with Applications to Preventive function
Maintenance. (Springer International Edition, 2000). Table 2- Optimized values of failure rates and repair times as
[3] M.W. Gangel, R.J. Ringlee, Distribution system reliability obtained by SL-PSO techniques.
performance. IEEE Trans. PAS-1968 87(7), 1657-1665 (1968).
Variables Magnitudes as obtained by SL-PSO
[4] IEEE Committee Report, Bibliography on the application of 1 0.2381
probability methods in power system reliability evaluation. IEEE 2 0.0971
Trans. Power Appar. Syst. PAS-91, 649- 660 (1972).
3 0.2004
[5] IEEE Committee Report, Bibliography on the application of 4 0.1832
probability methods in power system reliability evaluation, 1971- 5 0.1973
1977. IEEE Trans. Power Appar. Syst. PAS-97, 2235-2242,
6 0.1000
(1978).
7 0.1000
[6] R.N. Allan, E.N. Dialynas, I.R. Homer, Modelling and evaluating
r1 6.9290
the reliability of distribution systems. IEEE Trans. PAS-98, 2181-
2189 (1979).
r2 7.7864
r3 8.1587
[7] R. Billinton, R.N. Allan, Reliability Evaluation of Engineering
r4 11.7020
Systems. (Springer International Edition, 1992).
r5 11.6380
[8] R. Billinton, R.N. Allan, Reliability Evaluation of Power System.
r6 7.9993
(Springer International Edition, 1996).
r7 11.9930
[9] R.N. Allan, R. Billinton, Probabilistic assessment of power Objective 19.0210
systems. Proc. IEEE 88(2), 140-162 (2000).
function
[10]Aditya Tiwary, "Inspection-Repair-Based Availability
Optimization of Distribution System Using Bare Bones Particle Table 3- Current and optimized reliability indices
Swarm Optimization", Chapter in Book Series Computational Current Optimized Threshold
Intelligence: Theories, Applications and Future Directions - S. No. Index
values values values
Volume II, Advances in Intelligent Systems and computing 799,
1 SAIFI 0.7200 0.4128 0.5
Springer, 2019.
2 SAIDI 8.4500 3.3020 4
[11]A. Tiwary, "Inspection-Maintenance-Based Availability
3 CAIDI 11.7361 7.9954 8
Optimization of Feeder Section Using Particle Swarm
4 AENS 26.4100 10.000 10

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 547
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Design of Photo-Voltaic Renewable Energy Sources


Using Bidirectional Converter
Ravi Anand1, Ashutosh Kumar Singh2, R.K.Mandal3, Zeeshan Hussain4
1,2,3,4
Dept. of Electrical Engg. National Institute of Technology, Patna, India
Email: ravianand000@gmail.com1, ash170723@gmail.com2, rajib@nitp.ac.in3, mezeehussain@gmail.com4

Abstract-In this paper, DC micro grid fed with conversion; these converters are often used for low and
solar having the facility of bidirectional power flow medium power applications but for high power
has been proposed. The whole system works in applications, isolated converters are used [1]. One of
islanded mode supplying power to three-phase load the most commonly used isolated bidirectional converter
and to the single-phase load. Therefore, power
is Dual active bridge. The DAB is also known as the
electronics converters which supports the
bidirectional power flow is connected to the system.
solid-state transformer. The solid- state transformer
Among the various types of dc-dc converters, the consists of high frequency transformer and has many
dual active bridge is generally used in transferring applications [2]. DAB is a bidirectional DC-DC
the large power. This is the reason that is why it converter having a high frequency transformer in between
has been used in the proposed system. Because of [3]. A high-frequency inverter is found on the main side
constant utilization and over dependence on non- of the transformer, while a high-frequency rectifier is
renewable energy sources for power generation, found on the secondary side. There are various
vehicles, enterprises, the fossils fuel stores are configurations of these high frequency inverter and
exhausting at a disturbing rate. It won't be long rectifier. These may either be half bridge, full bridge or
when these sources will be wiped out. In this way, push-pull configuration [4]. In dual active bridge, the
there is a wide new enthusiasm towards the
voltage phases at both ends of the high frequency
sustainable power sources. Sustainable power
sources guarantee best alternative to handle the
transformer control the flow of energy. The modulation
issue of future demand of power without relying on technique which may be used for switching the switches
coal, oil, diesel and other conventional sources. of the dual active bridge may be either SQM (Square
There are numerous kinds of sustainable power HFL modulation), TRM (Triangular HFL modulation)
sources like sun-oriented resources, wind energy, or SIM (Sine HFL modulation). Among these
hydel energy, geothermal energy, tidal energy modulation technique SQM is most efficient in
which can be used as an alternative for conventional transferring large amount of power through the DAB,
sources. Index Terms-DC to DC Converter, DC but it suffers from the problem of high circulating current
to AC Converter, DC Micro-grid, Renewable [5]. The different modulation techniques utilised include
Energy Sources, PWM. modulation of single phase shifts, extensive phase shift
I. INTRODUCTION modulation, double phase shift modulation and three
phase shift modulation [6]. SPS is the most widely used
The whole world is shifting towards the usage of modulation technique used in DAB as it has got several
nonconventional energy sources, but due to uncertainty attractive features such less inertia, easy implementation
in the generation by these sources, there is a need for of soft switching techniques, better dynamic
the backup which can be in any form, it may be either performance but when the voltages at both the primary
be a simple rechargeable battery or any fuel cells. These side and secondary side of transformer is not matched
storage devices require the power electronics which a high circulating current flows through the circuit [7].
facilitates the bidirectional power flow. A bidirectional The DAB facilitates the bidirectional power flow which
converter such as the isolated and non-isolated may be is used for both the battery charging as well as
utilized for any application that requires DC-DC
548 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

discharging. DAB is connected to the DC micro grid Ratings of battery and solar array are decided
whose voltage needs to be maintained constant, the accordingly.
voltage balancing control technique is used so that
whatever be the conditions and varying loading A. PV array details
conditions, the controller tries to maintain the DC micro Solar module ratings: - VOC = 38.23, ISC =
grid voltage constant at 750 V [8]. The solar PV is 8.67A, IMPP = 8.2A, VMPP = 29.9V, PMAX =
connected to the DC micro grid which provides the 245.1W, Number of parallel strings = 15, Quantity of
power to both the load as well as charge the battery series-connected modules per string = 06, Quantity of
when it has surplus power. In other situations, when it cells in each module = 60, Let the power produced by
does not provide enough power the battery discharges the PV array be P watts and let sunlight falling is for 6
itself to meet the load demand [9]. The closed loop hours a day. Battery watt-hours to be supplied = (P-
control technique used for switching the switches of 10000) x5 +(P-2000) x1
dual active bridge manages the direction of power flow Average power supplied PV array to battery = ((P-
via DAB by changing the phase shift angle between the 10000) x 5
voltages at both the ends of transformer. The adequate
power flow through the DC micro grid maintains its + (P-2000) x 1) / 6 Watts
voltage constant at 750V. The three phases as well as Current flowing through the battery =((P-10000) x
the single-phase loads are connected through the 5 + (P- 2000) x 1) /(96 x 6) A
inverter, both single phase and three phase inverters
Charging current through the battery = Total ampere-
are working in the closed loop so that better rms voltage
hours of battery/6 hours = 3500/6 = 583.33((P-10000)
is maintained at the output of the inverter.
x 5 + (P-2000) x 1) /(96x 6) = 583.33, P = 57.99 kW.
II. PROPOSED METHODOLOGY
B. Battery bank details
The system proposed in this paper is for the remote
Battery used: - Lead acid battery, Rated Ampere
locations where there is no availability of the grid. In
hours capacity of the battery = 3500Ah, Nominal
villages the loads are generally of two types i.e. lighting
voltage = 96V, Initial SOC of battery taken = 50
loads which operates almost 24 hours a day, and other
percentage, Battery response time = 0.00001sec.
load is water pump load which generally operates 5
hours a day. The lighting loads are small single-phase C. Load details
loads generally of ratings equal to 1000W or 2000W
Water pump load: - 10kW, 400V, 50Hz, 3-phse
whereas pump load is used for irrigation purpose by
squirrel cage induction motor, Time of operation of load
the farmers. The motor which are used most frequently
= 5 hours per day Single phase load: 1. 3kW, 230V,
is 3 phase squirrel cage induction motor. The solar
50Hz, R-L load 2. 2kW, 230V, 50Hz, R-L load, Time
powered system with battery backup is very suitable
of operation each load = 24 hours.
system for such remote locations. The battery bank is
being attached to the bidirectional dc-dc converters D. Schematic diagram of the system proposed
which allows the flow of power in both the direction. In
The schematic diagram of the proposed system is
general lead-acid battery is used to store extra power
shown in the Fig. 1. The proposed square wave DAB
provided by the solar cells. The maximum number of
is shown in the Fig.
days when there will not be solar power is known as
the days of autonomy, depending upon the days of 1. It has two-level square wave inverter on the high
autonomy and keeping in mind that the battery needs voltage side which is connected to the solar array. This
to get charged within one day, the battery bank is PV array serves as the primary source of energy for
needed to be designed and the solar array must be the system, since it is linked to the inverter on the input
capable of providing that much amount of power. side. In order to maximize the power output of the PV

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 549
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

array, the solar PV is linked to the MPPT method. The priority. The control technique used is in such a way
MPPT technique used here decides the duty ratio of that under any unbalance conditions whether load is
the boost converter. The MPPT technique that has been getting changed or the irradiance is getting changed,
used in the proposed system is P and O i.e. Perturb the flow of power is always such that it maintains the
and Observe method. On the low voltage side of the constant voltage of 750V at the DC capacitor link. The
high frequency transformer a rectifier is connected which power produced by the solar array flows both to loads,
converts the square wave AC voltage to the DC voltage. and also to the battery, and if the power produced via
On the output side of the rectifier battery is connected. the solar array does not correspond to that required by
On the high voltage side an inductor of appropriate charging the battery will be charged, in this case, the
value is also connected which is main element in the battery will provide the leftover power. In the case when
DAB which helps in the flow of power via the dual there is almost zero generation by the solar array, then
active bridge. complete power will be delivered to the load by the
battery. To maintain the constant voltage at the dc link
a proper control technique is used which is being
discussed in further sections. Since both gravimetric
density as well as volumetric density of the lead acid
battery is high as compared to the other battery, in
general lead acid battery is used in most applications.
E. CLOSED LOOP CONTROL OF DAB
The control of dual active bridge is shown in the
Fig. 2. Where, Vref = 750V; Vdc:- dc micro grid voltage;
Pi: Input
Fig. 1. Simplified diagram of the system proposed.

The difference in the voltages across the inductor


that decides the amount of power transfer. The major
advantage of using the bidirectional converter is that it
facilitates the flow of power in both the direction i.e.
the power can either be taken from the battery during
discharging and the power can also flow to the battery
during charging. Depending upon the direction of power
flow the mode of operation may be called as either Fig. 2. Control of Closed Loop DAB.
boost mode or buck mode. When the battery is charged, power to the dual active bridge. The voltage across
the power is transferred from high voltage to low voltage a DC micro grid must be maintained constant at 750 V
(Buck Mode) while the battery is discharged when the in order to ensure the necessary power flow to the load,
energy is drained from the low voltage to the high voltage and a correct control strategy must therefore be used.
side, which is known as boost mode. The DC voltage The voltage at the DC micro grid is compared to the
of the micro grid is maintained at the 750V, a capacitor reference voltage of 750V and the error is given as a
of appropriate value is connected so that it could reference to the next block which compares it to the
maintain the required voltage of the 750V across it. On input power of dual active bridge, the output from this
the low voltage side, a battery is connected whose is given to the PI controller. Depending on whether the
nominal voltage is taken to be 96V its ampere hours error at the power block is positive or negative, gate
rating is 3500Ah. The whole system is configured in signals are generated having required phase shift in
such a way that supplying power to the load is the first between, this phase shift decides the direction of power
550 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

flow via the dual active bridge. There are three modes is also a three phase water pump load. The dc link
of functioning, depending on the direction of power capacitor voltage is kept constant at 750V, during this
flow: (1) If the power of the array is higher than the mode SOC of battery increases, the phase shift between
load requested; (2) If the power of the array is lower the high voltage side and low voltage side in this case
than the load power required; (3) if the power of the will be positive i.e. VHV will lead VLV. Fig. 3 through
PV array is zero. MODE 1: When the power of the Fig. 14 shows the simulation results for this scenario.
PV array exceeds the power of the load The PV system In both Fig. 3(a) and Fig.3(b), the voltage across an
produces sufficient electricity to supply the load and inductor is displayed while the current is shown in Fig.
charge the battery during this operating mode. Fig. 2 3. (c). The difference in the phase shift of the voltage
shows the schematic diagram of the system functioning
in this mode. MODE 2: When power of the PV array
is lower than power of load. The PV array generates
electricity from this mode to the DC micro grid and the
remaining power required by load is sent via the battery.
MODE3: When PV array has zero generation. In this
mode the complete power demanded by the load is
given by the battery itself, during this mode the battery
discharges itself to provide the power demanded by
the load as well as maintains the DC micro grid voltage Fig. 3. (a) Primary side voltage (b) secondary side voltage (c)
constant at 750V. The rate of discharge of the battery Current through inductor.
in this case will be faster as compared that in the second across the inductor which is positive in this case
mode. facilitates the power flow through the DAB. The
F. SIMULATION RESULTS outgoing voltage and output currents shown in Fig. 4(a)
and Fig. 4(b) are shown as sinusoidal as shown in the
The power produced by the solar PV array is graph in a single phase load 1. In Fig. 4(c) and Fig.
uncertain i.e. it depends upon the environmental 4(d), the active and reactive power that passes through
conditions. In case of solar powered system, it depends the load is displayed. The system is working such that
upon the temperature and irradiance on the solar panel. it is providing the power as per demanded by the load
With this uncertainty there is a need of backup for as can be seen from the graph. The exit voltage and
ensuring the continuous power flow to the load. Also, output current is shown in Fig. 5(a) and Fig. 5(b) by
the battery needs to be charged as well as the single stage load 2 as shown in the graph. The load is
discharged, this requires the power electronics sinusoidal In Fig. 5(c) and Fig. 5(d), the active and
converters which facilitates the bidirectional power flow. reactive power flowing through the load is illustrated.
The system developed here consist of DAB which is Fig. 6(a) and Fig. 6(b) shows the active power and
intermediate between the DC micro grid and battery. reactive power demanded by the three-phase load, as
DAB controls the energy flow to the load by the battery can be seen from the graph both the wave-forms are
depending upon the power generated by the PV array. constant which shows the proper functioning of the
The simulation results of all the above discussed modes system. The output voltage of the three-phase inverter
are shown as follows. The solar generates electricity, in is shown in the Fig. 6(c), the output voltage is sinusoidal
this instance it supplies the leftover power, to feed the with very less total harmonic distortion (THD) value.
demand as well as the batteries. This mode of operation
is known as the buck mode. The power is balanced
among the solar power, battery power and load power.
There are three loads connected to the system, two
single phase loads are connected in parallel, and there

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 551
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

side of the high voltage through the active dual bridge,


the phase change between voltages at the end and the
battery is discharged in this mode as the SOC shows.
This mode of operation is known as the boost mode.
The DC link capacitor voltage is kept constant at 750V
by correct power balance among all the sources and
the load. The nominal voltage of the battery is kept at
96V. The simulation results of this case are shown in
the Fig. 7 to Fig. 11. The power produced by the PV
Fig. 4. (a) Output voltage (b) Output current (c) Active power array is shown in the Fig. 7(a), except for the some
(d) Reactive power of single-phase load 1.
transient as can be seen from the graph, the power
delivered by the PV array is constant. Fig. 7(b) depicts
the power flowing via DAB to the battery which is
constant as expected. Voltage across the inductor is
shown in the Fig. 8(a) and Fig. 8(b) while the inductor
current is shown in the Fig. 8(c). The power flowing
through the different components of the system
maintains the constant voltage across the capacitor.

Fig. 5. (a) Output voltage (b) Output current (c) Active power
(d) Reactive power of single phase load 2.

Fig. 7. (a) Power given by PV array (b) Power delivered by


battery.

Fig. 6. (a) Active power (b) Reactive power (c) Output voltage
of the three phase load.
Fig. 8. (a) Primary side voltage (b) Secondary side voltage (c)
CASE 1: If the energy is less than the energy of the Current through inductor.
solar system. If this is the case, the power provided by
the photovoltaic array is lower than that needed for Fig. 9(a), and Fig. 9 (b) illustrates a single phase
charges, so the battery supplies the balance power, if load, which is sinusoidal as shown in the graph, the
power flows from the side of the low voltage to the output voltage and output current. Fig. 9(c) and Fig.

552 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

9(d) illustrate the active and the reactive power through the voltages at the primary and secondary side of the
the load. The system is working such that it is providing transformer is negative ensuring the flow of power from
the power as per demanded by the load as can be seen battery to load via dual active bridge. The voltage across
from the graph. Fig. 10(a) and Fig. 10(b) shows the DC capacitor link is maintained at 750V. The simulation
output voltage and output current through the single- results of the system working in this mode is shown in
phase load 2 which is sinusoidal as can be seen from the Fig. 12 to Fig. 14. The power produced by the PV
the graph. The active and the reactive power flowing array is shown in the Fig. 12(a), except for the some
through the load is shown in the Fig. 10(c) and Fig. transient as can be seen from the graph, the power
10(d) respectively. The system is working such that it delivered by the solar array is zero here. Fig. 12(b)
is providing the power as per demanded by the load as shows the power flowing via DAB from the battery
can be seen from the graph. which is constant as expected. The power flowing
through the different components of the system
maintains the constant voltage across the capacitor.

Fig. 9. (a) Output voltage (b) Output current (c) Active power
(d) Reactive power of single phase load 1.
Fig. 11. (a) Output voltage (b) Output current (c) Active power.

Fig. 10. (a) Output voltage (b) Output current (c) Active power
(d) Reactive power of single phase load 2. Fig. 12. (a) Power given by PV array (b) Power delivered by
battery.
Fig. 11(a) and Fig. 11(b) shows the active power
The output voltage and output current is shown in
and reactive power demanded by the three phase load,
the graph Fig. 13(a) and Fig. 13(b) via single-phase
as can be seen from the graph both the waveforms are
load 1 which is sinusoidal. In Fig. 13(c) and Fig. 13(d)
constant which shows the proper functioning of the
are the active and the reactive power which flows
system. The output voltage of the three phase inverter
through the load. The system is working such that it is
is shown in the Fig. 11(c), the output voltage is sinusoidal
providing the power as per demanded by the load as
with very less THD value. CASE 2: When solar power
can be seen from the graph. Fig. 14(a) and Fig. 14(b)
is zero Here the PV generated is zero. This situation
depicts the output voltage and output current through
may arise on cloudy days when there is no sunlight. In
the single phase load 2 which is sinusoidal as can be
this case the whole power that is required by the load
seen from the graph. The active and the reactive power
is being provided by the battery itself. Here the battery
flowing through the load is shown in the Fig. 14(c) and
will get discharged at very fast rate as can be seen from
Fig. 14(d) respectively. The system is working such
the SOC graph of the battery. The phase shift between

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 553
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

that it is providing the power as per demanded by the for control of power flow via DAB is SPS (Single-
load as can be seen from the graph. phase shifted) modulation technique. Single-phase shift
modulation technique is the simplest among all the
modulation technique. The control technique has been
used compares the power input to the dual active bridge
and the grid power and depending upon the difference
of the power, proper gate signals are generated which
creates the phase shift between the voltages at the two
ends of the high frequency transformer. The whole
system has been studied and simulated under varying
irradiance conditions. The varying irradiance generates
different power which is either equal to, greater than or
less than the load power. Accordingly, phase shift
changes and ultimately the power required by the load
Fig. 13. (a) Output voltage (b) Output current (c) Active power is maintained and voltage across the dc micro grid is
(d) Reactive power of single phase load 1.
kept constant. The closed loop single-phase and three-
phase inverter has been developed which mitigates the
voltage fluctuation at the input side of the inverter and
maintains the constant rms voltage at the output of the
inverters feeding the single-phase and three-phase AC
load.
REFERENCES
[1] K. Tytelmaier, O. Husev, O. Veligorskyi and R. Yershov, "A
review of non-isolated bidirectional dc-dc converters for energy
storage systems," 2016 II International Young Scientists Forum
on Applied Physics and Engineering (YSF), Kharkiv, pp. 22-28,
Fig. 14. (a) Output voltage (b) Output current (c) Active power
2016.doi: 10.1109/YSF.2016.7753752.
(d) Reactive power of single phase load 2. [2] X. She, A. Q. Huang and R. Burgos, "Review of Solid-State
Transformer Technologies and Their Application in Power
III. CONCLUSION Distribution Systems," in IEEE Journal of Emerging and Selected
Topics in Power Electronics, vol. 1, no. 3, pp.186-198,
In this paper, DC micro grid fed with solar having Sept.2013. doi: 10.1109/JES TPE.2013.227791.
the facility of bidirectional power flow has been
[3] H. Qin and J. W. Kimball, "Solid-State Transformer Architecture
proposed. The whole system works in islanded mode Using AC-AC Dual- Active Bridge Converter," in IEEE
supplying power to three-phase load and to the single- Transactions on Industrial Electronics, vol. 60, no. 9, pp.3720-
phase load. There are various form of energy storage 3730, Sept. 2013. doi: 10.1109/TIE.2012.2204710.

system like mechanical, thermal etc., among these the [4] W. Jing, C. Hung Lai, S. H. W. Wong and M. L. D. Wong, "Battery-
super capacitor hybrid energy storage system in standalone DC
electrical form of energy storage is the most suitable microgrids: a review," in IET Renewable Power Generation, vol.
form. The battery connected to the system is the 11, no. 4, pp. 461469, 3 15 2017.doi: 10.1049/iet-rpg.2016.0500.
rechargeable, this needs to be charged at regular interval. [5] B. Zhao, Q. Song, J. Li, Y. Wang and W. Liu, "High-Frequency-
Therefore, power electronics converters which supports Link Modulation Methodology of DC-DC Transformer Based
the bidirectional power flow is connected to the system. on Modular Multilevel Converter for HVDC Application:
Comprehensive Analysis and Experimental Verification," in IEEE
Among the various types of dc- dc converters, the dual Transactions on Power Electronics, vol. 32, no. 5, pp. 3413-
active bridge is generally used in transferring the large 3424, May 2017.doi: 10.1109 /TPEL.2016.2586196.
power. This is the reason that is why it has been used in
the proposed system. The modulation technique used

554 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[6] B. Zhao, Q. Song, W. Liu and Y. Sun, "Overview of Dual Active- [8] M. A. Moonem, T. Duman and H. Krishnaswami, "Capacitor
Bridge Isolated Bidirectional DC-DC Converter for High voltage balancing in a neutral-point clamped multilevel dc-dc
Frequency-Link Power-Conversion System," in IEEE dual active bridge converter," 2017 IEEE 8th International
Transactions on Power Electronics, vol. 29, no. 8, pp. 4091- Symposium on Power Electronics for Distributed Generation
4106, Aug. 2014.doi: 10.1109/TPEL.2013.2289913. Systems (PEDG), Florianopolis, pp. 1-7, 2017.doi: 10.1109/
PEDG.2017.7972484.
[7] V. Karthikeyan and R. Gupta, "Zero circulating current modulation
for isolated bidirectional dual-active bridge DC-DC converter," [9] V. Karthikeyan and R. Gupta, "Varying phase angle control in
in IET Power Electronics, vol.9, no. 7, pp. 1553-1561, 6 8 isolated bidirectional DC-DC converter for integrating battery
2016.doi:.10.1049/iet-pel.2015.0475. storage and solar PV system in standalone mode," in IET Power
Electronics, vol. 10, no. 4, pp. 471-479, 31 3 2017.doi: 10.1049/
iet- pel.2016.0162.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 555
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Microcontroller based Feeder Protection From Over


Load and Earth Fault Relay
Dr. T. Ravi Kumar1, M.Deepika2, G. Srichandana3, M. Sindhusree4, SK.Umme Habiba5
1
Associate Professor, 2,3,4,5Student
1,2,3,4,5
Dept of EEE, Geethanjali Institute of Science and Technology, Nellore

Abstract:Distribution feeder protection could condition. Generally, the distribution feeder is the one
before long be convoluted by non-radial flows of which carries/transmits electricity from the generating
real and reactive power accessible from high station (or) substation to the distribution system. In these
infiltration disseminated age and conceivably from feeders there are no tapings are taken at the any ends,
miniature frameworks. Distinguishing ground
so the total current that is flowing in the feeder remain
issues in power circulation frameworks is a testing
same from the start to end. Some time because of the
task. The test comes from framework establishing
setup, load association, and accessible flaw current fault conditions these feeders may prone to the overload
from deficiencies with issue impedance. Because conditions. These over load conditions can be achieved
of the closeness of force appropriation lines to by the use of electromagnetic relay for the tripping of
homes and structures, ground flaws can represent the circuit breaker.By the use of these conventional
a danger through likely electrical contact or fire methods of using the electromagnetic relays, Latching
starting. The dangers expect utilities to reevaluate relays, Electronicrelays.etc may take some time and
the test of dependably distinguishing a ground issue also does not give the accurate value of the current
to limit the perils of a brought-down power line. which causes the over current. Also, by using these
This paper will exhibit the limits of non directional conventional methods the accurate Earth fault detection
over current assurance and the entanglements of
is very tough. This can achieved by using the micro
an inappropriately arranged directional component.
controller based circuit to detect the current and type
A novel arrangement utilizing directional over
current components further got by a heap of faults say the current that is causing in the phases or
infringement capacity can take care of these issues. due to earth fault.
This methodology has been approved in
1.1 Necessity of this paper
sustainable plant authority circuit assurance
applications over a wide scope of working By the increase in demand of electricity the protection
conditions. List Terms-Directional over current, also increased. This leads to the continuous supply of
circulated age, conveyance insurance, feeder electricity. The main aim of this paper is to protect the
assurance, future dissemination feeder, load bus bar from the over load current condition in a very
infringement, inexhaustible feeder security, Smart accurate way. Also, serving the Earth faults is also
Grid, VAR controls.
necessary for the smooth operation of the system.
1. INTRODUCTION Whenever the fault occurs and the protection is not
done in the times within recovery time, the devices may
Now a days continuous usage of electricity has
get damaged. In order to prevent the damage of the
become a necessity with the improvement in modern
feeders in the systems accurate tripping is required. The
life style. Continuous supply of electricity need to be
replacement of the faulty bus bar with the new one is
achieved by reducing the fault conditions in the various
time taking and not economical.
sections of the generation, Transmission and distribution.
One among them for the continuous distribution of By using this paper we can protect the circuit from
electricity is protecting the feeder from the fault over current faults in phases and ground by taking

556 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

minimum time to disconnect the fault circuit and also it consists of feeder.The right side of the paper is feeder.
provides the accurate tripping. It also provides the trip The feeder is the combination of three phase terminals
current at which the over load condition occurred and and neutral, three phase fuses and three phase circuit
it is displayed on the LCD. breakers. The three phase circuit breaker is connected
to three phases and has current transformers. This three
2. BLOCK DIAGRAM current transformers are connected to the R, Y, B phase
and one current transformer is connected to neutral.

Figure2:- Schematic diagram

It contains other terminals for connecting to the load.


In this we have the indicating lamps for indicating the
Figure1:- Block diagram
load current (or) load supply (or) load voltage. The
In this figure we can able to have two connections indicating lamps RYB indicate the load current. The
to serve both the phase and the earth faults. These two three loads are used for the RYB load and one load is
connections are equips with the current transformers. used to create the earth fault and over load. The AC
Then these are connected as inputs for the Line Current supply unit is combination of terminal blocks, toggle
to Voltage (LCTV) card and Neutral Current to Voltage switch, fuse and transformer. The transformer is having
(NCTV) card. After the conversion of the current from the primary voltage 230v and secondary voltage is 12v
these phases and neutral to voltage it fed to the MIC and9v.12v and 9v are connected to the power supply
which is microcontroller Ardunio Mega 2560. This card. The electronic part consists of power supply card,
Micro controller is considered as the heart of this paper. current sensing card, TAI card, Arduino, LCD display.
LCD is connected to the MIC to transfer the data from The power supply card is the combination of terminal
the MIC to display for easy user accessibility. Trip of blocks, rectifier, filter, small capacitors and LED.
Alarm Indicator Card (TCAI) is provided as the
feedback to the phase supply. Power supply (P S card)
card is used to supply the power to the circuit by using
a transformer is provided as an input for the LCTV,
NCTV and MIC.
3. SCHEMATIC DIAGRAM
The work is divided into two parts. One is electrical
and another one is electronic part. The electrical part
consists of AC supply unit and the electronic part

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 557
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4. WORKING in the system is connected in series with the power line


and sense the current flow in the power line. The output
of the current transformer is connected to the overload
circuit. Whenever the over current occurred, the circuit
will be tripped. To trip the circuit, we are using relay
which will control through our microcontroller.
5. COMPONENTS
The main components are used in the paper are
a) Power supply card.
b) Trip of alarm indicator.
c) Arduino mega 2560.
d) Liquid crystal display (LCD).
e) Current transformers.
f) On/Off push buttons.
g) Circuit breakers.
h) Indicators.
Figure3:- Hardware kit Power supply card:
Feeder protection is defined as the protection of
the feeder from the fault. So that the power grid
continues supply the energy. The feeder injects the
electrical energy from substation to the load end.
So it is essential to protect the feeder from the various
type of faults. In this paper we detect the exact earth
fault. This can be apply to LV voltage or medium voltage
or any type of voltage. Before accurate the earth fault
application is 220kv, 400kv and 800kv etc. Here the
micro controller ARDUINO is heart of our paper.
Feeder protection from overload is the prototype Figure4.1:- Power supply Card
module which consists of ARDUINO UNO micro The figure shows the power supply card that converts
controllers, current sensors, ADC0808, relay module, main AC to low voltage regulated DC power. It consists
16*2 LCD module, bulb, feeder supply and power of a full wave bridge rectifier 12v and 9v. A filter
supply. The automatic overload protection system circuit capacitor also added to get smooth DC and a regulated
has a current sensing unit to detect the over current of 12v and 9v also added in the circuit. This regulator
through the power line. The basic two reasons for the with supply a constant DC source will be supplied.
over current in a power line are over load and short There are four terminal connectors. The two numbers
circuit. So, when these faults occur in current sensor are input AC 12v & 9v and another two numbers are
gives a signal to the line controllercircuit. For generating DC 12v, 9v.
high current more loads are applied to the circuit, so
that the current will be increased in the current sensor

558 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Trip of alarm indicator card and Indicators: These inputs calculations will be done by
trigonometrically in microcontroller by program.
Outputs of microcontroller will be connected to trip
alarm card to trip the three phase circuit breaker.
Liquid crystal display:

Figure4.2:- Trip and Alarm Indicator


Figure4.4:- LCD
Inthis figure, purpose of an alarm system is to bring
a malfunction to the attention of operators and The above figure shows LCD(Liquid Crystal
maintenance. The trip and alarm system has its own Display). It is a flat panel display. It is used as display
sensors, logic and control elements. So that under failure screen in calculators. A 16*2 LCD display is connected
conditions. It will take the process to safe state and to arduino 2560 to display all three phase currents and
protect the environment. The outputs of arduino mega neutral currents. For displaying images the LCD's are
2560 are connected to trip alarm relay card driven by used in digital purpose.
2N2222A transistor. A single pole relay contacts are Current transformer:
connected in series with control circuit of feeder which
is driven by 12v DC supply.
Arduino mega 2560:
This is a micro controller 2560 assembled in arduino
will be protected and easy programmable kit. It has
multiple analog inputs & digital outputs. All inputs from
over current card, neutral card will be connected to
analog inputs
Figure4.5:- Current Transformers

The figure shows the current transformer of ratio


10A/100Ma with primary three turns and secondary is
connected 10ohms and 50ohms resistors as voltage
divider.
On/Off push buttons:
The push buttons are spring loaded returnable.
When the normal operation contactor will make contact
after pressing push button and vice versa.
Circuit breakers:
Circuit breakers are an essential part of the protection
Figure4.3:- Arduino Mega 2560 system of a electrical network.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 559
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Reduced hazards: This method minimizes time


contact between human and high voltage device. As it
is known, most substation devices have high voltage
and generate electromagnetic that can harm human
health. On the other hand, the exposure to high voltage
environment may also be able to cause risk to human
health. Therefore, an integrated monitoring system is
Figure4.6:-Circuit Breaker crucial to be implemented for easy monitoring the
substation while minimizing interaction of human to the
They automatically disconnect the circuit in the event
substation devices.
of fault occurs. Thus, preventing the damage to the
network and its equipment. The relay uses three Low Power Consumption: In this paper, we are
numbers of three phase circuit breakers. Two pins are using low power consumption type electronic equipment
used as load contacts and another two pins are used as such as GMS module which consumes 5V dc,
latching the relay. Microcontroller of 9V dc And TAI card of 12V dc,
etc. They consume very little power so maintenance
Indicators: cost also reduces.
Indicators are used to reflect the working state of Cost Effective: After incorporating this paper, we
the circuit. do not need to deploy a person at every place for
collection data, this reduction of manual force reduces
the labor cost to some extent. The sensors and
transducers employed also do not need regular
maintenance which in turn reduces the maintenance cost.
That means overall labor cost is reduced.
Accurate tripping time: this is the main advantage
in this paper. When the fault occurs in the system it may
be earth or phase fault, the tripping of the corresponding
faults which is related to the over load or over
current.The results that are showingfor the faults is having
Figure4.7:- Indicators
the accurate value and the time of showing the fault
An indicator lamp used commonly colors are red, immediately when occurs in the system.
green, yellow, white and blue. Yellow means stand by,
green means normal operation and red means Detect the earth fault immediately: when there
emergency stop. is an earth fault occurs in the system when it is
programmed by the microcontroller, the fault that can
Advantages: be showed by the system and immediately responds to
Real time monitoring: This is one of the main the fault and detects the fault immediately when it is
perspectives why we have chosen this paper in the first occurred in the system. This gives the protection to the
place. In most of the today's facilities lack in this point, entire system and there is no damage to the system.
because they don't have proper facility to fetch real Applications:
time data; they usually rely on the periodically collected
data that too manually collected. Thereby it is very tough This paper is used for protecting bus bars in
sometimes to judge the actual health of the machine we substation, generating station etc.It is used to industrial
are monitoring. What has been overcame though this appliance protection.This system is implemented in
paper. industries.This system can be used to monitoring and

560 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

controlling the home appliances High voltage current value then it trips the over load current which is
transformer as a backup protection. called over load fault.
Transformer protection is designed to limit the
damage and system disturbance caused by fault that
occurs in power transformer. Vey often the transformer
protection system must provide backup protection for
bus bars connected to the transformer sometimes the
transformer protection system is main protection for
bus bars connected to the transformer. In many cases
the transformer protection system provides backup
protection for power lines connected to these bus bars.
The transformer protection has to detect and determine
if it is shall operate on abnormal conditions and external
fault. In case of internal fault, the transformer protection
has to detect the fault and initiate the tripping of circuit
breakers. The transformer protection has to limit damage
to the transformer at overload and at low frequency.
The protection has to disconnect the consumers if
voltage becomes too high. Figure5.1:- Over load phase fault

CONCLUSION: Earth fault current:


In our paper we studied to attain control and Whenever there is a over load it gives earth fault.
monitoring of over load condition of feeder lines. The That means if the current is more than the setting value
conventional methods of detecting the faults in the then it trips earth fault which is called earth load fault.
feeders can be replaced by this practice of using the
microcontroller based method which is more accurate.
It also helps to protect the system from damage very
quickly after occurring of the fault. It can give the results
fastly and it has accurate tripping time. This improves
the life of the components but also side steps
unnecessary expenses in the frequent replacement of
components. Therefore pursues to protect a system
based on the microcontroller that will shrewdly monitors
the fault and prompts a safety measures in order to
guard the feeder in the time event of power overloading.
Result:
In this result, we have to set the values in arduino
which is called setting current value. Whenever the over
load occurs it gives phase fault (or) earth fault. Figure5.2:- Overload Earth Fault

Over load phase current:


If the load becomes increased then the current also
increased. When this current is more than the setting

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 561
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES: [5] B. Belvedere, M. Bianchi, A. Borghetti, C. A. Nucci and M.


Paolone et al "A Microcontroller-Based Power Management
[1] Amit Sachan, "Microcontroller based substation monitoring and System for Standalone Micro grids with Hybrid Power Supply"
control system with GSM modem" ISSN: 2278-1676 Volume 1, IEEE Transactions on Sustainable Energy, vol. 3, num. 3, p. 422-
Issue 6 (July-Aug. 2012), PP 13-21 431, 2012.
[2] Natalie Matta, Rana Rahim-Amoud, Leila MerghemBoulahia, [6] M. Frankowiak, R. Grosvenor, and P. Prickett, "A review of the
Akil Jrad, "A wireless sensor network for substation monitoring evolution of microcontroller-based machine and process
and control in the smart grid" (IEEE) monitoring", International Journal of Machine Tools and
[3] M. Kezunovic, Y. Guan, M.Ghavami, "New concept and solution Manufacture, vol. 45, pp. 573-582, 2005
for monitoring and control system for the 21st century substation"
(IEEE)
[4] Hao liang , Bong jun Choi , Atef Abdrabou , Weihua Zhuang and
Xuemin(Sherman) shen," Decentralized Economic Dispatch in
Micro grids via Heterogeneous Wireless Networks" ,IEEE Journal
on selected Areas in Communications: Smart grid
Communications, vol 30,no.6,pp.1061-1074,July 2012

562 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Power Factor Improvement in Modified Bridgeless


Landsman Converter Fed EV Battery Charger
S.Spandana1, M.Sekhar2
1
EEE Department, St.Mark College
2
Head of the Department, St.Mark College
Email: sekharlakshmisuneetha@gmail.com2

Abstract:-This work deals with the design and researcher is required. Certain efficacious control
implementation of a new charger for battery strategies need to be developed to integrate them with
operated electric vehicle (BEV) with power factor the existing distribution system. Some of the above
improvement at the frontend. In the proposed mentioned strategies are correlated with the power
configuration, the conventional diode converter at
quality issues addressed by the EV chargers that
the source end of existing electric vehicle (EV)
battery charger, is eliminated with modified
associate with the charging process of battery packs
Landsman power factor correction (PFC) converter. [4-5]. Therefore, an efficient power factor correction
The PFC converter is cascaded to a flyback (PFC) technique, which eliminates the adverse effects
isolated converter, which yields the EV battery of input DBR as well, is needed at the front-end of the
control to charge it, first in constant current mode conventional DBR fed charger.
then switching to constant voltage mode. The
proposed PFC converter is controlled using single
sensed entity to achieve the robust regulation of
DC-link voltage as well as to ensure the unity power
factor operation. The proposed topology offers
improved power quality, low device stress, low
input and output current ripple with low input
current harmonics when compared to the
conventional one. Moreover, to demonstrate the
conformity of proposed charger to an IEC 61000-
3-2 standard, a prototype is built and tested to
charge a 48V EV battery of 100Ah capacity, under
transients in input voltage. The performance of the
charger is found satisfactory for all the cases.

INTRODUCTION
Fig. 1 Conventional E-Rickshaw Battery Charger: (a)
With the strict supervision on emissions, fuel savings, Configuration (b) Measured input current, input power and
THD in input current
global warming issues and limited energy resources, the
contribution of electric mobility is significant towards
the development of sustainable and efficient alternative
in the transport sector [1-2]. Regarding this, a survey
based on the present scenario and future technologies
for the propulsion of electric vehicle (EV), are presented
in [3]. The electric mobility provides several advantages
over the conventional petrol- and diesel-powered
vehicles. However, to incorporate the transportation
electrification thoroughly, deep attention of the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 563
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE I. SPECIFICATION OF E-RICKSHAW UNDER Fig. The two circuit configurations of a buck converter: On-
CONSIDERATION state, when the switch is closed, and Off-state, when the
switch is open
CONVERTERS
BUCK CONVERTER
A buck converter is a step-down DC to DC
converter. Its design is similar to the step-up boost
converter, and like the boost converter it is a switched-
mode power supply that uses two switches (a transistor
and a diode), an inductor and a capacitor.
The simplest way to reduce a DC voltage is to use a Fig Naming conventions of the components, voltages and
current of the buck converter.
voltage divider circuit, but voltage dividers waste energy,
since they operate by bleeding off excess power as
heat; also, output voltage isn't regulated (varies with
input voltage). Buck converters, on the other hand, can
be remarkably efficient (easily up to 95% for integrated
circuits) and self-regulating, making them useful for tasks
such as converting the 12-24 V typical battery voltage
in a laptop down to the few volts needed by the
processor.
Theory of operation

Fig.Evolution of the voltages and currents with time in an


ideal buck converter operating in continuous mode.

The operation of the buck converter is fairly simple,


with an inductor and two switches (usually a transistor
and a diode) that control the inductor. It alternates
between connecting the inductor to source voltage to
store energy in the inductor and discharging the inductor
into the load.
Fig Buck converter circuit diagram

564 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

CONTINUOUS MODE So we can write from the above equations:


A buck converter operates in continuous mode if
the current through the inductor (IL) never falls to zero
during the commutation cycle. In this mode, the
operating principle is described by the chronogram in It is worth noting that the above integrations can be
figure: done graphically: In figure 4, is proportional to
the area of the yellow surface, and to the area
• When the switch pictured above is closed (On-state,
top of figure 2), the voltage across the inductor is VL
of the orange surface, as these surfaces are defined by
= Vi - Vo. The current through the inductor rises the inductor voltage (red) curve. As these surfaces are
linearly. As the diode is reverse-biased by the voltage simple rectangles, their areas can be found easily:
source V, no current flows through it; for the yellow rectangle and -Votofff for
• When the switch is opened (off state, bottom of figure the orange one. For steady state operation, these areas
2), the diode is forward biased. The voltage across must be equal.
the inductor is VL = -Vo(neglecting diode drop). BOOST CONVERTER
Current IL decreases.
A boost converter (step-up converter) is a power
The energy stored in inductor L is
converter with an output DC voltage greater than its
input DC voltage. It is a class of switching-mode power
supply (SMPS) containing at least two semiconductor
Therefore, it can be seen that the energy stored in L switches (a diode and a transistor) and at least one
increases during On-time (as IL increases) and then energy storage element.
decreases during the Off-state. L is used to transfer
energy from the input to the output of the converter.
The rate of change of IL can be calculated from:

With VL equal to Vi -Vo during the On-state and to


Fig 2.6 Boost converter circuit diagram
-Vo during the Off-state. Therefore, the increase in
current during the On-state is given by: Power can also come from DC sources such as
batteries, solar panels, rectifiers and DC generators. A
process that changes one DC voltage to a different DC
voltage is called DC to DC conversion.

Identically, the decrease in current during the Off- PWM TECHNIQ


state is given by:
PULSEWIDTH MODULATION
Pulse Width Modulation (PWM) is the most effective
means to achieve constant voltage battery charging by
switching the solar system controller's power devices.
If we assume that the converter operates in steady When in PWM regulation, the current from the solar
state, the energy stored in each component at the end array tapers according to the battery's condition and
of a commutation cycle T is equal to that at the beginning recharging needs Consider a waveform such as this:
of the cycle. That means that the current IL is the same
at t=0 and at t=T (see figure 4). Therefore,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 565
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig.switch pulse from 0 to 12v with smaller pulse width

Similarly, if the switches keep the voltage at 12 for


3 times as long as at 0v, the average will be 3/4 of 12v Fig Simulink diagram of battery model
- or 9v, as shown below.
CONTROL UNIT
In this work, through BBDC the dc link side is
connected tobatteries bank. The objective of the control
of this BBDC is tomaintain constant dc-link voltage as
a reference value in addition to discharge/charge current
from/to battery bank according tothe required load
power.
Fig.switch pulse from 0 to 12v with larger pulse widthand if
the output pulse of 12v lasts only 25% of the overall time,
then the average is

Fig The schematic diagram of BBDC converter controller


Fig.switch pulse from 12 to 0v with larger pulse width
PI CONTROLLER
BATTERY AND CONTROL UNIT
The general block diagram of the PI speed controller
BATTERY is shown in Figure 2
A battery is modelled using a simple series
connectedcontrolled voltage source with a constant
resistive value. The controlled voltage source is
described by
E=Eo-KQ-ƒidt+Aexp(-BƒQidt)(6) Fig Block Diagram of PI Speed Controller

Where E0 is the no load battery voltage (V). ADVANTAGES AND DISADVANTAGES


• The integral term in a PI controller causes the steady-
state error to reduce to zero, which is not the case
for proportional-only control in general.
• The lack of derivative action may make the system
more steady in the steady state in the case of noisy

566 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

data. This is because derivative action is more capability. Simulink is a tool used to visually program a
sensitive to higher-frequency terms in the inputs. dynamic system (those governed by Differential
• Without derivative action, a PI-controlled system is equations) and look at results.
less responsive to real (non-noise) and relatively fast
CONCEPT OF SIGNAL AND LOGIC FLOW:
alterations in state and so the system will be slower
to reach setpoint and slower to respond to In Simulink, data/information from various blocks
perturbations than a well-tuned PID system may be. are sent to another block by lines connecting the relevant
blocks. Signals can be generated and fed into blocks
METHOD FOR TUNING PI CONTROLLER
dynamic / static).Data can be fed into functions. Data
PI-controllers have been applied to control almost can then be dumped into sinks, which could be scopes,
any process one could think of, from aerospace to displays or could be saved to a file. Data can be
motion control, from slow to fast systems. With changes connected from one block to another, can be branched,
in system dynamics and variation in operating points multiplexed etc.
PI-controllers should be retuned on a regular basis.
Adaptive PI-controllers avoid time-consuming manual
tuning by providing optimal PI-controllers settings
automatically as the system dynamics or operating points
change. There are various conventional methods used
for tuning of PI-controller such as
1. Trial and error
2. Continuous cycling method (Ziegler Nichols method)
3. Process Reaction Curve Methods (Ziegler-Nichols
and Cohen-Coon methods)
Fig4.1 Simulink library browser
4. Ziegler-Nichols method (both types of responses)
5. Cohen-Coon method (self regulating response only) Connecting blocks:

MATLAB SOFTWARE
Matlab is a high-performance language for technical
computing. It integrates computation, visualization, and
programming in an easy-to-use environment where
problems and solutions are expressed in familiar
mathematical notation. Typical uses include Math and
computation Algorithm development Data acquisition
Modeling, simulation, and prototyping Data analysis,
exploration, and visualization Scientific and engineering
graphics Application development, including graphical Fig 4.2 Connecting blocks

user interface building. To connect blocks, left-click and drag the mouse
from the output of one block to the inputof another
SIMULINK:
block.
Simulink is a software add-on to matlab which is a
mathematical tool developed by The Math works,(http:/ SOURCES AND SINKS:
/www.mathworks.com) a company based in Natick. The sources library contains the sources of data/
Matlab is powered by extensive numerical analysis signals that one would use in a dynamic system

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 567
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

simulation. One may want to use a constant input, a difficult to arrive at an analytical solution for a system
sinusoidal wave, a step, a repeating sequence such as having non-linearity's such as saturation, signup function,
a pulse train, a ramp etc. One may want to test limited slew rates etc.
disturbance effects, and can use the random signal
generator to simulate noise. The clock may be used to
create a time index for plotting purposes. The ground
could be used to connect to any unused port, to avoid
warning messages indicating unconnected ports.

Fig simulink blocks

Mathematical operations:
Fig Sources and sinks Mathematical operators such as products, sum,
logical operations such as and, or, etc. .can be
CONTINUOUS AND DISCRETE SYSTEMS: programmed along with the signal flow. Matrix
All dynamic systems can be analyzed as continuous multiplication becomes easy with the matrix gain block.
or discrete time systems. Simulink allows you to Trigonometric functions such as sin or tan inverse (at
represent these systems using transfer functions, an) are also available. Relational operators such as
integration blocks, delay blocks etc. 'equal to', 'greater than' etc. can also be used in logic
circuits

Fig Simulink math blocks

Fig 4.4 continuous and discrete systems

Non-linear operators:
A main advantage of using tools such as Simulink is
the ability to simulate non-linear systems and arrive at
results without having to solve analytically. It is very

568 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

SIMULATION RESULTS CONCLUSION


An improved EV charger with modified BL
Landsman converter followed by a flyback converter
has been proposed, analyzed, and validated in this work
to charge an EV battery with inherent PF Correction.
The design and control of the proposed EV charger in
DCM mode have offered the advantage of reduced
number of sensors at the output. Moreover, the
proposed BL converter has reduced the input and output
current ripples due to inductors both in input and output
of the converter.
FUTURE WORK
Along with the current THD and PF regulatory
requirements, a set of regulation for power efficiency
and system performance might be planned and enforced
in the upcoming era. The new requirements for the
above regulations is expected to provide the platform
for a new research area where the researchers and
industries can join to address these new challenges. The
future scope for the proposed work is enlisted as
follows. 1) The efficiency and power level could be
increased to provide fast charging to the battery.
REFERENCES
[1] WencongSu, HabiballahEichi, WenteZeng and Mo-Yuen Chow,
"A survey on the electrification of transportation in a smart grid
environment," IEEE Transactions Industrial Informatics, vol.8,
no.1, pp.1-10, Feb. 2012.
[2] ChingChuen Chan, "The state of the art of electric, hybrid, and
fuel cell vehicles," Proc. IEEE, vol.95, no.4, pp.704-718, Apr.
2007.
[3] KaushikRajashekara, "Present status and future trends in electric
vehicle propulsion technologies," IEEE J. Emerg. Sel. Topics
Power Electronics, vol.1, no.1, pp.3-10, Mar. 2013.
[4] Juan C. Gomez and Medhat M. Morcos, "Impact of EV battery
chargers on the power quality of distribution systems," IEEE
Transactions Power Del., vol.18, no.3, pp.975-981, Jul. 2003.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 569
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

An Artificial Intelligence Based Solar Tracking System


C.Harika1, B.Ramya2, Dr.K.Sudheer3, Dr.P.Suresh4
1,2,3,4
Dept.of EEE, SVCE Tirupati,India
Email: Chennupatiharika8050@gmail.com1, badurramya1@gmail.com2

Abstract-This paper presented the use of Recently, new control technique and technological
artificial intelligent based neural network control have appeared suggesting that new approaches could
tracking systemfor better harnessing of sun's be found on thebasis of intelligent mechatronic
energy. The sun tracking aalgorithm is developed systems.Since the maximumamount of solar energy,
to track sun position to receive maximum solar
captured by the solar cell, is related to the accuracy for
radiations. Robotic arm with four degreeof freedom
tracking sun'sposition,then a high efficient sun tracking
was used as a mechanical structure to position the
solar cell under the sun for greater flexibility. The controller should be considered. In previous years
implementation of the artificial intelligent control several methods have been proposed to improve
solar tracking system was done while the testing tracking systems for following the trakectory of the sun
was conductedthrough experimental measurement. basedon orientation and tilt motion control. These
From the result, the power output of solar cell methods includes: optimizing tilt and orientation angles
placed on artificial intelligent robotic arm tracking of solar usinggeographical latitudes information.In this
system produced twenty percentincrease when paper, the most relevant prominent control method, in
compared with that of fixed position solar cell. solar applications have been introduced in the field of
Keyword-solar tracking, solar cell, neutral artificial intelligent which include; robotic arm tracking
network sunposition systems using neural network control based on light
sensors, ambient temperature and electric load
1. INTRODUCTION
variations. The characteristic of the solar radiation are
The world demand of electrical powerhas been constantly variable. The atmospheric conditions, climate,
increasing rapidly every day. In Nigeria, the major the geographiccharacteristics, among others, are the
source of electricity generation is through Hydro and most important to parameters thatdetermine the solar
thermal. The fact that theproduct ofpetroleum products radiation quantity that is received on a given point of
and gases were convertedintoelectricitymakesthe cost the earth. The characteristics above were considered
of petroleumproductsexpensive in Nigeria. Thesun in the implementation of the robotic arm sun tracking
beingarenewable andunlimited source of energy has system. Experimental resultsvalidate the performance
been found to be vital alternative. Extracting of the tracking system.
usableelectricity from the sun was made possible by
the discovery of the photoelectric effect and subsequent 2. SUN POSITION MODEL
development of solar cell, a semi-conductivematerial The position of a point P on the earth's surface with
that convert visible light into electricity directly. respectto the sun's rays is known at any instant if the
Researchers in the field of photovoltaic are faced latitude, l, and hour angle, h, for the point, and the sun's
with thetask of looking for solutions that can make solar declination angle, d, are known. It is explained in Figure.
cells moreefficient.One of reliable ways that can 1
enhance the poweroutput of solar is the use of solar
tracking systems Although our conventional tracking
systems have their own limitation.

570 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the sun's declination is zero at the two equinoxes [ ].


The declination angle is given by d=23.45 sin [360/
365(284+n)] (degrees)

Figures 1: Latitude, hour angle and Sun's declination angles

(a) Latitude
Latitude, l, is the angular distance of the point P north
(or south) of the equator. It is the angle between OP
and the projection of OP on the equatorial plane
Armstrong S. (2005). The centre of the earth is denoted 3. CALCULATION OF CLOCK TIME AND
by O. North latitudes are considered positive and south SOLARTIME
latitudes are considered negative.
Calculation of sun position must be made in terms
(b). Hour Angle of solar time. In order to know sun position, we are to
convert local clock time into solar time. The conversion
The hour angle, h, is the angle measured in the earth's
between solar time and clock time requires knowledge
equatorial plane between the projection of OP and the
of the location, the day of the year, and the standards
projection of a line from the centre of the sun to the
to which local clocks are set. Time of Greenwich
centre of the earth. It is measure from local solar noon,
meridian (zero longitude) is knownas Greenwich Civil
being positive in the morning and negative in the
Time or Universal Time.Such time is expressed on an
afternoon. Onehour of time is represented by 360/
hour scale from zero to 24.
24=15 degrees of hour angle.
Local Civil Time is found from the precise longitude
(c) Delination Angle of the observer. On any particular meridian, Local Civil
The plane that includes the earth's equator is called time is more advanced at the same instant than on any
the equatorial plane. If a line is drawn between the center meridian further west and less advanced than on any
of the earth and the sun, the angle between this line and meridian further east. [Armstrong .S (2005). The
the earth's equatorial plane is called the declination. difference amounts to 1/15 hour (4 minutes) of time for
Henry .S. (2014).The declination is positive when the each degree difference in longitude.
sun's rays are north of the equator and negative when Clocks are generally set to give the same reading
they are south of the equator. At the time of dry season, throughout an entire area with a span of about 15
the sun's rays are 23.5 degrees south of the earth's degrees of longitude. The time kept in each such area
equator and the sun's rays are 23.5 degrees north of or zone is the Local Civil Time of a meridian near the
the earth's equator. At the time of the canney season, centre of the area.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 571
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Such time is called Standard Time. In many parts of After calculating Local Solar Time, the solar hour
the world, clocks are advanced beyond Standard time angle, h can be calculated. As hour angle varies by 15
in Daytime and such time is called Daylight saving time. degrees per hour and as it is zero at solar noon, and
Time measured with respect to the apparent diurnal negative before solar noon, the equation for the hour
motion of the sun is called Apparent Solar time, Local angle can be given by
Solar Time, or simply Solar time. A solar day is slightly Suugur B (2007)
different from a 24 hours civil day due to irregularities h = 15(LST - 12)………………………… (3)
of the earth's rotation, obliquity of the earth's orbit and
some other factors. The difference between Local Solar 4. MODELLING OF SOLAR CELL
Time, LST and Local Civil Time, LCT is known as the The simplified equivalent circuit of a solar cell consists
equation of time. of a diode and a current source connected in parallel
The solar time and the clock time can be related as (Fig. 2.). The current source produces the photocurrent
LST = G+ (1 15) (L STD -L loc ) + EOT - Iph, which is directly proportional to solar irradiance.
DT……… (1) The two key parameters often used to characterize a
solar cell are its short-circuit current and its open-circuit
Where, voltage which are provided by the manufacturer's data
LST= Local solar time [hr] sheet. The equation ofthe current voltage Ipv-Vpv
simplified equivalent circuit is derived from Kirchhoff's
CT= Clock Time [hr] law.
L STD = Standard meridian of the local time zone. We have
Lloc= Longitude of actual location [degrees west] Ipv = Iph - Id--------------------------. (4)
EOT= Equation of time [hrs]. Where
DT= Daylight Savings Time correction, ( DT=0 if Id = I0
not on
-
Daylight savings time, otherwise DT is equal to the
number of hours that the time is advanced for daylight 1 …………………………………......(5)
savings time, usually 1hr). Thus
Values of the Equation of Time, E, are calculated as IPV = Iph - I0
[2] -
-
E=0.165 sin 2B - 0.126 cos B - 0.025 sin B
……..(2) 1 ……………………….….................(6)

Where, B= with Iph is the photocurrent that is equal to short-


circuitcurrent, I0 (A) is the reverse saturation current
360 of the diode, q is the electron charge (1.602 x 10-19
364 C), K Botzman's constant (1.381910-23 J/K), A is
diode ideality factor. Tj is junction temperature of the
and n is the day of the year. panels (K), Id is the current shunted through the intrinsic
Thus, in order to relate local solar time with clock diode,
time, we are to consider two correction factors apart
from daylight saving time, which are longitude correction
and equation of time.

572 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Figure 3: shows the neural Network flow cart of the system


operation.

Vpv is the voltage across the solar cell.


IPV = Isc - I0
-1 …………………………(7)
We can determine the reverse saturation current I0
by setting Ipv=0 (case when no output current).
Iph = 0
Vpv = Voc
0 = Iph - I0
-1 ……………………………(8) 7. IMPLEMENTATION OF ARTIFICIAL
NEURALNETWORK
The technique we adopted in the implementation of
Artificial Neutral network is called perturb and observe
(P and O) method. In this method, power output of the
solar cell is monitored every cycle and is compared to
its Value before each Perturbation is made. If a change
(either positive or negative) in the duty cycle of the DC-
Figure 2: Solar Cell Model DC converter causes output power to increase, the duty
cycle is changed in the same direction. If it causes the
Thus we obtain, taking into account the fact that,
output powerto decrease, then it is reversed to the
with this model
opposite direction Femia N (2005). Perturb and
6. ARTIFICIAL NEURAL NETWORK observe method is simulated in Math lab Simulink.
Figure 3.2 shows the simulink model of solar intensity
A neuron is a cell made up of a cellular body and a
with time of the day. The model illustrates the variation
cone in which the cellular body ramifies to form the
of solar intensity with respect to time. The neutral
dendrites dendrites transfer the information between the
network was trained to understand the behavior of solar
neuron and the soma, body of the neuron. There is an
radiations with time. This was done by using the values
intercellular space between the axon of the related
of measured solar radiations during the training process.
neuron works like a valve controlling the rate of flow of
information and is called as synapse. It is necessary to Figure 3.3 shows the simulink model of robotic arm
parameterize all these synapse to achieve a goal. The with four degree of freedom. The robotic arm was
neural network works according to equation……(13) designed in such a way that the movement of the arm is
controlled by neural network.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 573
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

8. EXPERIMENTAL SETUP CONCLUSION


This experimental work was performed at Abakpa A method for optimal use of solar energy generated
Nike Enugu Nigeria. The Geographical location has been developed. An advanced technology of
include:- artificial intelligent based on the neural network control
Latitude between 6.200N and 10.400N and or robotic arm tracking system was implemented.
Longitude between 8.200E and 11.500W. In this Experimental measurements, that validates the
experiment, a solar cell rating of 4w was used. The performance of the system was conducted. From the
power output of the solar cell place on fixed position result, the power output of a solar cell placed on ANN
and that of solar cell placed on artificial Neural Network robotic arm tracking system shows 20% increase when
robotic tracking system was compared control. compared to that of solar cell placed on the fixed
position.
The experimental measurement on this work was
done in the month of June 2014. The experiment setup REFERENCES
was shown in figure 6. Figure 7 shows the graph of 1. Ainuchi R. (2006): "Grid Connected Photovoltaic Generation
values obtained. System with Adaptive Step- Perturbation method and active sun
tracking Scheme" IEEE.
2. Ani K. (2011) "Simulation Model of ANN based Maximum Power
Point tracking controller for solar PV system" Solar Energy
material and solar cell pages( 4) 773-778.
3. Armstrong .S (2005)' "Sun-Tracking System with PLC Control
for Photo-Voltaic Panels" International Journals of Green energy,
pages (): 635-643.
4. Awachie .L. (2003): "Solar Energy in Progress and Future
Research Trends". USA Addison Wesley Publishing.
5. Canberra S. (2004): "Design of a Traditional Solar Tracking
System". AIP Conference Proceedings 6/15/2004 page 151-158.
6. Femia N. (2005) "Optimization of perturb and ObserveMaximum
power point tracking method". IEEE Transaction on Power
Electronics pages 963-973.

Figure : Test Bed for Measurement Set Up 7. Henry S. (2014): "Maximum Power Tracking for Photovoltaic
Power System: Development and Experimental Comparison of
two algorithms. Renewable Energy, 35, 2381-2387.
8. Hughes R.O. (2004): "Robust Tracking and Model following the
certain dynamic Delay systems by Memoryless Linear
Controllers". IEEE Transactions on Automatic Control, page
1473-1481.
9. Romanaova P. (2012): "Theoretical Investigation of Energy Gain
by Absorption of Solar Radiation in Clouds pergamon Press
England.
10. Suugur B. (2007): "A Modified Tracking Algorithm for Maximum
Power Tracking of Solar Array. Energy.

Figure : Graph of Power Comprision between p1 and p2

574 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Relay Control and Operation for 220KV Feeder


Murali Dasari1, A.Nandini2, P. Sreevidya3, M.Jyothi Reddy4, L.Divya5
1
Associate Professor, 2,3,4,5Students
1,2,3,4,5
Dept of EEE, Geethanjali Institute of Science and Technology, Nellore

Abstract: The purpose of this paper is to acquire security. A powersystem consists of components such
the remote electrical parameters like feeders as generators, lines, transformers, loads, switches, and
status ON, OFF along with these it sends the values compensators. However, widely dispersed power
of current or voltage in the form of alerts to control sources and loads are the general configurations of
room / personnel through the WIFI. This paper is
modern power systems. Today electricity still suffers
also designed to protect the electrical circuitry by
from power outages and blackouts due to the lack of
operating a relay. This relay gets activated
whenever the electrical parameters exceed the automated analysis and poor visibility of the utility over
predefined values. This system can be designed the grid. As the complexity of the distribution network
to send alerts whenever the relay status on and off has grown, automation of substations has become a
or whenever the voltage or current exceeds the need of every utility company to increase its efficiency
predefined limits. This paper makes use of a and to improve the quality of power being delivered.
microcontroller, in this paper ESP32 Micro Monitoring the status of the feeder can be done in May
controller is used it having built in WIFI. The was, but here we are considering the GSM module for
controller can efficiently communicate with the monitoring in the form of SMS tomobile. Supply Circuit,
different sensors being used and it is programmed Current and voltage sensing circuit, Current
with C++ language. This system also can
Transformer, a relays circuit, and a usermobile better
automatically send the real-time electrical
known as a cellphone.
parameters when the status is changed in the form
ofSMS. This system can be designed to send SMS II. BRIEF OVERVIEW OF THEPAPER
alerts whenever the feeder status changes on, off
or whenever the current exceeds the predefined The purpose of this paper is to acquire the remote
limits. electrical parameters like voltage, current, and real- time
status of the feeder in a substation or factory and send
Keywords:ESP 32 Microcontroller, Relay,
Feeder,LCD,IPOP Card, Current sensing Card, these real-time values over the network using theWIFI
current transformer. module. This paper is also designed to protect the
electrical circuitry by operating an Electromagnetic relay.
I. INTRODUCTION (FIRST This relay gets activated whenever the electrical
LEVELHEADING) parameters exceed the predefined values. The relay can
Electricity is an extremely handy and useful form of be used to switch off the electrical supply to the outgoing
energy. It playsanever-growing role in our moderni feeder of a substation. Here mainly we are monitoring
ndustrialized society. The electrical power systems are three conditions, those are whether the Circuitbreaker
highly non-linear, extremely huge, and complex is in an off state, on, or tripped. This system can be
networks. Such electric power systems are unified for designed to send alerts whenever the relay trips or
economic benefits, increased reliability, and operational whenever the voltage or current exceeds the predefined
advantages. They are one of the most significant limits in the form of SMS to mobile.
elements of both national and global infrastructure, and
when these systems collapse it leads to major direct
and indirect impacts on the economy and national

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 575
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. NECESSITY OF THE PAPER iii. To Maintain Continuity of supply


As the complexity of the distribution network has By keeping track on the real time parameters, we
grown, automation of substations has become a need want to maintain the continuity of the supply.
of every utility company to increase its efficiency and
to improve the quality of power being delivered. Today iv. To Reduce labour cost
electricity still suffers from power outages and blackouts One of the main objectives of our paper is to reduce
due to the lack of automated analysis and poor visibility the labour cost to some extent which will make the facility
of the utility over the grid. Here in this paper, we more economical.
developed the only monitoring status of the feeder in a
v. Benefits of ThePaper Real timemonitoring
substation orfactory.
This is one of the main perspectives why we have
The main object behind our paper is that we can
chosen this paper in the first place. In most of the today's
monitor the status of the substation at any remote
facilities lackin this point, because they don't have
location through your mobile. For this purpose, we are
proper facility to fetch real time data; they usually rely
using ESP 32 Microcontroller having Built in WIFI. At
on the periodically collected data that too manually
the same time for safety purposes, we will display the
collected. Thereby it is very tough sometimes to judge
same status of the feeder at the LCD which we are
the actual health of the machine we are monitoring. What
going to be placed at the substation. From this
has been overcame though this paper. Here we are able
monitoring, we can get the real-time status of the feeder.
to monitor the real time data of the machine irrespective
The same monitoring can also be extended to monitor
of fault.
the required status of the factory. Labor cost to monitor
feeder of a substation also reduced, a single person vi. Helpful for Fault Management
can monitor the status of Number of Substations
Monitoring means acquiring parameters from the
through his mobile with minimal cost by introducing the
assets of interest. The data obtained is of great
same setup to thosesubstations.
importance for fault management and scheduled
IV. SALIENT OBJECTIVES OF THE PAPER maintenance. By promoting modern and competitive
techniques and equipment for continuous monitoring and
i. To improve reliability and compatibility diagnosis, it is possible to track natural or accidental
This is one of the main objectives of our paper to degradation over time; if identified in time and remedied,
improvethe reliability of the power being delivered by it will not generate serious events which may be sources
speedy detection and isolation of the fault and of extremely costly damage for electricity suppliers and
maintaining a constant voltage level, which will make consumers. At the same time, it is possible to extend
the paper utmost reliable andcompatible. the life of the equipment, optimize the maintenance
program, and reduce the outages and expenses for the
ii. Real time monitoring planned repairs of thefacility.
This is one of the main advantages of this paper. All
the real- time data collected using the GSM module vii. Remote Access
and transfer to the mobile. So, through this paper, we This is one of the main advantages of this paper. All
can monitor the status of the feeder at any Geographical the real time status of a feeder is monitor through mobile
location where you have the mobile signal. This means using GSM (Global System for Mobile
we do not need to go to the control room to physically Communications) module, which enables us to get all
check the data. the real time data at its ease remotely.
Which means we do not need to go the control room
to physically check the data.

576 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

viii. Personalized alert over fault Function of Block Diagram


By incorporating this paper, we can get Personalized Figure 1.1 shows the basic block diagram of this
alerts over any sort of discrepancies i.e., whenever the paper. The block diagram consists of various
electrical parameters exceed the predefined values. We components like circuit breaker, current sensing
have incorporated relays which acts over and physically card(C.S), LCD i.e. Liquid crystal display ,IPOP card
isolates the machines where disturbances occur. i.e. Input and output card. ESP 32 Microcontroller,
Current transformer, Feeder.
ix. Reduce Hazards:
The Current Transformer primary is connected to
In larger switchyards there are lot of high voltage the feeder and its secondary is connected to the Current
equipment's. Which are hazardous for the working sensing (CS) card. CT (Current Transformer) will
personnel. Through our paper as we can remotely measure the amount of current flowing in the feeder
observe and collect all the required data, thereby it continuously and it will give the information to the
reduces hazards. Current sensing(CS) card.
x. Cost effective This Current Sensing Card will convert the current
After incorporating this paper, we do not need to signal into the required Voltage level and transmitted it
deploy person at every place for collection data, this microcontroller
reduction of manual force reduces the labor cost to The microcontroller will take information from the
some extent. The sensors and transducers employed IPOP card. We are programming the microcontroller
also does not need regular maintenance which in turn in such a manner that it takes the voltage from the CS
reduces the maintenance cost. That means overall labor card and it also takes information from the IPOP card
cost isreduced. and give the input signal to the LCD modules.
V. BASIC BLOCK DIAGRAM AND IPOP card takes the input from the feeder and supply
ITSFUNCTION of this card is taken from power supply card and it
transfersthesignalstothemicrocontroller .Microcontroller
is coded with C++ programming and it will
communicates the LCD display and here it shows the
status of feeder i.e. ON,OFF along with the current or
voltage values and it send alert message to the control
room and respective substation engineer the same
information which we got an SMS will be displayed on
LCDDisplay.
VI. INTERFACING OF
MICROCONTROLLER WITH LCD
MODULES:

Fig 1 Basic block diagram


Fig 2 Interfacing of microcontroller with LCD

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 577
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Figure shows the interfacing of microcontroller with In this paper 220KV feeders are used. Feeders
LCD,pin26 i.e. SDA and pin 29 SCL, VCC, Ground transmits electrical energy from substation or generating
pins are connected to LCD. LCD takes information station to distribution. Feeder is also known as switch
from the ESP32 Microcontroller through the above gear unit. Switch gear is a combination of busbar,
mentioned pins. isolator toggle switch .12v supply is given to the switch
gear from the step down transformer. Current
VII. COMPONENTS USED IN PROPOSED transformer is connected to the incoming feeder which
PAPER will continuously sense the Current to the current sensing
Basically, we classify the components of our card based on the program in the microcontroller itsend
proposed paper into two categories they are Electrical signals of feeder status along with current or voltage
Components and Electronic Components as shown in values. circuit breaker and earth switch is connected to
figure 4 the feeder. That circuit breaker and earth switch is
interlocked witheach other.
In this 2 pole PLA relay will act as the circuit breaker.
when we switch on the power supply then the circuit
breaker beon and then switch on the load in this paper
40W choke be acts as aload. If one is on i.e. circuit
breaker is on state then Earth switch should be in Off
state for this purpose interlocks are provided between
the circuit breaker and Earth switch. In this 2 pole
change over relay will acts as a Earth switch.
2. ESP32 Microcontroller:

Figure3: Diagram of components used

1. Feeder / Switch Gear Unit

Figure 5:ESP32Microcontroller:

ESP 32 is a low cost system on chip (soc)


microcontroller from Espressif systems, the developers
of the famous ESP8266 soc.
Important thing to know about ESP32 is that it is
manufactured using TSMC's ultra-low power
40nmtechnology. so, designing battery operated
Figure3:diagram of feeder/switch gear unit. applications like wearable's, audio equipment, smart
watches etc.

578 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Specifications of ESP32: 6. Power Supply Card:


Single or dual core 32 bitmicroprocessor.
34 programmable GPIO'S.
Supports 802.11b/g/n WI-FI connectivity with
speeds up to 150Mbps.
Secure boot and flashencryption.
Motor PWM and up to 16- channels of
LEDPWM.Different ways toprogram:
ArduinoIDE.
Javascript
Micro python.
Embedded c language.
3. Current sensing card:
The current sensing card is responsible for measuring
the output current from the current transformer. It is
continuously sense the current from the feeder and
converts this sensed current into voltage with the help
of current sensing card .the voltage of this is fed to the
microcontroller. Fig6: Power Supply card:

4. IPOP Card: Power supply card is used to supply the power i.e.
5VDC to the ESP32 Microcontroller. It is the
IPOP Card stands for input and output card .it takes combination of SMPS, step down transformer, full wave
supply from the SMPS 12V DC for functionality of bridge rectifier. when step down transformer input is
IPOP card. Since all the electronic devices works on 230v and it gives 12v AC from this full wave bridge
DC supply. In this paper rectifier is used to convert ac to dc and it fed to the
5. LCD Display: capacitor for smoothening the dc voltage . Here, in this
paper power supply card supplies dc power i.e. 12v
LCD stands for Liquid Crystal Display it is used the dc to the circuit breaker and earth switch. And it supplies
display the status of feeder along with this it displays 5v dc to the ESP32 Microcontroller because the
current or voltage values of the feeder. ESP32 microcontroller takes 5v dc for functionality.
Microcontroller is communicates the LCD. IPOP takes
inputs from the feeder and gives signals to the ESP32 Explanation of proposed paper:
microcontroller through the output card. The main theme of this paper is to monitor the status
of the feeder through mobile at any remote location
through the WIFI. In this paper ESP 32 microcontroller
is used.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 579
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VIII. SCHEMATIC DIAGRAM AND ITS When 12v dc supply is connected to the IPOP card
OPERATION i.e. input and output card. It is a combination of terminal
connectors,diodes, 4N 35optocouplers, resistors,
2N22A transistors and LEDs. The function of this card
is input of HMI is given to IPOP card then further it will
be connected to ESP32 Microcontroller. and the output
of the ESP 32 is connected to IPOP card since the
output generated by the ESP32 is not sufficient to Drive
the electromagnetic relays i.e. circuit breakers so, the
output of the ESP 32 is amplified by a transistor 2N22A
and the amplified voltage is given to the electromagnetic
relays which acts asa circuit breaker and Earth switch
coming to the feeder or switch gear unit it is a
combination of current transformer, toggle switch, trip
indicator, circuit breaker and earth switch at last load is
used. The output of the current transformer is fed to
the current sensing card this card continuously sensing
the current and it convert the current into voltage and
Fig 7: Schematic Diagram
voltage is connected to ESP32.
Figure shows the schematic diagram of this paper.
When circuit breaker is on and close the earth switch
This schematic can be divided into two parts one is
so, that the residual voltage discharged to the
electrical and another one is electronics. Electrical parts
ground.since this feeder .finally ESP32 microcontroller
consists of AC system, Feeder and coming to the
it takes inputs from the IPOP card and C.S card based
electronics part it consists of IPOP,ESP32
on the program in the microcontroller it will work. And
Microcontroller, current sensing card, circuit breaker,
it sends alert message to the control room and
earth switchetc.
respective substation engineer. And also it displays
And four push buttons are used, two push buttons information on the LCD display i.e. liquid crystal display.
are used to control the circuit breaker and another two
push buttons are used to control the earthswitch. IX. RESULT

When power supply is on ac system takes power The main objective of this paper it continuously
supply from the terminal blocks i.e. 220V AC and this monitors the status of feeder whether it is ON, OFF
power is flow through the SMPS i.e. switch mode .and also it monitors the current flow through the feeder
power supply and this converts 220v ac to 12v dc. line if any over current are occurred it sends alert
And this 12v dc is flow through the IPOP Card. And messages to the control room and also respective
again the power supply is given to the step down substation engineer. What ever the information is send
transformer , this step down transformer takes 220v in the form of SMS same will be displayed on LCD.
ac and it step down that voltage into 5v ac .since the X. CONCLUSION
electronic components functions with dc supply. So,
the secondary 5v ac is fed to the full wave bridge rectifier Monitoring means acquiring significant parameters
, it is used to convert the ac voltage to dc voltage so, it from the assets of interest. The acquired data is feasible
converts 5v ac to 5v dc and output of this regulated by to be used for analyses and diagnose the condition of
the 7805 Mosfet regulator again capacitor is connected the assets which is of great use for maintenance
to smoothen this dc supply voltage and this 5v dc is scheduling, failure management and controlling system
flow trough the ESP32Microcontroller. and this method minimizes time contact between human

580 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and high voltage device. As it is known, most substation 3) D. Pal, R. Meyur, S. Menon; M.J.B. Reddy; D.K. Moha, "Real-
time condition monitoring of substation equipment using thermal
devices have high voltage and generate electromagnetic cameras", Published in: IET Generation, Transmission &
that can harm human health. This proposed system is Distribution, (Volume: 12, Issue: 4, 2 27, 2018)
specially designed for monitoring of substation feeder 4) D. Hanafi, M.N. Ribuan, I.A. Wibowo, H. Hashim, M.I. Ismail
which are deployed at dispersed locations There are "Simulation of substation integrated monitoring system using
many parameters to be quantified and monitored LabVIEW", Transaction on Power System Distribution, ISSN:
2229-8711 Online Publication, June 2011.
periodically. It is quite costly and difficult to monitor
5) J. Singh, Y. R. Sood, R. K. Jarial and P. Verma,"Condition
the parameters by appointing a person at all locations Monitoring of Power Transformers", Bibliography Survey, vol.
and furthermore the data would also be error prone if 24, no. 3, pp. 11-25,2008
the monitoring is manual. The greatest issue is to have 6) Mr. S. S. Ghodhade, Dhiraj D. Patil, Ajay kumar, S. Pujari, Sachin
all the feeder data at a single sink when the data is S. Ayarekar, Prakash B. Bandgar, AshwiniS.
collected manually. Through our proposed system all 7) Waghmare, "Substation Monitoring and Control System",
the problems discussed above can be reduced to some International Journal of Scientific Research and Review,Volume
7, Issue 3, 2018, ISSN NO: 2279-543X
great extent.
8) AmitSachan,"Microcontrollerbasedsubstationmonitoring and
XI. REFERENCES control system with GSM modem" ISSN: 2278-1676 Volume 1,
Issue 6 (July-Aug. 2012), pp13-21
1) L. Velásquez, R. Villafáfila-Robles, P. Lloret, L. Molas- Balada,
A. Sumper, S. Galceran-Arellano, A. Sudrià- Andreu, Oct. 2007, 9) Dr. GhousBukshNarejo, Engr. Shahyan Pervez Bharucha, Engr.
"Development and implementation of a condition monitoring Danny ZarirPohwala, "Remote Microcontroller Based
system in a substation", 9th International Conference on Electrical Monitoring of Substation and Control System through GSM
Power Quality and Utilisation, EPQU2007 Modem",International Journal of Scientific &Engineering .

2) P. Lloret, J. L. Velásquez, L. Molas-Balada, R. Villafáfila- Robles, 1) http://www.ijser.orgDumitru Sacerdoianu, FloricaLãzãrescu,


A. Sumper, S. Galceran-Arellano, Oct. 2007, "IEC 61850 as a IulianHurezeanu, Ancua-MihaelaAciu, MarcelNICOLA,
flexible tool for electrical systems monitoring", 9th International IonPURCARU, AncaALBIA, “Contributions to monitoring the
Conference on Electrical Power Quality and Utilisation, condition ofsubstations”, 2019 8th International Conference on
EPQU2007 Modern PowerSystems(MPS).

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 581
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Sag, Swell Protection for Domestic Equipments and


Motors Using Arduino
M.Rajesh1, A.Sindhupriya2, K.Anusha3, D.Chandra Lekha4, Y.Teja Sri5
1
Assistant Professor, 2,3,4,5Student
1,2,3,4,5
Dept. of EEE, Geethanjali Institute of Science and Technology, Nellore.

Abstract: The aim of this project is to develop a The swell condition will occur when RMS voltage or
high voltage tripping mechanism to protect the load current rise between 1.1 and 1.8 pu at the power
from damage. Fluctuations in AC mains supply are frequency for durations of 0.5 to 1 minute. And above
frequent in homes and industries. The abnormal the 1.8pu and below 0.9pu is called over voltage and
over voltages may be caused due to various
under voltage respectively. Voltage sags and under
reasons such as sudden interruption of heavy loads,
lightening impulses, switching impulses etc. The
voltage conditions are caused by abrupt increases in
sensitive electronic devices in these conditions can loads such as short circuits and faults or it is caused by
get easily damaged. It is preferable to have a abrupt increase in source impendence, abruptly caused
tripping mechanism to protect the load. Our project by loose connection. Voltage swells and over voltage
aims at protecting the electrical equipments from conditions are almost always caused by an abrupt
abnormal voltages using arduino. The main purpose decrease in load on a circuit with a poor or damaged
of this protection system is to isolate the load from voltage regulator, although they can also be caused by
abnormal voltage conditions by controlling the a damaged or loose neutralconnection.
relay tripping coil with an arduino. It detects any
voltage greater and less than 230v (preset value).If a) Objective: the objective of the system is to
the voltage is greater or less than the preset value, provideprotection to electrical and electronic
it initiates a trip signal which in turn is given to the equipments andtheir failure due to abnormal voltage
circuit breaker. Than the circuit breaker isolates conditions.
the load from the source. If the voltage come backs b) Power quality:
to the presetvalue(230v) than the relay rests.This
project can be further extended to overcurrent Power quality refers to working voltage and current
relay. under specified range and perfection in the shape of
waveform in terms of pure sinusoidal and minimum
1. INTRODUCTION distortion. The term power Quality is defined by two
Actually sudden fluctuation in voltage is very big and characteristics, first, reliability, i.e. continuity of supply,
serious problem in industries and home appliances and second, rapid restoration of service. The specifications
it causes losses in electrical circuits. These losses causes for good power quality are as follows:
low power factor in the supply and by much amount of 1. Variation of electrical quantity should be within
power is going to be wasted. These fluctuations may guaranteed tolerance limits.
significantly impact the power quality as well as the
2. Pure sinusoidal wave with limited distortion.
reliability of other voltage controlling devices. Therefore
due to this fluctuation various costly and precious 3. Balanced three phase voltages.
equipments may get damaged. 4. Reliable supply.
When RMS voltage or current drops between 0.1 5. Earthing system should serve its purpose properly.
and 0.9 pu at the power frequency for durations of 0.5
Power Quality problems can be detected by
cycles to 1 minute then it is said to be sag condition.
following observations:

582 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

1. A part of equipment mis-operates at the same time d) Electrostatically induced over voltages because of
of the day. availability of the charged clouds nearby.
2. Circuit breakers get tripped without actually being II. Internal Over voltages: These overvoltages arise
overloaded. because of change in operating conditions of the
network. Internal overvoltages are grouped into two
3. Failure of equipment during bad weather conditions.
categories as follows:
4. Automated system stops working for no genuine
1. Switching overvoltage: These over voltages are
reason.
caused by transient phenomena which appear due to
c) Necessity: switching of load and they cannot be avoided. These
over voltages are generally oscillatory and take the
Now day's high quality power is basic need of highly form of a damped sinusoid.
automated industries and home appliances. So this high
quality power may be got by the help of this circuit and 2. Temporary Over voltages: These over voltages
are the steady-state voltages of power system
it will improve the power factor and thus power can be
frequency may result from the disconnection of load,
fully utilized. In this way, we can remove our sag, swell, particularly long transmission lines cases.
over and under voltage problems and get benefited.
Table 1: Classification of over voltages(Swell) according to
Protection against sudden overvoltage's in IEEE 1159.

substations is a vital part of the overall reliability of Types of Duration Magnitude


power systems. The degree of surge protection afforded Voltage
to a station is governed by the reliability required and Instantaneous 0.5 – 30 cycles 1.1 – 1.8 pu.
Momentary 30 cycles – 3 sec 1.1 – 1.4 pu.
the economics to obtain such reliability. Since major Temporary 3 sec – 1 min 1.1 – 1.2 pu.
stations generally include strategic and highly valuable
power equipment, surge protection is essential to avoid
or minimize major system disturbances as well as major
equipment failures.
The protection from overvoltage is mainly necessary
for Humans because the peoples are dead due to
overvoltageshock.
d) Over voltage:
An overvoltage is an event in which the voltage level
root mean square (r.m.s.) value lies in the range of 1.1 Figure 1: Over voltage
p.u. to 1.8 p.u. at the supply frequency and lasts for a
time interval ranging between half cycle to one minute. e) Under voltage:
Over voltages are mainly of two types as follows: An under voltage is an event in which the voltage
level root mean square (r.m.s) value lies in the range of
I. External Overvoltage: These types of over voltages
0.1 p.u to 0.9 p.u at the supply frequency and lasts for
mainly arise from atmospheric disturbances generally
a time interval ranging between half cycle to one minute.
because of lightening. Such conditions may arise due
to any one of the following reasons: - The condition of sagging of voltage generally arises when
heavy loads are switched on like when an induction
a) Direct strokes of lightening. motor is started it draws 6-10 times of full load rated
b) Side strokes of lightening and this lagging current causes a dip in voltage across
c) Voltages induced along the length of the line because the impedance of the system.
of change in atmospheric conditions.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 583
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 2:Classification of under voltages according to IEEE with salt. This salt formation acts as a good conductor
1159.
of electricity and fault occurs.
Types ofunder Duration Magnitude
Voltage 2. PROPOSED PROTECTION SYSTEM:
Instantaneous 0.5 – 30 cycles 0.1 – 0.9 pu
Momentary 30 – 3 sec 0.1 – 0.9 pu a) Components used in the proposed system:
Temporary 3 sec – 1 min 0.1 – 0.9 pu

Figure 2: Under voltage(Sag)

Causes of under voltage:


1. Closing and opening of circuit breakers: When the
circuit breaker of the phase is opened suddenly, than
the line which is feeding will be temporarily
disconnected.The other feeder lines from the same
substation will act as an under voltage. Fig 1: Flow diagram of the componentsused

2. Due to the fault: Under voltage due to the fault can The components of the proposed protection system
be critical to the operation of a power plant. The are divided into two parts:
magnitude of under voltage can be equal in each phase
I. Electrical components
or unequal respectively and it depends on the nature
of fault. II. Electronic components
3. Due to motor starting: Under voltage due to motor I. Electrical components:
starting are symmetrical since induction motors are
balanced three phase loads, this will draw 1. AC supply unit: It is the combination of SMPS,
approximately the same high starting current in all terminal block, ON/OFF switches, fuse, toggle
the phases. switch(T.S). It will take the supply from T.B 230V
AC through SMPS to get 12V DC output.
4. Due to transformer energizing: there are mainly two
causes, one is normal system operation which includes 2. Switchgear unit: It is the combination of busbar,
the manual energizing of a transformer and another voltage transformer, circuit breaker, load, ON/OFF
is the reclosing actions. These under voltages are switch, control feeder, relay, control feeder.
unsymmetrical in nature. voltage transformer(230V/4.5v ) measures the load
5. Equipment failure: It is due to the insulation breakdown voltage.
or heating or short circuit.
II. Electronic components:
6. Bad weather: Lightning strikes in the power lines
causes a significant number of under voltages. 1. Power supply card: It consists of fullwave bridge
rectifier 12V and 9V. A filter capacitor also added to
7. Pollution: Flash over takes place when there is a storm smooth DC and regulator of 12V and 9V also added
in the coastal regions, where the power line is covered in this card to get constant DC output. four terminal

584 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

connectors are used two for input and the other two “Uno" means one in Italian and is named to mark
for output. the upcoming release of Arduino 1.0. The Uno and
9V DC is fed to arduino, 12V DC is fed to TAI version 1.0 will be the reference versions of Arduino,
card and control circuit of the feeder. moving forward UNO is the latest in a series of USB
arduino boards.
2. Voltage sensing card: It measures the stepped down
load voltage and this measured voltage is fed to Memory:
arduino. It consists of zener diode and resistors.
The AT mega328 has 32 KB (with 0.5 KB used for
The zener diode further drops some % of voltage in the bootloader). It also has 2 KB of SRAM and 1 KB
the measured value in order to ensure that the input of of EEPROM (which can be read and written with the
microcontroller shouldn't exceed 5V. EEPROM library).
3. ARDUINO AT MEGA 328:
Overveiw:
The Arduino Uno is a microcontroller board based
on the ATmega328 (datasheet). It has 14 digital input/
output pins (of which 6 can be used as PWM outputs),
6 analog inputs, a 16 MHz ceramic resonator, a USB
Fig 2: Arduino Atmega328
connection, a power jack, an ICSP header, and a reset
button. It contains everything needed to support the The microcontroller compares the measured value
microcontroller; simply connect it to a computer with a with preset value and generates the command signal.
USB cable or power it with a AC-to-DC adapter or 4. Trip and indication card(TAI): It consists of opto-
battery to get started. couplers, 5V DC change over relay and resistors.
The Uno differs from all preceding boards in that it The weak command signal is strengthen by the opto-
does not use the FTDI USB-to-serial driver chip. coupler to operate the relay in the TAI card.
Instead, it features the Atmega16U2 (Atmega8U2 up
to version R2) programmed as a USB-to-serial b) Table 3: Specifications of the test system:
converter. Revision 2 of the Uno board has a resistor
pulling the 8U2 HWB line to ground, making it easier
to put into DFU mode.
Revision 3 of the board has the following new
features:
• Pinout: added SDA and SCL pins that are near to the
AREF pin and two other new pins placed near to the
RESET pin, the IOREF that allow the shields to adapt
to the voltage provided from the board. In future,
shields will be compatible both with the board that
use the AVR, which operate with 5V and with the
Arduino Due that operate with 3.3V. The second one
is a not connected pin, that is reserved for future
purposes.
• Stronger RESET circuit.
• Atmega 16U2 replace the 8U2.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 585
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

c) Block diagram of the proposed protection a) Schematic diagram and its operation:
system:

Fig 4: Schematic diagram

Connections:
Fig 3: Block diagram 230V AC from the mains is fed to SMPS via fuse
3. Explanation of the proposed protection and T.S. SMPS converts 230V AC to 12V DC. 12V
system: DC is fed to Power supply card. Power supply card
generated two different DC outputs 12V and 9V. 9V
The objective of the system is to provide the is fed to arduino, 12V is fed to TAI card and the control
protection to the electrical and electronic equipments circuit of the feeder.
and avoid their failure due to abnormal conditions. The
theme of the protection system is to isolates the load Primary of the voltage transformer is connected
during abnormal voltages by controlling the control parallel to load and secondary is connected to voltage
circuit of the feeder by using arduino. sensing card. The output of the voltage sensing card is
fed to arduino. The output of the arduino is connected
to TAI card.
Operation:
Under abnormal voltage conditions: Voltage is not
within the belowmentioned limits:
Vref - 10% of Vref ≤ Vload ≤ Vrefef + 10% of Vref
Here Vref is adjusted by varying the potential knob.

586 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Abnormal voltage level is stepped down by the 4. RESULT


voltage transformer. This stepped down voltage is The tripping mechanism we designed for the
measured by the voltage sensing card. The zener diode protection of electrical devices from under and over
in the voltage sensing card further drops some portion voltage isolate the load from the supply when the voltage
of the voltage in the measured value in order to ensure is 10% less than or greater than equals to the reference
that the input of the microcontroller shouldn't exceed voltage.
5V. Microcontroller in the arduino compares the
measured value with preset value and generates a Vref - 10% of Vref ≤ Vload ≤ Vref + 10% of Vref
command signal of voltage 4V and current few mA. 5. ADVANTAGES
The output coming from the microcontroller is weak
and not sufficient to operate the relay in TAI card. This a) Since the overall operation and controlling is done
weak signal is strengthen by the opto-coupler. The by the arduino, it is accurate and reliable
strengthen signal energizes the coil of the relay in TAI b) It eliminates the manual operation.
card. Due to the electromagnetic force the NC contact
c) Speciality of tripping five loads of different mains
will open due to this there will be no power supply to
at a time.
the coil of the CB and CB NC contacts will open. Thus
the load is isolated from the supply during abnormal d) This protection system is applicable to household
voltage conditions. equipments, industrial circuit breaker, power
transformers, domestic & industrial motors and
b) Hardware implementation: pumpsets.
6. CONCLUSION
In this paper, we have discussed about the problems
caused by under and over voltage in industrial
applications as well as consumer goods. We designed
a system using arduino Atmega328 to disconnect the
load automatically from the supply during the event of
over and under voltage.
It is the cost effective solution to protect the electrical
and electronic equipments.
Automatic switch off in abnormal voltage conditions.
7. REFERENCES
[1] Manish Paul, AntaraChaudhury, SnigdhaSaikia (2015), "Hardware
Implementation of Overvoltage and Under voltage
Protection",IJIREEICE Vol. 3, Issue 6, June 2015, ISSN
(Online)2321-2004.
[2] Silicon institute of technology, "Power quality problem
identification and protection scheme for low voltage system",
Orissa, November 2010.
[3] G. Yaleinkaya, M. H. J. Bollen and P.A.Crossley (1999),
"Characterization of voltage sags in industrial distribution
systems", IEEE transactions on industry applications, vol.34,
no. 4, pp. 682-688,July/August.
Fig 5: Hardware implementation.
[4] C.H.Vithalani,"Over-Under Voltage Protection of Electrical
Appliances", August 2003, Electronics for You.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 587
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[5] EPRI Project Manager R. Schainker, System Compatibility [9] Mohammad Shah Alamgir and SumitDev, "Design and
Research Project, "EffectsofTemporary Overvoltage on Implementation of an Automatic Voltage Regulator with a Great
Residential Products", 1008540 Final Report, March 2005 Precision and Proper Hysteresis", Vol.75, year 2015, pp,
"IJAST".
[6] Hopkinson, R. H., "Ferroresonant Overvoltage Control Based
on TNA Tests onThree-Phase Delta-Wye Transformer Banks," [10]Endeavour Energy Power Quality& Reliability Centre, "Voltage
IEEE Transactions on Power Apparatus and Systems,vol.86, Sag Mitigation", Technical Note 11, August 2012.
pp. 1258-65, October 1967.
[11] Math H. J. Bollen, "Understanding Power Quality Problems -
[7] Article, "Over voltage Under voltage load Protection", website: Voltage Sags and Interruptions", 2000, New Jersey, John Wiley
http://www.nevonprojects.com/Over-voltage-Under-voltage- & Sons.
load-protection.html, last Accessed 27 September2015.
[8] LAMARCHE, Paper, "Controlled Ferroresonant Technology",
Volume 1, Issue 2, November 2006.

588 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Distributed Generation System Inverter with Overload


Tripping Through IoT
Dr. T. Ravi Kumar1, Dr. G. Srinivasa Rao2, B. Yaswanth3, K. PavanKalyan4
1
Assoc. Professor, Dept. of EEE, Geethanjali Institute of Science and Technology, Nellore, A.P.
2
Assoc. Professor, Dept. of EEE, CMR College of Engineering & Technology, Hyderabad, Telangana.
3,4
Student, Dept. of EEE, Geethanjali Institute of Science and Technology, Nellore, A.P
Email: ravikumar@gist.edu.in1

Abstract: One of the essential requirements for network networks will go far to improve socio-
financial improvement in any country on the planet economy lives of individuals.
is the arrangement of solid power supply
frameworks. This work is an advancement of a 1. INTRODUCTION
native innovation cross breed Solar - Wind Power A hybrid inverter is a new technology U.P.S
framework that saddles the sustainable power (Uninterruptable Power Supply) which incorporates
sources in Sun and Wind to produce power. Here,
renewable energy resources i.e., solar and wind to meet
electric DC energies created from photovoltaic and
wind turbine frameworks are moved to a DC-AC
the load demand. Usually, electricity from solar panels
coast charging-inverter framework that gives is generated only during the day, with a peak production
charging flow to a substantial stockpiling bank of around midday. This power is fluctuating and is not
Battery and simultaneously delivers rearranged AC synchronized with the electric utilization of households.
capacity to AC loads. Inverters are broadly utilized To overcome the differences between load and demand
in the homegrown just as modern conditions to fill during the night, it is important to store energy for later
in as second line of source if there should arise an utilization.
occurrence of force cut from the power utility
lattices. In any case, because of low limit of the The security and reliability of the electrical energy
battery the inverter vanishes with the utilization of infrastructure is of vital importance today more than
weighty burden apparatus. This paper is planned ever, given the degree to which electric-powered
so that it defeats this constraint utilizing sun technology has become embedded in all human
oriented energy. It comprises of a 12V Battery, activities. Protecting the electrical power supply system
which gets charged from two sources, first being against interruptions due to various faults is thus a main
simply the principle supply. On the off chance that research concern. One of the components involved in
the primary force supply is accessible, the hand- power-system protection is the circuit breaker, which
off changes to the association utilizing mains power is responsible for closing the system when a fault or
supply to supply to the heap. This force likewise
anomaly occurs in order to protect the electrical
charges the battery for utilizing it as reinforcement
equipment.
the following time there is no blackout. The
utilization of different sources gives extra benefit (i). Overview
of excess force on account of dragging out blackout.
This inverter holds for long span to give continuous The worldwide usage of renewable power sources
force supply to client. This paper likewise is expanding quickly, especially the usage of solar and
comprises of electrical switch which works wind power sources, as illustrated by U. Fesli et al.
consequently on account of over-burdening. The [1]. Renewable energy counted for around 19% of the
electrical switch will work through web of things energy consumption worldwide in 2012 and continued
which will likewise give data of over-burdening to rise during the year 2013 as per 2014 renewable
inverter. It is feasible and that advancement of global status report. The report highlighted the PV
mixture wind-close planetary system for off-

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 589
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

installation system, hence energy storage system In this paper, two renewable energy sources i.e.,
becomes essential to guarantee continuous power solar and wind are used. As the voltage obtained from
supply. a wind turbine is AC, hence it is rectified to DC, while
As solar and wind energy sources are fluctuating in voltage obtained from solar panels is already in DC. A
nature, therefore a buck-boost converter is used for microcontroller is used that compares the voltages
solar panels to fix the voltage at a specific level, as obtained from solar and wind power sources. It checks
mentioned by M.H. Rashid.By incorporating both the availability of both power sources and therefore it
renewable sources, the reliability of power continuity shifts load to the power source, available at that time.
increases. This paper focuses on the difficulties and In case, if there is unavailability of both power sources,
arrangements of incorporating both, solar and wind then the load will be shifted tosupply. A battery is also
energy sources. Voltages and high frequency harmonics connected to the system so that if there is a complete
are significant factors of power quality for both, multiple power outage, the load will be shifted to the battery
power sources operating in parallel or a single power bank. In this way, continuity of electric supply is ensured.
source operating alone, as mentioned by Z. Sen [3]. Moreover, if both renewable energy sources are
available, then the solar power source will be used to
In today's world, the technological trend of supply the load while the wind power source will be
implementing "smart" technologies, fostered by the used to charge the battery. A smart city also embeds in
emergence of Cloud Computing and the Internet of the urban landscape computers, sensors, cameras and
Things (IoT), led to a transfiguration of ordinary devices other sensitive equipment operating in the background.
and environments to "smart" entities. In this context, In these circumstances, protecting the power supply
traditional electrical protection devices also tend to grid against faults becomes even more important, given
transcend and become "smart", and consequently offer the increasing number of sensitive devices connected
improved fault-detection and protection, remote in the emerging Smart world. Moreover, the traditional
monitoring and event notification. By becoming smart, electrical protection for residential, office and industrial
a home is embedded with ubiquitous computing buildings is based on classic circuit breakers tripping
equipment that connects all the household devices to or fuses being blown when an overload happens, thus
one another and the Internet. The demand of electrical offering limited protection and warning.
energy is constantly increasing and the non-renewable
energy resources i.e., oil, coal and natural gas are (ii). Theoretical Base
diminishing, as mentioned by R. Madhumitha et al. [4]. In this paper, there are three types of sources i.e.,
Moreover, the cost of these resources is high, which solar, wind and WAPDA. Wind and WAPDA supplies
motivates us to design a hybrid inverter that incorporates are in AC, therefore bridge rectifier is used to convert
renewable energy resources i.e., solar and wind. The AC into DC while solar is in DC. These three DC inputs
objective of this paper is to design an inverter that can are compared by using microcontrollers built in
be operated by a 12V battery and can be used to drive comparator. Comparator will select the best available
AC loads while minimizing the conventional inverter cost source, operates its corresponding relay and indicates
and complexity by using a microcontroller. by using the LEDs. We will use the selected in putto
The objective of this paper is to provide an alternate charge the battery for backup. Inverter will convert DC
power supply for remote locations such as small villages. into AC by using PWM and MOSFETs.Smart Hybrid
Also, the system can be used as a temporary power Inverter uses renewable energy sources to charge the
supply for locations affected by natural disasters. In system storage battery which can be used to provide
order to achieve these objectives, the product must be the electricity, in absence of either or both energy
economical and easy to manufacture. sources.By integrating the two renewable sources i.e.,
solar and wind, the impact of variable nature of solar
and wind power sources can be resolved and the overall

590 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

system would become more reliable and economical. architecture monitoring is being improved continuously.
From consumer's perspective, the installing cost of a Data communication is safe and encrypted, as Microsoft
hybrid system is still a problem.The main objective of Azure hosts its data.
this paper is to provide an alternative power supply for
remote locations such as islands and small
villages.Inverters have wide range of applications, like
in household and industry as well.This paper describes
the design, implementation and experimental validation
of the ELSA (Electrical Safety) power-system
protection device with built-in support for IoT-based
integration in smart environments like a Smart City or a
Smart Home.
Fig 1: Red Back Smart Hybrid Inverter System
• The rest of the paper is organized as follows: section
II provides background and related work on this topic, (ii). Solar hybrid inverter
section III describes the system architecture detailing Hybrid inverter is a new type of uninterruptible power
the three components (hardware, software and
supply (UPS) which supplies electrical energy for
communication network and data concentrator),
household items. Maximum production from solar
section IV presents the experimental validation of the
system while section V draws conclusions and panels is produced around midday. Electricity produced
underlines future research directions. from solar is not enough, therefore MPPT charger is
used to yield the output at a desired voltage level, as
2. TECHNOLOGIES RELATED TO illustrated by S. Bandawar et al. [8]. Smart hybrid
INVERTER. inverter stores maximum energy during daytime and then
(i). Red back technology later, this stored energy can be utilized during night.
Red back technology is a company that aims in The output of solar panel changes with the movement
changing the way of electrical household usage. Hybrid of sun. If the sun is directly above the solar panel, we
system of this company stores solar energy at daytime will get maximum possible voltage, but if the sun is away
up to the maximum level by using batteries so that when from the panel, then voltage will not be sufficient.
there is unavailability of solar energy, power can be Therefore, for making its output voltage constant, we
provided to the household items that operates on use MPPT (Maximum Power Point Tracking) charge
electricity. This initiative can help power authorities in control. Basically, MPPT is a buck-boost converter
many ways, for example, owners can sell electricity which maintains the output voltage of solar panel. If the
produced by solar panels to the national grid. sun is directly above the solar panel and the output
voltage is high, the buck-boost converter will act as a
Although many companies are manufacturing hybrid buck converter, and it will step down the voltage to a
inverters, but red back technology is the only company desired level. Similarly, if the sun is away from the panel
that is popular in Australia, for manufacturing a hybrid and the output voltage is low, the converter will act as a
system that is economical to use.According to Y. Zhang boost converter, and it will step up the voltage to a
et al. [12], red back hybrid inverter costs 30 percent desired level.
less than other hybrid inverter products. Other than low
cost, new safety measures are taken by red back Hybrid inverters can operate during off grid and on
technologies, as all switchgears are prewired and are grid conditions. During on grid, both energy sources
tested in industry, before releasing the product in market. i.e., solar and WAPDA are used, whereas during off
grid condition, stored energy in battery is used to power
Red back system is more adaptable and dynamic, up household items, as mentioned by T. Mallick et al.
from the software perspective. Red back system

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 591
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

(iii). Studies related to hybrid systems. product within a few Lua script lines. It includes
firmware which runs on the ESP8266 fig.3.Wi-Fi SOC
PV hybrid systems from Espressif Systems, and hardware which is based
Hybrid PV systems are the combination of on the ESP-12 module ESP8266EX offers a complete
photovoltaic systems and wind turbines or generators. and self-contained Wi-Fi networking solution.
Mostly they are used on islands, but they can also be
installed at other places. Largest PV system is present
on island in Germany, named as Pell worm. Other large
hybrid systems are also installed on different islands, as
on Canary Island. In Figure 2-8, the model of one of
the largest hybrid systems is shown.

Fig 3: Node MCU (ESP8266-12E)

The pin diagram of ESP8266 is shown in fig 4. As


the ESP8266 was developed as a Serial to Wi-Fi
adapter, its firmware implemented an interpreter for AT
commands. Thus, initial usage of the IC was limited to
using a either a USB to Serial adapter, or a separate
microcontroller (e.g., ATmega328) to issue AT
Fig 2: PV Hybrid System commands over the ESP8266's Serial UART interface.
(iv). Case Studies It can be used to host the application or to offload
Wi-Fi networking functions from another application
Khythnos island of Greece processor. When ESP8266EX hosts the application, it
Hybrid system at Khythnos uses 100 kW boots up directly from an external flash.ESP8266EX
photovoltaic arrays, wind turbine of 100 kW and a is among the most integrated Wi-Fi chip in the industry;
battery of 600 kWh. A diesel generator of 200 KVA is it integrates the antenna switches, RF balun, power
inconnection with hybrid system, through distribution amplifier, low noise receive amplifier, filters, power
grid. Solar, wind and diesel generator supplies power management modules, it requires minimal external
simultaneously, into the grid. This power plant is being circuitry, and the entire solution, including front-end
monitored through control system. module, is designed to occupy minimal PCB area.

Wilpena pound
This power system has a PV system of 100 kW,
battery storing capacity of 400 kWh, an inverter of 125
kW and a diesel generator of 440 kW. Energy from
battery and diesel generators are used simultaneously
during night, which is automatically selected through
smart controller in power system.
3. HARDWAREREQUIREMENTS
(i). NODE-MCU (ESP8266-12E)
The Node MCU is an open-source firmware and
development kit that helps you to Prototype your IOT
Fig 4: Pin diagram of Node MCU

592 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The ESP8266 has seen a wide adoption as a cost- over-current protection circuits, battery chargers,
effective solution for IoT and Wi-Fi-capable devices. switching mode power supplies, digital watt meters,
The ESP8266 was developed by Shangai-based programmable current sources, etc. Today, we will talk
Espressif systems, as a Serial (UART) to Wi-Fi SoC about ACS712 current sensor fig.5 device which
(System on a Chip) based around a Tensilica provides an economical and precise way of sensing AC
XtensaLX3DPU. This tiny IC includes an RF front end, and DC currents based on Hall-effect. This discussion
RAM, and (usually) an onboard TCP/IPstack that is divided into two parts. The first part will provide a
allows it ready to connect to a nearby Access Point, to brief overview of the ACS712 sensor and its
act as an Access Point itself, or both. characteristics. In the second part,a test experiment will
The connector gave access to the pins used for serial be carried out to interface the sensor with a PIC
communication, namely RX and TX, as well as 4 control microcontroller to measure a dc current.
pins, GPIO0, GPIO2, CH_PD and RST (reset), along Features:
with VCC and GND.However, other ESP-NN boards
offer access to a wider variety of pins, although their • 100 mV/A output sensitivity
packaging is of a custom Surface-Mount Device, with • 5.0 V, single supply operation
castellated pins as seen in the documentation page • Output voltage proportional to AC or DC currents
linked above. From the different ESP-NN boards, we
began to experiment with the ESP-12E. • Factory-trimmed for accuracy
For starters, different firmware options have been • Extremely stable output offset voltage
ported to run on the ESP8266, effectively taking it from • Nearly zero magnetic hysteresis
a simple Serial to Wi-Fi adapter into a fully functional
• Ratio metric output from supply voltage
microcontroller with access to its GPIO and hardware-
based functions like PWM, I2C, 1-Wire • Low noise analog signal path
communication, and ADC; all this, of course, in addition • Device bandwidth is set via the new FILTER pin.
to maintaining its Wi-Fi capabilities.
• µs output rise time in response to step input current
Features:
• 80 kHz bandwidth
• Low cost, compact and powerful Wi-Fi Module
• Total output error 1.5% at TA = 25°C
• Power Supply: +3.3V only
• Small footprint, low-profile SOIC8 package
• Current Consumption: 100mA
• I/O Voltage: 3.6V (max) Working Principle:
• I/O source current: 12mA (max) The Allegro ACS712 current sensor is based on
• 512kB Flash Memory the principle of Hall-effect, which was discovered by
Dr. Edwin Hall in 1879. According to this principle,
• Can be used as Station or Access Point or both when a current carrying conductor is placed into a
combined.
magnetic field, a voltage is generated across its edges
• Supports Deep sleep (<10uA) perpendicular to the directions of both the current and
• Can be programmed using Arduino IDE or AT- the magnetic field. It is illustrated in the fig. 3.15 shown
commands or Lua Script. below. A thin sheet of semiconductor material (called
Hall element) is carrying a current (I) and is placed into
(ii). Hall Effect Sensor a magnetic field (B) which is perpendicular to the
Sensing and controlling current flow is a fundamental direction of current flow. Due to the presence of Lorentz
requirement in a wide variety of applications including, force, the distribution of current is no more uniform

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 593
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

across the Hall element and therefore a potential Sensitivity & Output:
difference is created across its edges perpendicular to The ACS712-05B can measure current up to ±5A
the directions of both the current and the field. This and provides output sensitivity of 185mV/A (at +5V
voltage is known Hall voltage and its typical value is in power supply), which means for every 1A increase in
the order of few microvolts. The Hall voltage is directly the current through the conduction terminals in positive
proportional to the magnitudesof I and B. So, if one of direction, the output voltage also rises by 185mV. The
them (I and B) is known, then the observed Hall voltage sensitivities of 20A and 30A versions are 100 mV/A
can be used to estimate the other. and 66 mV/A, respectively. At zero current, the output
voltage is half of the supply voltage (Vcc/2). It should
be noted that the ACS712 provides ratio metric output,
which means the zero current output and the
devicesensitivity are both proportional to the supply
voltage, VCC. This feature is particularly useful when
using the ACS712 with an analog-to-digital converter.
The precision of any A/D conversion depends upon
the stability of the reference voltage used in the ADC
operation. In most microcontroller circuits, the reference
Fig 5: Hall Effect sensor working principle. voltage for A/D conversion is the supply voltage itself.
The ACS712 device is provided in a small, surface So, if the supply voltage is not stable, the ADC
mount SOIC8 package. It consists of a precise, low- measurements may not be precise and accurate.
offset, linear Hall sensor circuit with a copper conduction However, if the reference voltage of ADC is same as
path located near the surface of the die. When current the supply voltage of ACS712, then the ratio metric
is applied through the copper conductor, a magnetic output of ACS712 will compensate for any error in the
field is generated which is sensed by the built-in Hall A/D conversion due to the fluctuation in the reference
element. voltage.
Now, if the supply voltage drifts and becomes Vcc
The output of the device has positive slope when an
= 4.5V, then, due to the ratio metric nature, the new
increasing current flow through the copper conduction
output of the ACS712 sensor will be 4.5/2 = 2.25V,
path (from pins 1 and 2, to pins 3 and 4). The ACS712
which will still be digitized to 512 by the ADC as its
device comes in three variants, providing current range
reference voltage is also lowered to 4.5V.
of±5A (ACS712-05B), ±20A (ACS712-20B), and
±30A (ACS712-30A). Similarly, the sensitivity value will also be lowered
by a factor of 4.5/5 = 0.9, which means if the ACS712-
05B is powered with a 4.5V supply, the sensitivity is
reduced to 166.5 mV/A, instead of 185mV/A.
This concludes that any fluctuation in the reference
voltage will not be a source of error in the analog-to-
digital conversion of the ACS712 output signals. The
curve below fig. 2.8 shows the nominal sensitivity and
transfer characteristics of the ACS712-05B sensor
powered with a 5.0V supply. The drift in the output is
Fig 6: Functional block diagram of ACS712[26] minimum for a varying operating temperature, which is
attributed to an innovative chopper stabilization
technique implemented on the chip (read ACS712
datasheet for detail).

594 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Step 6: Select your Arduinoboard.


• Step 7: Select your serial port.
• Step 8: Upload the program to your board.
BLYNK Cloud:
It can control hardware remotely, it can display
sensor data, it can store data, visualize it and do many
other cool things. It's a digital dashboard where you
Fig 7: Output voltage vs Sensed current. can build a graphic interface for your paper by simply
Accurate sensor to measure Ac/DC current up to dragging and dropping widgets. It is really simple to set
20A.The sensor can even measure high AC mains everything up and you will start tinkering in less than 5
current and is still isolated from the measuring part due mins. Blynk is not tied to some specific board or shield.
to integrated hall sensor. The board operates on 5V. Instead, it is supporting hardware of your choice.
Whether your Arduino or Raspberry Pi is linked to the
Applications: Internet over Wi-Fi, Ethernet or this new ESP8266 chip,
• When combined with threshold detection they act as Blynk will get you online and ready for the Internet of
a switch. Your Things.
• These are used in ultra-high-reliability applications There are three major components in the platform:
such as keyboards. • Blynk App - allows to you create amazing interfaces
• Hall Effect sensors are used to time the speed of for your papers using various widgets we provide.
wheels and shafts. • Blynk Server - responsible for all the
• Used to detect the position of permanent magnet in communications between the Smartphone and
brushless electric DC motors. hardware. You can use our Blynk Cloud or run your
private Blynk server locally. Its open source could
• Sensors are embedded in digital electronic devices easily handle thousands of devices and can even be
along with linear transducers. launched on a Raspberry Pi.
• Sensing the presence of the magnetic field in industrial • Blynk Libraries - for all the popular hardware
applications. platforms - enable communication with the server and
• Used in smartphone to check whether the flip cover process all the incoming and out coming commands.
accessory is closed. Now imagine every time you press a Button in the
Blynk app, the message travels to the Blynk Cloud,
• Used For contactless measurement of DC current in where it magically finds its way to your hardware. It
current transformers. works the same in the opposite direction and
• This is used as a sensor to detect the fuel levels in everything happens in a blynk of an eye.
automobiles. Design of the investigation
Arduino Installation process Design of our paper is a hybrid system, where three
• Step 1: Get your board and USB cable. power sources are used as input and paper is based on
source selection process. A microcontroller selects one
• Step 2: Download Arduino IDE Software of the best available power sources, it checks the
• Step 3: Power up your board. available power sources and makes a comparison
• Step 4: Launch Arduino IDE between them and selects one of the economic power
sources. Renewable power sources are kept at first
• Step 5: Open your first paper.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 595
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

priority. In case, if there is unavailability of both


renewable power sources, then power from electric
utility company will be used as a power source for
meeting load demand and to charge the backup battery.
If both renewable power sources are available, then
by comparison between both renewable power
sources, one of the efficient sources is selected to meet
the load demand, while other power source is used to
charge the backup battery. In case, if both renewable
power sources are not available, then system will
Fig8 : Block diagram of hybrid power generation
automatically check the availability of third source i.e.,
power from electric utilization company and therefore Above figure shows the block diagram of the hybrid
load demand is met by power this source. power generation system, using wind and solar power.
This block diagram includes following blocks.
LM 317 is a three-terminal device, which can be
used as a voltage regulator. Its output voltage, ranges • Inverter
from 1.25 volts to 37 volts. It can allow 1.5 amperes • Solar panel
of current to flow through it, however current passing
capacity can be increased, by connecting a number of • Wind turbine
LM 317 in parallel combination. It requires just two • Charge controller
external resistors to set the output voltage. Input voltage • Battery Bank
must not be less than 3 volts, otherwise LM 317 will
not work. This device features a typical line regulation Working of Overload Tripping.
of 0.01% and load regulation of 0.1%. Its operation is Step 1: In order to establish connection between
quite safe, as it includes thermal overload protection. the client and the server the Wi-Fi option in the
Selection of power supply depends upon the application Smartphone is enabled.
and its usage. Other than LM 317, any type of power
supply can be used accordingly. Step 2: It is connected to the Wi-Fi module of the
system.
5. Design of hybrid energy system Step 3: Each electronic/electrical appliance in the
Hybrid energy system is the combination of two or system is connected to the digital pins on the node MCU
more energy sources, for delivering power to the load. board.
In other words, it can be defined as energy system, Step 4: A Relay is used for connecting each device
which is designed to extract power, by using two or to the Arduino, which helps in converting high Voltage
more energy sources is called hybrid energy system supply to low voltage.
Hybrid energy system is reliable, efficient, un-harmful
and economical to use. In this paper, solar, wind and Step 5: A C-program is loaded on to the
power from utility source are used for generating power. microprocessor chip on the node MCU Board which
Solar and wind have many advantages, then other specifies what action is to be performed on receiving
energy sources. Both energy sources have greater particular inputs.
availability in many areas. There is no need, to find Step 6: An Android Application has been developed
special location to install this system. which enables the end user to monitor and control the
appliances from any remote location.
Step 7: Through adafruit we will give the command
to the node MCU.

596 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Step 8: Successful controlling and monitoring of electric utility company, therefore we designed three
appliances. independent power supplies which represents the three
power sources i.e., solar, wind and electric power from
6. RESULT utility company. In order to select the best available
In this paper we presented the hybrid inverter power source, a microcontroller is used which compares
advantages i.e., Inverter safe operation and voltages of the three power sources. The step was to
Uninterrupted Power supply. These are being achieved design an inverter, therefore we used MOSFETs, as
by the availability of different sources in this inverter they can carry large amount of current, as compared to
and protection provided by the IoT.By this inverter we BJTs and FETs. We used a total of 8 MOSFETs in
can provide continuous power supply up to 1 A in single parallel, so that current passing through them can be
phase. In this paper we presented the value at which divided. For PWM (Pulse Width Modulation), we used
protection relay is operated is 1.1A. By doing some another microcontroller instead of using a complex
changes in programming we can set the current limit circuit. At the output we observed a 12 Volts, 50 Hz
from inverter to load at which relay is operated. AC voltage on oscilloscope. To make this 12 Volts, 50
Hz AC voltage useable for household consumption, we
a. Recommendations
used a 350 Watts transformer which step up the voltage
A hybrid system should be intended for the power level from 12 Volts to 220 Volts.
that can be generated from two power sources.
Moreover, the charge controller should have a 8. FUTURE SCOPE
programmed electrical detach circuit that will prevent Automation for residences become common place,
batteries from being over charged. the market will eventually be crowded with several
Other suggestion incorporates: players, multiple product offerings and competitive
pricing with low margins. The products themselves will
1. The wind turbine blades should be installed to a reach a 'plug and play' type of usability.
protected pole, as high as possible.
As a future aspect, we can enhance the output
2. The solar panels should not be hindered by shadows.
voltage by reducing total harmonic distortion and high
3. During any repair work, whole system should be frequency harmonics, by utilizing extra components.
turned off. Moreover, power rating can also be enhanced by using
4. The wire should be of good quality, to carry maximum more MOSFETs in parallel combination. But due to
load current by the two sources. the shortage of time and other limitations we designed
the inverter up to 350W rating. As a future aspect,
7. CONCLUSIONS
inverters can be synchronized with supply at the same
This paper described the design, implementation, frequency and voltage level.
and functional validation of an advanced power-system
protection device with IoT-based support for REFERENCES
integration in smart environments like Smart Homes or 1) Yuan W, Zhao L, Zeng B. Optimal power grid protection through
a defender- attacker-defender model. Reliability Engineering &
Smart Cities. The protection device ensures the safety System Safety. 2014; 121:83- 89.
of electrical consumers connected to the public power
2) Liu J, Huang GM, Ma Z, Geng Y. A novel smart high-voltage
supply grid by disconnecting the electrical supply in the circuit breaker for smart grid applications. IEEE Transactions on
event of fault : overcurrent. The system also provides a Smart Grid. 2011; 2(2):254-264.
Web-based interface for monitoring the network of 3) Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani
operating devices and real-time event notification O. Network-level security, and privacy control for smart-home
IoT devices. In: Wireless and Mobile Computing, Networking
through e-mail and SMS messages.We are and Communications (WiMob), 2015 IEEE 11th International
incorporating three power sources i.e., solar, wind and Conference on. IEEE; 2015. p. 163-167.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 597
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4) Ferna ´ndez-Carame ´s TM. An intelligent power outlet system 8) Z. Sen, "Solar Energy Fundamental and Modelling Techniques",
for the smart home of the Internet of Things. International Journal 1st ed., vol. 2, Springer, pp. 58- 125, 2008.
of Distributed Sensor Networks. 2015; 11(11):214805.
9) A.Menon and R.Madhumitha, "Design and simulation of solar
5) Mrazovac B, Bjelica MZ, Teslic N, Papp I. Towards ubiquitous micro- inverter with multiple loads," International Journal of
smart outlets for safety and energetic efficiency of home electric Advanced Research in Electrical, Electronics and Instrumentation
appliances. In: Consumer Electronics-Berlin (ICCE-Berlin), 2011 Engineering, vol. 3, no. 5, pp. 9612-9620, 2014.
IEEE International Conference on. IEEE; 2011. p. 322-326.
10) G. Masters, Renewable and Efficient Electrical Power System,
6) U. Fseli, R. Bayir and M. Ozer, "Design and implementation of 3rd ed., A John WileySons, Inc., Publication, pp. 205-214, 2004.
a domestic solar and wind hybrid energy system," International
11) M. Muralikrishna and V. Lakshaminarayna, "Hybrid solar and
Conference on Electrical and Electronics Engineering, vol. 1, no.
wind energy system for rural electrification," ARPN Journal of
2, pp. 29-33, 2009.
Engineering and Applied Sciences, vol. 3, no. 5, pp. 50-58, 2008.
7) M.H.Rashid, "Power Electronics: Circuit, Devices and
Applications", 3rd ed., Prentice Hall, pp. 226-287, 2004.

598 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Hemp Battery (Hemp Super Capacitor)


Debanga Bhattasaly
Department of Electronics and Communication Engineering, Aryabhatta Institute of Engineering and Management
Durgapur, Panagarh, Paschim Bardhhaman, West Bengal, India
Email: debangabhattasaly99@gmail.com

Abstract- Hemp is a variety of the Cannabis Hemp is declared as environmentally friendly for the
sativa plant. Hemp is a type of psychoactive plant, production of batteries and other items. They use less
it contains Tetrahydrocannabinol (THC) and land as compared to other plants and leave no
Cannabidiol (CBD). The THC contains ecological footprints.
phytochemical compositions. Hemp is refined into
a variety of commercial items like- Paper, Rope, Hemp based carbon structures perform better than
Textiles, Clothing, Biodegradable plastics, Paint, Graphene based structures when used as an electrode
Insulation, Biofuel, Food, Animal feed, Fibre, Seed in a Supercapacitor or battery.Hemp fibres are
oil, Shoes, Mulch, Animal bedding, Litter, Creams, extracted from hemp plants and undergoes through a
Bird feed, Recreation, etc. A device needs a source process to produce carbon electrodes, which holds as
of energy to keep it running, mostly a battery. Now much energy as graphene-based electrodes and is used
this battery has graphite in it which basically is
in regular batteries or ultracapacitors. Hemp based
carbon. This carbon is the fuel source of for almost
natural fibres are harnessed into sheets, which provide
every single battery. Hemp as a plant contains
carbon in it as stored energy, when processed it cost affordable, environmentally sustainable alternative
can be used as a source of fuel. Scientific studies to graphene-based sheets.
show that hemp is better than Lithium and other
graphene-based batteries. Hemp batteries
generate good amount of power, portable to use,
easy to manufacture and not dangerous as the
conventional batteries available in the market.
Keywords- Hemp, Supercapacitors, Hemp
battery, Current collector, Electrolyte, Active
material, Separator, Graphene

I. INTRODUCTION
Fig 1. Prototype of a Hemp Battery
Technology has a limit of power storage or delivery.
We need more power-dense materials for improved II. WORKING MECHANISM
efficiency. The current technologies need raw materials Hemp fibres are extracted from hemp plants, turned
to produce batteries, which are not easily available into cellulose, then into carbon and then into flexible
everywhere. Current battery technology increases the electrodes. Since these are biodegradable, when
cost of manufacturing and production and are not disposed, they return back to the Earth. Thus, hemp
feasible enough to give amazing products and solutions. helps in stabilizing the natural carbon cycle and stores
Conventional batteries need mining of raw materials, carbon for up to 1000 years. So, its termed as "Green
which leads to environmental degradation. Most Battery".
batteries are a Lithium-ion based, and degrades the Two current collector plates are coated with hemp
environment during the mining and production. Batteries based activated carbon material. They are separated
need carbon as their electrodes, which is produced by by a porous membrane separator. Electrolyte is
burning trees causing a lot of pollution. squashed in between them. It is then charged and ready
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 599
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

to deliver power. Though it's a capacitor, but the Hemp battery is a non-graphene-based battery
working mechanism is similar to that of a battery. technology, operates at low cost and better than
graphene-based battery. Soaking 0.1g (50mm x 50mm)
of hemp based active material in electrolyte for 24hrs
gives better results as compared to Lithium-ion
batteries. Increasing the surface area increases the
power in the battery. A typical hemp supercapacitor
has 250mA on the size of a stamp and is 98% efficient
and stable as compared to Lithium-ion batteries. The
supercapacitor is rechargeable, has millions of charge
and discharge cycles and is biodegradable. Hemp
supercapacitors are cost-effective and gives identical
technical value as Lithium batteries. More industries and
Fig 2. Extracted Hemp-bast-fibre
firms are opening and scaling up the production of hemp
There are different materials that are used in a hemp batteries.
battery. Each one of the materials gives different
capacitance, voltage, current, efficiency, performance,
etc.

Fig 4. Hemp (Green) Battery


Fig 3. Schematic diagram of 3.6 Farad Hemp Supercapacitor
IV. METHODS AND PROCESSES
III. WHY DO WE NEED HEMP BATTERY?
Hemp fibres extracted from hemp plant contains
Battery production is worse for the environment and cellulose, which is heated and undergoes a process to
has larger environmental footprint. Most of the modern convert it into flexible carbon electrodes, used in
battery technology uses Lithium, which needs mining batteries or supercapacitors. The fibre undergoes
and releases greenhouse gases. Production of a small hydrothermal carbonization process to convert the
battery releases around 2 - 3 metric tons of CO2 in the fibres into carbon electrodes. The battery charges
environment. A large battery releases around 17 metric instantly and gives industry best results.
tons of CO2. On an average 8 - 10 metric tons of CO2
Conducting material sheets are coated with activated
is released. Lithium-ion batteries use Lithium as the
carbon material and separated by electrolyte-soaked
source of fuel, which requires mining. Ground water
separator. Then they are charged and discharged to
supply is used extensively for the mining of Lithium,
deliver the required power.
which leads to a decrease in ground water level and
affects agriculture. Mining uses 65% of water, which Suppose we are making a hemp coin cell; the weight
produces around 750 tons of brine and 1 ton of Lithium, of the active material is 0.029g and the total weight of
which is around 6% of the battery technology. the whole cell is 2.997g. The cell is 3mm thick and

600 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

20mm in diameter, the separator is 20mm, active


material is 15mm and current collectors are 15mm each.
The top cap (negative terminal) and has a nylon seal in
it. The current collector which is the anode is connected.
The electrolyte-soaked separator is added along with
the active material. The Spicer, spring and a bottom
cap (positive terminal) is added. The cell is closed and
pressurized up to 500 - 600psi.
To obtain the sheet, manufacturers first dissolve the
lignin and cellulose, leaving pure carbon nanosheets.
By transforming these sheets into electrodes and adding
an ionic liquid, the resulting supercapacitor rivals'
alternatives in terms of both energy density and operating
Fig 6. Power Density & Energy Density vs other storage forms
temperature range.
B. Charging and Discharging Rates
More the voltage is applied to the battery, faster the
charging time.A small hemp battery discharge from
100mA to 20mA in 1.5hrs. Leaving the carbon ink for
24hrs gives extra 25% boost in power delivery.
A Lithium battery takes around 4 - 6 mins to
discharge, whereas a Hemp battery takes around 31
Fig 5. Hemp Coin Cell
mins to discharge and recharges within seconds.
V. VOLTAGE, CURRENT, EFFICIENCY
We know that, 1 mole = 6.022 x 1023
6.242 x 1018 electrons = 1 Coulomb
1 Coulomb = 1 Amps/sec = 1 F/V
A. C - rate
A C-rate is a measure of the rate at which a battery
is discharged relative to its maximum capacity. A 1C
rate means that the discharge current will discharge the
entire battery in 1 hour. C-rates are the rate of discharge
(or charge) as compared to the capacity of the battery.
A 1C discharge will be the current that would seemingly Fig 7. Discharge Rate of Hemp Battery
go through the rated ampere-hours of the battery in an
hour. A 2C rate is twice that current. A 0.5C rate is half A 1cm2 battery gives 3.95F to 4F with 1.2V and
that current. Half the time means double the C and half 3.33C. The battery having size of an A4 sheet has
the C means double the time. 2000Ah and after 10000 cycles its efficiency drops
down from 100% to 97.5%.
CR = f (t, m, mc)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 601
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Aluminium plates are micro etched to improve


supercapacitor performance. The NaOHcleans the foil
and forms nucleation sites. The HCletches the foil
starting at the nucleation sites. HCl left long enough will
get a micro porous foil, which will be at least 100 times
increase in the surface area.

Fig 8. Prototype of a Supercapacitor

The capacitance is given by, C=(kA)/d


Now suppose the area of a hemp battery = 215mm
x 202mm = 0.0434mm2
d = 0.1mm = 0.0001m
k = 3.2
 = 8.854 x 10-12
C = 12.3nF
R = 980000 ohm
Fig 10. Discharge of Hemp Battery
T = 1184.6sec
Sugar (2g) is mixed with Zn (NO3)2 (2g) at 120ºC
C = T/R = 0.001208 F = 1.21mF
for 5 - 10 mins. Then it's heated in an oven at 190ºC
Normally the capacitor stores = 991nJ but actually for 5 mins to form carbon foam, which then undergoes
the capacitor stores = 97.58mJ carbonisation and heated at 600 - 700ºC for 30 mins
VI. MATERIALS USED to give carbon and ZnO. Carbon and ZnO is mixed
with HCl to give ZnCland carbon foam. The foam is
Polyvinyl acetate (PVA) (50ml) is mixed with then filtered, washed and dried to produce high
NaOH(2.5g) and stirred. Then it's mixed with Ethanol performance material for the battery.
(50ml) and heated at 80ºC for 30 minsto give Sodium
acetate and Polyvinyl alcohol (yellow in colour). This
Polyvinyl alcohol is mixed with the activated carbon
material and gives more efficiency.

Fig 11. Material performance graph


Fig 9. Prototype of a Hemp Supercapacitor

602 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Basically paper, paper towel, etc are used as


separators. Apart from that Cellulose acetate
andAcetone is used to produce artificial separators.
VII. CONSIDERATIONS
The price of chemical batteries remains too high so
researchers are exploring other alternatives including
flow batteries, thermal batteries, gravity-based systems,
etc. But these are not enough to deliver low cost and
clean and green energy so we are using hemp batteries.
Hemp batteries are used as a storage media. Its better
storage device than conventional batteries. More Fig 13. Hemp Battery Performance
efficient, lasts longer, resilience to temperature, don't Hemp batteries are the new and improved
degrade, etc. The charge discharge cycle is used to replacement of graphene.
improve energy density. The batteries have million years
of lifecycle and is no toxic and no flammable.

Fig 14. Hemp vs Lithium Battery

VIII. APPLICATIONS
Fig 12. Lithium vs Hemp Performance
Hemp is a wonder crop. Hemp battery can be used
Scientists are starting to discover more and more
for a wide range of purposes.
uses for hemp, with recent studies suggesting that hemp
batteries may be more powerful than lithium. Some • Hybrid or Electric Vehicles
geniuses have discovered a way to use hemp fibre as a • Alternative to graphene
supercapacitor. Scientists explain that the fibre from
hemp can be transformed to produce high-performance • Mobile devices
devices to store energy. • Medical devices like Defibrillators
• Computers
• Portable media players
• Photovoltaic systems
• Digital cameras
• Electric tools
• Grid power buffer

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 603
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Uninterrupted Power Supply (UPS) information and suggestions for the validation of this
• Voltage stabiliser paper.

• Micro grids REFERENCES


[1] Hemp for Cheap, Fast charging Batteries. [Interview].
• Energy harvesting
[2] Nanobinoids. [Interview].
• Aviation
[3] "Building Integrated Energy Storage (BIES)".
• Tanks and submarines [4] YouTube, "Supercapacitors: Hemp".
• Missiles [5] "Hempwiki," 17 May 2020. [Online]. Available: https://
hempwiki.com/product/hemp-batteries.
• Railway
[6] "Global Hemp Association," 15 Jan 2021. [Online]. Available:
• Cranes, forklifts and tractors http://globalhempassociation.org/2021/01/15/hemp-batteries-
better-than-lithium-and-graphene.
• Motor racing [7] R. Mertens, "Hemp fibre used to develop low-cost graphene-
like nanomaterial," 16 Jun 2013. [Online]. Available: https://
IX. CONCLUSION www.graphene-info.com/hemp-fiber-used-develop-low-cost-
graphene-nanomaterial.
With over 500,00 uses for the hemp plant claimed it
may come as no surprise that none of the plant need go [8] YouTube, "Future of Energy Storage".
to waste. Researchers are using so called waste fibres [9] YouTube, "Carbon Nanoribbons from Hemp".
and fibres from the decortication of the stem to create [10]Wikipedia, "Supercapacitors," [Online]. Available: https://
lower-cost energy storage. en.wikipedia.org/wiki/Supercapacitor.
[11] Wikipedia, "Hemp," [Online]. Available: https://en.wikipedia.org/
Supercapacitors, can charge in seconds and provide wiki/Hemp.
huge amounts of power instantaneously. They enjoy
[12] YouTube, "Solid Electrolyte for Supercapacitors".
almost limitless lifecycle, as there are no internal
[13] YouTube, "Capacitors, Supercapacitors, Battery basics".
components that break down, and they can charge and
discharge in much wider range of temperatures. [14] S. K. Seger, "Research Shows Batteries Made From Hemp Are
Superior to Lithium, Graphene," Testset, 2020.
If we were able to increase the energy density of [15]"Future Bridge," 10 Nov 2020. [Online]. Available: https://
supercapacitors - and decrease the cost - so they were www.futurebridge.com/industry/perspectives-mobility/
on par with lithium-ion batteries, they could change the supercapacitors-a-viable-alternative-to-lithium-ion-battery-
technology.
face of electric industry. We'd have extremely flexible
[16] YouTube, "Battery or Supercapacitor structure".
energy storage with near-endless lifespan.
[17] YouTube, "All Carbon Battery (Karpen Cell)".
ACKOWLEDGEMENT [18] YouTube, "High Performance Materials".
I express my deepest compassion for my parents [19]D. Lagesse, "Supercapacitors Amp Up as an Alternative to
and my family members for their encouragement and Batteries," National Geographic,2013.
affectionate co-operation during my research work. [20] R. L. McGovern, "Davinci," 9 Apr 2020. [Online]. Available:
https://www.davincivaporizer.com/news/could-hemp-batteries-
Last but not the least my sincere thanks to all the solve-the-energy-crisis.
people who had spent their valuable time to help and [21]J. Morgan, "Hemp fibres 'better than graphene'," BBC, 2013.
explain me with all that I wanted to know. Words will [22]"Way of Leaf," 3 Jan 2020. [Online]. Available: https://
fall short to describe their importance to me. My wayofleaf.com/hemp/hemp-vs-lithium-batteries.
gratefulness to them and also to their kind and co-
operative attitude throughout the journey. I extend my
heartiest thanks to all those respondents, people and
well-wishers who gave their valuable comments,

604 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Power System Stability Enhancment Using Facts


Controller
Arti Prasad1, Priyanka Rajput2
Email: prasadarti22@gmail.com1, Priyankarajput2112@gmail.com2

Abstract : It is specifically important to focus lessening in power transference capability and increase
on voltage stability analysis of the power system in losses. Low VAR levels may result in voltage sag.
to avoid worst case scenarios such as voltage Therefore, suitable levels of reactive power are to be
collapse. The purpose of this dissertation is to sustained for improving the voltage stability of the power
identify methods for enhancing the steady-state system. The bases of reactive power such as
voltage stability using FACTS devices and
conventional devices which are built out of resistance,
determining their impact on real and reactive
power losses, improvement of bus voltage
inductance or capacitance together with transformer,
magnitude and transmission line loadability. To and Flexible AC Transmission System (FACTS)
achieve this, FACTS devices are used in IEEE 5, strategies offer adequate reactive power to the system.
IEEE 9 and IEEE 30 test bus systems. The results FACTS devices offer reactive power compensation,
obtained assist in drawing conclusions on the and improve voltage stability, transmission ability, power
effectiveness of FACTS devices at generator, load flow control, and working tractability of the power
and swing buses in terms of matrices such as system.
voltage magnitude profile, PV curves, and active
and reactive power losses. II. SYSTEM MODEL
Keywords - FACTS, Steady state voltage
stability, reactive power compensation techniques,
flexible AC transmission systems.

I. INTRODUCTION
Voltage Stability examination is vital as voltage
instability may result in the partial or complete
disturbance in the power system. For voltage stability
examination, a number of steady-state examination III. PREVIOUS WORK
methods such as standard power flow methods, After surveying different literatures available in IEEE
continuation power flow methods, nodal methods and transactions, journal and conference proceedings on
dynamic simulation methods are being used by the the topic "Power system stability enhancement by using
electrical utilities. facts controller" it is found that improve voltage stability,
The reactive power plays an important role in a transmission ability, power flow control, and working
power system. Basically, an electric power is generated, tractability of the power system.
transmitted and then distributed to the consumers.
IV. PROPOSED METHODOLOGY
Transformers, transmission and distribution lines, cables
and many common load devices such as motors swing The following method is proposed to study the
the relationship between current and voltage due to their effectiveness of FACTS devices in improving the voltage
inherent characteristics. This swing is measured in volt- stability of a power system. For this purpose, an IEEE
ampere reactive (VAR). High VAR levels may result in 5, IEEE 9 and IEEE 30 bus test system has been taken

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 605
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

as a test system. First, the IEEE 5 bus test system is and the maximum loadability point. The same FACTS
built in MATLAB then IEEE 9 and then IEEE 30. Then, device is included in the system at a generator bus and
continuation power flow analysis is performed on the later at the swing bus and the metrics are obtained as
system built by using MATLAB. The metrics such as given above. The comparison of the metrics between
voltage magnitude profile, active and reactive power the no facts case, the facts at load bus case, at generator
losses, p-v curves, and maximum load ability point are bus case and at the swing bus case provides us the
used to have an understanding of the voltage stability necessary information in determining the effect of the
of the system. In the next step FACTS devices such as facts device used on each of the buses and if it is
SVC, STATCOM, and TCSC are included in the improving the system from the no facts case. This
system built in MATLAB, one at a time. Again, the process is repeated for SVC, STATCOM and TCSC
continuation power flow analysis is performed for each and the metrics obtained are compared with each other
of the cases individually and the metrics are obtained and also with the no FACTS case.
for each of them. The metrics are to be compared
between the each device along with the initial case where V. SIMULATION/EXPERIMENTAL
no facts device is used. The effectiveness of each device RESULTS
is drawn out from the results obtained from comparing In this section author need to describe experimental/
the metrics. simulation results with graphs and appropriate tables.
Thus, this study helps in understanding the most Table 1. With Compentation

efficient FACTS device which can be used for the Compentation


S. No. Bus
enhancement of the static voltage stability of a power 10 MVar 50 MVar
system. 1. IEEE-5 44 44
2. IEEE-9 7.9 8.5
The test system which is the IEEE 5 and IEEE 9 3. IEEE-30 8.9 10
bus system is built in MATLAB in a format that is
compliant with the Simulation. First, the test system is
built without including the FACTS devices in it. In
Simulation, this MATLAB file is opened and continuation
power flow analysis is performed on it. Then, a load
flow report provides the voltage magnitude at each bus
giving us the voltage magnitude profile. It also provides
the active and reactive power losses at each bus and
also the total active and reactive power losses of the
system. A P-V curve can be drawn at each bus which
provides the maximum loadability point of the curve
after which the voltage collapses to zero.
Another IEEE 30 bus test system is built in
Figure 5.1 Voltage at IEEE 5 Bus With Compensation of 10
MATLAB including one of the FACTS devices at a MVAR
load bus in a format that is compliant with the Simulation.
In Simulation, this MATLAB file is opened and
continuation power flow analysis is performed on it.
Then, the load flow report, and p-v curve report gives
the variation in the metrics such as voltage magnitude
profile, active and reactive power losses at each bus,
total active and reactive power losses in the system,

606 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VII. FUTURE SCOPES


The future scope of the research work reported in
the dissertation are as follows:
1. The performance of the proposed scheme can be
further studied under large disturbances for enhancing
the voltage stability and the dynamic and transient
behavior of the system can be investigated further in
order to predict the voltage stability.
2. The application of the artificial techniques can be
explode to enhance further the dynamic behavior of
the system.

REFERENCES
[1] Nidul Sinha, Sambit Karan and Santosh Kr. Singh "Modified DE
Figure 5.2 Voltage at IEEE 9 Bus With Compensation of 10 Based ATC Enhancement Using FACTS Devices" International
MVAR Conference on Computational Intelligence & Networks IEEE
2015
[2] Rahul Dubey, Shishir Dixit and Ganga Agnihotri "Optimal
Placement of Shunt FACTS Devices Using Heuristic
Optimization Techniques: An Overview" Fourth International
Conference on Communication Systems and Network
Technologies IEEE 2014
[3] Mohammed Amroune, Hadi Sebaa, Tarek Bouktir "Static Voltage
Stability Margin Enhancement Using SVC and TCSC"
International Journal of Electrical, Computer, Energetic, Electronic
and Communication Engineering Vol:7, No:10, 2013
[4] Tarik Zabaiou, Louis-A Dessaint and Innocent Kamwa
"Preventive control approach for voltage stability improvement
using voltage stability constrained optimal power flow based on
static line voltage stability indices" Generation, Transmission &
Distribution IET 2014
[5] H. Kazari, A. Abbaspour-Tehrani Fard, A. S. Dobakhshari, A.
M. Ranjbar "Voltage Stability Improvement through Centralized
Figure 5.3 Voltage at IEEE 30 Bus With Compensation of 10 Reactive Power Management on the Smart Grid" IEEE PES
MVAR Innovative Smart Grid Technologies (ISGT), 2011

VI. CONCLUSION [6] Mahyar Zarghami, Mariesa L. Crow, Jagannathan Sarangapani,


Yilu Liu "A Novel Approach to Inter area Oscillation Damping
The conclusions of the research work reported in by Unified Power Flow Controllers Utilizing Ultracapacitors"
this dissertation are as follows: IEEE Transactions on Power Systems, Vol. 25, No. 1, February
2010
1. The Main Contribution of this work is to enhance [7] Karar Mahmoud , Mamdouh Abdel-Akher and Abdel-Fatah
Power System Stability by using Facts Controller. A.Ahmed "Sizing and Locating Distributed Generations for
Losses Minimization and Voltage Stability Improvement" IEEE
2. The Shunt Compensated Power System has been International Conference on Power and Energy (PECon2010),
represented by its equivalent System. The effect of Nov 29 - Dec 1, 2010, Kuala Lumpur, Malaysia
using shunt compensation in enhancing the voltage
[8] R. W. Chang, T. K. Saha "Maximizing Power System Loadability
stability of the shunt compensated power system has by Optimal Allocation of SVC using Mixed Integer Linear
been observed. Programming" IEEE PES General Meeting Minneapolis, 2010

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 607
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[9] Sandeep Gupta, Prof. R. K. Tripathi and Rishabh Dev Shukla


"Voltage Stability Improvement in Power Systems using Facts
Controllers: State-of-the- Art Review", International Conference
on Power, Control and Embedded Systems (ICPCES), 2010
[10] Mr.R.H.Adware, Prof.P.P.Jagtap and Dr.J.B.Helonde "Power
System Oscillations Damping using UPFC Damping Controller"
Third International Conference on Emerging Trends in Engineering
and Technology, 2010
[11] M.Arun Bhaskar, C.Subramani, M.Jagdeesh Kumar and
Dr.S.S.Dash "Voltage Profile Improvement Using FACTS
Devices: A Comparison between SVC, TCSC and TCPST"
International Conference on Advances in Recent Technologies in
Communication and Computing, 2009.

608 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

MPPT Algorithm Based on Particle Sswarm


Optimizations for PV Array Under Partial Shading
Conditions
Abderrezzak Lalouli1, Aicha Wahabi2
1,2
Laboratoire RITM. Ecole Nationale Supérieure d'Electricité et de Mécanique
University of Hassan II Casablanca, Casablanca, Morocco
Email: lalouliabd@gmail.com1, wahabi2012@gmail.com2

Abstract-Under non-uniform solar irradiance The energy produced by this type of system seems
levels, the P-V characteristic of a photovoltaic array the most promising, non-polluting, inexhaustible and with
has several maximum power points, and one of a low installation cost. Nevertheless, the production of
them is the global maximum power point, which this energy is non-linear and it varies according to the
leads to an optimization problem. This paper
irradiation and the temperature.
presents an algorithm for tracking the maximum
power point of a photovoltaic array under partial If the PV panels received a uniform irradiation level,
shading conditions (PSC), based on particle swarm the non-linear I-V and P-V characteristic curves have
optimization. Simulation results show that the only one MPP at the knee of the curve. Therefore, the
applied MPPT technique can reach the global operating point of the photovoltaic (PV) array does
maximum power point and not stagnate at the first not always coincide with the maximum power point. In
power peak even if it is a local maximum power this case, a tracking mechanism called "Maximum
point, a thing that cannot be achieved through
Power Point Tracking" (MPPT) is used to ensure that
classical MPPT techniques such as Increment
Decrement (IC) or Perturbation and Observation the maximum power is always generated[2].
(P&O). But practically, it is impossible for the photovoltaic
Keywords-Partial shading; Local maxima; array to have a uniform irradiation permanently because,
Global maximum power point; PV system; Global sometimes, it is eclipsed completely or partially, by the
maxima; particle swarm optimization (PSO); passage of trees, buildings, clouds or telephone poles.
In addition, most solar modules come in solar cells
I. INTRODUCTION connected in series, which means that each cell must
The unsustainable global consumption of energy has have the same amount of current, or when solar panel
significantly increased the pressure on fossil fuel locations receive lower radiation intensity, the unshaded
resources, which has increased the effects of global cells will cause the shaded cells to produce a higher
warming and climate change problems. As a result, the current than their short circuit current, so the shaded
global ambient temperature is predicted to increase cells will operate at a negative voltage. Which means
approximately 2°C by 2050 due to polluting emissions the shaded cells absorb energy instead of producing
caused by non-renewable energy resources [1]. energy for the system [3].
This growing demand for energy and the pollution In addition, the reference [4] mentioned that for
caused by the use of fossil fuels are pushing the partially shaded PV systems, the (P-V) characteristics
population to use renewable energy. In this regard, become more complicated and shows a multi-peak
photovoltaic energy is one of the important sources of curveFig 1, In other words, it might emerge several
renewable energy that provides a solution to our energy local maximum power points (LMPP), and in which
production problems. only the highest peak will be considered as the global

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 609
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

maximum power point (GMPP), This critical


phenomenon is called partial shading condition (PSC).

Fig 2:The block diagram of the PV system.

This paper is organized as follows: Section 2 is


reserved for the study of the photovoltaic system. In
section 3, we present the PSO algorithm. The results
of the simulation are explained in section 4. Section 5
Fig 1:The P-V curve of the PV array under PSC includes the conclusion and future work.
PSC can reduce the solar PV efficiency and can II. MODELING OF THE PV SYSTEM:
lead to almost zero power output. Therefore, identifying
and tracking the GMPP among the local maximum A. Modeling the PV module and array:
power points, is essential to extract the maximum power
1)Modeling the PV module:
and ensure the optimal operation of the PV module.
The photovoltaic effect is a basic physical mechanism
The objective of this paper is to present an algorithm
that efficiently converts solar energy into electricity. A
for tracking the maximum power point of a photovoltaic
photovoltaic cell has always been the best building
array under partial shading conditions (PSC) based on
block for producing a photovoltaic system. Typically,
particle swarm optimization (PSO).
PV cells are grouped together to create PV modules.
A typical PV system is shown in Fig 2, consisting of Among the various methods of Modeling a PV module,
a PV array feeding a DC load through a boost converter, the mathematical model with a single diode that can be
and an MPPT controller. The DC boost converter in used to simulate PV cells. This model is composed of a
this case also provides the control action to force the photoelectric current source represented by Iph[6][7],an
PV system to operate at the maximum power point ideal diode connected in parallel with Iph, And two
[5]. The work is done on MATLAB®/Simulink® - resistors (Rs and Rsh) which represent series and shunt
Simscape. resistors respectively [8] as shown inFig 3. The current
Iph is directly proportional to the light falling on it. The
I-V and P-V characteristics are given in[9][10].

610 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig 3:Single diode equivalent model of the PV module.


Fig 4:18 KW PV array simulated model in MATLAB /
The Table1 shows the electrical specifications of the S i mu l i n k

PV module used in this document. B. Impact of the temperature and radiation on


Table 1:Electricalspecifications of the LG Electronics the photovoltaic array:
LG265S1C - A3 PV module
The definition of the I-V and P-V characteristics of
LG Electronics
Module the PV array depends on the accuracy of the reference
LG265S1C - A3
Maximum Power (w) 215.15 W parameters for various operating conditions.Fig 5
Voltage at MPP (v) 29 V shows the I-V and P-V characteristics of the PV arrayat
Current at MPP (A) 8.49 A 25°C temperature and for the following different solar
Open circuit voltage (Voc) 36.3 V
irradiations: 250 W/m2; 500 W/m2; 750 W/m2; 1000
Short-circuit current Isc (A) 7.84 A
W/m2. From the I-V characteristics, it is observed that
2) Modeling the PV array: Isc and Voc are almost identical to those of the actual
values. And when the solar irradiation decreases, the
To form a PV array, the modules can be connected
MPP of the PV module also decreases, and when the
in series or parallel (Bridge-linked PV, Series-Parallel
irradiation level increases, the MPP of the PV module
PV, Total Cross ties (TCT)) [11]. Generally, modules
also increases.
are connected in series to increase voltage and in parallel
to increase power output[12][13]. On the other hand, Fig 6 shows the I-V and P-V
characteristics at 1000 W/m2 irradiation and for different
The total number (M) of PV modules required for
temperatures as follows: 25°C; 35°C; 45°C. As the
the PV array design is:
temperature level increases, the MPP of the PV module
decreases. Thus, solar irradiation and temperature
(1)
aretwo important factors that affect the power output
Total power required = 18 KW, maximum power of solar panels [12][14].
for one module = 213.15 W. So, M = 20000/213,15
≈ 70 Modules. With 12 modules in series, the PV array
is therefore divided into (6 parallel and 12 series), Fig
4shows the model simulated in the MATLAB®/
Simulink® environment that was used to obtain the P-
V and I-V characteristics under uniform and PSC in
this section, View the different characteristics Fig 5-
Fig 6-Fig 7.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 611
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig 5:I-V and P-V characteristics for Array type : LG


Electronics inc.LG256S1C-A3 ;12 series Modules ;6 parallel
Fig 6:I-V and P-V characteristics for Array type: LG
strings at the constant temperature of 25°c and various solar
Electronics inc. LG256S1C-A3 ;12 series Modules; 6 parallel
irradiation :1000 W/m2 ; 750 W/m2 ; 500 W/m2 ; 250 W/m2
strings at the constant irradiation of 1000 W/m2 and various
cell temperature: 45°C; 35 °C; 25°C

C. PV array characteristics under partial


shading conditions:
Due to the environmental constraints such as
buildings, passing trees or clouds, snow, dust deposits,
and the large surface area occupied by the PV modules,
the modules may be exposed to different solar radiation,
i.e., operating under PSC, which is the main reason for
power losses in PV systems[15].

612 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

However,in the PSC framework, the P-V curve has configurations. Its topology is shown in Fig 11, An input
multiple LMPPs and a single GMPP, as shown in Fig capacitor (Cf-in) is connected to limit the high frequency
7, so it becomes essential to distinct GMPPs and harmonic components, the inductor function (L) is to
LMPPs. Note that when the bypass diode is removed suppress the current ripple, while the capacitor function
the PV array will have only one peak, while the output (Cf-out) is to reduce the output voltage ripple.
power will drop dramatically. Therefore, the bypass The relationship between the output and input
diode should always be connected in parallel with the voltages (Vout and Vpv) respectively, is given by (2),
PV module to increase the output power under PSC. where ? is the duty cycle.

(2)

The parameters of the DC-DC boost converter used


in this paper are shown inTable 2.
Table 2: Parameters of the DC-DC boost converter

Parameter Value
Resistor R (load) 50 ?
Inductor L 120 µH
Capacitor Cf-in 330 µF
Capacitor Cf-out 330 µF

III. PARTICLE SWARM OPTIMIZATION


(PSO)ALGORITHM:
The inspiration for the particle swarm algorithm is
to simulate the navigation and search of a swarm of
birds or a shoal of fish. PSO was developed by James
Kennedy and Russel Eberhart in 1995 by studying the
social behavior of animals moving in swarms. PSO seeks
to achieve high-quality optimization by iteratively fine-
tuning a candidate solution. PSO uses fewer resources
than other optimization techniques.
The particle swarm corresponds to a population of
simple agents, called particles. Each particle is
considered a solution to the problem, where it has a
position xi and a velocityvi (displacement). In addition,
each particle has a memory that allows it to remember
Fig 7:PV array characteristics under uniform and PSC: (a)
Array I-V curve, (b) Array P-V curve. its best performance Pbest (in position and velocity)
and the best performance achieved by the particles in
D. Modeling of the boost converter the swarm Gbest. During its movement, the particle is
The aim of the DC-DC converter is to transfer the influenced by the following components: Inertia
maximum power from the module to the load. There component, Cognitive component, social component.
are certain types of DC-DC converters such as buck, In this work, position and velocity are respectively
boost and buck-Boost. In this paper, the "boost" thought of as the duty cycle and power output of the
configuration is chosen because of its wide use and high PV system.
reliability compared to other more complex

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 613
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig 8 shows the flowchart of the PSO-based tracker


search mechanism. Initially, the number of duty cycles
was randomly selected. Then, each of them is applied
to the PV. The system current and voltage are measured
to estimate the PV power. This power represents the
fitness function of the particle i. Then, the comparison
between the new fitness value and the power
corresponding to the Pbest will be saved. If the new
estimated power is higher than the old one, it is selected
as the best fitness value. After evaluating all particles,
the old velocity and position of each particle can be
updated based on (3) and(4 ) [16]When the stopping
criteria is achieved, the PSO-based tracker stops and
provides the optimal duty cycle corresponding to the
overall power.

(3)

(4)

Fig 8: flowchart of the PSO-based tracker search mechanism.

614 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

IV. SIMULATION RESULTS


A. Simulation approach
In this section, the temperature is assumed to be
constant, at 25°C for all conditions, but irradiation levels
will vary under various conditions. The PV array has
been connected to the Load through a boost converter
which is controlled by the proposed MPPT Fig 11. To
verify the performance of the proposed controller,
different simulations are performed using MATLAB/
Simulink and the "Simscape Electrical" toolkit. The
simulation results are split into two subsections. First,
the simulations are performed under uniform irradiation
and then under partial shading condition (PSC).
The PV array in use consists of 72 PV modules,
The speci?cation of the individual PV module is shown
in Table1. the specifications of the boost converter are
shown in Table 2. The switching frequency of the boost
converter is set to 20 kHz.
The PWM block is a mask block of the PWM
generator for the boost converter. It is used to generate
pulse signals for the IGBT based on the obtained duty
cycle.
B. MPPT system under uniform irradiation:
This section presents the simulation results of the
MPPT system with the PSO technique.Fig 9 shows
the simulation results of V-pv, P-pv and duty cycle under
uniform irradiations.
Fig 9:Simulation results of the PV system under different
irradiations and at 25°C.

The results proved that the PSO algorithm was able


to track the MPP under normal conditions, since there
was only one peak point on the PV curve for each
irradiation. The efficiency of the proposed algorithm is
99% efficiency and a fast-tracking speed around 0.14
s.
C. MPPT system under Partial Shading
Condition (PSC):
This section elaborates the e?ect of multiple peak-
points on PV due to the partial shading condition (PSC).
The MPPT system was tested with the PSO techniquein
the same irradiation conditions as Error! Reference

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 615
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

source not found..Fig 10 display the simulation results Fig 10:Simulation results of the PV system under partial
shading condition and at 25°C.
of V-pv, P-pv,duty cycle and P-V under PSC.
V. CONCLUSION
Comparedthe results in Fig 7 and Fig 10 , the results
proved that the proposed algorithm is able to track the In this paper, the results indicate that the proposed
GMPP under PSC with 99% efficiency and a fast- controller offer a number of advantages: it has a faster
tracking speed around 0.14 s. tracking speed, it is efficient and can localize the GPPM
for all environmental variations i.e. under normal
irradiation or partial shading condition. , despite the
presence of some oscillations in the PPM..

Fig 11:Proposed Simulink model of PV system using PSO techniques

616 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [9] A. Al-Subhi, I. El-Amin, and M. I. Mosaad, "Efficient predictive


models for characterization of photovoltaic module performance,"
[1] L. Bastida, J. J. Cohen, A. Kollmann, A. Moya, and J. Reichl, Sustainable Energy Technologies and Assessments, vol. 38, p.
"Exploring the role of ICT on household behavioural energy 100672, Apr. 2020, doi: 10.1016/j.seta.2020.100672.
efficiency to mitigate global warming," Renewable and Sustainable
Energy Reviews, vol. 103, pp. 455-462, Apr. 2019, doi: 10.1016/ [10]Ulleberg and S. O. Mørner, "TRNSYS simulation models for
j.rser.2019.01.004. solar-hydrogen systems," in Solar Energy, Apr. 1997, vol. 59,
no. 4-6-6 pt 4, pp. 271-279. doi: 10.1016/S0038-
[2] M. Azab, "A New Maximum Power Point Tracking for 092X(97)00015-7.
Photovoltaic Systems," no. 2002, pp. 702-705, 2009.
[11]N. Shankar and N. SaravanaKumar, "Reduced Partial shading
[3] R. Alik and A. Jusoh, "An enhanced P&O checking algorithm effect in Multiple PV Array configuration model using MPPT
MPPT for high tracking efficiency of partially shaded PV based Enhanced Particle Swarm Optimization Technique,"
module," Solar Energy, vol. 163, no. August 2017, pp. 570-580, Microprocessors and Microsystems, p. 103287, 2020, doi:
2018, doi: 10.1016/j.solener.2017.12.050. 10.1016/j.micpro.2020.103287.
[4] H. Labar and M. S. Kelaiaia, "Real time partial shading detection [12]M. Premkumar, C. Kumar, and R. Sowmya, "Mathematical
and global maximum power point tracking applied to outdoor modelling of solar photovoltaic cell/panel/array based on the
PV panel boost converter," Energy Conversion and Management, physical parameters from the manufacturer's datasheet,"
vol. 171, pp. 1246-1254, Sep. 2018, doi: 10.1016/ International Journal of Renewable Energy Development, vol. 9,
j.enconman.2018.06.038. no. 1, pp. 7-22, 2020, doi: 10.14710/ijred.9.1.7-22.
[5] S. Ravytset al., "Embedded BIPV module-level DC/DC [13]B. Yang et al., "Comprehensive overview of meta-heuristic
converters: Classification of optimal ratings," Renewable Energy, algorithm applications on PV cell parameter identification,"
vol. 146, pp. 880-889, Feb. 2020, doi: 10.1016/ Energy Conversion and Management, vol. 208. Elsevier Ltd, p.
J.RENENE.2019.07.018. 112595, Mar. 15, 2020. doi: 10.1016/j.enconman.2020.112595.
[6] Y. Liu, Z. Lu, and F. Yang, "The investigation of solar PV models," [14]B. Yang et al., "Comprehensive overview of maximum power
in 2018 IEEE Power and Energy Society Innovative Smart Grid point tracking algorithms of PV systems under partial shading
Technologies Conference, ISGT 2018, 2018, pp. 1-5.doi: 10.1109/ condition," Journal of Cleaner Production, vol. 268, p. 121983,
ISGT.2018.8403350. 2020, doi: 10.1016/j.jclepro.2020.121983.
[7] L. N. Rao and S. Gairola, "PV system analysis under partial [15]S. Motahhir, A. EL Hammoumi, A. EL Ghzizal, and A. Derouich,
shading using a sine model," International Journal of Renewable "Open hardware/software test bench for solar tracker with virtual
Energy Research, vol. 8, no. 1, pp. 280-290, 2018. instrumentation," Sustainable Energy Technologies and
[8] A. Elewa, M. M. Elkholy, and M. El-Arini, "Adaptive MPPT Assessments, vol. 31, pp. 9-16, Feb. 2019, doi: 10.1016/
for PV systems under partial shadow condition and different j.seta.2018.11.003.
loads using advanced optimization techniques," in 2017 19th [16]J. Farzaneh, R. Keypour, and M. A. Khanesar, "A New Maximum
International Middle-East Power Systems Conference, Power Point Tracking Based on Modified Firefly Algorithm for
MEPCON 2017 - Proceedings, 2017, vol. 2018-Febru, pp. 152- PV System Under Partial Shading Conditions," Technology and
162. doi: 10.1109/MEPCON.2017.8301178. Economics of Smart Grids and Sustainable Energy, vol. 3, no. 1,
pp. 1-13, Dec. 2018, doi: 10.1007/s40866-018-0048-7.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 617
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Multiple Faults Detection of Transformer by


Microcontroller and Conventional Methods
V. Anjaneyulu1, Syed Fowzia2, G. Anusha3, R.Rajeswari4, S.Nirmala5
1
Assistant Professor, 2,3,4,5Student
1,2,3,4,5
Dept of EEE, Geethanjali Institute of science and Technology, Nellore, A.P, INDIA
Email: sai.anji1@gmail.com1

Abstract: In olden days we used to provide transformer is a high efficiency piece of electrical
lamps for fault identification with relay logic. These equipment and its losses are very low because there
circuits are costly and have limited time and poor will be no mechanical friction involved in its operation
reliability. To overcome the said, we are introducing
a microcontroller which will handle all relay logics 2. Three phase transformer
and display the message in LCD and this
conventional (indicators) will be used as backup.
Three phase transformers are more economical for
The microcontroller has been recognized as a supplying large loads and large power distribution. Even
general-purpose building block for intelligent though most of the utilization equipment are connected
digital systems. A microcontroller is a by the single-phase transformers, these are not preferred
microprocessor system built on a single chip. for large power distribution in the aspect of economy.
Major features of amr2560 microcontroller are 8- Three phase power is used in almost all fields of
bit CPU optimized for control applications. electrical power system such as power generation,
transmission, and distribution sectors, also all the
1. INTRODUCTION
industrial sectors are supplied or connected with the
A transformer is one of the most common devices three-phase system. The advantages of three phase
found in electrical system that links the circuits which transformer are smaller and lighter to construct and
are operating at different voltages. These are commonly better operating characteristics.
used in applications where there is a need of AC voltage
Extensive Boolean processing capabilities, on-chip
conversion from one voltage level to another. It is
flash program memory, on-chip data RAM, Bi-
possible to decrease or increase the voltage and current
directional and individual addressable input and output
by use of transformer in AC circuits based on the
lines, multiple 8-bit timer or counter, UART, multiple
requirements of the electrical equipment or device or
source/Vector/Priority interrupt structure, on-chip
load. Various applications use wide variety of
oscillator and clock circuitry, on-chip EEPROM, SPI,
transformers including power, instrumentation, and
Watchdog Timer. In this project we can detect multiple
pulse transformers.
faults of a single-phase transformer and we can also
Based on the power supply transformers are monitor the temperature and current on the LCD. This
classified into two types. project is applicable for the railway high voltage
transformer 132kv/25kv.
1. Single phase transformer
There are three main transformer faults.
A single-phase transformer is an electrical device
that accepts single phase AC power and outputs single 1. open circuit conditions
phase AC. This is used in the distribution of power in 2. Over heating conditions
non-urban areas. They are used as step-down
transformer to decrease the home voltage to a suitable 3. Winding short circuit conditions
value without a change in frequency. A single-phase

618 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

1. Open circuit conditions disadvantages such as occupies more space, not reliable
The open circuit in the transformer can cause an , high cost and has less durability. The proposed method
abnormal heat inside the transformer which cause which is a microcontroller-based system overcomes the
transformer in dangerous conditions. when open circuit drawbacks of the existing system. In the proposed
conditions or fault occurs it is essential to disconnect system microcontroller takes the required action as soon
the transformer from the system. as the fault is detected and gives command to trip the
circuit breaker and hence transformer gets protected
2. Over heating conditions from the damage.
Over heating of transformer fault can mainly cause 3. BLOCK DIAGRAM
from two conditions such as overload conditions and
short circuit conditions of the transformer. COMPONENTS FOR THE PROPOSED
SYSTEM
3. Winding short circuit conditions
This fault condition is also known as internal faults
and this kind of faults are mainly occurring due to winding
disorientations, over heating of the internal parts of the
transformers and mechanical injuries. When this type
of fault occurs, it is necessary to immediate shut down
of the transformer before gets damage.
Different transformers demand different schemes of
transformer protection depending upon their
importance, winding connections, earthing methods and
mode of operation etc. It is important to practice to
provide Buchholz relay protection to all 0.5 MVA and
above transformers. While for all small size distribution Fig: 1 : Power supply card, MSI card, Conventional logics
transformers only high voltage fuses are used as main card, Arduino pro mini 2560, power transformer, current
transformer, circuit breaker, Trip and indicator, indicators
protective device. For all larger rated and important and LCD
distribution transformers, over current protection along
with restricted earth fault protection is applied. Working model of the system
Differential protection should be provided in the
transformers rated above 5 MVA. Depending upon the
normal service condition, nature of transformer faults,
degree of sustained over load, scheme of tap changing,
and many other factors, suitable transformer protection
schemes are chosen.
The transformer is costly equipment and highly
reliable pieces of the equipment of the substation. So,
the protection of the transformer is the vital. Different
Fig: 2 :Working model of the system
types of faults may occur in the transformer, if the fault
sustains for a long time, the transformer will damage. The above figure shows the arrangement for the
Therefore, it is required to trip the transformer as soon transformer multiple faults detection by microcontroller
as possible when any fault occurs. The existing and conventional methods. Working can be explained
transformer protection methods has some of the as follows

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 619
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

CONVENTIONAL METHODS RESULTS


To demonstrate this method we need to turn on the The results of the project are displayed on the LCD.
power supply and then through the power supply card Here in this project we are displaying the transformer
supply is given to the conventional logics card. Inputs temperature , current through the load before and after
are generated through push buttons connected to the circuit breaker tripping and the type of trip. Results of
relays. when press to oil temperature trip button is the transformer faults can be shown in three steps.
pressed then oil temperature trip indicator will glows. 1. Turn on the power supply and toggle switch. Reset
Similarly by pressing the other two buttons one after the microcontroller and turn ON the load by pressing
the other over current trip indicator and buchholz relay the green button. Now increase the temperature of
trip indicator glows. the probe as soon as temperature exceeds the limit
circuit breaker is tripped and result is displayed as
PROPOSED METHOD shown in the figure.
In this project we are using microcontroller that
detects the three faults of the transformer that is due to
over load, over oil temperature and buchholz relay.
These are provided as input to the multiple signal Fig: 3
integrators. Whenever fault occurs the respective
parameter is sensed by the multiple signal integrators
and it generates the output which is given to the
microcontroller .Now microcontroller gives command
to trip and indicator which trips the circuit breaker and
transformer gets protected.
Fig: 4
Supply is turn on and power supply card provides 2. Reset the microcontroller and turn ON the load. Now
supply to the components of the proposed system. To press the overcurrent button microcontroller
demonstrate the over current fault we are adding over immediately trips the circuit breaker and result is
load to the existing load by using press to over current displayed as shown in the figure.
button. When the button is pressed the microcontroller 3. Again Reset the microcontroller and turn ON the load.
detects the fault and immediately trips the circuit breaker. Press the Buchholz relay button immediately after
To show the fault due to over temperature the pressing the button circuit breaker is tripped and result
temperature probes temperature is increased the is displayed as shown in the figure
microcontroller detects the fault and finally trips the
circuit breaker. Nextbuchholz press button is pressed CONCLUSION
which is on the multiple signal integrator, microcontroller Transformers are static devices totally enclosed and
detects it and it trips the circuit breaker.Finally when generally oil immersed. Therefore, chances of faults
fault occurred message is displayed on the LCD occurring on them are very rare. However, the
consequences of even a rare fault may cause very
ADVANTAGES
serious damage unless the transformer is quickly
Accurate detection of the faults, less power disconnected from the system. This necessitates to
consumption, Fast response, Generate low heat, Low provide adequate protection for transformers against
Cost possible faults. In this project transformer multiple faults
detection by using conventional methods and
APPLICATIONS
microcontroller are shown. Conventional methods
Industries, Power Plants, Substations, Hospitals require lot of components, space and also generates
more heat. All this cause to reduce the life of system.

620 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

By adopting microcontroller-based system will detects 9. REFERENCES


the faults of the transformer with less electronic 1. Campbell, Richard J., Weather related power outages and electric
components. The parameters of transformer are given system resiliency, Congressional researchservice report for United
to multiple signal integrator which is connected to States congress, August 2012.

microcontroller. Microcontroller will give output to trip 2. Udoh, Benjamin E., "The Restricted Earth Fault Relay
Operation_Impact of Current Transformer Knee Voltages,"The
and indicator to trip the circuit breaker and message is International Journal Of Engineering And Science (IJES), Volume
displayed on the LCD. This project is also designed in 2, Issue 12, 2013.
such a way that it will completely free from human errors, 3. J. Robertson, "Use of Silicon Carbide Varistors in the Prevention
the system control by the microcontroller, if by mistake of Overvoltages in Electrical T&D ProtectionSystems", 10th IET
human try to ON the switch in wrong way it cannot International Conference onManchester, 2010
turn ON. By implementing this technology safe and 4. High Impedance Restricted Earth Fault Protection, Technical
Guidance Notes,SIEMENS Protection DevicesLimited, 2012.
quick operation performed

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 621
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

An Optimal Placement and Sizing of Distributed


Generators in Unbalanced Distribution Systems Using
Supervised Big Bang-Big Crunch Method
Pavan Gubbala
Email: pavangubbala208@gmail.com

Abstract-This paper presents an efficient and heuristic [17]-[26]. The analytical method known as
fast-converging optimization technique based on a the "2/3 rule" was proposed in [3] for optimal installation
modification of the traditional big bang-big crunch of a single DG, two analytical methods for optimal
method for optimal placement and sizing of voltage location of one DG in radial and meshed power systems
controlled distributed generators. The proposed
were introduced in [4]. Reference [5] presented a non-
algorithm deals with the optimization problems
incorporating multiple distributed generators for
iterative analytical method to minimize power loss by
the sake of power as well as energy loss the optimal placement of DG in radial and meshed
minimization in balanced/unbalanced distribution systems. Analytical expressions for finding optimal size
systems. The proposed algorithm is implemented and power factor of different types of DGs were
in MATLAB environment and tested on the 33- suggested in [7]. In [8] the authors proposed an
bus feeder system and the IEEE 37-node feeder. improved analytical method for allocating four types of
Validation of the proposed method is done via DG units for loss reduction in primary distribution
comparing the results with published results networks along with an approach for optimally selecting
obtained from other competitive methods. the optimal DG power factor. Linear Programming was
INTEGRATION of distributed generators with the used to solve optimal DG power optimization problem
distribution networks sparked broader interest in the in [9] and [11] for achieving maximum DG penetration
last two decades. Distributed generators (DGs) are and maximum DG energy harvesting, respectively. The
connected to the distribution network for different authors in [10] identified the optimal sizing and sitting
purposes: improving the voltage profile, reducing the of CHP-based DG based on urban energy network by
power loss, enhancement of system reliability and solving the nonlinear programming problem. A
security, improvement of power quality by improving multiobjective performance index, taking into account
supply continuity, relieving transmission and distribution the time-varying behavior of both demand and
congestion, reduction in health care costs due to generation, when optimized by an exhaustive search,
improved environment, reducing the system cost and was suggested in [12]. An optimization method was
deferral of new investments [1] and [2]. Optimal location developed in [13] for specifying the locations and sizes
and capacity of DGs plays a pivotal rule in maximizing of multiple DGs to achieve DG capacity maximization
the benefits gained from them, on the other side non- and loss minimization. A probabilistic-based planning
optimal placement or sizing of DGs may cause technique was proposed for determining the optimal
undesirable effects. The search space of optimal location fuel mix of different types of renewable DG units in
and capacity of DGs is roomy. Different optimization order to minimize the annual energy losses in the
strategies have been presented in recent literature with distribution system is presented in [14]. In [15] another
objective functions aiming to power loss minimization, probabilistic-based planning technique was presented
cost reduction, profit maximization and environmental to determine the optimal capacity and location of wind-
emission reduction. The optimization methods are based DG units to minimize the annual energy losses in
classifies into analytical [3]-[8], numerical [9]-[16] and the distribution system. A multi-period optimal power

622 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

flow was solved using nonlinear programming in [16]. Given: the input data comprises the distribution
Genetic algorithm (GA) and optimal power flow were feeder structure, series impedances, mutual impedances,
combined to solve the optimization problem in [17], shunt capacitances, feeder loads values and load types.
and GA was applied to solve a DG optimization problem Required: to determine exactly the optimal DG
with reliability constraints in [19] and for maximizing capacity and optimal DG location for the sake of
the profit by the optimal placement of DGs in [20] and minimizing the distribution feeder active power loss as
[21]. The DG optimal power was evaluated by the Tabu well as energy loss using (1) and (2) without violating
Search (TS) method for the case of uniformly distributed the system constraints:
loads [22]. A continuous stochastic DG model optimal
power was evaluated by a GA as well as by a combined
TS and scatter search [23]. Reference [25] proposed
a method that integrates constant power factor DG units
in balanced distribution networks for minimum power
loss. In [26] artificial bee colony (ABC) algorithm was
implemented to determine the optimal DG size, power where fis feeder number, Nf is total number of
factor, and location in order to minimize the total system feeders, Ploss, fis the power loss at certain feeder f , h is
real power loss is proposed. Big Bang-Big Crunch (BB- the hour number and Ploss, his the total system power
BC) optimization method was firstly presented by Erol loss at certain hour h. The system constraints are as
in [27]. The method was successfully applied to follows:
nonlinear multidimensional functions and showed good
• Voltage limits: voltage at each bus should be within
convergence speed [28]-[31]. The BB-BC method was a permissible range usually
applied to solve power flow problem with continuous
and discrete control variables in [28], the method was
tested on the IEEE 30-bus feeder and results were
• DG power limits: active, reactive and complex powers
compared to genetic approach. In [29] the BB-BC
of the DG unit are constrained between minimum
algorithm for optimal selection of the control parameters and maximum value and this range should not be
for minimizing the fuel cost of generators was presented. violated:
This paper presents a supervised BB-BC method for
finding the optimal location and capacity of dispatchable
DGs connected to unbalanced distribution feeders for
power/energy loss minimization without violating the
system constraints. The DG in the proposed algorithm
is modeled as voltage controlled (PV) node with the
flexibility to be converted to constant power (PQ) node
in case of reactive power limit violation. The proposed In the proposed method DG maximum active power
algorithm is implemented in MATLAB and tested on is limited by
the 33-bus feeder and the IEEE 37-node feeder. The
results obtained are compared with published results
for validation. The comparison proves the effectiveness,
and the speed of convergence of the proposed method. The previous relation is bounded by the thermal
capacity limit of the feeder lines. The DG power factor
II. PROBLEM STATEMENT is bounded between two preset values; hence, the
The optimization problem under study can be stated reactive power is also bounded in return.
as follows:

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 623
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Lines thermal limit (line Ampacity): it represents the reactive current injection depends on the difference
maximum current that the line can withstand at certain between the voltage magnitude of the PV node and
DG penetration, exceeding this value leads to melting the scheduled value. Steps for modeling DG when
of the line: operating at specified terminal voltage are minutely
discussed in [32] and [33]. DG in the proposed
algorithm is modeled as PV node with the flexibility
to be converted to PQ node in case of reactive power
• Power balance: the sum of input power should be limit violation.
equal to the sum of output active power in addition to
3) Complexity of the optimization problem: the
the active power loss. The input power may include
traditional BB-BC algorithm [27] can be easily used
the DG active power and the active power supplied
to solve a nonlinear, multidimensional optimization
by the utility. The active output power is the sum of
problem where the function to be optimized is
loads active power:
continuous and formulated as an equation that depend
on the system variables.
On account of the complexity, unbalance, offshoot
Approach: apply the supervised BB-BC method to of the feeder branches and the mutual impedances
solve the optimization problem and find the optimal between phases for the feeder under study, the function
location and capacity of DGs in order to minimize the to be optimized either as the power loss or the energy
power loss or the energy loss. Rummage for the optimal loss cannot be formulated as a function of DGs power
location and capacity of DGs connected to unbalanced or location. In addition, the locations of DGs as one of
distribution system by using the proposed method is the system variables, is not continuous as it must be an
faced by some obstacles that can be summarized in the integer numbered in a random way. Moreover, the
following challenges: current optimization problem involves many local
1) Nature of the distribution system: a distribution minimum locations that may trap the traditional BB-
system has a radial topological structure. Newton BC algorithm.
Raphson and fast decoupled Newton Raphson are
III. SUPERVISED BIG BANG-BIG
the most widely used methods for transmission
systems but they are unsuitable for the distribution CRUNCH
networks because distribution networks are ill- The traditional BB-BC algorithm [27] consists of
conditioned. The backward forward sweep method two steps; the first one named Big Bang phase
is selected for the developed power flow, as it involves encompasses the creation of the initial candidate
limited matrix operations and no matrix inversions solutions that are spread randomly all over the search
[32]. The hired method is composed of two steps,
space, the Big Bang phase is the followed by Big Crunch
the backward sweep step at which the branch current
is calculated based on the nude currents using KCL,
phase that huddle all the candidate solution at only one
the forward sweep step at which the updated voltages solution that is called the center of mass.
at all nodes are calculated using KVL. The step by step procedure of the BB-BC algorithm
2) Modeling of voltage controlled DGs: small is discussed as follows:
capacity DGs can not supply sufficient reactive power 1) Form an initial generation of candidate solution inside
to control the output voltage, this leads to representing the search space.
the generation node as PQ or constant negative load
with current injection into the node. Large capacity 2) Calculate the objective function value of all candidate
DG can supply required reactive power; hence the solutions.
generator node in this case must be modeled as PV 3) Find the center of mass (x2 ) according to (10). Best
node. When modeled as PV node DG behaves as value of the previous step can be chosen as the center
voltage dependent current source as the amount of of mass:

624 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4) Select the best DG location and power that achieve


minimum active power loss.
5) Call the DG location corresponding to the best DG
power obtained from step 4) from the guidance table.
6) Calculate the active power loss corresponding to the
DG power determined from step 4) and the recalled
where xi is a point within the search space and fi is DG location then compare this power loss Plrec with
the power loss determined from step 4) . Plrec
the corresponding value of the objective function.
4) Create new members around the center of mass to 7) Check the power loss at the recalled location, if its
be used in the next iterations using (11), the value is lower than the power loss determined from
remoteness of the new candidate solution decreases step 4) set the recalled location as the best location,
as the number of iterations elapse: otherwise set the best location to that obtained from
step 4).
8) Update the DG locations and powers using (12) and
(13). Keeping the best DG location and power as a
where is the upper limit of the search space, is a one of the new system variables, round the DG
normally distributed random number and is the iteration locations to the nearest integer. The new DG locations
and powers are upper and lower bounded. The square
step.
of the iteration step is used to quicken the
5) Repeat steps 2)-4) until the stopping criteria has been convergence:
met. Although BB-BC has proven to be an efficient
method in solving nonlinear, multidimensional
optimization problem where the function to be
optimized is continuous, it might not be the best
method to solve the current optimization problem due
to its tendency to fall in local minimum points and
difficulty to converge to the optimal solution due to where locnew and pgnew are the new candidates DG
the complexity stated in Section II. locations and active powers. uploc and uppare the
maximum value of DG locations and active powers.
For guaranteeing of reaching the optimal solution
with less effort and with rapid convergence the 9) Repeat steps 4)-8) until the convergence criteria is
supervised BB-BC algorithm is proposed. Fig. 1 shows met, the convergence is considered achieved when
the flow chart of the supervised BB-BC and it is more than 50% of the DG locations and DG active
discussed in the following step by step procedure. powers are converged to a certain value.

1) Construct the guidance table consists of power The proposed supervised BB-BC method grips the
intervals and the corresponding best location for each demerits of the traditional BB-BC through the following
interval. Guidance table is formulated by dividing the modifications:
DG active power range 0 <pg<pgmax to equally 1) Proposing the guidance table that orients the method
divisions, at each division the best location is roughly towards the optimal solution and preventing it from
estimated by setting the DG active power to the falling in local minimum locations.
middle value of each division and find the location
that achieve the minimum active power loss. 2) Amendment of the updating equations of the BB-BC
method to be suitable for the current optimization
2) Generate randomly the initial values of the system
problem and for accelerating the convergence.
variables (DGs active power, DGs locations).
3) Calculate the active power loss corresponding to all
initial DG locations and powers by running the
unbalanced load flow.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 625
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 2. Layout of the 33-bus feeder

Fig 1.Supervised Big Bang-Big crunch method

3) Keeping the best location and DG power of one


iteration within the variables of the next iteration in Fig. 3. Renumbered IEEE 37- node feeder.
order not to lose a candidate solution. IV. ANALYSIS AND RESULTS
The proposed algorithm has been implemented in
MATLAB and the following studies were done on the
IEEE 33-bus [34] and the IEEE 37-node [35] feeders
presented in Figs. 2 and 3 respectively to evaluate the
optimal DG location and size.

626 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The IEEE 33-bus feeder is a balanced feeder with The DG in the proposed study is modeled as PV
constant active and reactive power loads while the IEEE node with the flexibility to be converted to PQ node in
37-node feeder is complex as it is characterized by case of reactive power limit violation; the reactive power
spot loads, single phase and three phases balanced and limits is calculated by varying the power factor from
unbalanced loads, delta connected loads, constant 0.8 lagging to 0.8 leading. Moreover, the DG model
active and reactive power, constant impedance, and could be switched to PQ node only whenever required.
constant current type loads. The regulator was removed
in order to clearly evaluate the effects of the DG on the A. Comparative Study
system voltage profile for the IEEE 37-node feeders. 1) Validation of the Unbalanced Load Flow:
The substation node is numbered as (0) as it is the Unbalanced load flow without DG was done on the
reference node which has a constant voltage of 1 per- IEEE 37-node feeder and the results of voltages were
unit, the numbering of the other nodes compared with [32]. Table I shows a sample of the
per unit line to line nodes voltages of the proposed
load flow and [32]. It is clear that the results obtained
matched closely the results of [32].
2) Validation of DG Integration to the Load Flow:
Different sizes of constant power factor DG were
tested and compared to results done on the 33-bus
feeder and presented in [25].Table II confirms that
the results are almost identical.
3) Validation of the Supervised BB-BC Algorithm:
The proposed algorithm is applied to the 33-bus feeder
and the optimal DG active power and location are
compared with the results published in [25] which
uses analytical method for finding the optimal location,
size

Table 2
Comparison of Results Published in [25] and the Proposed
Results

Fig. 4. Active power loss versus iteration of 33-bus feeder.

and power factor of DG in order to minimize the


power loss. The comparison of results is presented in
is done in ascending order. Whenever a lateral
Table III. In addition, the results of the proposed method
branches off of the main feeder the lateral is indexed
were compared with results published in [26] which
before returning to the main feeder.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 627
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

uses artificial bee colony algorithm (ABC) and also with Table III : Comparison of Optimal Location and Power of DG
Connected to the IEEE 33- Bus Feeder With [25]
results published in [36] which uses genetic algorithm
(GA). Two case studies were conducted using the
proposed method, the first case was to find the optimal
location and power of a DG unit that's able to supply
active power only and the second was for a DG that's
able to supply active and reactive power within the
permissible range. The comparison of results is
presented in Table IV. The results of case 1) closely
matches the results of [26] and [36] as their studies
were done on using a DG that supplies active power
only. Case 2) shows that the proposed algorithm is more Table IV : Comparison of Optimal Location and Power of DG
Connected to the IEEE 33-Bus Feeder with [26] and [36]
efficient in finding the DG optimal location and power
as the power loss is much reduced. This can be
explicated that the proposed algorithm not only evaluate
the optimal DG active power but also evaluate the
optimal DG reactive power within the permissible range
that is able to keep the bus voltage at the specified
voltage (1 p.u.). It is important to notice that numbering
of the IEEE 33-bus feeder starts from zero in the
proposed work while it started from one in [26] and
[36]. To evaluate the speed of convergence of the
proposed method the power loss versus iterations is
plotted in Fig. 4. It's noticed that the active power loss
converged to its optimal values after 4 iterations only, Table V : Guidance Table of One DG
meeting the stopping criteria previously mentioned in
Section III need 13 iterations which shows the high
speed of convergence of the proposed method.
B. Applications of the Supervised BB-BC
Method
1) Optimal Location and Power of One DG Using
Supervised BB-BC Method: The optimization problem
is constrained as mentioned in Section II. All constraints
are taken into account in these applications. The
proposed method is applied on the IEEE 37-node
feeder. The IEEE 37 feeder is formed from four different
types of branches with current capacity (698 A, 483
A, 230 A, and 156 A) [33]. The maximum active power
of each DG is calculated in order not to exceed the
feeder thermal limit. The guidance table is presented in Table V where
the maximum power is considered to be 80% of the
feeder rated KVA (2500 KVA) and the power range
is divided to 8 intervals. The optimal location and power
are presented in Table VI.

628 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Comparison is done between the traditional BB- 2) Optimal Location and Power of Two DGs Using
BC method and the Supervised BB-BC method to Modified BB-BC Method: Integrating two DGs into
emerge the advantages of the subsequent method. Ten the system increase the complexity of the optimization
trials with different initial values were done using the problem, the objective function becomes four
dimensional as it depend on locations and powers of
two methods at different number of system variables
two DGs. In addition another constraint is added to
(DG powers, DG locations). Any method is considered
the system that the sum of the two DGs power must
failed if it converges to values other than the optimal not exceed the total load power.
values. Fig. 5 shows the robustness of the proposed
method at small number of system variables. The The guidance table is obtained by fixing the power
proposed method has the following advantages over interval of one DG and varying the power interval of
the traditional one: the second DG until the sum of the DG powers reaches
80% of the feeder rated KVA, then the power interval
• The supervised BB-BC method never trapped in local of the first DG is changed to a new interval and the
minimums at a sufficient number of system variables.
intervals of the second are varied again. This result in
Table VI : Optimal Location and Power of DG Connected to
IEEE 37-Node Feeder
32 different cases, i.e., guidance table in case of two
DGs consists of 32 raw and the corresponding optimal
locations. A sample of the guidance table presented in
Table VII and the optimal DGs locations and powers
are evaluated as shown in Table VIII.
C. Optimal Location and Scheduling of One DG for
Energy Loss Minimization
Three different types of loads residential, commercial
and industrial are used as shown in Table IX, the average
hourly values of the load scaling factor curve presented.
Table VII : Calculated Sample of the Two DGsGuidance Table

Fig. 5. Comparison between traditional and supervised BB-


BC methods

• Keeping the last best DG location and power from


previous iteration among the new system variables
helps not to lose the optimal solution at the new
iteration.
• The Supervised BB-BC method reduces
computational time and effort due to its high speed of
convergence.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 629
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table VIII : Calculated Optimal Locations and Powers of Two Table X :Hourly Optimal Location
DGs

Fig. 6. Typical buses load curve [37]


Table IX : System Buses Types

Fig. 7. Minimum energy loss at all candidate locations, IEEE


37-node feeder.

The supervised BB-BC method is applied at every


hour, the hourly candidate optimal location and the
corresponding power loss are presented in Table X,
and the results show that the candidate optimal locations
are buses 2, 16, 21, 22, 25, and 27 for daily energy
in Fig. 6 are calculated. The daily energy loss at the loss minimization.
base case where no DG is connected is equal to To find exactly the optimal location for daily energy
972.8961 kWh. loss minimization, a DG is placed at every candidate
location and the optimal power at every location at each
hour is determined. The minimum power loss is
calculated at each hour of the day and hence, the
minimum daily energy loss is calculated at all candidate
location. The energy loss in kWh at every candidate
location are displayed in Fig. 7, show that the optimal
location for daily energy loss minimization is bus 22
with energy loss of 361.60835 kWh (i.e., 62.83%

630 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

reduction in daily energy loss as compared to the base V. CONCLUSION


case where no DG is connected). The daily active power A supervised BB-BC method has been presented
schedule of a DG connected to bus 22 to achieve the in this paper. The proposed method determines
minimum energy loss is presented in Fig. 8. appropriately the optimal location, capacity of one or
To validate the previous results the modified BB- more voltage controlled DG(s) for power loss
BC algorithm has been applied to the 33 bus feeder, it minimization. The method has been applied on balanced
was found that the optimal location is node (5) which is and unbalanced distribution feeders and validated via
comparing its results with published results done using
different analytical and numerical methods. The method
is capable of handling distribution systems of all sizes.
For large systems the computational time and effort will
increase, however, the current optimization problem is
an offline "planning" problem, where the computational
time is of minor importance in comparison to the
accuracy and efficiency of the method. The proposed
method has been compared with the traditional BB-
BC method to confirm its efficiency and robustness.
Fig. 8. Daily active power schedule of DG connected to node Moreover, the method has been used to determine the
22, IEEE 37-node feeder.
minimum daily energy loss and the corresponding
optimal location and hourly active power schedule. The
results showed that the supervised BB-BC method is
superior in evaluating the optimal DG location and
power due to it robustness, efficiency and high speed
of convergence.
REFERENCES
[1] T. Ackermann, G. Andersson, and L. Soder, "Distributed
generation: A definition," Elect. Power Syst. Res., vol. 57, pp.
195-204, 2018.
[2] G. Celli and F. Pilo, "Optimal distributed generation allocation in
MV distribution networks," in Proc. 22nd IEEE Power Eng. Soc.
Int. Conf. Power Industry Computer Applicat., 2001. PICA
2001. Innovative Computing for Power - Electric Energy Meets
the Market, May 20-24, 2001, pp. 81-86.
[3] H. L. Willis, "Analytical methods and rules of thumb for modeling
Fig. 9. Daily active power schedule of DG connected to node 5, DG-distribution interaction," in Proc. IEEE Power Eng. Soc.
IEEE 33-node feeder. Summer Meeting, Jul. 2000, pp. 1643-1644.

typical to the powerloss case. The minimum daily [4] C. Wang and M. H. Nehrir, "Analytical approaches for optimal
placement of distributed generation sources in power systems,"
energy loss at the optimal location is 1031.318 kWh IEEE Trans. Power Syst., vol. 19, no. 4, pp. 2068-2076, Nov.
(i.e., 68.35% daily energy loss reduction as the daily 2004.
energy loss at the base case where no DG is connected [5] N. Acharya, P. Mahat, and N. Mithulananthan, "An analytical
is 3258 kWh). The daily active power schedule of a approach for DG allocation in primary distribution network,"
DG connected to node 5 to achieve the minimum Int. J. Elect. Power Energy Syst., vol. 28, no. 10, pp. 669-678,
Dec. 2006.
energy loss is presented in Fig. 9.
[6] T. Gözel and M. H. Hocaoglu, "An analytical method for the
sizing and siting of distributed generators in radial systems,"
Elect. Power Syst. Res., vol. 79, no. 6, pp. 912-918, Jun. 2009.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 631
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[7] D. Q. Hung, N. Mithulananthan, and R. C. Bansal, "Analytical [20] R. K. Singh and S. K. Goswami, "Optimum allocation of
expressions for DG allocation in primary distribution networks," distributed generations based on nodal pricing for profit, loss
IEEE Trans. Energy Convers., vol. 25, no. 3, pp. 814-820, Sep. reduction, and voltage improvement including voltage rise issue,"
2010. Int. J. Elect. Power Energy Syst., vol. 32, no. 6, pp. 637-644,
Jul. 2010.
[8] D. Q. Hung and N. Mithulananthan, "Multiple distributed
generators placement in primary distribution networks for loss [21] J. M. López-Lezama, J. Contreras, and A. Padilha-Feltrin,
reduction," IEEE Trans. Ind. Electron., vol. 60, no. 4, pp. 1700- "Location and contract pricing of distributed generation using a
1708, Apr. 2013. genetic algorithm," Int. J. Elect. Power Energy Syst., vol. 36, no.
1, pp. 117-126, Mar. 2012.
[9] A. Keane and M. O'Malley, "Optimal allocation of embedded
generation on distribution networks," IEEE Trans. Power Syst., [22] K. Nara, Y. Hayashi, K. Ikeda, and T. Ashizawa, "Application
vol. 20, no. 3, pp. 1640-1646, Aug. 2005. of tabu search to optimal placement of distributed generators,"
in Proc. IEEE PES Winter Meeting, Columbus, OH, USA, Feb.
[10] X. Zhang, G. Karady, and S. Ariaratnam, "Optimal allocation of
2001, vol. 2, pp. 918-923.
the CHP-based distributed generation on urban energy
distribution networks," IEEE Trans. Sustain. Energy, vol. 5, no. [23] C. Novoa and T. Jin, "Reliability centered planning for distributed
1, pp. 246-253, Jan. 2014. generation considering wind power volatility," Elect. Power Syst.
Res., vol. 81, no. 8, pp. 1654-1661, Aug. 2011.
[11] A. Keane and M. O'Malley, "Optimal utilization of distribution
network for energy harvesting," IEEE Trans. Power Syst., vol. [24] L. Wang and C. Singh, "Reliability-constrained optimum
22, no. 1, pp. 467-475, Feb. 2007. placement of reclosers and distributed generators in distribution
networks using an ant colony system algorithm," IEEE Trans.
[12] L. F. Ochoa, A. Padilha-Feltrin, and G. P. Harrison, "Evaluating
Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 6, pp. 757-764,
distributed time-varying generation through a multiobjective
Nov. 2008.
index," IEEE Trans. Power Del., vol. 23, no. 2, pp. 1132-1138,
Apr. 2008. [25] F. S. Abu-Mouti and M. E. El-Hawary, "Heuristic curve-fitted
technique for distributed generation optimisation in radial
[13] R. A. Jabr and B. C. Pal, "Ordinal optimisation approach for
distribution feeder systems," IET Gener., Transm., Distrib., vol.
locating and sizing of distributed generation," IET Gener.,
5, no. 2, pp. 172-180, 2011.
Transm., Distrib., vol. 3, no. 8, pp. 713-723, Aug. 2009.
[26] F. S. Abu-Mouti and M. E. El-Hawary, "Optimal distributed
[14] Y. M. Atwa, E. F. El-Saadany, M. M. A. Salama, and R.
generation allocation and sizing in distribution systems via
Seethapathy, "Optimal renewable resources mix for distribution
artificial bee colony algorithm," IEEE Trans. Power Del., vol. 26,
system energy loss minimization," IEEE Trans. Power Syst.,
no. 4, pp. 2090-2101, Oct. 2011.
vol. 25, no. 1, pp. 360-370, Feb. 2010.
[27] K. Osman and I. Eksin, "A new optimization method: Big Bang-
[15] Y. M. Atwa and E. F. El-Saadany, "Probabilistic approach for
Big Crunch," Adv. Eng. Softw., vol. 37, no. 2, pp. 106-111, 2006.
optimal allocation of wind-based distributed generation in
distribution systems," IET Renew. Power Gener., vol. 5, no. 1, [28] C. V. Gopala and G. Yesuratnam, "Big Bang and big crunch and
pp. 79-88, Jan. 2011. firefly optimization application and comparison to optimal power
flow with continuous and discrete variables," Int. J. Elect. Eng.
[16] L. F. Ochoa and G. P. Harrison, "Minimizing energy losses:
Informat., vol. 4, no. 4, Dec. 2012.
Optimal accommodation and smart operation of renewable
distributed generation," IEEE Trans. Power Syst., vol. 26, no. 1, [29] S. Sakthivel, S. Arun, S. Marikani, and S. Kurinji, "Application
pp. 198-205, Feb. 2011. of big bang big crunch algorithm for optimal power flow
problems," Int. J. Eng. Sci. (IJES), vol. 2, no. 4, pp. 41-47, 2013.
[17] G. P. Harrison, A. Piccolo, P. Siano, and A. R. Wallace, "Hybrid
GA and OPF evaluation of network capacity for distributed [30] Z. Zandi, E. Afjei, and M. Sedighizadeh, "Reactive power dispatch
generation connections," Elect. Power Syst. Res., vol. 78, no. 3, using big bang- big crunch optimization algorithm for voltage
pp. 392-398, 2008. stability enhancement," in Proc. IEEE Int. Conf. Power and
Energy (PECON), Malaysia, Dec. 2012, pp. 239-244.
[18] A. Helal, M. Amer, and H. Eldosouki, "Optimal location and
sizing of distributed generation based on genetic algorithm," in [31] C. F. Kucuktezcan and V. M. I. Genc, "Big bang-big crunch
Proc. 2nd Int. Conf. Computing and Control Applicat., Marseilles, based optimal preventive control action on power systems," in
France, 2012, pp. 1-6. Proc. 3rd IEEE PES Innovative Smart Grid Technologies Europe
(ISGT Europe), Berlin, Germany, 2012, pp. 1-4.
[19] C. L. T. Borges and D. M. Falcão, "Optimal distributed generation
allocation for reliability, losses, and voltage improvement," Int. [32] S. Khushalani, J. M. Solanki, and N. N. Schulz, "Development
J. Elect. Power Energy Syst., vol. 28, no. 6, pp. 413-420, Jul. of threephase unbalanced power flow using PV and PQ models
2006. for distributed generation and study of the impact of DG models,"
IEEE Trans. Power Syst., vol. 22, no. 3, pp. 1019-1025, Aug.
2007.

632 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[33] C. S. Cheng and D. Shirmohammadi, "A three-phase power flow [36] T. N. Shukla, S. P. Singh, V. Srinivasarao, and K. B. Naik, "Optimal
method for real-time distribution system analysis," IEEE Trans. sizing of distributed generation placed on radial distribution
Power Syst., vol. 10, no. 2, pp. 671-679, May 1995. systems," Elect. Power Compon. Syst., vol. 38, no. 3, pp. 260-
274, 2010.
[34] M. E. Baran and F. F. Wu, "Network reconfiguration in
distribution systems for loss reduction and load balancing," IEEE [37] W. El-Khattam, Y. G. Hegazy, and M. M. A. Salama,
Trans. Power Del., vol. 4, pp. 1401-1407, 1989. "Investigating distributed generation systems performance using
Monte Carlo simulation," IEEE Trans. Power Syst., vol. 21, no.
[35]Radial Distribution Test Feeders [Online]. Available: http://
2, pp. 524-532, May 200.
ewh.ieee. org/soc/dsacom/ test feeders.html

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 633
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Investigation of Equilibrium Optimizer to Solve


Economic Dispatch with Practical
Y.V. Krishna Reddy1, B.V. Arun Kumar2, A. Sudhakar3
1
Assistant Professor, SV College of Engineering, Department of EEE, Tirupati, India
2
Assistant Professor, VEMU Institute of Technology, Department of EEE, Chittoor, India
3
Associate Professor, SV College of Engineering, Department of EEE, Tirupati, India
Email: krishnareddy.yv@svcolleges.edu.in1, Venkatarun206@gmail.com2, Sudhakar.a@svcolleges.edu.in3

Abstract: Now a day's power demand keep on various practical limitations such as valve-point effects,
increasing due to rapid changes occurs in power prohibited operating zones and up/down ramp rates.
industry. For that purpose establishing new Methods such as particle swarm optimization (PSO)
generating is costlier rather than effectively utilize [1], firefly algorithm (FFA) [2], quick group search
the available generating stations. In order to
optimizer (QGSO) [3], cuckoo search algorithm (CSA)
properly planning of power system generation
[4], hybrid approach (GA-APO-NSO) [5], MSG-HS
sharing Economic Dispatch (ED) plays vital role.
In this paper, Equilibrium Optimizer (EO) is used [6], PSOGSA [7], teaching learning based optimization
to solve the ED problem with effect of valve-point, (TLBO) [8], PSO [9], backtracking search algorithm
prohibited operating zones (POZs), ramp rate up/ (BSA) [10], exchange market algorithm (EMA) [11],
down limits and pollution like practical constraints. modified CSA [12], evolutionary algorithm (EA) [13],
In order to analyze the capability of the EO multiobjective BSA [14], multiobjective EA [15], new
algorithm, the algorithm is applied to four test global PSO (NGPSO) [16].
systems with 6 unit systems and the results are
compared with other optimization algorithms. The However some of the above mentioned optimization
comparative results proven that EO is better algorithm stuck in the local minimum and does not
optimization technique to solve ED problem with converse to the global minimum. The above methods
practical constraints. are not used for solving the ED problem with all practical
constraints. To overcome these drawbacks proposed
Keywords: Power Industry, Economic Dispatch,
Equilibrium Optimizer, Valve-point, Prohibited new equilibrium optimizer (EO) [17] algorithm. In order
operating zones, Ramp rate up/down limits. to analyze the capability of the EO algorithm, the
algorithm is applied to four test systems with 6 unit
I. INTRODUCTION systems and the results are compared with other
Economic Dispatch (ED) is a major issue in the optimization algorithms.
electrical system. The required power demand is II. PROBLEM FORMULATION
optimally allocated to the available generator units
known as ED. Usually, the ED problem is complicated A. Classical ED
by the practical constraints of the thermal units, such as The theoretical cost curve of classical ELD problem
transmission losses, valve-point loading, prohibited is as shown in the Figure 1.
operating zones and ramp rate limits. The conventional
ED problem focused only on minimizing operating costs,
with a view to reducing emissions along with operating
costs, which would change the ED problem to the
Economic Emission Dispatch (EED) problem.
In the last decade, many meta-heuristic optimization
algorithms have been used to solve ED problems with

634 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

$/MWh

D
A B C

Fig.1 Convex Fuel cost function


MW
The most simplified cost function of each generating
unit i, can be represented as a quadratic function as: Fig. 2. Non-Convex Fuel cost function

Minimize C. EDRPOZ
n ED problem with ramp rate Limits and prohibited
FT  min f   Fi (Pi ) ($ / h) (1)
i 1
operating zones (POZs) treated as EDRPOZ. Figure
N
3 shows the model of Ramp-rate limits.
Fi (Pi )   (a i Pi2  bi Pi  ci ) (2) Pi  P0i  UR i if generation increases
i 1  (7)
P0i  Pi  DR i if generation decreases
Equality Constraints:
N Pi
Pi0 Pi0
 Pi  PD  PL (3)
Pi
i 1
Pi0 Pi
To calculate transmission losses the B-coefficient
method used. t t+1 t t+1 t t+1
(a) (b) (c)
N N N
PL   Pi Bi jPj   B0i Pi  B00 (4)
Fig. 3 Ramp rate limits of generating units
i 1 j1 i 1 The new operation limits:
Inequality Constraints Pi min,r  Pi  Pi max,r (8)

Pi min  Pi  Pi max (5) Where


Where: Pimin and Pimax are the minimum and Pi min,r  max(Pi min , P0i  DR i )
maximum real power generation limits of the ith Pi max,r  min(Pi max , P0i  UR i ) (9)
generating unit.
These POZs can be included in the ED formulation
B. EDVPE as follows:
The ED problem cost objective function, considering P  Pi  Pi,1i
the valve-point effects (EDVPE). Figure 2 shows the  i min

valve-point effect is incorporated in classic ELD Pi  Pi,uj1  Pi  Pi,l j j  2,....n i
 u (10)
problem by superimposing the sine component model Pi,n  Pi  Pi max
on the quadratic cost curve.  i
Figure 4 clearly shows the POZs modeled in the
Fi (Pi )  a i Pi2  bi Pi  ci  ei sin(fi (Pmin  Pi )) (6)
cost curve.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 635
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fuel Cost ($/h) selected four best particles based on their fitness value
during the entire optimization process with other particles
whose positions are in the mean of the four best particles
described above. Such five particles were called
candidates for equilibrium and used to construct an
equilibrium pool.
Ceq,pool  {Ceq(1) , Ceq(2) , Ceq(3) , Ceq(4) , Ceq(ave) } (14)
Pjmin LB UB
Pj  lPj  l
L B UB
Pj k kPj k k Pmax power output (MW)
t t t t
j C. Exponential term (F)
Fig. 4 Generator characteristics with POZs
The key updating rule for concentration is controlled
D. EED by the exponential term F
To reduce emissions along with the cost of F  e  (t  t 0 ) (15)

generation considering the problem of environmental


iter (a 2 iter
economic dispatch (EED). The fossil fuel power plants t  (1  ) ) (16)
max iter max iter
produce pollutants such as NOX , CO2 and SO 2 emissions
which are usually represented by separate quadratic To achieve convergence by increasing the quest
functions. Nevertheless, by combining all the pollutants pace and improving discovery and exploitation
as single emission introducing exponential function to capabilities, t0 is modelled as
the quadratic emission function as given in Equation (11) 1
for overall emission level of the pollutants. t0  ln(a1sign(r  0.5)[1  e t ])  t (17)

NG
Now equation (15) can be rewritten as
F  E(PG )   ( k PGk   k PGk   k )   ck  exp(PGk  k ) (ton / h) (11)
2

k 1
F  a1sign(r  0.5)(e t  1) (18)
Weighted sum method: The fuel cost and emission
objective problem is converted into single objective D. Generation rate (G)
CEED problem given by Equation (12) by assuming Generation rate is the most significant parameter
weighting factor proportion to the importance of the used in equilibrium algorithm to increase the process of
objective. exploitation.
Minimize F=W  F2  (1  W)  F3 (12)
G  G 0 e –k(t –t 0 ) (19)
III. EQUILIBRIUM OPTIMIZER Where
A. Faramarzi proposes an Equilibrium Optimiser G 0  GPC(Ceq  C) (20)
(EO). In EO, each solution with its position acts as a
0.5r1 r2  GP
search agents. GP = { } (21)
0 r2  GP
A. Initialization and evaluation of the functions Finally, EO's updating law shall be as follows:
The initial positions were randomly determined G
C  Ceq  (C  Ceq ) * F  (1  F) (22)
according to the number of particles in the search space V

Cint
i
ial
 Cmin  randi (Cmax  Cmin ) i  1, 2,3,......n (13) IV. RESULTS
B. Equilibrium pool and candidates (Ceq) A. Classical ED
The state of equilibrium is known as the final state In order to evaluate solution of classical ED problem
of EO convergence. In EO these candidates are generator practical constraints are not considered like

636 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

valve-point effect, ramp limits and prohibited operating Table 2: Comparison results for 6-unit to EDVPE

zones. But the transmission losses, equality and GA-NSO[5] MSG-HS[6] PSO [6] EO
P1 (MW) 182.4784 199.6331 197.8648 199.5997
inequality constraints are considered for 6-unit test P2 (MW) 48.3525 20.0000 50.3374 20.0000
system [2] with power demand of 800 MW. The fuel P3 (MW) 19.8553 23.7624 15.0000 23.8221
cost function is convex function follows as Equation 1. P4 (MW) 17.1370 18.3934 10.0000 19.0903
P5 (MW) 13.6677 17.1018 10.0000 18.1304
Table 1: Comparison results for 6-unit to classical ED P6 (MW) 12.3487 15.6922 12.0000 13.7463
P L (MW) 10.4395 11.1830 11.8022 11.0135
PSO [1] FFA[2] CSA[4] EO PT(MW) 293.839 294.5829 295.2022 294.0135
P1 (MW) 32.67 32.5861 32.5863 33.9199 FC($/hr) 984.936 925.6406 925.7581 924.8883
P2 (MW) 14.45 14.4843 14.4843 14.4029
P3 (MW) 141.73 141.548 141.548 141.2473 EDVPE
990
P4 (MW) 136.56 136.045 136.045 135.6431
P5 (MW) 257.37 257.664 257.664 257.3198 980

P6 (MW) 242.54 243.009 243.009 242.6420


970
PL (MW) 25.32 25.3309 25.3312 25.1749

Fuel cost ($/hr)


PT (MW) 825.32 825.3309 825.3312 825.1749 960

FC($/hr) 41896.66 41896.7 41896.9 41890.507


950
4
x 10
940
Classical ED
4.27
930
4.26

200 400 600 800 1000 1200 1400 1600 1800 2000
4.25
Iteration
Fuel cost ($/hr)

4.24
Fig. 6 Convergence characteristics of EDVPE
4.23

4.22
C. EDRPOZ
4.21

4.2
EDRPOZ comprising six generators meets [11] a
4.19 load demand of 1263 MW and includes loss, POZs
200 400 600 800 1000 1200 1400
Iteration and ramp up/down limits.
Fig. 5 Convergence characteristics of classical ED Table 3: Comparison results for 6-unit to EDRPOZ

The simulation and comparison results for the given BSA [10] EMA [11] MCS[12] EO
P 1(MW) 447.4902 443.3872 447.5038 447.0649
test system are presented in Table 1. Among all the P 2(MW) 173.3308 173.2524 173.3182 173.1643
methods, the proposed EO method is better interms of P 3(MW) 263.4559 263.3721 263.4628 263.9481
optimal cost and convergence characteristics shown in P 4(MW) 139.0602 138.9894 139.0653 139.0668
P 5(MW) 165.4804 165.3650 165.4764 165.5847
figure 5 for 25 trails. P 6(MW) 87.1409 87.0781 87.1347 86.5868
PL (MW) 12.9583 12.4430 12.9582 12.4154
B. EDVPE PT (MW) 1275.95 1275.443 1276.958 1275.4164
FC($/hr) 15449.89 15443.07 15449.89 15442.675
The cost function of the generation is represented
by the Equation 6. The sinusoidal term added to convex The optimal and comparison results for EDRPOZ
cost function and resulting becomes non-convex cost problem are presented in Table 3. The total operating
function. The test system comprising six generating units cost during practical constraints is 15442.6753 ($/hr)
[5] meets a power demand of 283.4 MW and includes and it is found to be lesser than the other methods
valve-point effect and transmission loss. reported in the literature. The convergence
The best and comparison results for test system are characteristics of 6 unit system with proposed method
presented in table 2. Among all the methods the for EDRPOZ are shown in Figure 7 for 25 trails.
proposed EO method is better in terms of optimal cost
and convergence characteristics shown in figure 6 for
25 trails.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 637
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4
x 10 figure 8, 9 and 10 represents convergence
1.9 EDRPOZ characteristics of test system.
1.85 Table 5: Comparison results for 6-unit system to EED

1.8 Fuel Cost Emission


CEED
Methods Min. Min.
Fuel cost ($/hr)

1.75
Min.($/Hr)
($/Hr) (ton/Hr)
BSA [13] 605.9984 0.194203 608.9169
1.7
MOEA [14] 607.78 0.1942 NA
1.65
NGPSO [15] 605.9983 0.194178 623.8705
SMODE [16] 619.07 0.1942 NA
1.6 EO 604.9688 0.1942 598.9677
1.55 COST MINIMIZATION

200 400 600 800 1000 1200 1400 625


Iteration

620
Fig. 7 Convergence characteristics of EDRPOZ

Fuel cost ($/hr)


D. EED 615

The fossil fuel power plants produce pollutants such 610

as emissions which are usually represented by separate 605

quadratic functions. Nevertheless, by combining all the 200 400 600 800
Iteration
1000 1200 1400

pollutants as single emission introducing exponential


Fig. 8 Convergence characteristics of EED to cost
function to the quadratic emission function is given in min imiz atio n
Equation (11) for overall emission level of the pollutants. 0.206
EMISSION MINIMIZATION
The fuel cost and emission objective problem is
0.204
converted into single objective Economic Emission
Dispatch (EED) problem by using the equation (12), 0.202

assuming weighting factor proportion to importance of


Emission (ton/hr)

0.2
the objective.
0.198
Table 4: Optimal results for to EED by EO

Unit Cost Emission EED


0.196

minimization minimization
0.194
P1 (MW) 5.0000 40.9793 50.0000
P2 (MW) 30.3402 46.2677 17.9027 200 400 600 800 1000 1200 1400
Iteration
P3 (MW) 64.1857 54.2949 15.0798
P4 (MW) 102.4765 38.8797 12.2136 Fig. 9 Convergence characteristics of EED to emission
P5 (MW) 48.0259 54.3078 15.0798 min imiz atio n
P6 (MW) 35.1204 51.4338 18.6104 670 ECONOMIC EMISSION MINIMIZATION
PTotal (MW) 285.1486 286.6741 284.6620
660
P los s (MW) 1.7486 3.2741 1.2620
Gcost ($/h) 604.9688 649.5788 598.9677 650

E (ton/h) 0.226023 0.1942 0.2242


Fuel cost ($/hr)

640

The IEEE 30-bus 6-Unit system is considered as 630

test system. Data is taken [16] with power demand of 620

283.4 MW. Table 4 represents the optimal results for 610

test system for minimizing the cost, emission and 600

combined economic emission with the help of EO. Table 200 400 600 800
Iteration
1000 1200 1400

5 provides comparison results for EED problem and


Fig. 10 Convergence characteristics of EED

638 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

V. CONCLUSIONS 7. Serhat Duman and Nuran Yorukeren, "A Novel Modified Hybrid
PSOGSA based on Fuzzy Logic for Non-Convex Economic
A new optimization algorithm called Equilibrium Dispatch Problem with Valve-Point Effect", Electrical Power
Optimizer (EO) is used in this paper to solve the and Energy Systems (Elsevier Journal), Vol.64, pp.121-135, 2015.

economic dispatch problem with realistic restrictions 8. Sumit Banerjee and Deblina Maity, "Teaching Learning Based
Optimization for Economic Load Dispatch Problem Considering
such as valve point effect, ramp rate up/down limits, Valve Point Loading Effect", Electrical Power and Energy Systems
prohibited operating zones and pollution. The EO has (Elsevier Journal), vol.73, pp.456-464, 2015.
been used to evaluate four separate 6-unit test systems. 9. Zwe-Lee Gaing, "Particle Swarm Optimization to Solving the
The findings were consistent with other methods listed Economic Dispatch Considering the Generator Constraints",
in the literature and showed that EO had quick IEEE transactions on power systems, Vol. 18, no. 3, august 2003.

convergence speed, better fuel cost outcomes, 10. Mostafa Modiri-Delshad and S. Hr. Aghay Kaboli, "Backtracking
Search Algorithm for Solving Economic Dispatch Problems with
prevailing computational performance and more Valve-Point Effects and Multiple Fuel Options", Energy (Elsevier
cognizant achievement. The suggested algorithm would Journal), Vol. 116, pp.637-649, 2016.
be a viable solution to solve ED problem practical 11. Naser Ghorbani and Ebrahim Babaei, "Exchange Market Algorithm
constraints. The proposed methodology is a potential for Economic Load Dispatch", Electrical Power and Energy
approach in large-scale framework to solve complex Systems (Elsevier Journal), Vol. 75, pp.19-27, 2016.
non-smooth optimization problems. 12. Jian Zhao and Shixin Liu, "Modified Cuckoo Search Algorithm
to Solve Economic Power Dispatch Optimization Problems",
REFERENCES IEEE/CAA journal of automatica sinica, Vol. 5, no. 4, pp,794-
807, july 2018.
1. Hardiansyah, Junaidi and Yohannes MS, "Solving Economic Load
Dispatch Problem Using Particle Swarm Optimization 13. M. A. Abido, "Multiobjective Evolutionary Algorithms for
Technique", International journal of intelligent systems and Electric Power Dispatch problem", IEEE transactions on
applications, Vol.12, pp.12-18, 2012. evolutionary computation, Vol. 10, no. 3, pp.315-330, june 2006.

2. K. Sudhakara Reddy and M. Damodar Reddy, "Economic Load 14. Mostafa Modiri-Delshad and Nasrudin Abd Rahim, "Multi-
Dispatch Using Firefly Algorithm", International Journal of Objective Backtracking Search Algorithm for Economic Emission
Engineering Research and Applications, Vol. 2, Issue4, pp.2325- Dispatch Problem", Applied Soft Computing (Elsevier Journal),
2330, July-August 2012. Vol. 18, pp.1-15, 2015.

3. Mohammad Moradi-Dalvand and Behnam Mohammadi-Ivatloo, 15. B.Y. Qu, J.J. Liang, Y.S. Zhu, Z.Y. Wang and P.N. Suganthan,
"Continuous Quick Group Search Optimizer for Solving Non- "Economic emission dispatch problems with stochastic wind
Convex Economic Dispatch Problems", Electric Power Systems power using summation based multi-objective evolutionary
Research (Elsevier Journal), Vol. 93, pp.93-105, 2012. algorithm", Information Sciences (Elsevier Journal), Vol.12, pp.1-
19, 2016.
4. A.Hima Bindu and M. Damodar Reddy, "Economic Load
Dispatch Using Cuckoo Search Algorithm", International Journal 16. Dexuan Zou, Steven Li, "A New Global Particle Swarm
of Engineering Research and Applications, Vol. 3, Issue 4, pp. Optimization for the Economic Emission Dispatch with or
498-502, Jul-Aug 2013. without Transmission Losses", Energy Conversion and
Management (Elsevier Journal), Vol.139, pp.45-70, 2017.
5. Tahir Nadeem Malik and Azzam ul Asar, "A New Hybrid
Approach for the Solution of Nonconvex Economic Dispatch 17. Faramarzi et al "Equilibrium Optimizer: A Novel Optimization
Problem with Valve-Point Effects", Electric Power Systems Algorithm", Elsevier 2019.
Research (Elsevier Journal), Vol. 80, pp.1128-1136, 2010.
6. Celal Yasar and Serdar Ozyon, "A New Hybrid Approach for
Nonconvex Economic Dispatch Problem with Valve-Point
Effect", Energy (Elsevier Journal), Vol. 36, pp.5838-5845, 2011.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 639
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

640 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Department of Mechanical Engineering

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 641


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

642 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Design and Fabrication of High Speed Effortless


Bicycle
T. Sathees1, S.Vengatesh2, S.Santhoshkumar3, A.Prathishg4, S.Rajaselvam5
1
Assistant Professor, 2,3,4,5UG Scholar
1,2,3,4,5
Department of Mechanical Engineering, Paavai Engineering College.

Abstract: In the recent years various vehicle Ring gear. Planetary gearing or epicyclical gearing consist
were introduced in the market but due to limitation of one or more outer gear, or planet gear rotate about
in carbon emission and BS series limited speed central or sun gear. By adjusting Pedal crank mechanism
availability vehicle in the market and causing of
or rotation of pedal in given rotation transmission of
environment pollution over few years. There is a
gear through sprocket to rear axle of wheel we adjust
need to decrease dependency on fuel vehicle, so
bicycle is to be modified for optional in future. To various speed ratio according to requirement.
implement the new technique using the change in LITERATURE SURVEY
pedal assembly and two epicyclical gears are added
one of 18 teeth and another gear of 42 teeth placed 2.1 Design And Fabrication Of String Bicycle "Av.Hari
in-between the chain sprocket and rear sprocket Babu, V.Madhava" The main aim of this project is
to optimize the speed of the vehicle and to increase to design and fabricate a string bicycle.Bicycle is a
the efficiency of the bicycle for comfort drive and two wheel vehicle,which is being powered by a rider
to reduce the effort applied on the bicycle. In and can be steered using a handle. It is one of the
normal cycle one full rotation of the pedal cover a most eco-friendlier and an economical mode of
distance of 5.4 meter only, but in our modified transport word wide.There were various forms of
bicycle covers a distance of 10.9 meter in one full bicycle in the past history through which the existing
rotation of pedal at high speed.. form has evolved. Studies are still going on for making
bicycling more comfortable and economical.Though
Keywords : Pedaling, Human Powered Vehicle bicycle is a low cost system that is used for travelling
(HPV) up to a certain distance,it need more man power and
1. INTRODUCTION human effort for propelling it.Hence there is always
a search for a high efficient form of bicycle which
In automobile system, gearbox play important role requires less human effort for propelling it. Here
in shifting of gear. A cycle is local means of transport no introduce a new innovative concept. In this project
of cycle available in market Bicycle, Tricycle. Most the power transmission is done with the help of the
cycle Rickshaws used to carry Passengers for hire this strings instead of sprockets and the chain drives.
vehicle used in southern Asia and south Asia generally 2.2 Design & Fabrication Of Shaft Driven Bicycle"G.
rickshaws are provided for recent immigrant from the Hari Prasad, S.Marurthi, R.Ganapathi".A shaft driven
rural areas for the work. generally impoverished men bicycle is a bicycle that uses a shaft drive instead of
various locally made cycle used for transportation, in a chain which contain two set of bevel gear at both
an eco-sensitive zone where there is increasing green the ends to make a new kind of transmission system
house effect, Global Warming effect due to ban of highly for bicycle for getting high reliability system,and more
emitted vehicle cycle is basic use for transportation. safe system.This project is developed for the users
to rotate the back wheel of a two wheeler using
But in the cycle has many shortcoming, cycle has less
propeller shaft. Usually in two wheelers, chain and
advantage, due to less efficiency extra effort(i.e. torque)
sprocket method is used to drive the back wheel.
applied on the pedal while Gradient, to improve the Shaft-driven bikes have a large bevel gear where a
efficiency of bicycle planetary gear box can be used. conventional bike would have its chain ring.
Planetary gear consists of planet gear, sun gear, and

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 643


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2.3.Design and Fabrication of Foldable Bicycle" Shishir 3.1 LINE DIAGRAM


S, Manjunath P, Pavanasudan R, and Ravi Sathyajith"
has proposed that during working on experimental
setup and after a long discussion in the paper of
"Design and Fabrication of Foldable Bicycle".To cope
with time deficit, we can utilize the time spent on
commuting efficiently to exercise by using bicycles,
thereby also contributing to pollution control. But
regular bicycles occupy sufficient space to park, are
not easy to carry around and are probable to theft.
Transport has been one of the most important issues
to be dealt with in the present day situation as
commuting from place to place within the city has
become a tedious and an expensive task. It is very
difficult to reach the nearest public transport facility
and in many cases the destination will be very far
from the main roads where the public transport might

3. WORKING PRINCIPLE
This system is been designed with lever mechanism
i.e. stated that two equal force acting in opposite
direction i.e.(clockwise or counter clockwise) and
applied to uniform lever to equal distance from fulcrum
counter each other and established state of Side view of a High Speed Effortless Bicycle
eqillibrium.with applying lever principal to pedal and
epicyclical gear box there is increase speed.When brake 4. APPLICATIONS
pedal is pressed it force transmitted to slotted Strip Highly suitable for bicycles riders
provided in bicycle pedal which is pivoted at one end Sport activities using bicycles where people use to
near pivoted restriction of connecting rod to increase cycle/pedal for long distances.
the torque acting on pedal of bicycle. Slotted part is Daily life bicycle uses as a main tool of transportation
provided for crank rotation over pedaling of bicycle for some people.
connected to chain sprocket. Hollow tube section is
provided to utilize maximum power during pedaling and Contribution to motivate old age people to use
maximum force transmitted to sprocket which is rigidly bicycles to exercise their legs
supported at pedal-crank mechanism supporting rod 4.1 ADVANTAGES
is fixed at end of one end, two bearing is provided for
Effortless
rigidly supported gear and sprocket clamped on fixed
supporting rod.Chain mechanism is shifted to spur gear The components used for the fabrication are very
for transmission of torque. spur gear has large simple.
advantage over other gear due to simple design, have a There is no slippage problem.
high power speed efficiency, The cost of the system is less.
Strings deliver maximum power to the wheels.
The rider needs not to apply minimum power to the
pedals.
Noiseless operation can be achieved.

644 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

5. CONCLUSION [3] Sreevalsan S Menon, Sooraj M S, Sanjay Mohan, Rino Disney


and Suneeth Sukumaran(2013). Design and Analysis of Kinetic
In this way, finally we conclude that speed of bicycle Energy Recovery System in Bicycles. International Journal of
can increased by changing pedal mechanism and Innovative Research in Science,Engineering and Technology: 2319-
8753.
implementing epicyclical gear box to rear axle for
[4]Anmol Parashar and Seemant Purohit(2016). Design & Fabrication
transmitting torque from sprocket to rear axle of vehicle of Shaft Driven Bicycle. International Journal of Science
to obtain variable speed of bicycle as per needed Technology & Engineering. ISSN (online): 2349-784X
[5] Shishir S, Manjunath P, Pavanasudan R, and Ravi
REFERENCES Sathyajith(2015). Design and Fabrication of Foldable Bicycle.
[1] Ram Singh, Prof. Mrs. D.C. Sharma(2013). A Review of SSRG International Journal of Mechanical Engineering (SSRG-
Experimental study of home automation by bicycle pedal power. IJME).
International Journal of Emerging Trends in Engineering and [6] Nikhil P. Ambole and Prof. P. R. Kale, "Finite Element Analysis
Development: 2249-6149 Carbon Fiber Sprocket using ANSYS", International Journal for
[2]Swapnil Shringarpure, Pranjal Upadhyay, Abhishek Bhalotia and Scientific Research & Development, Vol. 4, Issue 05, August
Dhiraj Sambhwani(2013). Automated Bicycle. International 2016, ISSN (online): 2321-0613
Journal of Emerging Trends in Electrical and Electronics (IJETEE).

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 645


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Air as a Fuel (Alternative Fuels)


Raghul J.R1, Navaneethan R2, Kavin Sankar M3, Pradeep R V4, Kavin Prasanth M5, Roshan J6
1,2,3,4,5,6
Department of Mechanical Engineering, Bannari Amman Institution of Technology (Autonomous),
Sathyamagalam, Erode
Email: raghul.me19@bitsathy.ac.in1, navaneethanr.me19@bitsathy.ac.in2, kavinsankar.me19@bitsathy.ac.in3,
pradeep.me19@bitsathy.ac.in4, kavinprasanth.me19@bitsathy.ac.in5, roshan.me19@bitsathy.ac.in6

Abstract: Transportation is the most vital part INTRODUCTION


in our day-to-day life. The latest trend in the
automotive industry is to develop light weight We are living in a very mobile society so light utility
vehicles. Every automotive industry is looking to vehicles (LUV) like bikes and cars are becoming very
reduce the weight of the vehicle as it helps in the popular means of independent transportation for short
better handling of the vehicle and increases the distances. We know that our world is facing fuel crisis
efficiency of the vehicle. As we all know that fuel is now. Petrol and diesel which have been the main sources
non-renewable sources of energy and also the of fuel in the history of transportation, are becoming
prices of fuel increases day by day. Today, the heavy more expensive and impractical. An alternative way of
vehicles are known for producing a large amount producing the running the vehicle must be made so that
of harmful gases like CO2, SO2 etc. which act as we can prevent further damage to the earth. The
the major source for global warming. Research is alternative sources of energy available are solar, electric,
going on to find a light weight vehicle which does
atmospheric air etc. Air acts like a blanket for the earth.
not pollute the environment and to reduce the price
of the vehicle. TATA MOTORS make an It is the mixture of gasses, which makes it neutral and
agreement with Motor Development International non-polluting. It has the property to get compressed to
MDI of France to develop a car that runs on a very high pressure and retain it for a long period of
compressed air. Also, it will be more economical time. It is cheap and can be found abundantly in the
and pollution free. The cost of refilling the air will atmosphere. So, it can be used as an alternative fuel
be very less as compared to petrol or diesel. One for the automobiles. Engineers are directing their sincere
of the alternatives is the use of compressed air to efforts to make use of air as an energy source to run
generate power to run an automobile. Due to the the LUVs which will make future bikes and light/small
unique and environmental friendly properties of air, cars running with air power for daily routine distances
it is considered as one of the future fuels which and the travel will be free from pollution and cost
will run the vehicles. This paper briefly summarizes
effective.
Working of air engine, Compressed air can fuel a
car, the air filter, working, air powered scooter, WORKING OF AIR ENGINE:
Advantages and disadvantages of air powered
vehicle. • Approximately 90m3of compressed air is stored in
fiber tank in the vehicle.
Keywords: Air filter, fuel, air engine.
• The engine is powered by compressed air, stored in a
carbon-fiber tank at 30Mpa (4500psi). The tank is
made of carbon fiber in order to reduce its weight.
• The engine has injection similar to normal engines,
but uses special crankshafts and pistons, which remain
at top dead center for about 70 degrees of the
crankshaft's cycles; this allows more power to be
developed in the engine.

646 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Also, we can use Turbocharger for increasing the • The engines work with both air taken from
speed. atmosphere and air pre-compressed in tanks. Air is
compressed by the onboard compressor or at service
• The expansion of this air pushes the piston and creates
station equipped with a high-pressure compressor.
movement. The atmospheric temperature is used to
re-heat the engine and increase the road coverage • Before compression, the air must be filtered to get
rid of any impurities that could damage the engine.
• The air conditioning system makes use of expelled
Carbon filters are used to eliminate dirt, dust, humidity
cold air.
and other particles which unfortunately are found in
COMPRESSED AIR CAN FUEL A CAR: the air in our cities.

In practical terms compressed air at 300 bars is • This represents a true revolution in automobiles and
stored in the carbon fiber tank A. it is thefirst time that a car has produced minus
pollution, i.e. iteliminates and reduces exciting pollution
rather thanemitting dirt and harmful gases. The
exhaust pipe on thecar produces clean air which is
cold on exit (between -150and 00) and is harmless to
human life. With this system theair that comes out of
the car is cleaner than the air thatwent in.

WORKING:

Air is release through the main line firstly to an


alternator B where the first stage of decompression
takes place. The now cold air passes through heat
exchanger C which adds thermal energy to the air and
provides a convenient opportunity for air conditioning
D. The warm compressed air now passes to the motor
E where two more stages of decompression and
reheating takes place. The motor drives the real axle G
through the transmission F. Control of engine speed is
through conventional accelerator pedal H controlling a
valve within the motor.
The Air Filter:

AIR POWERED SCOOTER:


Jem Stansfield, an English inventor has been able to
convert a regular scooter to a compressed air moped.
This has been done by equipping the scooter with a
compressed air engine and air tank.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 647


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• The energy required for compressing air is produced


at large centralized plants, making it less costly and
more effective to manage carbon emission than from
individual vehicles.

Jem Stansfield created the bike by strapping two • Compressed air engine reduces the cost of vehicle
high-pressure tanks onto the side of his Push moped. production by about 20%, because there is no need
The tanks are basically scuba tanks. He uses the to build a cooling system, spark plugs, starter motor,
electricity from his house to fill the tanks. The power is or muffler.
then "stored" there, much like a battery, ready for use. • The rate of self-discharge is low opposed to batteries
The tanks used are carbon-fiber tanks of the sort used that depilate their charge slowly over time. Therefore,
by firefighters for oxygen. But still, they're far cheaper the vehicle maybe left unused for longer periods of
than even the lead acid battery used in car now. Of time than electric cars.
course, the compressor works on electricity, so that's • Compressed-air vehicles emit few pollutants, mostly
not always a clean power source but recharging options dust from brake and tire wear.
at night or off peak will enhance the chances to use the
power that would be wasted otherwise. The top speed DISADVANTAGES:
is about 18 mph, and it can only go 7 miles before the • Very little is known about air powered vehicles thus
air pressure runs out and a lot more power could far.
probably be pulled by tweaking his configuration. A • Compressed air has a low energy density comparable
small gear on the end of the air drill, connected to the to the values of electrochemical lead-acid batteries.
chain of the bike would make a much more elegant
solution. Several companies are investigating and • The air cars will travel only with low speed and it will
producing prototypes, and others plan to offer air take nearly 6 hours to charge.
powered cars, buses and trucks. The compressed air • Limited storage capacities of the compressed air tank.
is stored in carbon-fiber tanks that are built into the
chassis. As the air is released, the pressure drives CONCLUSION:
pistons that power the engine and move the car, and For the entire disruption made one can say that by
the pistons compress the air into a reservoir so that the using air car there is reduction in air pollution. The
process continues. emission benefits of introducing this zero-emission
technology are obvious. Compressed air for vehicle
ADVANTAGES: propulsion is already being explored and now air
• Refuelling can be done at home using an air powered vehicles are being developed as a more fuel-
compressor or at service station. efficient means of transportation. Some auto-mobile
companies are further exploring compressed air hybrids

648 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and compressed fluids to store energy for vehicles which REFERANCES


might point the way for the development of a cost- 1. S.S. Verma, Department of Physics, S.L.I.E.T. (Deemed to be
effective air powered vehicles design. Unfortunately, University), Longowal, Dist.-Sangrur, Punjab, 148 106, India.
there are still serious problems to be sorted out before 2. Ashish Jiotode, Pravin Jeurkar, Abhijit Wadhai Amravati
air powered vehicles become a reality for common use University, Babasaheb Naik College of Engineering, Pusad,
Maharashtra, India.
but there is a hope that with the development in science
& technology well sup-ported by the environmental 3. KONTHAM SWETHA, Assistant Professor (Sr. Grade)
Department of Mechanical Engineering, Vardhaman College of
conscious attitude and need to replace costly Engineering-Shamshabad, India.
transportation methods, air-powered vehicles will 4. h t tp s: // www. mo to rc yc le n e ws .c o m/n ews/ 2 0 0 8 /a p r il /
definitely see the light of the day. apr1408inventorcreatesfirstairpoweredmotorcycle-/
5. https://www.researchgate.net/publication/339513136_
COMPRESSED_AIR_VEHICLE_A_REVIEW

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 649


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The Effect of Holding Time on the Characteristics of


Titanium and Austenitic Stainless-Steel Joints
A.Arun Negemiya1, K.S.Mohanraj2, S.Gnanasekaran3, C.Sangeevi4
1,2,3,4
Assistant Professor, Department of Mechanical Engineering, Sri Shakthi Institute of Engineering & Technology,
Coimbatore, Tamilnadu, India
Email: arunnegemia@gmail.com1

Abstract: Solid-state diffusion bonding (DB) of especially when their Physico-chemical characteristics
Ti-6Al-4V to AISI 304 austenitic stainless-steel change. This method generates joints with less
plates was carried out in vacuum with uniaxial dimensional tolerance, less macroscopic deformation,
compressive pressure of 14 MPa and bonding and fewer structural inhomogeneities.Ghosh et al. report
temperature of 900 °C. The quality of the joint was that for solid-state DB of commercially pure titanium
assessed using optical and SEM microscopy and
and 304 stainless steel, maximum bond strength of 71%
intermetallic compounds were confirmed using
XRD. The bonded joints' room-temperature of that of titanium was attained for the couples treated
characteristics were assessed using for 30 minutes. Ghosh et al. studied direct bonding
microhardness, ram tensile, and lap shear tests. between commercially pure titanium and 304 stainless
The 75-minute DB connection has a maximum steel at 850 °C for 30-150 min under uniaxial stress in
bonding strength of 243 MPa and a lap shear a vacuum. Despite the large volume percentage of
strength of 149 MPa. intermetallics, the assemblies treated for 90 minutes had
Keywords: Diffusion bonding, Ti-6Al-4V alloy, 76 percent of the bond strength of titanium. Assemblies
Austenitic stainless steel, Holding time bonded to AISI 304 were studied for their interfacial
microstructure and mechanical characteristics.
INTRODUCTION
EXPERIMENTAL WORK
In addition to its high strength-to-weight ratio,
titanium alloy Ti-6Al-4V has an excellent fatigue life, DB was performed on rolled Ti-6Al-4V alloy and
low density, and corrosion resistance. Joints of titanium AISI 304 austenitic stainless-steel plates. The samples
alloy and stainless steel have found use in nuclear, were 50 mm square and 5 mm thick. Tables 1 and 2
chemical, and aerospace sectors. The metallurgical provide the chemical and mechanical characteristics of
disconformity of titanium alloys and stainless steels the basic materials. The specimen was heated to the
makes conventional fusion welding problematic due to bonding temperature in a 1600°C heating furnace while
chemical segregation and intermetallic formation at the necessary pressure was applied. After bonding, the
interfaces. Dissimilar materials may be joined via DB, samples were cooled to room temperature before
removal.
Table 1 Chemical composition (wt %) of the base metals

Material Al C Cr Fe Mn Ni O P S Si Ti V
Ti–6Al–4V 6 - - 0.25 - - 0.2 - - - 90 4
AISI 304 - 0.08 20 74 2 10 - 0.045 0.03 1 - -
Table 2 Mechanical properties of base metal

Alloy Yield strength Ultimate % of Hardness


(MPa) strength (MPa) Elongation (HV0 .5)
Ti-6Al-4V 880 950 14 350
AISI 304 305 505 30 200

650 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The samples were DB for 30, 45, 60, 75, and 90


minutes at 14 MPa and 900°C. Five samples were
prepared for microstructure investigation by belt
polishing, disc polishing, and buffing. The mirror quality
was achieved by polishing with silicon carbide emery
paper up to 2500 grit. The samples were Ti-6Al-4V
(85 ml H2O, 10 ml HF, 5 ml HNO3) and AISI 304 (20
ml HNO3, 60 ml HCl). Energy dispersive spectroscopy
revealed the atomic percentage composition (SEM-
EDS). XRD verified the existence of intermetallic
phases using cobalt as a target at 35 kV and 25 mA
sample current. The research utilized a scanning range
of 30 to 90 deg with a step size of 0.01 deg (2). A
universal tensile tester was used to evaluate the lap shear
Fig. 1 Effect of holding time on joint strength
and bonding strengths of the specimens produced
utilizing wire-cut electrical discharge machining. The Figure 2 shows microhardness throughout the joint
microhardness values were measured by applying a 0.5 area. The interdiffusion of components across the joint
kg force transverse to the bond line for 15 seconds. is anticipated to influence hardness. The Fe side
hardness was 245 HV at 0.1 mm distance and rose to
RESULTS AND DISCUSSION 561 HV at the joint contact. The increase in hardness
3.1 Effect of holding time on mechanical at the joint contact was related to the development of
properties intermetallics in the joint area. The hardness values were
low for a holding time of 30 minutes and increased
Figure 1 reveals that joint strength test findings LSS withholding time to a maximum value for a holding time
and BS were 138 MPa and 236 MPa at 30 minutes of 90 minutes. Intermetallic segregation at the joint center
and rose to withhold time to 151 MPa and 244 MPa owing to the solid interface aggressiveness was believed
at 75 minutes. This progressive rise in strength is due to to be the primary reason for an increase in hardness
isothermal solidification of the joint with increasing values.
holding time. Joint strength dropped to 149 MPa and
242 MPa when the holding duration was extended to
90 minutes. Weaknesses at the joint interface due to
increasing segregation of brittle Ti-Fe intermetallics
Bonding produced much stronger joints than previous
connecting methods.

Fig. 2Effect of holding time on microhardness

Figure 3 indicates that DLT increased with 900°C


holding duration. However, DLT increased between 30

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 651


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and 75 minutes, then decreased when the holding period This shift may be due to gradual homogeneity of the
was increased to 75 minutes. joint area as components diffuse out and titanium alloying
elements diffuse in. During this period, isothermal
solidification was accomplished. A study of samples
bonded at 900 °C for various holding periods revealed
alterations in the diffusion zone microstructure.
3.2 Microstructure characterization
Figure 4 depicts a cross-section of the bond contact
after 30 minutes. Diffusion zones widen as the holding
duration rises to 45 and 75 minutes. A DLT may be
visible along with the interface after 30 minutes of
holding. Solid-state diffusion of Ti/Fe in base metals is
one of the early bonding phases at the Ti/Fe contact.
Intermetallic Fe2Ti intermetallic developed at grain
boundaries as holding time increased. Intermetallics
Fig. 3 Diffusion layer thickness as a function of holding time between Ti/Fe may also develop afterward.

Fig. 4 Optical micrographs of the joint interface at holding time of (a) 30 min, (b) 45 min, (c) 60 min, (d) 75 min, and (e) 90 min

652 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Figure 5 displays SEM and EDS findings of DB (a&b). The interface includes 49.74 % Ti, 28.77 %
samples bonded at 900°C, 14 MPa, and 75 minutes. iron, 9.5 % chromium, 7.33 % aluminum, 2.5 %
SEM examination of the Ti6Al4V/AISI304 joint shear vanadium, and 2.28 % nickel Figure 5 shows the
fracture shows cleavage fracture (Figure 5(a)). Many findings of an X-ray diffraction study (c). XRD and
fine river patterns and cleavage fractures with a local EDS indicate the existence of intermetallic phases such
rip (Figure 5(b)). This demonstrates that the Ti6Al4V/ a s F

3
, Fe2Ti4O, Fe2Ti, NiTi2, FeNi, Fe3OTi3, FeTi,
e N i

AISI304 joint fracture is not completely brittle and is and Cr2Ti. Intermetallics produced at the diffusion zone
also tough. The shear fracture location in the diffusion increase with DB time, in agreement with previously
zone is determined by interface structure. Figure 5 published studies.
shows the findings of an EDS study at the interface

Fig. 5 Microstructural characteristics of diffusion bonded joint (a) SEM micrograph, (b) EDS results, and (c) XRD results

CONCLUSIONS of reaction products for 75 minutes, according to the


The DB joint treated at 75 minutes had a maximum transition joints. There were no Fe3OTi3 phase mixtures
bonding strength of 243 MPa and a lap shear strength produced in 75 minutes.
of 149 MPa. Holding time increases the volume REFERENCES
percentage of Ti-Ni intermetallics, reducing bond
[1]. Ghosh M., Bhanumurthy K., Kale G., Krishnan J., Chatterjee S.
strength. Bond strength is weak at lower joining times (2003); Diffusion bonding of titanium to 304 stainless steel,
because of partial surface coalescence. The thickness Journal of Nuclear Materials, 322, pp.235-241.
of the diffusion layer affects the bonding strength. [2]. Ghosh M., Kundu S., Chatterjee S., Mishra B. (2005); Influence
Holding time affects the diffusion layer's function. The of interface microstructure on the strength of the transition joint
between Ti-6Al-4V and stainless steel, Metallurgical and
optimal diffusion layer thickness is 10.54 m for improved Materials Transactions A, 36, pp.1891-1899.
mechanical characteristics. The holding duration
increases the hardness value. The SS-Ti interface is free

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 653


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[3]. He P., Zhang J., Li X. (2001); Diffusion bonding of titanium [10].Kundu S., Chatterjee S. (2006); Effect of bonding temperature
alloy to stainless steel wire mesh, Materials Science and on interface microstructure and properties of titanium-304
Technology, 17, pp.1158-1162. stainless steel diffusion bonded joints with Ni interlayer,
Materials Science and Technology, 10, pp.1201-1207.
[4]. Ghosh M., Chatterjee S., Mishra B. (2003); The effect of
intermetallics on the strength properties of diffusion bonds formed [11].Mahendran G., Balasubramanian V., Senthilvelan T. (2010);
between Ti-5.5Al-2.4V and 304 stainless steel, Materials Science Influences of diffusion bonding process on bond characteristics
and Engineering A, 363, pp.268-274. of Mg-Cu dissimilar joints, Transaction of Nonferrous Metal
Society of China, 20, pp.997-1005.
[5]. Kurt B., Orhan N., Kaya M. (2009); Interface characterisation
of diffusion bonded Ti-6Al-4V alloy and austenitic stainless steel [12].Cam G., Ipekoglu G., Bohm K.H., Kocak M. (2006);
couple, Materials Science and Technology, 25, pp.556-560. Investigation into the microstructure and mechanical properties
of diffusion bonded TiAl alloys, Material Science, 41, pp.5273-
[6]. Ghosh M., Chatterjee S., Mishra B. (2002); Characterization of
5282.
transition joints of commercially pure titanium to 304 stainless
steel, Materials Characterization, 48, pp.393- 399 [13].Vigraman T., Ravindran D., Narayanasamy R. (2012); Diffusion
bonding of AISI 304L steel to low-carbon steel with AISI 304L
[7]. Lee H.S., Yoon J.H., Park C.H., Ko Y.G., Shin, Lee C.S. (2007);
steel interlayer, Materials and Design, 34, pp.594-602.
A study on diffusion bonding of superpalsticTi-6Al-4V ELI grade,
Materials Process and Technology, 187-188, pp.526-529. [14].Ghosh M., Samar Das, BanarjeeP.S., Chatterjee S. (2005);
Variation in the reaction zone and its effects on the strength of
[8]. Ozdemir N., Bilgin B. (2009); Interfacial properties of diffusion
diffusion bonded titanium-stainless steel couple, Materials
bonded Ti-6Al-4V to AISI 304 stainless steel by inserting a Cu
Science and Engineering A, 390, pp.217-226.
interlayer, Advanced Manufacturing Technology, 41(5-6),
pp.519-526.
[9]. Vigraman T., Ravindran D., Narayanasamy R. (2012); Effect of
phase transformation and intermetallic compounds on the
microstructure and tensile strength properties of diffusion-bonded
joints between Ti - 6Al - 4V and AISI 304L, Materials and
Design, 36, pp.714-727.

654 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

CFD Analysis of Heat Transfer in Helical Coil Heat


Exchanger with Constant Wall Heat Transfer
Coefficient
R.Selvan1, V.Sowndaryan2
1,2
Mechanical Department, RAAK College of Engineering and Technology, Puducherry, India
Email: selvan.r2004@gmail.com1, sowndar95@gmail.com2

Abstract- There is a wide application of coiled conditions such as adiabatic or insulated wall conditions.
heat exchanger in the field of cryogenics and other Some examples of heat exchangers are:
industrial applications for its enhanced heat transfer
characteristics and compact structure. Lots of • Intercoolers and pre heaters
researches are going on to improve the heat • Condensers and boilers in refrigeration units
transfer rate of the helical coil heat exchanger. Here,
in this work, an analysis has been done for a tube- • Condensers and boilers in steam plant
in-tube helical heat exchanger with constant heat • Regenerators
transfer coefficient with turbulent flow. There are
various factors present that may affect the heat • Oil coolers and heat engines
transfer characteristics of the heat exchanger. • Automobile radiators etc.
Here, the experiment has been done by varying
the curvature ratio i.e. ratio of coil diameter to inner II. PROBLEM IDENTIFICATION
tube diameter and inlet velocity of the hot fluid in
To accomplish this goal, the following problems were
the inner tube. The curvature ratio is varied from
8 to 25 and inlet velocity is varied from 1m/s to
encountered:
2m/s step wise. The analysis has done using ANSYS Various parameters changing due to coil shape,
13 CFD methodology. Different parameters are temperature gradient and various Thermodynamic
calculated from the results obtained and graphs are properties.
plotted between various parameters such as
Nusselt number, friction factor, pressure drop and Problems in determining overall heat transfer
pumping power versus Reynolds number. These coefficient due to fouling, and other
graphs have been analysed and discussed to find Parameters, Design and Construction of a physical
out the optimal result for which the heat exchanger
model of the heat exchanger.
would give the best performance.
Keywords- Heat Exchanger, Helical Coil, CFD
Testing of the physical model under different flow
Analysis, Double Pipe Heat Exchanger. rates and flow configurations.(Parallel flow and counter
flow).
I. INTRODUCTION
Comparison of the results from both theoretical and
A heat exchanger may be defined as equipment experimental work.
which transfers the energy from a hot fluid to a cold
The progression of the S-N curve shown in Fig. 2
fluid, with maximum rate and minimum investment and
can be influenced by many factors such as stress ratio
running cost. The rate of transfer of heat depends on
(mean stress), loading frequency, temperature,
the conductivity of the dividing wall and convective heat
corrosion, residual stresses, and the presence of
transfer coefficient between the wall and fluids. The heat
notches. A constant fatigue life (CFL) diagram is useful
transfer rate also varies depending on the boundary
for the study of stress ratio effect. The Goodman line is

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 655


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

a method used to estimate the influence of the mean Merging:


stress on the fatigue strength. The model has 3 parts and 3bodies after sweep
III. METHODOLOGY operation. So, all the 3 parts are selected using control
and merged into 1 part. At the end it will have 1 part
A. Methodology adopted: and 3 bodies. The 3 bodies are named as follows:
Here the analysis is done using ANSYS-13
1. Inner fluid (fluid)
software.
2. Thickness volume (solid)
B. Analysis procedure:
3. Outer fluid (fluid)
• Geometrical modeling
• Meshing B. Meshing:
• Solution: In free meshing a relatively coarser mesh is
• Material selection generated. It contains both tetrahedral and hexahedral
cells having triangular and quadrilateral faces at the
• Defining zones boundaries. Later, a fine mesh is generated using edge
• Boundary conditions sizing. In this, the edges and regions of high pressure
• Solution methods and temperature gradients are finely meshed.
• Solution initialization Creating named sections
• Iteration Different sections are named according to their use
• Plot results and contours such as cold inlet, cold outlet, hot inlet, hot outlet etc.

IV. EXPERIMENTAL PROCEDURE Now the project was updated, saved and meshing
window was closed. After that the ANSYS Fluent
A. Geometrical modelling: launcher was opened double clicking on setup. The
First the geometry of the model is created in ANSYS dimension was set as 3D, option as Double Precision
workbench. Fluid flow (fluent) module is selected from and then OK. The Fluent window was opened.
the workbench. The design modeller opens as a new
C. SOLUTION
window when the geometry is double clicked.
Sketching: Problem Setup

Using sketching option three concentric circles are The mesh was checked. The analysis type was
created in XY-plane (diameters of circles are 6mm, changed to Pressure Based type and the velocity
7mm and 13mm) in three different sketches. A straight formulation was changed to absolute. Time was changed
line is also created in sketch 4 along the height of the to steady state.
helical tube at the centre. Models
Sweep: Energy was set ON position. And viscous model
Then the three circles were swept about the central was selected as "k-? model (2 equations).
axis with pitch 40 mm and number of turns is 1.5. At
Materials
first the mean coil diameter is 50mm and then it is varied
for different values of D/d. Then using Boolean operation Water-liquid as fluid and copper as solid was
the overlapping volumes are subtracted and respective selected from the fluent database by clicking change/
phases were chosen. create.

656 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Cell zone conditions Convergence criteria


Different parts were assigned as solid or fluid The convergence criteria were set to 10-5 for the
accordingly. three velocity components and continuity, 10-8 for
energy and 10-4 for turbulent kinetic energy and
Boundary conditions dissipation energy.
Different boundary conditions were applied for Run calculation
different zones. Since it is a tube-in-tube heat exchanger,
there are two inlets and two outlets. The inlets were The number of iterations was set to 1000 with step
defined as velocity inlets and outlets were defined as size 1. Then the calculation was started and it continued
pressure outlets. The inlet velocity of the cold fluid was till the results converged. Various contours were plotted
kept constant i.e. 2.5m/s, whereas velocity of hot fluid and different parameters were calculated such as
was varied from 1m/s to 2m/s for different experiments. weighted average of total temperatures at out let and
The outlet pressures were kept default i.e. atmospheric inner wall, total wall flux, pressure drop across the hot
pressure. The hot fluid temperature at inlet was 650C fluid inlet and outlet to calculate pumping power.
and cold fluid inlet temperature was kept 230C. The D. GRID INDEPENDENCE TEST
other wall conditions were defined accordingly. The
This test is carried out to find out the optimum grid
surrounding air temperature was kept 27 oC and
size of a model at which the parameters don't change
convective heat transfer coefficient between outer wall
with varying grid size in mesh. In this method the same
and surrounding was 2500W/m2K.
simulation is run on progressively for coarse grid,
Solution methods medium grid and finer grids (3 grids should be the
minimum) by changing a global grid sizing parameter
The solution methods were set as follows:
rather than local refinement, unless it takes too long to
1. Scheme = Simple run/insufficient computer resources to see if the solution
2. Gradient = Least Square Cell Based changes as the grid is refined. When the grid is fine
enough the solution does not change, so that the solution
3. Pressure = linear
is 'grid independent'. This gives reducing the
4. Momentum = Second Order Upwind discretization error inherent in CFD.
5. Turbulent Kinetic Energy = Second Order Upwind Grid independent test for different geometries of the
6. Turbulent Dissipation Rate = Second Order Upwind heat exchangers are shown below.
7. Energy= power law The engine was allowed to run with sole fuel at
various loads for nearly 10 minutes to attain the steady
Solution Control and Initialization;
state and constant speed conditions. Then the following
Under relaxation factors the parameters are: observations were made.
• Pressure = 0.3 Pascal • The water flow was maintained constant throughout
the experiment.
• Density = 1 Kg / m3
• The load, speed and temperature indicators were
• Body forces = 1 Kg /m2s2
switched on.
• Momentum = 0.7 Kg-m/s • The engine was started by cranking after ensuring
• Turbulent kinetic energy = 0.8 m /s 2 2 that there is no load.

All the conditions were left as default. Then the Hot • The engine was allowed to run at the rated speed of
inlet was selected from the compute from drop down 1500 rev/min for a period of 20 minutes to reach the
steady state.
list and then the solution was initialized.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 657


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• The fuel consumption was measured by a stop watch. It is found that there is no change is outlet
• Smoke readings were measured using the AVL Smoke temperature when number of divisions is more than 31,
meter at the exhaust outlet. 33, and 63. Hence, it is taken as the mesh size for all
the calculations. "31. 33, 63" means the no of divisions
• The amount of NOx, CO, HC was measured using of the three diameters are 31, 33, 63 respectively.
exhaust gas analyzer.
V. RESULTS AND DISCUSSIONS
• The exhaust temperature was measured by using a
sensor. The heat transfer and flow characteristics of a helical
coil pipe can be observed from the contour diagrams
• Then the load was applied by adjusting the knob, which
of temperature and pressure distribution, variation of
was connected to the Eddy Current Dynamometer.
Nusselt number, friction factor and pumping power with
• Experiments were conducted using sole fuel, Biodiesel Reynolds number.
and it blends with diesel fuel, and the above procedure
was adopted. A. Tables
Table I. Number of division's nodes and outlet temperature The results obtained from the CFD analysis are given
D/d=8
in the tables below and from that Nusselt number (Nu),
No. of divisions No. of nodes Outlet te mp. of hot fluid friction factor (f), pressure drop (p) and pumping
21,23,45 85622 331.524
25,27,53 128722 333.324
power (P) has been calculated.
31,33,63 325488 333.717 Table 5.1 Nu, f,  p and P for different values of Re at D/d=8
41,43,85 459619 333.717
D/d=10 Re Nu p f P
No. of divisions No. of nodes Outlet te mp. of hot fluid 12938.79 130.6194 1192.57 0.06535 158.8453
21,23,45 92467 331.542 15526.34 150.5578 1654.1 0.06296 263.7802
25,27,53 135262 332.926 18113.9 169.8872 2183.83 0.06108 405.8183
31,33,63 356922 333.252 20701.46 188.7711 2749.04 0.058864 583.4454
41,43,85 489231 333.254
23289.02 209.8607 3443.76 0.058268 821.9023
25876.57 225.2856 4171.54 0.057174 1105.929
Temp Vs Nodes Table 5.2 Nu, f, p and P for different values of Re at D/d=10

Re Nu p f P
334
reu 12938.79 126.6922 1252.53 0.057494 166.7881
ta 333.5 15526.34 146.1506 1731.68 0.055212 276.1124
re
p 333 Temp Vs 18113.9 165.0135 2279.97 0.053415 423.648
m
e 332.5 Nodes 20701.46 183.4424 2895.788 0.051947 614.5485
T
te 332 23289.02 201.4091 3536.32 0.050126 843.9726
lt
u 331.5 25876.57 219.0824 4325.312 0.049664 1146.669
O
331 Table 5.3 Nu, f, p and P for different values of Re at D/d=15

0 200000 400000 600000 Re Nu p f P


No of Nodes
12938.79 147.2556 1627.759 0.046058 216.4941
15526.34 167.4906 1654.09 0.032502 263.7786
18113.9 188.5804 2183.826 0.031532 405.8176
Temp. Vs Nodes
333.5 20701.46 209.1515 2781.175 0.030748 590.2564
er 23289.02 229.2546 3443.77 0.030085 821.9047
tua 333 25876.57 248.932 4171.551 0.029520 1105.932
re
p Table 5.4 Nu, f, p and P for different values of Re at D/d=20
m 332.5
tet Temp. Vs
elt Re Nu p f P
332 Nodes
u 12938.79 150.6472 1904.089 0.043790 253.0991
O
331.5 15526.34 172.9615 2620.015 0.041850 417.324
18113.9 194.5491 3434.737 0.040312 637.8061
331 20701.46 215.5315 4345.977 0.039054 921.9153
0 200000 400000 600000 23289.02 235.9751 5351.214 0.037997 1276.722
No of Nodes 25876.57 255.9566 6447.76 0.037085 1708.984

658 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 5.5 Nu, f, p and P for different values of Re at D/d=25

Re Nu ?p f P
Pressure drop Vs Re
12938.79 158.4227 2187.524 0.040278 290.6452
5000
15526.34 181.7256 3003.343 0.038407 478.2586
18113.9 204.2441 3930.159 0.036929 729.6851 4000
20701.46 226.1019 4963.713 0.035721 1052.844
23289.02 250.1111 5832.123 0.034231 1354.1542 3000
25876.57 268.2465 7341.522 0.033805 1945.774 Pressure drop
2000 Vs Re
VI. GRAPH 1000

Using the values obtained from CFD analysis as 0


given in the above tables, graphs are plotted between 0 10000 20000 30000
various parameters from which the fluid flow
Fig.6.3 Graph of Reynolds number Vs pressure drop for D/d=8
characteristics and heat transfer can be easily visualized.
Pumping Power Vs Re
Nu Vs Re 1200
250 1000
200 800

150 600
Pumping
Nu Vs Re 400 Power Vs Re
100
200
50
0
0
0 10000 20000 30000
0 10000 20000 30000
Fig.6.4 Graph of Reynolds number Vs pumping power for D/
Fig.6.1 Graph between Nusselt number Vs Reynolds number d=8
for D/d=8
From the above graphs (Figure 6.1, 6.2, 6.3, 6.4) it
friction factor Vs Re is observed that the Nusselt number, pressure drop and
pumping power increases with increasing Reynolds
0.066 number whereas friction factor decreases with increasing
0.064 Re. For the optimal condition of heat exchanger,
0.062 pumping power should be minimum with maximum
friction factor Nusselt number, i.e. the power consumption should be
0.06 Vs Re
less with more heat transfer rate.
0.058
0.056 Nu Vs Re
0 10000 20000 30000 300
250
Fig.6.2 Graph between Reynolds number Vs friction factor for
D/d=8 200 D/d=8
150
u D/d=10
N
100 D/d=15

50 D/d=20

0 D/d=25

Re

Fig.6.5 Graph between Nu & Re for different D/d

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 659


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

8000
Nu Vs Re f V s Re
7000
250 0.066
p6000 D/d=8 0.065
or
5000 200 0.064
D D/d=10
er4000 0.063
su
se3000
D/d=15 f150 0.062
r D/d=20 & 0.061
P
2000 u
D/d=25 N100 0.06
1000 0.059
0 50 0.058
0.057
Re 0 0.056
0 5000 10000 15000 20000 25000 30000
Fig.6.6 Graph between pressure drop & Re for different D/d Re

Fig.6.9 variation of Nusselt number and friction factor with


Friction factor Vs Re Reynolds number for D/d=8

0.07
0.06
0.05 Nu Vs Re f Vs Re
0.04 D/d=8
250 0.058
0.03 D/d=10
0.057
0.02 D/d=15 200 0.056
0.01 D/d=20 f 0.055
&150 0.054
0 D/d=25 u
N 0.053
100
0.052
50 0.051
0.05
Fig.6.7 Graph between friction factor & Re for different D/d
0 0.049
0 5000 10000 15000
Re 20000 25000 30000
Pumping Power Vs Re Fig.6.10 Variation of Nusselt number and friction factor with
Reynolds number (D/d=10)
2500

2000
N u Vs Re f Vs Re
1500 D/d=8
300 0.05
D/d=10 0.045
1000 250
D/d=15 f 0.04
500 &200 0.035
D/d=20 u 0.03
N150 0.025
0 D/d=25 0.02
100 0.015
50 0.01
0.005
0 0
0 10000 20000 30000
Fig.6.8 Graph between power & Re for different D/d
Re

Fig.6.11 Variation of Nusselt number and friction factor with


Reynolds number (D/d=15)

660 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• For more heat transfer rate, higher curvature ratio


Nu Vs Re f V s Re should be preferred irrespective of the power low.

300 0.045 • From the velocity and temperature contours it can be


250 0.044 observed that the velocity is higher towards the outer
0.043
side of the coil whereas temperature is higher towards
f 200 0.042
& 150 0.041 inner side of coil.
u 0.04
N • The heat transfer performance of a helical tube heat
100 0.039
50 0.038 exchanger is more than that of a straight tube heat
0.037
0 0.036 exchanger.
0 10000 20000 30000
REFERENCES
Re
[1] Darvid, A.N., Smith, K.A., Merril, E.W. and Brain, P.L.T, 1971,
Fig.6.12 Variation of Nusselt number and friction factor with Effect of secondary fluid motion on laminar flow heat transfer in
Reynolds number (D/d=20) helically coiled tubes. AICHE Journal, 17, 1142-1222.
[2] K.S. Bharuka, D.Y. Kasture, 1984, Flow through a helically coiled
Nu Vs Re f Vs Re annulus, Applied Science Research, 41, 55-67.
[3] Timothy John Rennie, 2004, Numerical And Experimental Studies
300 0.041
0.04 of a Double pipe Helical Heat Exchanger, Dept. of Bio-resource
f 250 Engg. McGill University, Montreal.
&200 0.039
u 0.038
N150 0.037 [4] Vimal Kumar, Supreet Saini, Manish Sharma, K.D.P. Nigam,
100 0.036 2006, Pressure drop and heat transfer study in tube-in-tube helical
0.035 heat exchanger, Chemical Engineering Science, 61, 4403 - 4416.
50 0.034
0 0.033 [5] Rennie, T.J. and Raghavan, V.G.S., 2006, Numerical studies of a
0 10000 20000 30000 doublepipe helical heat exchanger. Appl Thermal Eng, 26, 1266-
Re
1273.
Fig.6.13 Variation of Nusselt number and friction factor with [6] Vimal Kumar, Burhanuddin Faizee, Monisha Mridha, K.D.P.
Reynolds number (D/d=25) Nigam, 2007, Numerical studies of a tube-in-tube helically coiled
heat exchanger, Chemical Engineering and Processing, 47, 2287-
VII. CONCLUSIONS 2295.

This work investigates the heat transfer and flow [7] J.S. Jayakumar, S.M. Mahajani, J.C. Mandal, P.K. Vijayan, and
Rohidas Bhoi, 2008, Experimental and CFD estimation of heat
characteristics of a tube-in-tube helical heat exchanger transfer in helically coiled heat exchangers, Chemical Engg
for counter flow using CFD methodology. The effect Research and Design, 221-232.
of mass flow rate in the inner tube and curvature ratio is [8] Rahul Kharat, Nitin Bhardwaj, R.S. Jha, 2009, Development of
studied and the various conclusions drawn are: heat transfer coefficient correlation for concentric helical coil
heat exchanger, International Journal of Thermal Sciences, 48,
• Nusselt depends on the curvature ratio, i.e. the ratio 2300-2308.
of coil diameter to inner tube diameter. Nu increases [9] N. Ghorbani a, H. Taherian b, M. Gorji c, H. Mirgolbabaei d,
with increasing curvature ratio. Also it was found that 2010, Experimental study of mixed convection heat transfer in
Nu increases with increasing mass flow rate or vertical helically coiled tube heat exchangers , Experimental
Reynolds number. Thermal and Fluid Science 34, 900-905.
[10]J. S. Jayakumar, Helically Coiled Heat Exchangers, Heat
• For turbulent flow in the pipe, friction factor decreases Exchangers - Basics Design Applications, 12.
with increasing Reynolds number(Re) whereas heat
[11]Rajput R.K., 2011, Heat and Mass Transfer, S. Chand &
transfer rate increases with Re. So, there exists an Company ltd., pp.563, chap.10
optimal value of mass flow rate and curvature ratio
for which the heat exchanger would give the best
performance.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 661


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Design of Contactless Braking System


T. Sathees1, J.Vikram2, B.Vinith Kumar3, M.Yogeshwaran4, N.V.Sundharrajan5
1
Assistant Professor, Mechanical Department, Paavai Engineering College, Namakkal, Tamilnadu, India
2,3,4,5
UG Scholar, Mechanical Department, Paavai Engineering College, Namakkal, Tamilnadu, India
Email: satheesthangavelupgi@paavai.edu.in1, vikramvedha676@gmail.com2, vinithruby@gmail.com3,
yogeshwarankm@gmail.com4, sundharrajan297@gmail.com5

Abstract- This paper presentation explores the The resultant braking power is straightforwardly
working principle of eddy current brake relative to the velocity at which the balance is traveling
mechanism, which can be analyzed by Maxwell through the brake component. This very property, in
3DTransient solver. An eddy current brake, like a any case, is additionally one of attractive braking's
conventional friction brake, is responsible for
burdens in that the vortex drive itself can never totally
slowing an object, such as a train or a roller coaster
hold a train in perfect condition. It is then regularly
etc. Unlike the friction brakes, which apply
pressure on two separate objects, eddy current important to hold the train setup with an extra
brakes slow an object by creating eddy currents arrangement of balance brakes or "kicker wheels" which
through electromagnetic induction which create are straightforward elastic tires that reach the train and
resistance, and in turn either heat or electricity. In successfully stop it.
this paper, linear Halfback magnetized mover is Magnetic brakes can be found in two configurations:
applied to eddy current braking system for high
speed. For such a breaker, we give analytical • The brake elements are mounted to the track or
formulas considering end effects for its magnetic alongside the track and the fins are mounted to the
field, eddy current distribution, forces according underside or sides of the train. This configuration
to the secondary relative permeability, and looks similar to frictional fin brakes.
conductivity. The results given here are purely • The fins are mounted to the track and the brake
analytic & applicable. elements are mounted to the underside of the train.
Keywords- Magnetic field, Eddy current brake, This configuration can be found on Intamin's
Conventional friction brake) Accelerator Coasters (also known as Rocket
Coasters) such as KingdaKa at Six Flags Great
Magnetic brakes Adventure.
Attractive brakes are a moderately new innovation Attractive brakes are noiseless and are much
that is starting to pick up notoriety because of their high smoother than grinding brakes, bit by bit expanding the
level of security. As opposed to moderating a train by braking control so that the general populations on the
means of grinding, (for example, balance or slide ride don't encounter quick changes in deceleration.
brakes), which can regularly be influenced by different Numerous advanced exciting rides, particularly
components, for example, downpour, attractive brakes those being fabricated by Intiman, have used attractive
depend totally on certain attractive properties and braking for quite a while. Another real crazy ride creator
resistance. Truth be told, attractive brakes never interact actualizing these brakes is Bollinger and Maxillary in
with the train. 2004 on their Silver Bullet altered liner, Making it the
Attractive brakes are comprised of maybe a couple initially suspended exciting ride to highlight attractive
lines of neodymium magnets. At the point when a metal brakes, and again utilized them on their more up to date
balance (commonly copper or a copper/aluminum tasks, for example, Leviathan at Canada's Wonderland.
amalgam) goes between the columns of magnets, swirl These later applications have demonstrated successfully
streams are produced in the blade, which makes agreeable and important for these modified napkins
attractive field restricting the balance's movement. which frequently give the feeling of flight.

662 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

There additionally exist outsider organizations, for prerequisites of braking at high speeds, totally without
example, Magnatar tech. Which give different designs the utilization of erosion. Because of its particular
of the innovation to be utilized to supplant and retrofit establishment area (transmission line of unbending
stopping mechanisms on existing crazy rides to build vehicles), electromagnetic brakes have better warmth
wellbeing, enhance rider solace, and lower upkeep scattering ability to dodge issues that grinding brakes
expenses and work. face. Ordinarily, electromagnetic brakes have been
mounted in the transmission line of vehicles. Fredrick,
EDDY CURRENT BRAKING J. R (2002)
Whirlpool streams are stream in a roundabout way. The propeller shaft is partitioned and fitted with a
They get their name from "whirlpools" that are shaped sliding all inclusive joint and is associated with the
when a fluid or gas streams in a roundabout way around coupling rib on the brake. The brake is fitted into the
impediments when conditions are correct. To produce case of the vehicle by method for hostile to vibration
whirlpool streams for an examination a "test" is utilized. mounting. The down to earth area of the retarder inside
Inside the test is a length of electrical channel which is the vehicle keeps the immediate impingement of air on
framed into a loop. Rotating current is permitted to the retarder created by the movement of the vehicle.
stream in the curl at a recurrence picked by the Any wind stream development inside the skeleton of
professional for the sort of test included. An element the vehicle is found to have a moderately inconsequential
extending and falling attractive field frames in and around impact broadcasting live stream around tire ranges and
the curl as the rotating current courses through the loop. consequently on the temperature of both front and back
circles. So the utilization of the retarder does not
influence the temperature of the consistent brakes.
In that way, the retarders amplify the life range of
the normal brakes and keep the general brakes cool
for crisis circumstance. Electromagnetic brakes work
in a moderately cool condition and fulfil all the vitality
prerequisites of braking at high speeds, totally without
the utilization of grinding. Because of its particular
establishment area (transmission line of inflexible
vehicles), electromagnetic brakes have better warmth
dispersal ability to maintain a strategic distance from
Figure 1: Generation of Eddy current Bae J. S., (2004) issues that grinding brakes face. Ordinarily,
At the point when an electrically conductive material electromagnetic brakes have been mounted in the
is put in the loop's dynamic attractive field transmission line of vehicles. The propeller shaft is
electromagnetic, prompting will happen and whirlpool isolated and fitted with a sliding all inclusive joint and is
streams will be instigated in the material. Karnopp, M., associated with the coupling rib on the brake. The brake
(1989) Eddy streams streaming in the material will is fitted into the undercarriage of the vehicle by method
create their own "optional" attractive field which will for hostile to vibration mounting. The handy area of the
contradict the curl's "essential" attractive field acc. To retarder inside the vehicle keeps the immediate
the Lenz's guideline. impingement of air on the retarder brought about by
the movement of the vehicle.
I. INSTALLATION LOCATION
Any wind stream development inside the
The establishment area of Electromagnetic brakes undercarriage of the vehicle is found to have a
close to the moving part. Electromagnetic brakes work moderately inconsequential impact reporting in real time
in a generally cool condition and fulfill all the vitality stream around tire zones and subsequently on the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 663


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

temperature of both front what's more, back circles. can be correspondingly attenuated up or down. Rather
So the use of the retarder does not influence the than pads pressing harder on a rotor, the resistive
temperature of the consistent brakes. In that way, the magnetic force is amplified. Though there is no physical
retarders broaden the life range of the customary brakes contact, the process still generates increased slowing,
and keep the normal brakes cool for crisis circumstance. along with heat, as a result of the resistance. Eddy
Klingerman, Y. (1998) current brake systems are used mostly in larger vehicles,
like trains. A sub-type of the Eddy current brake is
II. WORKING PRINCIPLE
known as the linear Eddy current brake. Instead of the
normal circular design, magnetic coils are wound around
a straight rail. The coils alternate between a positive
and negative magnetic charge, so, when activated,
generate resistance and slowing action. This design is
less widely used than traditional electromagnetic brakes
on train systems, but, in places like Europe, is becoming
more common on high-speed rail systems.
Unpowered versions of the linear design - which
instead use permanent, rare Earth magnets - are the
brake of choice on most roller coasters. As anyone
Figure 2 :Magnetic Braking who has ridden a roller coaster will be aware, these
When an electrical conductor, such as copper or non-electromagnetic types work on an on-off basis,
aluminum, moves through the field of a permanent and cannot be easily modulated. This results in very
magnet or an electromagnet, electromagnetic induction abrupt periods of deceleration, and, for this reason,
creates eddy currents, which dissipate some of the they are not a popular choice on more comfort-oriented
kinetic energy into Joule heat and results in slowing the vehicles, like trains.
motion of the conductor. This principle is utilized in the III. FUTURE OF EDDY CURRENT
construction of magnetic brakes. This Demonstration BRAKING
shows magnetic braking applied to a rotating metallic
disk. This might, for example, serve to control resistance The assortment of papers that have been reviewed
to motion in exercise machines. Magnetic braking can in this paper shows that use of eddy current dampers
also find applications in roller coasters and railroad has seen a number of diverse applications. However,
trains, in which the metallic conductor has the shape of many of the applications are not directed towards the
a linear rail. In contrast to conventional friction brakes, commercial market and are developed to suit a niche
there is no direct contact between interacting surfaces, field. The eddy current damper does have numerous
which makes magnetic braking more reliable and advantages over other damping systems. For instance,
reduces wear and tear. due to the non-contact nature of the damper it does
not change the dynamics of the structure or cause mass
A magnetic brake is a device that leverages strong loading and added stiffness, as many other damping
magnetic forces to slow a vehicle down. There are mechanisms do. Additionally, because the damper does
various different types of magnetic brake systems, not contact the structure, there is no need for a viscous
including ones that use electromagnets to actuate fluid, seals, or the periodic maintenance needed by many
traditional friction pads, and those that leverage magnetic other damping and braking systems. Furthermore, eddy
repulsion itself to provide resistance. current damping systems are easy to install, and the
By increasing or decreasing the amount of electric damping force can easily be controlled through
current, the stopping power of an Eddy current brake adjustment of the position or strength of the magnets.

664 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The question left un an were, where will eddy current Finally, the use of eddy currents for active damping
damping mechanisms be in the future? There are several mechanisms may allow a more effective damper to be
locations that are particularly well suited for eddy current developed. The use of eddy current dampers as active
dampers, but perhaps the most promising is in space. control mechanisms is limited in the current literature.
The advantages listed above provide a combination of One application that may be effective is to displace the
attributes that are not available in other damping magnet relative to the moving conductor, in an attempt
mechanisms. When a device is placed into orbit, the to increase the net velocity between the two devices
system must function for its entire and instigate a higher damping force. Other active
life span without requiring any type of maintenance. control methods may use electromagnets to damp
This can place limitations on the type of damper used, vibrations out. If the amount of research into eddy
leaving few systems left. Perhaps the two damping current damping continues to grow, this type of damper
systems that require the least amount of maintenance will surely find its way out of niche applications and
after their placement are eddy current dampers and into the commercial market.
constrained layer damping. The drawback of ADVANTAGES
constrained layer damping is that it modifies the system's These are non-mechanical; no moving parts hence
structural properties, while the drawback of the eddy no friction. Fully resettable, no parts need to be
current damper is that it typically requires a second replaced. Can be activated at will via electrical signal,
structure to support the magnets. However, the Low maintenance cost, Operates at any rotational
extremely cold temperatures that are present in space speed.
actually improve the damping performance of the eddy
current damper, due to the decrease in resistivity of the DISADVANTAGES
conductor. The opposite is the case for constrained layer Braking force diminishes as speed diminishes with
damping treatments, because the extreme cold can no ability to hold the load in position at stand still. That
cause stiffening of the visco elastic material and the could be considered to be a safety issue, but it really
vacuum pressure could cause out gassing if not properly means that friction braking may need to be used as
sealed, thus making their use in space problematic. The well., Eddy-current brakes can only be used where the
use of these dampers in space may be the key to infrastructure has been modified to accept them.
developing better eddy current technology that may
open a commercial market. One commercial market IV. CONCLUSION
that may be a key location for eddy current damping is With all the advantages of electromagnetic brakes
the vibration absorbers used in vehicles. The dampers over friction brakes, they have been widely used on
currently used tend to require replacement throughout heavy vehicles where the ?brake fading' problem is
the life of the automobile and lose effectiveness over serious. The same concept is being developed for
time. The eddy current damper could potentially replace application on lighter vehicles. A Halbach magnetized
these devices if sufficient research were carried out. A mover was applied to a high-speed eddy current braking
second area of the automobile that may benefit from system. Based on analytical 2-D field solutions
the use of eddy currents is the braking system. The use considering dynamic end effect, the magnetic field, eddy
of eddy currents for braking purposes could potentially current distribution, and forces according to the
lead to regenerative braking that would reduce the secondary relative permeability and conductivity were
amount of electrical energy required to power the presented.
electromagnets. The automobile market is a key It was observed that the air-gap flux density has a
commercial market that can typically open doors for non uniform distribution for the high speed.
the technology used. Comparisons between numerical simulations and
experimental data were also presented.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 665


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [7] International Journal of Applied Engineering and Technology


ISSN: 2277-212X (Online) An Online International Journal
[1] Bae J. S., Kwak M. K. and Inman D. J. (2004). Vibration Available at http://www.cibtech.org/jet.htm 2011 Vol. 1 (1)
Suppression of Cantilever Beam Using Eddy Current Damper. January-April/ pp104-113/Tripathi and Raj. Research Article
Journal of Sound and Vibration, (Accepted) 113
[2] Baz, A. and Poh, S., (2000), - Performance Characteristics of the [8] Karnopp, M., (1989), ?Permanent Magnet Linear Motors Used
Magnetic Constrained Layer Damping,? Shock and Vibration as Variable Mechanical Damper for Vehicle Suspensions, Vehicle
Digest, Vol. 7, 81-90. System Dynamics,18 187-200.
[3] Cadwell, L. H.,( 1996), - Magnetic Damping: Analysis of an [9] Fredrick, J. R. and Darlow, M. S (1994), - Operation of an
Eddy Current Brake Using an Air Track,? Journal of Physics, Electromagnetic Eddy Current Damper With a Supercritical
Vol. 64, 917-923. Shaft,?ASME Journal of Vibration and Acoustics, Vol. 116, No.
[4] Cunningham, R. E., (1986), - Passive Eddy Current Damping as 4, 578-580. Fung, R-F.,
a Means of Vibration Control in Cryogenic Turbo machinery,? [10]Sun, J-H., and Hsu, S-M., (2002), - Vibration Control of the
NASA Technical Paper number NASA-TP-2562, Access No. Rotating Flexible-Shaft/Multi- Flexible-Disk System with the
N86 24722 Eddy Current Damper,? ASME Journal of Vibration and
[5] Davis, L. C. and Reitz, J. R., (1971), - Eddy Currents in Finite Acoustics, Vol. 124, 519-526.
Conducting Sheets,? Journal of Applied Physics, Vol. 42, No. [11] Klingerman, Y., Gottlieb, O., and Darlow, M. S., (1998a), -
11, 4119-4127. Analytic and Experimental Evaluation of Instability in
[6] Gunter, E. J., Humphris, R. R., and Severson, S. J., (1983), - Rotordynamic System with Electromagnetic Eddy Current
Design Study of Magnetic Eddy Current Vibration Dampers for Damper,? ASME Journal of Vibration and Acoustics,120 272-
Application to Cryogenic Turbomachinery, University of Virginia 278.
Report UVA/528210/MAE84/101, NASA Grant NAG-3-263.

666 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Solar Water Desalination Using Paraffin Wax as Phase


Change Material
Sudhakar S1,Shanmugavel S2,Sherwin Moses Daniel A3,Sanjei Pranav S4, Tarun S5,Suriya Prakash V6
1,2,3,4,5,6
Mechanical Department, Bannari Amman Institute of Technology, Sathyamangalam.
Email: sudhakar.me19@bitsathy.ac.in1, shanmugavel.me19@bitsathy.ac.in2, sherwinmosesdaniel.me19@bitsathy.ac.in3,
sanjeipranav.me19@bitsathy.ac.in4, tarun.me19@bitsathy.ac.in5, suriyaprakash.me19@bitsathy.ac.in6

Abstract: All life on earth depends on energy buildings have been investigated within the past
and the cycling of carbon. Energy is essential for decade. The experimental results computed in the
economic and gregarious development and poses field of dihydrogen monoxide distillation process
an environmental challenge. The world's utilizing solar energy in the presence of energy
dependence on fossil fuels commenced storage materials i.e paraffin wax are discussed in
approximately 200 years ago. Availability of fossil this paper.
energy resources, peak oil era and this is the time
for terminus of the fossil fuel era, price and INTRODUCTION
environmental impact and sundry renewable Water crisis is one of the major problems on this
resources and utilization of it. earth. As the world population increases continually,
The twenty-first century is expeditiously water shortage will become more severe in the future.
becoming the impeccable energy storm, modern Even though water represents 70% of the earth. In the
society is faced with volatile energy prices and next decades, increased potable water consumption and
growing environmental concerns as well as energy fresh water resources depletion will cause a worldwide
supply and security issues. Solar and wind energy water scarcity problem. Nearly one third the world
are now providing the lowest cost options for
population will suffer from a problem of water scarcity.
economic and community development in rural
regions around the globe. Energy and dihydrogen Rarefaction of potable water has become a major
monoxide are the key to modern life and provide concern in many countries and therefore new techniques
the substructure indispensable for sustained are required to produce fresh water. To take advantage
economic development. Due to a growing world of natural resources, attention has been focused on
population and incrementing modernization desalination of sea water or brackish water/saline water.
ecumenical energy demand is rising during the At the same time, the gradual depletion of non
current century. renewable fuels and the related climate change
Finding the adequate supplies of clean and consequences should lead to key changes in energy
sustainable energy for the future is the ecumenical supply and use of energy.
society's most challenging task for this century. The To overcome this problem, there are various
future will depend on renewable sources such as
methods to produce fresh water from sea water, saline
solar, wind and biomass.
water or brackish water. Desalination processes have
There are immensely colossal numbers of PCMs received great attention as an alternative solution for
that melt and solidify at a wide range of fresh water production. Desalination is one of the
temperatures, making them captivating in a
methods which is suitable for potable water and less
number of applications. PCMs have been widely
cost effective. The demand for reliable and
utilized in latent heat thermal storage systems for
heat pumps, solar engineering and spacecraft autonomously operating desalination systems is
thermal control applications. The utilization of increasing continuously. These systems are meant for a
PCMs for heating and cooling applications for basic need of drinking water and fresh water supply.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 667


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Solar distillation seems to be a promising method T2 Water Temperature


and alternative way for supplying fresh water. Several T3 Vapor Temperature
solar still designs have been proposed and many of them
have found significant applications throughout the world. T4 Covering glass Temperature (inside)
Solar desalination systems have low operating and T5 Covering glass Temperature (outside)
maintenance costs and require large installation areas
I Intensity of light falling on the apparatus (W/m2)
and
NOMENCLATURE MATERIAL AND
METHODOLOGY

Fig 1: Active type solar still

Fig 3: Single slope solar still

Figure 3 presents a schematic diagram of the solar


still used in the present experimental study. It consists
of a Fiberglass basin which has an effective area of
1m2. This solar still is made of fiberglass with all
dimensions in cm as shown in figure 3. The fiber glass
sheet has a thickness of 4mm. It consists of a top cover
Fig 2: Passive type solar still of transparent fiber glass sheet with a tilt of 230 and is
high initial investments. There are two different types coated with black paint to absorb the maximum possible
of solar still, those are; active solar still and passive solar energy. This solar still faces west.
solar still. Figure 1 indicates active type solar still; which The entire assembly is made air tight with the help
contains the mechanical components like pump, valve of rubber gasket and clamps. Water enters the basin
etc. Figure 2 shows the passive type solar still; which through an inlet valve. To maintain a constant water
doesn't require any mechanical components. Among level of 5 cm, a floater is arranged inside the solar still.
active and passive solar stills passive solar still gets more The distilled water is condensed on the inner surface of
attractive compared with active solar still. Because the glass cover and runs along its lower edge. The
passive type solar still doesn't have moving elements, distillate water was collected in a bottle and measured
so no need for power consumption and no wear and by a graduated cylinder. Thermocouples were located
tear problems. So in this present work focused on at different places of the solar still to measures such as
passive solar still. outside glass cover, inside glass cover, basin water
TA Atmospheric Temperature T1 Basin temperature, vapor temperatureambient temperature
and basin temperature.In this experiment paraffin wax
Temperature
668 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

is used as phase change material. Two variants of afternoon at 12:15 P.M then it is in decreasing
paraffin wax are used with respect to different colors order.Since it was a on a partially sunny day there was
of the wax. All experiment work conducted in the month a slight variation in the intensity of light falling on the
of December on a partially sunny day here in solar still.
Hyderabad, India.
A basin of solar still has a thin layer of water, a
transparent glass cover that covers the basin and channel
for collecting the distillate water from solar still. The
glass transmits the sun rays through it and saline water
in the basin or solar still is heated by solar radiation
which passes through the glass cover and is absorbed
by the bottom of the solar still. In a solar still, the
temperature difference between the water and glass
cover is the driving force of the pure water yield. It Fig 5: Variation of Basin Temperature with Time
influences the rate of evaporation from the surface of From the figure it is seen that there is an increase in
the water within the basin flowing towards condensing the basin temperature as readings were taken at equal
cover. Vapor flows upwards from the hot water and intervals of time. As the rays fall continuously on the
condenses. This condensate water is collected through glass there is a huge increase in temperature of the glass
a channel. in the afternoon.
RESULTS AND DISCUSSIONS The increase in the temperature is seen when the
Output of a solar distillation depends on the incident wax was taken along with normal water.The increase
solar radiation. Figure 4 represents the variation of solar in the basin temperature is slightly more for the green
radiation flux with respect to time. It is observed to wax as its energy absorption and emission coefficient
increase with time up to 12:15 Noon with maximum are slightly more.
flux reaching 1156.37 W/m2. Thereafter both curves
(with and without wax) showed a decreasing trend
towards evening hours.
Radiation (I) = (154.5* Pyranometer Reading in
mV)-3.2 W/m2.

Fig.6: Variation of Water Temperature with Time

Figure 6 indicates water temperature (oC) variation


inside the solar still with respect to time.It was observed
that there was an increase of water temperature with a
maximum of around 65oC.
Paraffin wax has a property to absorb energy. Hence
when this wax was introduced there was a considerable
Fig 4: Variation of Solar Radiation with Time
change in basin water temperature with respect to the
Figure 4 shows the variation of solar radiation along original water temperature. This absorbed energy is later
the time in day. It will increasing from morning to

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 669


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

released enabling an increased amount of distilled water


collected.

Fig 9: Variation of Glass Cover outside Temperature with


Time

Fig 7: Variation of Vapor Temperature with Time Glass cover inside and outside temperatures
Vapor temperature increased as there is an continual increased with respective time with maximum
increase in atmospheric temperature and intensity of temperatures as shown in figure 8 and figure 9.
light, reaches maximum of 66.23oC with green wax and The glass temperatures increased continuously until
then falls as the intensity of light gradually fails, but the a particular point of time reaching a maximum of 50.7oC
fall is considerably less with the wax as they absorb the with green wax and then decreased
heat and releases the heat over a period of time.
CONCLUSION
The temperature of vapour inside the solar still is
observed to increase with time up to 3:30 P.M as shown Researchers working on solar energy and energy
in figure 7. storage materials need to adopt an approach to ensure
no impact on the environment and a lesser cost method.
Solar water distillation by using different types of waxes
is used to improve system performance in many thermal
engineering systems. The experimental results clearly
indicate that the wax absorbs some heat energy from
water store in them and release the stored energy
accordingly. Based on our experimental investigation
we thereby prefer green wax as the values obtained
are high compared to the normal water. The absorption
and emission coefficient are more for wax and it also
depends upon the color of the wax as the energy
Fig 8: Variation of Glass Cover inside Temperature with Time absorbed or emitted will be directly proportional to
The inner glass cover temperature increases with frequency and inversely proportional to wavelength of
increase in vapor temperature and intensity of light. So the color of wax.
there was a continual increase in the temperature
ACKNOWLEDGMENTS
attaining a maximum at 53.2oC and then a gradual
decrease but with respect to the wax the decrease in Foremost, I am thankful to Dr. A. Jaya Laxmi,
the inner glass temperature is less. Coordinator, Center for Energy Studies, JNT University
Hyderabad for giving opportunity to utilize energy
systems laboratory and Department of mechanical
engineering staff for their continues encouragement
towards research activities and preparing this paper.

670 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [7] Naga Sarada Somanchi, Ravi Gugulothu, Sri Lalitha Swathi Sagi,
Thotakura Ashish Kumar and Vijaya Koneru (2014),
[1] Hima Bindu Banoth, Bhramara Panithapu, Ravi Gugulothu, Naga "Experimental Study of Solar Water Distillation Using Epsom
Sarada Somanchi, Devender G, Devender V and Banothu Kishan, Salt as Phase Change Material", Fourth International Conference
"A Review on Performance of Solar Still with Different on Hydrology and Watershed Management, Organized by Centre
Techniques", Proceedings of International Conference on for Water Resources, Institute of Science & Technology,
Renewable Energy and Sustainable Development (ICRESS 2014), Jawaharlal Nehru Technological University Hyderabad, held on
pp: 393-398, 2014. 29th October to 1st November, 2014, pp: 470-474.
[2] Nagasarada Somanchi, Hima Bindu Banoth, Ravi Gugulothu and [8] Ravi Gugulothu, Naga Sarada Somanchi, Sri Rama Devi and
Mohan Bukya, "A Review on Performance of Solar Still Coupled Devender Vilasagarapu, "Experimental Study of Solar Still with
with Thermal Systems", Proceedings of 2014 1st International Energy Storage Material", International Conference on Industrial,
Conference on Non Conventional Energy (ICONCE 2014), pp: Mechanical and Production Engineering: Advancements and
114-118, 2014. Current Trends. Organized by Department of Mechanical
[3] Naga Sarada Somanchi, Hima Bindu Banoth, Ravi Gugulothu Engineering, Maulana Azad National Institute of Technology
and Mohan Bukya, "A Review on Parametric Performance of (MANIT), Bhopal, held on 27th - 29th November, 2014, pp:
Solar Still", International Conference on Industrial Engineering 489-494.
Science and Applications-2014 (IESA-2014), Organized by [9] Ravi Gugulothu, Naga Sarada Somanchi, R.Sri Rama Devi and
Department of Electrical Engineering, NIT Durgapur, held on Devender Vilasagarapu (2014), "Experimental Study of Solar Still
2nd to 4th April, 2014. pp: 167-172, ISBN: 978-93-80813-27-1. with Energy Storage Material", Journal of Sustainable
[4] Naga Sarada S, Banoth Hima Bindu, Sri Rama Devi R and Ravi Manufacturing and Renewable Energy, Volume 3, Number 1-2,
Gugulothu, "Solar Water Distillation Using Two Different Phase ISSN: 2153-6821, Nova Science Publishers,Inc.
Change Materials", International Mechanical Engineering [10]Ravi Gugulothu, Naga Sarada Somanchi, Sri Rama Devi R and
Congress 2014 (IMEC-2014), held at Department of Mechanical Kishan Banothu (2014), "Solar Water Distillation Using Three
Engineering, NIT Tiruchirappalli, held on 13th - 15th June, 2014. Different Phase Change Materials", Proceedings of "International
[5] Naga Sarada S, Banoth Hima Bindu, Sri Rama Devi R and Ravi Conference on Advances in Design & Manufacturing", at NIT
Gugulothu, "Solar Water Distillation Using Two Different Phase Tiruchirappalli, Tamil Nadu, India, held on 5th -7th December,
Change Materials", Applied Mechanics and Materials, Volume: 2014, pp: 961-965.
592-594, pp: 2409-2415, 2014.
[6] Naga Sarada Somanchi, Sri Rama Devi R, Hima Bindu Banoth
and Ravi Gugulothu, "A Review of Solar Water Distillation
Techniques", National Conference on Renewable and Sustainable
Energy (NURSE-2014) Organised by IST and JNTUH College
of Engineering Hyderabad, held on 27th -28th June, 2014.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 671


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

IoT Based Automatic Temperature Checker and Mask


Scanner
Sudharsan B1, Santhosh Kumar S2, Suresh V3, Sukumar K4, Sarvesh R N5, Sathurgantha K6
1,2,3,4,5,6
Mechanical Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode, India
Email: sudharsan.me19@bitsathy.ac.in1, santhoshkumar.me19@bitsathy.ac.in2, sukesh.me19@bitsathy.ac.in3,
sukumar.me19@bitsathy.ac.in4, sarvesh.me19@bitsathy.ac.in5, sathurganth.me19@bitsathy.ac.in6

Abstract- The initial phase in identifying Hindering social class transmission is the best
Coronavirus isto search for indications of fever. We approach to reducing the store on clinical consideration
actually need to watchout for everybody for a veil. systems and to keep the economy rolling. Associations
We have temperature testing frameworks for all are expected to notice standard working techniques
examining door ways, yet manual temperature
(SOPs) given by their organizations in attempts to check
checking has various disadvantages. The staff isn't
knowledgeable in the utilization of temperature
neighborhood of the disease. Regardless, there is a
scanners. When understanding qualities, there is money related impact on autonomous organizations to
space forhuman mistake. Individuals are regularly complete express SOPs and consistence rules and this
permitted sectionregardless of higher temperature is exacerbated when expected to selector re-
readings or the absence ofveils. In case directors appropriate staff people to execute consistence like
are absent, the staff might miss thefiltering. For assessing the temperature of moving toward customers
enormous groups, a manual checking gadgetisn't and ensuring genuine distance between them. As
proper. A contactless temperature scanner and a demonstrated by a report [2], one pharmacy business
veilshow are utilized in the gadget. We propose a in New South Wales (NSW), Australia, expected to
completely computerized temperature scanner and spend AUD1000-1500 consistently to higher staff for
passage supplier framework to tackle this issue.
noticing temperature and ensuring isolating.
It's a multi-reason machinethat can be utilized in
an assortment of ways. A contactlesstemperature EASEOF USE
scanner and a cover show are utilized in the gadget.
In the event that a high temperature or the short Web of things (IoT), as an engaging specialist of
fall of a veil is noticed, the scanner is connected data sharing through accessibility, is charming in clinical
straight forwardly to a human boundary, which fores benefits applications [3,4]. An advantage of this
talls passage. development is that it engages far off prosperity noticing.
Keywords- Mask detection, Temperature IoT similarly engageshuman-to-human, machine-to-
checking, Contactless. human, and machine-to-machine correspondence with
no external intervention. It can thus lybea very important
INTRODUCTION gadget in completing and noticing human social
In the current wake of the COVID-19 pandemic, correspondence during COVID-19. Safe work
thwarting or possibly limiting the neighborhood of the Australia has organized a plan[5] for privately owned
disease is a mammoth task, with governments and businesses in retail that follows working climate
associations across the world applying different securitytechniques.
techniques to bind people advancement and social "Key regions are physical separating and checking
correspondence. A result has been totally serious COVID-nineteen facet effects (likefever). We have a
monetary impacts. Another outline drove on 5800 little tendency to propose a marginal effort different for
US associations[1] gathered that 43% of associations personal firms to measure and report key COVID-19
were unexpectedly closed and falls in crafted by 40%. operating setting prosperity boundaries, for instance,

672 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

internal heat level (fever), the amount o fpeople per incoming and exiting people at the entrance and exit
square metre, and distance between individuals within points, providing a needed live of the quantity of
the line region. Besides, we have a tendency to gift a individuals per square measure. Upon cominginto the
functioning LED-based continuous declare powerfully premises, the individual is needed to answer the
administer physical removing for individuals remaining COVID-nineteen symptom-related form that is coupled
in an exceedingly line. to the dashboard. They then march on for the vital sign
Different existing works have careful executions for mensuration employing anon-contact IR temperature
COVID-19 identification and saying. planned a 5 (5) device MLX90614. Once queuing at the client service
sectionIoT-based system for early discovery of or payment counter, available LEDs WS2812B square
COVID-19 cases, utilizing constant manifestation info measure wont to visually show the permissible queuing
gathered to acknowledge associated cases with locations.
contamination. Kaplan et al. Thel ocations on the market in a very queue correlate
Executed quick screening off ever to acknowledge to the quantity of people coming in to the business area
sound and non-solid under studies in an exceedingly as an example, if solely 2 persons enter, the queue can
scholastic setting, utilizing infrared sensors introduced assign the 2 furthest apart locations attainable within
on a set frame. Temperature readings were sent the queuespace.As additional individuals enter,the
remotely to a wearable watch show for the administrator. quantity ofaccessible queuing locations updates while
For recognizing many cluster. [8] administered a camera- maintaining aminimum of one 5 m distance between
based individual together with framework in an locations. A time off light(ToF) device VL531 x at the
exceedingly library. the information on the amount of counter is employed to measure the gap of the front-
people checked was sent to a conveyable application mostindividual within the queue and provides alerts to
utilizing IoT innovation an interior IoT-based checking the individual (and the system) if minimum distance is
framework was accounted for by Petro Vic et al. desecrated.
[9]during which contactless temperature, cover, Individuals and managers should even be alerted ifthe
Associate in Nursing social removing check was dead minimum distance between individuals is desecrated
utilizing an Arduino-based mostly arrangement. within the queue. A RaspberryPi (RPi) camera lens
Current practices to ensure COVID-19 SOP camera module was wont to observe any violation in
consistence incorporate recruiting or relegating minimum distance between the queued people. The
employees to screen the inner heat level of participants available light-emitting diode strip used for permissible
and guarantee physical removing whereas earlier locations within the queue conjointly acted because the
executions think about parts ofmanifestation and standardization markers for the camera. The physical
distance checking, they do not provides a complete distance between the markers was translated to
continuous arrangement that may powerfully administer constituent distance between the 2 people. The system
participants to stay up COVID-SOP consistence. alerts if a personal strays into AN impermissible space
for over fives. As real distance mensuration isn't needed,
DESIGN this setup is enough to confirm social distancing
The setup assumes the ground area of little retail compliance."
businesses and checks for the quantity of people
enteringor going away the area, any COVID-19
symptoms beforecoming into, their vital sign, the gap
between the queuedcustomers, and distance between
the client and therefore the workplace counter,
Figure1.Infrared obstacle detectors keep a count of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 673


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig1

SETUP
"Figure 1 one presents the system device property. Fig3

This setup will add place of, or in conjunction with, PROPOSEDMETHODOLOGY


anyphysical markers or stickers presently prevailing
within the business to make sureCOVID-19 safety. In this work introduced an automated system
RaspberryPi four was started as a server to speak with forcovering several relevant aspects like Contactless
the sensors and login formation. The parameters temperature sensing, Mask detection, Automatic hand
recorded were individuals in, people out, current sanitizing aiming to increase Covid-19 entrance safety.
individuals, total individuals count/day, violations within It is a purely automated system. No one is allowed to
the queue, and also the individual temperature reading enter if they didn't wear mask and has high temperature.
was communicated through sockets. The information Buzzer will alert the security of this situation if any
collected was then uploaded on issue Speak [10] daily. fail-safe condition is found. Additionally, if they have
This info is thenretrieved for auditing, monitoring, and high temperature the message will be sent to the
coming up with functions. The dashboard was designed Covid19 health canter. Initially PIR sensor identify the
to be compatible with mobile, tablet, desktop person by the motion. Using temperature sensor, the
computers. temperature of the person is detected and if it exceeds
temperature limit a alert message is send. The alert
message send byWi-Fi module ESP8266. Parallelly the
camera captures the image.

Fig2

674 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The image processed using Viola Jones technique associated with that image. Nowadays, image
using Open CV and tensor flow, the classification processing is among rapidly growing technologies. It
between the person wearing mask or not is verified. forms core research area within engineering and
The proximity sensor detects the hand of a person computer science disciplines too. Image processing
places his/her hand under the sanitizer and it dispenses basically includes the following three steps: • Importing
the sanitizer accordingly. Each process of the proposed the image via imageacquisition tools; • Analysing and
work is explained in briefly in the following section. Fig.1 manipulating the image;
Flow Chart of the Proposed System. Output in which result can be altered image or report
A. PERSONDETECTION that is based on image analysis. There are two types of
methods used for image processing namely, analogue
Person detection is the process of identifying a and digital image processing. Analogue image processing
human's presence at the entrance. It is achieved using can be used for the hard copies like printouts and
the Passive Infra Red sensor(PIR). When a person is photographs. Image analysts use various fundamentals
detected the PI R sensor gives the output as 1. When a of interpretation while using these visual techniques.
person is not detected it gives the output as 0. Digital image processing techniques help in manipulation
B. TEMPERATURE CHECK of the digital images by using computers.The three 34
general phases that all types of data have to undergo
When a person is detected then the temperature of
while using digital technique are pre-processing,
the person is checked using mlx 90614 sensor. If the
enhancement, and display, information extraction.
temperature is above 1000 F then an alert message is
sent to the COVID Centre. If the temperature is below FACIALRECOGINATION
1000F then the person is checked for facemask. Facial recognition could be a method of recognizing
C. ALERT TO COVID CENTRE ESP an individual's face through technology. A biometric
identification system uses Biometrics to map facial
8266 module isused to send the message to COVID
expression from a photograph or video. It compares
Centre.
the knowledge with a information of well-known.
D. FACE MASK DETECTION Faces to seek out a match. biometric identification
When the temperature is below 1000F the will facilitate verify identity.
facemaskis detected using camera's input. For checking • Operating method of biometric identification
the facemask of a person, we use deep learning with
image processing using python. The code is flashed Step1.An image of face is captured from a
inside the RaspberryPi module. photograph or video. Face would possibly seem alone
or during a crowd. The image may show you wanting
E. ALERTINGSYSTEM straight ahead or nearly in profile.
If the facemask is not worn by the person then the Step2.Biometric identification software package
buzzer supply is turned on by the Raspberry Pi. The reads the pure mathematics of the face. Key factors
buzzer will ring until the facemask is worn. embrace the space between your eyes and also the
distance from forehead to chin. The software package
IMAGE PROCESSING
identifies facial landmarks-one system identifies sixty-
Image processing is a method to perform some eight of them-that area unit key to characteristicy our
operations on an image, in order to get an enhanced face. The result: the facial signature.
image or to extract some useful information from it. It is
Step3.Facial signature-a mathematical formula-is
a type of signal processing in which input is an image
compared to a information of well-known faces.
and output may be image or characteristics/features

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 675


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Step4.A determination is created. The faceprint FEATURES AND FUNCTIONS


could match that of a picture during a biometric • Mobile style for versatile placement in or ahead of
identification system database. buildings
• 7 in. bit screen with intrinsically thermal and video
cameras (temperature measure exactness ±zero,3°C)
• Easy plug-and-play installation mistreatment regular
power and network connections
• All parts square measure information science capable
• Voice management with extra visual prompts to make
sure correct face position (lower show unit)
• Facemask recognition will be disabled PRN
• Integrated management contact for machine-driven
propulsion of gate gates, doors,barriers,etc.
• Package includes IP- based question terminal with
TFT bit screen for user interaction and visual display
unit

KEY BENEFITS:
• Fully machine-driven observation of compliance with
mask and blood heat needs IMPLEMENTATIONANDRESULTS
• Reliable detection inside seconds To test the credibleness of the proposition, research
• Contact surfaces (touch screen) square measure laboratory house was utilized to line up sensors in
straight forward to wash and make clean keepingwith the look. Raspberry Pi was organized to
• Customizable system response and audio/video run on associate categorical(Node.js) web server
communication just in caseof non-compliance associated categorical was utilized as an attachment
employee. Agraphical information dashboard was
• Touch screen with obvious audio/video interaction for planned in Bootstrap five Alpha that shows device info
guiding users through the whole scanning method and cautions of any infringement. Bootstrap provides a
• Saves workers resources free and compelling structure to execute sites or
• Avoids potential hygiene and information privacy risks, graphical formats for low force processors [11]. The
because of totally machine-driven, information employee was organized to transfer the recovered
protection compliant technology information to issue Speak [10] on regular schedule.
explicit device hubs were designed as remote hubs

676 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

utilizing ESP8266 and sent info to the Pi employee inprogress knowledge remotely to a dashboard which
utilizing Web Socket correspondence convention. This may be used to screen and aid COVID-19 SOP.
convention builds up full-duplex correspondence and The framework is as of currently restricted to
sets up a diligent association over transmission visualize distance infringement simply within the
management convention(TCP) among employee and predefined territory (i.e.,line). Future endeavours are
client. the 2 IR sensors were set at the passage wayat engaged to grow the location for the whole floor
at allness of one meter ranging from the earliest stage territory, contact following, and backing for further lines.
(3a) and also the individual dump (in andout) was sent The framework is broadened effectively with negligible
to the graphical dashboard. In lightweight of that IR time and is speedily versatile to numerous circumstances.
sensor-external or internal-identified the impediment 1st,
the counter was inflated or decremented. In lightweight
of the contributions from these sensors,boundaries, for
instance, people in, people out, current people check,
and absolute footstep day after day were started.
The temperature device was settled before long
when the passage at a stature of one.2 m. Approaching
individuals were required to place their brow close to
the device and also the temperature studying was
recorded and shipped off the employee. to ensure the
correct distance was maintained once utilizing the
device, associate IR snag location switchwas utilized
and acclimated to figure within a two cm- 5cm vary (as
determined by the IR temperature device datasheet). REFERENCES
At the purpose once the member was within thisreach, 1. Pang,Z. Technologies and architectures of the Internet-of-Things
an inexperienced lightweight turned on demonstrating (IoT) for health and well-being. Ph.D. Thesis, KTH Royal
Institute of Technology, Stockholm, Sweden, January2013.
the correct distance. The temperature device utilized
will quantify contactless temperature with 0.5-degree 2. Kumar, K.; Kumar, N.; Shah, R. Role of IoT to avoid spreading
of COVID-19. Int. J. Intell. Netw. 2020, 1,32-35,doi:10.1016/
uranologers' truth [12]. The limit for the brow estimation j.ijin.2020.05.002.
of the IR device was set at daily and a 0.5uranology's 3. S a f e w o r k A u s t r a l i a . A v a i l a b l e o n l i n e : h t t p s : / /
to require into consideration the estimation website www.safeworkaustralia.gov.au/sites/default/files/2020-06/
selection [13]. An amount of flight device (Figure3b) COVID-19_Workplace-Checklist_12June2020.pdf(accessedon
16 October2020).
was set at a 1-m vary ranging from the earliest stage
acknowledge min distance infringement of the front of 4. Otoom, M.; Otoum, N.; Alzubaidi, M.A.; Etoom, Y.;Banihani,
R . A n I o T- b a s e d f r a m e w o r k f o r e a r l y i d e n t i f i c a t i o n
theroad. The device was set as a parallel device during andmonitoringofCOVID-19 cases.Biomed. Signal Process.
this manner presumably handing-off information once Control2020,62,102149,doi:10.1016/j.bspc.2020.102149.
the gap limit was crossed. the gap was endlessly 5. K a p la n , R . B. ; J o h n so n , T. M. ; S c h n ei d e r, R .; K r i s h n a n ,
determined and answered to the dashboard. S.M.ADesignforLowCostandScalableNon-ContactFever
Screening System. J. ASEE Annu. Conf.Expo.2011, doi:10.18260/
CONCLUSION 1-2-17316.
6. Sabancý, K.; Yigit, E.; Üstün, D.; Toktaº, A.; Çelik, Y.Thingspeak
A powerful account guarantee COVID-19 security BasedMonitoringIoTSystemforCounting People in A Library.
consistence is introduced during this work. The In Proceedings of the2018 International Conferenceon Artificial
framework depends on open supply programming and Intelligence and Data Processing (IDAP), Malatya,Turkey, 28–
30September2018; pp.1–6,doi:10.1109/IDAP.2018.8620793.
customarily accessible sensors to form AN ease and
easy to rearrange and redo started. It transfers valuable

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 677


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Finite Element Analysis of Fatigue Strength of


Fabricated Aluminium 5000 Series Alloy Using ANSYS
Software
Sasidhar Gurugubelli1, Tirupathi Tirlangi2, Avinash Vemmala3
1,2,3
Mechanical Department, GMR Institute of Technology, Rajam, India
Email: sasidhar.g@gmrit.edu.in1, tirlangitirupathi@gmail.com2, 16341a03b3@gmrit.edu.in3

Abstract- The aluminium-magnesium (Al-Mg) tensile strength, elongation, and fatigue life [1-5].
alloys typically contain between 0.5 to 13% Estimating the material life based on the operating
magnesium, with smaller additions of other conditions is critical. Material life is determined by design
elements. The magnesium provides substantial assumptions, material properties, and loading
increases in strength. In the automotive and
circumstances. Fatigue is responsible for 90 percent of
aerospace industries aluminium alloys are widely
used and as can be heat treated to enhance the
structural element degradation. Fatigue is the primary
properties of strength and corrosion resistance failure mechanism in many cases, consisting of initiation,
while maintaining low weight. The goal of this paper propagation, and final fracture [6]. Casting, welding,
is to prepare aluminium alloy in well-equipped and machining procedures may increase the importance
furnaces under the right thermal conditions to of the propagation phase by introducing minor flaws
achieve the needed temperature, and to create that act as local stress concentrators [7-8]. Micro voids,
aluminium alloy (5000 series) by sand casting to non-metallic inclusions, surface roughness, sudden
obtain the desired specimen. Variable percentages changes in cross-section, quenching fractures, and
of aluminium 88% and magnesium 12% by weight grinding cracks are examples. As a result, fracture
fraction were used to make the specimens. In this formation is aided by elements such high temperature,
study, the fatigue analysis of Al-Mg specimens is
corrosion, excessive loading, residual stresses, stresses
carried out using Ansys Workbench. Specimen was
subjected to fatigue analysis using and its
under combination loadings, stress concentrations,
performance was observed. The safe design life of surface quality, and metallographic structure.
the material is determined in the analyses for II. CALCULATIONS FOR FATIGUE LIFE
loadings in the elastic region.
Material fatigue is a phenomenon where structures
Keywords- Aluminium 5000 alloy, Fatigue
strength, ANSYS analysis)
fail when subjected to a cyclic load. This type of
structural damage occurs even when the experienced
I. INTRODUCTION stress range is far below the static material strength.
Aluminum alloys that have been age hardened are Fatigue is the most common source behind failures of
extremely useful in technology. In particular for building mechanical structures. The process until a component
and construction, automotive, cryogenic, marine finally fails under repeated loading can be divided into
applications, when relatively moderate strength, good three stages:
corrosion resistance and high toughness are required in 1. During a large number of cycles, the damage develops
conjunction with good formability and weldability, on the microscopic level and grows until a
aluminium alloys with Mg as alloying element (Al-Mg, macroscopic crack is formed.
5xxx aluminium series alloys) are used. Initial melt quality 2. The macroscopic crack grows for each cycle until it
and process design have a significant impact on the reaches a critical length.
mechanical properties of cast aluminium alloys, such as

678 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3. The cracked component breaks because it can no B. Low-Cycle Fatigue and High-Cycle Fatigue
longer sustain the peak load.
Fatigue analysis is not always based on a stress
A. Selecting Fatigue Variables response. This branch, however, has historically
received much attention since the majority of research
Under the influence of a nonconstant external load,
has been performed in regimes where stress-based
the state in the material also varies with time. The state
models are useful. Based on the number of load cycles
at a point in the material can be described by many
needed to produce a crack, it is customary to make a
different variables such as stress, strain, or energy
distinction between low-cycle fatigue (LCF) and high-
dissipation. The fatigue process is typically viewed as
cycle fatigue (HCF). The limit between the two is not
controlled by a specific such variable. A load cycle is
distinct, but it is typically of the order of 10,000 cycles.
defined as the duration from one peak in the studied
The physical rationale is that in the case of HCF, the
variable to the next peak. In a general case, all cycles
stresses are low enough that the stress-strain relation
do not have the same amplitude. For a superficial
can be considered elastic. When working with HCF,
discussion, it can, however, be assumed that the fatigue-
the stress range is usually used for describing the local
controlling state variable has the same value at the start
state. For LCF, meanwhile, strain range or dissipated
and end of each load cycle. In elastic materials, a cyclic
energy are common choices [9].
load causes a periodic-cyclic stress response. For such
cases, the load cycle is easily defined. This is illustrated C. Fatigue Models
by the Fig. 1, where stress is the fatigue-controlling state
Stress-life (S-N) method:
variable.
Materials fatigue performance is commonly
characterized by an S-N curve, also known as a Wohler
curve. This is often plotted with the cyclic stress (S)
against the cycles to failure (N) on a logarithmic scale.
S-N curves are derived from tests on samples of the
material to be characterized (often called coupons or
specimens) where a regular sinusoidal stress is applied
by a testing machine which also counts the number of
cycles to failure. This process is sometimes known as
Fig. 1. Common variables used for fatigue prediction
coupon testing. For greater accuracy but lower
The stress varies between a maximum stress,max, generality component testing is used. Each coupon or
and a minimum stress, min, during a load cycle. In the component test generates a point on the plot though in
field of fatigue, the variation in stress is often defined some cases there is a run out where the time to failure
using the stress amplitude, a, and the mean stress, m. exceeds that available for the test (see censoring).
Further, variables defining the stress range, R, and the Analysis of fatigue data requires techniques from
R-value are frequently used to describe a stress cycle. statistics, especially survival analysis and linear
The most important parameter for the fatigue damage regression.
is the stress amplitude. For any detailed analysis, the The progression of the S-N curve shown in Fig. 2
mean stress, however, must be taken into account as can be influenced by many factors such as stress ratio
well. A tensile mean stress increases the sensitivity to (mean stress), loading frequency, temperature,
fatigue, whereas a compressive mean stress allows for corrosion, residual stresses, and the presence of
higher stress amplitudes. notches. A constant fatigue life (CFL) diagram is useful
for the study of stress ratio effect. The Goodman line is
a method used to estimate the influence of the mean
stress on the fatigue strength.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 679


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A. Sand Moulding
Sand casting is a method of producing metal
components with complex shapes. The process cycle
we followed for sand casting consists of six main stages,
mainly Mold-making, Clamping, Pouring, Cooling,
Removal and Trimming shown in Fig. 4.

Fig. 2. S-N curve for aluminum with an ultimate tensile


strength of 320 MPa

A Constant Fatigue Life (CFL) diagram is useful for


stress ratio effect on S-N curve. Also, in the presence
of a steady stress superimposed on the cyclic loading,
the Goodman relation can be used to estimate a failure
condition. It plots stress amplitude against mean stress
with the fatigue limit and the ultimate tensile strength of
the material as the two extremes. Alternative failure
Fig. 4. Casting (a) Pouring of hot Molten metal (b) Round Al-
criteria include Soderberg and Gerber. Mg rod,

The stress level  is usually described by the stress B. Machining of the specimen
ratio R and the stress amplitude a.
The final specimen is reduced to the appropriate
(1) diameter after it is obtained from the sand casting with
a 20 mm diameter in accordance with ASTM E606
(2) standard [11]. We started by machining on a standard
hand lathe machine to meet this need. Using a lathe
(3) machine, the 20 mm diameter was lowered to 14 mm.
The specimens were then taken to the CNC Lathe and
III. PREPARATION OF THE SPECIMEN
reduced to the size depicted in Fig. 5 with a regular
We wanted to mix the two components in different surface finish.
compositions to make an aluminium alloy based on the
Specimens were loaded into a Siemens Computer
Aluminum 5000 series, which is a mixture of aluminium
Numerical Control (CNC) Lathe Machine; we built a
and magnesium. We mixed the proportions for
programme with conventional dimensions, and the
Aluminium-88 % and Magnesium-12 % for this
finished specimen after CNC machining is shown in Fig.
composition depicted in the Fig. 3.
6.

Fig. 5. Standard ASTM E606 Specimen dmensions.

Fig. 3. Pure Aluminium and Magnesium powder for mixing.

680 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 6. Final specimens after CNC Machining. Fig. 7. Fatigue stremgth analysis for 500 N in ANSYS

Fig. 8 shows fatigue life obtained from an applied


IV. FATIGUE ANALYSIS USING ANSYS
load of 500 N. For this load the specimen diameter
SOFTWARE
was 8 mm, Gauge length was 60 mm and applied force
ANSYS software was used to generate a model of was 500 N, giving maximum life of 1×108 cycles.
the specimen for fatigue study. The real dimensions of
this specimen is shown in Fig. 5. The rod bar was
circular in shape with a designated region where an
enhanced concentration of stress and the formation of
a fatigue fracture were expected. The ends of this model
were loaded by reversed bending moment on the one
side and by reversed torsion moment on the opposite
site. The values of presented stresses and strains in the
middle of the rod radius were taken from computational
analysis using finite element method. We used the same
material parameters in finite element model as are shown
in Table I. Fig. 8. Fatigue life estimation for 500 N in ANSYS
TABLE I. MECHANICAL PROPERTIES OF AL-MG ALLOYS
B. Applying load of 1000 N
Al-Mg Alloy
Aluminium - 88%
Content
Magnesium – 12%
Preparation Sand Casting
Tensile yield strength 150 Mpa
Ultimate Tesile strength 250 Mpa
Elongation 5%

A. Applying load of 500 N


Fig. 7 shows damage obtained from an applied load
of 500N. For this load the specimen diameter was 8
mm, Gauge length was 60 mm and applied force was
500 N, giving maximum failure at 178.11 MPa.
Fig. 9. Fatigue stremgth analysis for 1000 N in ANSYS

Fig. 9 shows damage obtained from an applied load


of 1000N. For this load the specimen diameter was 8
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 681
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

mm, Gauge length was 60 mm and applied force was


1000 N, giving maximum failure at 59.353 GPa.

Fig. 12. Fatigue life estimation for 1500 N in ANSYS

D. Applying load of 2000 N


Fig. 13 shows damage obtained from an applied
Fig. 10. Fatigue life estimation for 1000 N in ANSYS
load of 1500N. For this load the specimen diameter
Fig. 10 shows fatigue life obtained from an applied was 8 mm, Gauge length was 60 mm and applied force
load of 1000 N. For this load the specimen diameter was 2000 N, giving maximum failure at 1×1032 Mpa.
was 8 mm, Gauge length was 60 mm and applied force
was 1000 N, giving maximum life of 1×108 cycles.
C. Applying load of 1500 N
Fig. 11 shows damage obtained from an applied
load of 1500N. For this load the specimen diameter
was 8 mm, Gauge length was 60 mm and applied force
was 1500 N, giving maximum failure at 1×1032 Mpa.

Fig. 13. Fatigue stremgth analysis for 2000 N in ANSYS

Fig. 14 shows fatigue life obtained from an applied


load of 500 N. For this load the specimen diameter
was 8 mm, Gauge length was 60 mm and applied force
was 2000 N, giving maximum life of 1×108 cycles.

Fig. 11. Fatigue stremgth analysis for 1500 N in ANSYS

Fig. 12 shows fatigue life obtained from an applied


load of 500 N. For this load the specimen diameter
was 8 mm, Gauge length was 60 mm and applied force
was 1500 N, giving maximum life of 1×108 cycles.

Fig. 14. Fatigue life estimation for 2000 N in ANSYS

682 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

V. CONCLUSIONS [3] Anil K, Santosh K, N.K. Mukhopadhyay, "Introduction to


magnesium alloy processing technology and development of low-
• Round specimens of aluminium 5000 series alloy are cost stir casting process for magnesium alloy and its composites"
successfully cast and machined. Journal of Magnesium and Alloys, Vol. 0, pp. 1-10, 2018.
[4] J Hirsch, T Al-samman, "Superior light metals by texture
• To study the stress analysis at the fracture surface, engineering: Optimized aluminum and magnesium alloys for
finite element method (FEM) was employed. ANSYS automotive applications" Acta Materialia, Vol. 61, pp. 818-843,
program version R19.2 was used to check the 2013.
calculated fatigue results. [5] David Weiss, "Advances in the Sand Casting of Aluminium
Alloys" Chapter, researchgate.net, January 2018.
• There are three parts to a fatigue analysis: materials,
analysis, and outcomes. [6] Milan Sága, Peter Kopas, and Milan Uhríþík, "Modeling and
Experimental Analysis of the Aluminium Alloy Fatigue Damage
• Smooth fatigue specimens with varied loadings (500N, in the case of Bending - Torsion Loading" Procedia Engineering,
vol. 48, pp. 599-606, December 2012.
1000N, 1500N, and 2000N) were modelled, element
meshes were created, and a boundary condition [7] Liu Gang, Shao Yong, "Fatigue Life Calculation of Shaft System
corresponding to maximum loading condition was Based on Bend-Torsion Coupling" IOP Conf. Ser.: Mater. Sci.
Eng., vol. 569, 2019 [AMIMA].
given in a stress-life technique for conducting a
fatigue study. [8] L.P.Borrego, L.M.Abreu, J.M. Costa and J.M.Ferreira, "Analysis
of low cycle fatigue in AlMgSi aluminium alloys" Engineering
• It has been discovered that the life prediction by FEA Failure Analysis, vol. 11, pp. 715-725, 2004.
simulation is satisfactory for a variety of stress [9] Sasank S. P., Jagdeep G., Udit Kumar and Saichandan Sahoo,
amplitudes and cycle counts. "Modeling and Fatigue Analysis of Automotive Wheel Rim"
International Journal of Engineering Sciences & Research
REFERENCES Technology, Vol. 5, Issue 4, pp. 428-435, April 2016.

[1] John Campbell, "A Personal View of Microstructure and [10] Shahan Mazlan et. al., "Experimental and Numerical Analysis
Properties of Al Alloys" Materials, 14, 1297, March 2021. of Fatigue Life of Aluminum Al 2024-T351 at Elevated
Temperature" Matals, 10, 1581, 2020.
[2] Sasidhar Gurugubelli, Fathimunnisa Begum, "Experimental
Tensile Strength Characterization of Metal Matrix Composite [11] American Society for Testing and Materials. Standard test
Aluminum-6069 Percentage Variation Reinforced with method for measurements of fatigue crack growth rates. Annual
Molybdenum and Coconut Shell Ash" International Journal of Book of ASTM Standards 2000: Volume 03.01, ASTM E 647.
Scientific & Technology Research, Vol. 9, Issue 2, pp. 803-808, p. 591-630.
February 2020.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 683


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fluid Flow and Heat Transfer Over a Double Forward-


Facing Step With Obstacles
Sri Ram Deepak Akella1, Satish Geeri2
1
Department of Mechanical Engineering, Pragati Engineering College, Kakinada, Andhra Pradesh, India
2
Faculty of Mechanical Engineering, Pragati Engineering College, Surampalem, Andhra Pradesh, India
Email: sriramdeepak.11@gmail.com1, gsatish323@gmail.com2

Abstract- In this paper, a study of CFD has been 2. LITERATURE REVIEW


implemented over a Double facing step with
obstacles having a rectangular cross-section area The Analysis of turbulent flow and heat transfer over
with a different aspect ratio that is placed before a double forward-facing step with obstacles and
the inlet with different distances from an inlet (i.e., concluded that aspect ratio increases will increase
h and 2h). The numerical solution of continuity, turbulence and kinetic energy Hakan F. Oztop [1] study
momentum, and equation was solved by using a on laminar assorted convection flow over backward
commercial code that uses the finite volume and forward-facing step has been performed by Abu-
technique. The effect of turbulence was modeled Mulaweh [2]. Turbulent forced convection heat transfer
by using a K-? model. With an l/h ratio is equal to for double forward facing step flow is intentional with a
10 and an overall length of 1.6m and an inlet of the mathematical method by Yilmaz and Oztop [3]. The
length 0f 0.1m with a height of the step as 0.02.
bottom barrier of the channel is heated at unbroken
The effect of step height, obstacle aspect ratio and
distance, and Reynolds number on the flow and heat
temperature and the flow temperature at the upriver is
transfer are investigated. colder than that of the wall. It is found that the second
step can be used as switch limit for heat and fluid flow.
Keywords-heat transfer, fluid flow Double Nassab et al. [4] made a cunning on 7 turbulent flows
Forward-Facing step, obstacles, ANSYS analysis)
with heat handover a single forward-facing step. The
1. INTRODUCTION k- model is employed for computation of turbulence
oscillation. They found that the coefficient of heat
Turbulent put on convection flow in a channel with
transfer and also the hydrodynamic behavior of the flow
backward or forward-facing steps made the fear of
are strongly dependent to step length and proclivity
researchers in recent years. Such flows are widely
angle. A mathematical exploration of entropy peers in
implemented in many engineering and industrial
laminar forced convection of gas flow over a recess
purposes such as gas turbines, heat exchangers,
together with two inclined backward and forward-facing
combustion chambers, and cooling of electronic
steps in a horizontal conduit under hemorrhage ailment
devices. The flow over a forward-facing step (FFS)
is offered by Bahrami and Nassab [5]. Abu-Mulaweh
has more complexities than that of a backward-facing
[6] made a study on heat allocation and fluid flow of
step (BFS) due to the manifestations of more untying
turbulent assorted convection boundary-layer air flow
zones for the same flow conditions. The improvement
over an isothermal two-dimensional, vertical forward-
of heat transfer is expected to be improved in FFS.
facing step. In his occasion, the upriver and downriver
The size and strength of recirculation zones adjoining
ramparts and the step itself were heated to an unchanging
the two steps are critical for heat transfer augmentation.
and fixed temperature. He found that the turbulence
Thus, a stab is made to insert two rectangular hitches
concentration of the streamwise and diagonal velocity
mounted evenly near the two step.
oscillations and the intensity of temperature rise and fall
downstream of the step intensification as the step height
increases. The separation ahead of a forward-Facing

684 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

step was scrutinised by Stüer et al. [7] further down


laminar flow conditions using the hydrogen bubble
technique to visualize and PTV to demonstration the
3D velocity pitch in a Eulerian depiction in the vicinity
of the step. An experimental investigation of the
recirculation zone obtained downstream of a forward-
facing step engrossed in a turbulent boundary layer is
made by Sherry et al. [8]. They conferred the devices
affecting the reattachment reserve, namely the turbulent
fraternisation within the boundary layer and the velocity Fig 1: model-1a
shortfall in the boundary layer. A straight wall jet invading
against a forward-facing step in a crossflow is
scrutinized by Langer et al. [9]. An experimental modus
operandi is favored by using planar laser induced
fluorescence (PLIF). It is found that the entrainment
coefficients, for elliptical jet situation had mean value of
0.15 and 0.58. Atashafrooz et al. [10] worked on
entropy generation in laminar forced convection of gas
flow over a respite together with two inclined regressive Fig 2: model 1- b

and advancing facing steps in a level duct under


inclination condition. Supplementary correlated studies
on forward facing step flow can be found in literature
[11-19].
3. PHYSICAL PROBLEM
The considered tricky is illustrated schematically in
Fig. 1 to 4. It is a channel with a double forward facing Fig 3: model 2-a
(FFS). The top wall is insulated while the bottom wall
and steps have a constant temperature (Th) which is
hotter than the cove flow temperature. The height of
the double forward facing step (FFS) is 0.02m and the
overall height old the channel is 0.1m and the length
1.6 m
The following data is for the obstacles
Table 1: obstacles data Fig 4: model 2-b

Case Aspect Height Length Distance


ratio (L: B) from inlet
Model-1a 06:01 0.01 0.06 0.02
Model-1b 08:01 0.01 0.08 0.04
Model-2a 06:01 0.01 0.06 0.02
Model-2b 08:01 0.01 0.08 0.04

Fig 5: 2d surface modelled design for model 1a

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 685


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

At outlet: outflow is imposed,


p= 101,325 Pa.
At the walls: no slip boundary conditions are
considered. The bottom wall and steps are maintained
at constant hot temperature (T=Th= 313 K) while the
top wall is insulated
3.3. The mesh setting are as follows:
Fig 6: mesh model of model 1-a
Use advanced size function: proximity and
Each and every design is done by the solid works
curvature
and simulation is done in Ansys software
Relevance center: fine
3.1. Mathematical model and numerical
analysis: Initial size seed: active assembly

The governing equations of the continuity, momentum Smoothing: high


and energy for fluid flow and heat transfer are described Curvature: 18.0°
as follows. Proximity accuracy: 0.5
Num cells across gap: 3
Min size: 2.3403e-04
proximity Min size: 2.3403e-04
max face size: 1e-02m
max size: 1e-02m
growth rate: 1.20m
The effect of turbulence was modeled by using a k-
 model. This model consists of two transport minimum edge length 1e-02m
equations, one for the turbulence kinetic energy and
I. 3.4.SIMULATION:
the other for the dissipation of turbulence kinetic energy
time is steady time;
with k- model with the enhanced wall whose is
simulated with 10,000 iterations
II. 4. RESULT & DISCUSSION:
A numerical study was performed for turbulent flow
and heat transfer double FFS with obstacles. The
working fluid is water with different modules and
observed the pressure, temperature and velocity of the
different models with re = 30,000 and 1,00,000 and
3.2. Boundary conditions: results as follow

At inlet: Reynolds number,


Tin=293 K

686 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4.1.Pressure:

Fig 7: pressure plot at different distance at re of 30,000

Fig 8: pressure plot at different distance of 1,00,000

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 687


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4.2.Velocity:

Fig 9: velocity plot at different distance of re=30,000

Fig 10: velocity plot at different distance of re=1,00,000

688 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4.3.Heat variation in different model

Fig 16: temperature variation in model 1-b for 1,00,000

Fig 11: temperature variation in model-1a for re= 30,000

Fig 17: temperature variation in model 2-a for 1,00,000

Fig 12: temperature variation in model-1b for re=30,000

Fig 18: temperature variation in model 2-b for 1,00,000

The figure 7 and 8 are the pressure plot at different


distance and concluded that the pressure will gradually
drop in case of the flow model 1-a has lowest pressure
and highest pressure among the model.
Fig 13: temperature variation in model 2-a for=30,000
The fig 9 and 10 represent the velocity plot at
different distance and concluded that initial the velocity
at the place of the obstacles the velocity will increased
and again get decreased and again decreases and get
increases. For re=30,000 the velocity of out let is hight
for model 2-a and second nearly for model 1-a and
For re=1,00,000 the velocity of the outlet is more at
the for model 1-a and second for model 2-b.
Fig 14: temperature variation in model 2-b for re=30,000 The fig 11 to 18: is temperature variation of the
temperature over the re= 30,000 and 1,00,000 is
displayed
III. 5. CONCLUSIONS:
The turbulent flow and heat transfer for a channel
two forward set flow with rectangle obstacles have been
numerically studied 4 cases with two remolds number
were studied. The obtained results show that the
Fig 15: temperature variation in model 1-a for re=1,00,000

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 689


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

obstacles for model 1&2 - b which means the distance [9] D.C. Langer, B.A. Fleck, D.J. Wilson, Trajectory measurements
of a wall jet impinging onto a forward-facing step entering a
from the inlet is of distance of 2h will give more exist cross-flow, Journal of Hazardous Materials 176 (2010) 199-
velocity and the pressure difference form the re = 206.
30,000 is normal decreases gradually decrease for the [10] M. Atashafrooz, S.A.G. Nassab, A.B. Ansari, Numerical
re = 1,00,000 the pressure will suddenly be dropped investigation of entropy generation in laminar forced convection
and then gradually decreases flow over inclined backward and forward-facing steps in a duct
under bleeding condition, Thermal Science (2012),
IV. 6.REFERENCES [11] H. Hattori, Y. Nagano, Investigation of turbulent boundary layer
over forward-facing step via direct numerical simulation,
[1] Hakan F. Oztop et al had conducted a review of Analysis of International Journal of Heat and Fluid Flow 31 (2010) 284-294.
turbulent flow and heat transfer over a double forward-facing
step with obstacles International Communications in Heat and [12] D. Wilhelm, C. Hartel, L. Kleiser, Computational analysis of
Mass Transfer 39 (2012) 1395-1403 Available online 21 July the two-dimensional- three-dimensional transition in forward-
2012 facing step flow, Journal of Fluid Mechanics 489 (2003) 1-27.
[2] H.I. Abu-Mulaweh, A review of research on laminar mixed [13] R. Camussi, M. Felli, F. Pereira, G. Aloisio, A.D. Marco,
convection flow over backward-and forward-facing steps, Statistical properties of wall pressure fluctuations over a forward-
International Journal of Thermal Sciences 42 (2003) 897-909. facing step, Physics of Fluids 20 (2008) 075113-1-075113-13.
[3] I. Y?lmaz, H.F. Oztop, Turbulence forced convection heat transfer [14] J.G. Barbosa-Saldana, N.K. Anand, Flow over a three-dimensional
over double forward facing step flow, International horizontal forward-facing step, Numerical Heat Transfer, Part
Communications in Heat and Mass Transfer 33 (2006) 508-517. A: Applications 53 (2008) 1-17.
[4] S.A.G. Nassab, R. Moosavi, S.M.H. Sarvari, Turbulent forced [15] H.I. Abu-Mulaweh, B.F. Armaly, T.S. Chen, Measurements of
convection flow adjacent to inclined forward step in a duct, turbulent mixed convection flow over a vertical forward-facing
International Journal of Thermal Sciences 48 (2009) 1319-1326. step, In: ASME Proceedings of the Summer Heat Transfer
Conference, Las Vegas, Nevada, 2003, CD-ROM.
[5] A. Bahrami, S.A.G. Nassab, Study of entropy generation in laminar
forced convection flow over a forward-facing step in a duct, [16] H. Stüer, Investigation of separation on a forward facing step,
International Review of Mechanical Engineering 4 (2010) 399- PhD thesis, Swiss Federal Institute of Technology, Zürich, 1999.
404.
[17] K. Abe, T. Kondoh, Y. Nagano, A new turbulence model for
[6] H.I. Abu-Mulaweh, Turbulent mixed convection flow over a predicting fluid flow and heat transfer in separating and reattaching
forward-facing step - the effect of step heights, International flows - I. Flow field calculations, International Journal of Heat
Journal of Thermal Sciences 44 (2005) 155-162. and Mass Transfer 37 (1994) 139-151.
[7] H. Stüer, A. Gyr, W. Kinzelbachv, Laminar separation on a [18] Y.T. Chen, J.H. Nie, B.F. Armaly, H.T. Hsieh, Turbulent separated
forward-facing step, European Journal of Mechanics - B/Fluids convection flow adjacent to backward?facing step-effects of step
18 (1999) 675-692. height, International Journal of Heat and Mass Transfer 49 (2006)
3670-3680.
[8] M. Sherry, D. Lo Jacono, J. Sheridan, an experimental investigation
of the recirculation zone formed downstream of a forward-facing [19] B.E. Launder, D.B. Spalding, The numerical computation of
step, Journal of Wind Engineering and Industrial Aerodynamics turbulent flows, Computer Methods in Applied Mechanics and
98 (2010) 888-894. Engineering 39 (1974) 269-283.

690 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Microstructure Analysis of the Surface Coated with TiN


in Aluminium Alloy 2024 Grade by using Physical
Vapour Deposition Method
C.Sangeevi1, Dr. A. Arun Negemiya2, A Syed Ismail3, K.S. Athiabiraman4, B. Arunkumar5
1
Assistant Professor, 2,3,4,5UG Student
1,2,3,4,5
Mechanical Department, Sri Shakthi Institute of Engineering & Technology, Coimbatore, India
Email: sangeevi28@gmail.com1, arunnegemia@gmail.com2, syedismail@gmail.com3, athiabiramanks622@gmail.com4,
anaasdapper@gmail.com5

Abstract- The Aluminium Alloy 2024 grade tends frequent maintenance to keep the surface of the
to corrode the surface of the material, because it materials. The commonly used Aluminium alloy has the
having copper content, it will undergo severe attribute of not being able to tolerate high-temperature
corrosion. Normally these types of Aluminium resistance while also having a low wear resistance.
grade are applied in the building of the body of the
Aluminium alloy 2024 is available in both the forms of
aircraft. The main drawback of this material is after
the painting, it has to be frequently painted to
plates and in the forms of the sheet; the plates are used
decrease the corrosion, for those aerospace in the application of the fuselage structures, whereas
industries have to spend more amounts for the the sheets are used in the forms of fuselage skins. In
painting. In this work, we concentrated to get the this study we use Titanium Nitride (TiN) as a coating
better strength of Aluminium alloy 2024 grade by the surfaces of the Aluminium Alloy 2024, the TiN will
reducing the corrosion. The face of the AA2024 is be the hard materials in the metal family and it applied
layered with Titanium Nitride (TiN) at ∼1.465m for the coatings with the less than 5m.
thickness. This coating is prepared by the PVD
method, and after the coating process, the Most researchers are focused on plasma nitriding a
specimen is tested using the X-ray Spectroscopy Titanium coating onto the AA2024 to boost its wear
and SEM analysis for surface finish and the resistance. By employing magnetron sputtering, nano-
hardness test using the Micro hardness test. sized titanium particles are coated on the surface of the
Keywords: Titanium Nitride (TiN), Aluminium Aluminium alloy 2024 grade, and then the same is
Alloy 2024, Physical Vapour Deposition (PVD), plasma nitrate for eight hours at 300C interval starting
Scanning Electron Microscope (SEM). from 4000C to 4900C and in a gas having a mixture of
40% & 60% of N2 and H2. As compared to uncoated
I. INTRODUCTION material, the wear rate is reduced by 56 per cent after
In the Aerospace industry, lightweight materials have this treatment [1]. Some of them are using the Plasma-
a major impact on the construction of Aeroplanes; these enhanced chemical vapour deposition method on AA
materials have the properties of more hardness and also 2024. In this method they using the two different gasses
a reduction in corrosion properties like Aluminium Alloy at the ratio of 1:1, i.e. 50% oxygen and 50%
2021 grade materials. These materials having a copper hexamethyldisiloxane, plasma is ignited using the radio
content, and this leads to severe corrosion, while it frequency at 13.56MHz. The power was varying from
contacts with oxygen and water. For that, the majority 10 W to 80W in the 6 different sets of experiments.
of the Aeroplanes companies paints the materials to Salt spray method & electrochemical impedance
withstand the strength and hardness of the materials to spectroscopy will be used to assess corrosion
increase the lifetime of the print quality. This leads to an resistance [2]. Based on the several researcher
increase in the maintenance cost and also it takes methodologies handling the AA 2024 with TiN, we

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 691


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

adopted the surface coating using the Physical Vapour III. PREPARATION OF THE SUBSTRATE
Deposition Method (PVDM). MATERIAL
II. MATERIALS AND THEIR For this study, we use the basic material as AA2024
COMPOSITION grade in the form of a square plate having a thickness
of 4mm. After the primary cleaning process carried on
For this study, we use the main materials as the the plate, the plate will be cut for the required
Aluminium Alloy 2024 Grade and the Titanium Nitride dimensions. For that the AA2024 grade is cut in the
Powder. The detailed properties of the Aluminium Alloy dimensions of 20 x 20 cm using the Wire cut EDM,
2024 grade are shown in Table 1, and Table.2 describes specification and the picture of the EDM is mentioned
the detailed properties of the Titanium Nitride. in Table.3 and Fig.1.
Table.1 Property of Aluminium Alloy 2024 (AA 2024)

Physical Properties
Properties AA 2024
Density 2.78 g/cc
Mechanical Properties
Tensile Strength 483 MPa
Yield Strength 345 MPa
Modulus of Elasticity 73.1 GPa
Thermal Properties
Coefficient of Thermal Expansion 23.2 µm/m-°C
Thermal Conductivity 121 W/m-K Fig.1 Wire-Cut EDM Fig.2 Surface Grinding Machine
Chemical Composition
Table.3. Specification of Wire cut EDM
Silicon 0.5%
Iron 0.5% Parameters Range
Copper 3.8% - 4.9% Maximum Cutting speed 160mm²/min
Manganese 0.5% - 0.6% Surface Finish 0.8 µ
Magnesium 1.2% - 1.8% Taper ± 30°/ 50 MME
Chromium 0.1% Table size 445 X 655 mm
Zinc 0.25%
Titanium 0.15% After the cutting process, the surface is to be grinding
Table.2 Properties of Titanium Nitride
for 0.25 mm using the surface grinding machine,
specification and the picture of the surface grinding
Physical Properties
Properties TiN
machine is mentioned in Table.4 and Fig.2.The prepared
Density 5.21 g/cm3 material is shown in Fig.3.
Mechanical Properties Table.4. Specification of Surface Grinding Machine
Tensile Strength 240 MPa
Parameters Range
Modulus of Elasticity 251 GPa
Maximum Grinding Dia. 150 mm
Shear Modulus 15.6 GPa
Max. Grinding Length 450 mm
Thermal Properties
Spindle Speed 2800 RPM
Coefficient of Thermal
9.35×10- 6 K- 1 Motor Power 1 HP
Expansion
Thermal Conductivity 29 W/m-K Fig.3 shows that the prepared substrate of the
Melting point 2947 °C
Chemical Composition
Aluminium alloy 2024 after all the preparation.
Titanium 77.5% Simultaneously, Titanium Nitrides (TiN) is used for this
Nitrogen 22.6% study is in the form of a Powder state, for that Titanium
Nitrides (TiN) is to be filtered using Nano filter, from
which the above 0.70 ?m are filtered as shown in Fig.
4

692 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 3 Prepared Substrate Material Fig.6 TiN Coated AA2024

Fig. 4 Titanium Nitride Powder at 0.70 ?m Fig. 7 Procedure for the TiN coating in the AA 2024

IV. EXPERIMENTAL PROCEDURE V. TESTING PROCESS


The prepared substrate material is placed in the In this study, there are 3 different testing procedures
workpiece holder and place inside the sputtering were studied for the substrate material that will come
machine. The sputtering process is the Physical Vapour on the predefined thickness and the surface finish. They
Deposition Method, in which the TiN is coated in the are:
Aluminium Alloy 2024 at the thickness of ∼1.465m,
and the sputtering machine is shown in Fig.5. Initially, A. Coating Thickness:
the process is started by using Argon gas. The Argon Used to measure the thickness of the TiN layer in
gas is used to eject at the rate of flow 1.5 mL/min to the AA2024. For that 5 samples were taken on each
the Titanium Nitride atoms to coat over the AA2024 substrate material, and the average thickness is
for a while. After the air cooling, coating thickness is considered for the coating thickness. The instrument
measure using the coating thickness gauge. This used is the Elcometer 456 Coating Thickness Gauge.
instrument is used to measure up to 1500m. The
finished substrate material after TiN coated is shown in B. X-Ray Diffraction Studies (XRD):
Fig.6. The complete procedure for the TiN coating in This testing helps measure the different phases
the AA 2024 is shown in Fig.7. presented in the TiN coatings. This process was done
using the Ni-based Filter Cu-K radiation in a Philips
X-ray diffractometer. The characteristic d-spacing of
all possible values are taken from JCPDS cards and
were compared with d-values obtained from XRD
patterns to identify the various X-ray peaks obtained.

Fig. 5 Sputtering Processing Machine

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 693


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

C. Scanning Electron Microscopic Studies


(SEM):
TiN coated AA2024 and the powders were studied
under scanning electron microscope mostly using
secondary electron imaging. The surface, as well as the
interface morphology of all coatings, was observed
under the microscope. The detailed procedure for
preparing the specimen for the SEM studies is shown
in Fig. 8. Fig.10 Surface of material through SEM

Fig.11.Electron diffraction on the target material

This surface of the TiN coating material is shown in


Fig. 8 Procedure for preparing the specimen for SEM Fig. 11 using the microscopic view. This will help the
TiN is packed with the AA2024 without the air bubbles
VI. RESULTS AND CONCLUSION in between the molecules of TiN.
A. SEM Analysis: B. Hardness Test:
Fig. 9 shows the surface of the TiN coating in the In this testing method, the use of a diamond indenter
Aluminium Alloy 2024. The surface finish of the coating with a particular shape is used to make an impression
is smooth and the thickness we get is 1.465 m. The called as test load or applied force, which can be at 1-
magnitude will be 1.00 KX and EHT will be 10.00 1000gf, on the material under testing. And the diameter
KV and WD will be 10.4 mm, and the signal A = SE2. of the indentations test involves 50mm and 60mm, which
The coating is viewed in the microscopic at 20m. After are roughly equivalent to 2gf. This force can produce
the SEM analysis, using the Electron is diffracted on an indentation of around 50µm. Fig.12 shows that the
the target material to view the surface of the coating as different loading conditions at 1µm, 1.46 µm, 2 µm, 2.2
shown in Fig.10. µm. Because of its specificity, this type of testing is
applicable in cases where there is need to watch for
hardness changes on a microscopic level.

Fig.9. The cross-section and the surface of the TiN coating,


Fig.12 Hardness Test after coating
SEM

694 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

C. XRD Analysis: [3] S. Balanand, S. Bhowmik, M. Datta, R. Rane, and S. Mukherjee,


"Surface Characteristics of Plasma Treated and Titanium Nitride
From this Fig.14, we obtained that the Titanium (TiN) Deposited Aluminum Alloy", Materials Performance and
nitride was finely coated over the substrate Aluminium Characterization 8, no. 1 (2019): 468-480.

and the characteristics of the substrate for various [4] C.Lu, J.W.Yao, Y.X.Wang, Y.D.Zhu, J.H.Guo, Y.Wang, H.Y.Fu,
Z.B.Chen, M.F.Yanb, "A novel anti-frictional multiphase layer
thicknesses was studied, examined and analyzed over produced by plasma nitriding of PVD titanium coated ZL205A
the period of time and results were obtained. aluminium alloy", Applied Surface Science, Volume 431, 15
February 2018, Pages 32-38.
[5] FanyongZhang, MufuYan, JiningHe, FuxingYin, "Microstructure
evolution and wear resistance of nitride/aluminide coatings on
the surface of Ti-coated 2024 Al alloy during plasma nitriding,
Ceramics International", Volume 43, Issue 14, 1 October 2017,
Pages 10832-10839.
[6] FanyongZhang, YiDing, ShuYan, JiningHe, FuxingYin,
"Microstructure evolution and mechanical performance of Cr-N/
Al-Cr multilayer coatings produced by plasma nitriding Cr-coated
Al alloy", Vacuum, Volume 180, October 2020, pp.109540-
Fig.14. XRD Analysis
109544.
[7] R.N.Ibrahim, M.A.Rahmat, R.H.Oskouei, R.K.Singh Raman,
We conclude this study as a substrate was designed "Monolayer TiAlN and multilayer TiAlN/CrN PVD coatings as
for the sputtering process in which Titanium Nitride was surface modifiers to mitigate fretting fatigue of AISI P20 steel",
coated over Aluminium 2024 alloy by physical vapour Engineering Fracture Mechanics, Volume 137, March 2015, Pages
64-78.
deposition of gas. The resulting prototype was then
tested to get the appropriate results in different loading [8] Soroush Momeni, WolfgangTillmann, "Investigation of the self-
healing sliding wear characteristics of NiTi-based PVD coatings
conditions various types of tests were taken to get the on tool steel", Wear, Volumes 368-369, 15 December 2016, Pages
best result of the substrate for which it was developed. 53-59.
From that, we conclude that Titanium Nitride coated [9] Ali Shanaghi, Ali Reza Souri, Mahdi Rafie & Paul K. Chu, "Effects
Aluminium 2024 alloy possesses excellent result of Benzotriazole on nano-mechanical properties of zirconia-
alumina-Benzotriazole nanocomposite coating deposited on Al
compared to normal Aluminium alloy. 2024 by the sol-gel method", Applied Physics A volume 125,
Article number: 728 (2019).
REFERENCES
[10]Bing Li, Fei Sun, Qizhou Cai, Jing fan Cheng, Bingyi Zhao,
[1] American Society for Testing and Materials. Standard test method "Effect of TiN nanoparticles on microstructure and properties
for measurements of fatigue crack growth rates. Annual Book of of Al2024-TiN nanocomposite by high energy milling and spark
ASTM Standards 2000: Volume 03.01, ASTM E 647. p. 591- plasma sintering", Journal of Alloys and Compounds, Volume
630. 726, 5 December 2017, Pages 638-650.
[2] Joyia, Muhammad Ghufran, "Comparative performance analysis [11]Sun, Fei Li, Bing, Cai, Chao, Cai, Qizhou, "Effects of TiN
of cemented carbide, TiN, TiAlN, and PCD coated inserts in dry nanoparticles on hot deformation behavior of ultra-fine grained
machining of Al 2024 alloy", The International Journal of Al2024-TiN nanocomposites prepared by spark plasma sintering,
Advanced Manufacturing Technology volume 112, pages1461- Mechanics of Materials, Volume 138, November 2019,
1481 (2021). pp.103152.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 695


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Electricity Generation from Vehicle Parking Area


Saran.S1, Santhoshsivan.R2, Seenidurai.M3, Shiva Prasath.A4, Umashankar.P5, Keerthi Shriram.S6
1,2,3,4,5,6
Mechanical Department, Bannari amman Institute of Technology, Erode,India
Email: saransk.me19@bitsathy.ac.in1, santhoshsivan.me19@bitsathy.ac.in2, seenidurai.me19@bitsathy.ac.in3,
shivaprasath.me19@bitsathy.ac.in4, umashankar.me19@bitsathy.ac.in5, keerthishriram.me19@bitsathy.ac.in6

Abstract- Energy is the prime necessity of I. INTRODUCTION


survival of each and every organism in the universe.
Everything happening in the environment is a Electricity is required at every point in our daily life
result of the flow of energy to other forms. Energy and now-a-days, the increased growth of population
can be converted into many forms that can be results in reduction of conventional sources of energy.
measured in various ways. In this busy and fast The availability and consumption of electricity is
moving world, the population is multiplying regarded as the main content of the national standard
continuously and the conventional sources of of living in the present day civilization. Energy Plays an
energy are getting exhausted at a great pace.The important role in all sectors of a country's economy.
excess usage of energy has led to an energy crisis Energy crisis is mainly due to two reasons: first, the
over a few years. In order to overcome this population of the world has increased rapidly, and
problem, we need to execute an idea to optimize
second, the standard of living of human beings has
the use of conventional sources for conservation
of energy. One such idea is explained here. The
increased.The availability of regular conventional fossil
count of vehicles passing over some parking areas fuels are the main sources of power generation, but
in some hotels and public places has increased there is danger of sources getting reduced eventually
these days.Such parking slots are designed for by the next few years..Hence it becomes to save
heavy vehicles, as it increases the input torque and electricity.With the vast development of technologies
ultimately results in increasing the power as output. many other useful techniques of power generation have
The kinetic energy of the moving vehicles at the been emerged. The newly developed techniques focus
parking slot can be converted into mechanical on cost efficiency. One such method of power
energy of the shaft by using a rack and pinion generation is explained in this paper. In the present
mechanism. Then, this mechanical energy can be day life, a lot of vehicles are transporting and vehicles
transformed to electrical energy using a generator
possess some kinetic energy by virtue of their motion.
or dynamo which can be stored with the use of a
battery. All these conversions of energy take place
In the parking area of some hotels,malls these vehicles
in an electro-mechanical unit. This energy is saved waste tremendous amounts of energy while moving.So
during the daytime and can be used at night based making use of that waste energy we can generate
on our purpose .Therefore, by using this electricity.
arrangement a large amount of energy can be saved
and can be used for our further use.For the first
II. ENERGIES INVOLVED
time,the generation of electricity was done by using 1) KINETIC ENERGY
Faraday's dynamo in the 1800's. Generating
electricity by using dynamic plates in parking areas The kinetic energy of an object is the energy that it
is an ingenious and useful concept as it has more possesses due to its motion The work needed to
merits as compared to its faults and it is best suited accelerate a body of a given mass from rest to its
for the current situations. velocity is called kinetic energy.The kinetic energy of a
Keywords-Vehicle parking area,Power non-rotating object of mass m traveling at a speed v is
generation, Rack and pinion, Electricity, Energy, 1/2mv²
Electro-mechanical unit, Non conventional sources,
Kinetic energy, Mechanical energy, Vehicles.

696 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2) MECHANICAL ENERGY rotary motion. Here, the rack is the element producing
Mechanical energy is the energy that is possessed reciprocating motion and pinion rotates due to this
by an object due to its motion or due to its position. reciprocating motion. The rack is displaced vertically
Mechanical energy can be either kinetic (energy of due to the weight of the vehicle passing on the dynamic
motion) or potential energy (stored energy of position). plate in the floor and thus it reciprocates. As the rack
reciprocates, it makes the pinion rotate. The rack is
3) ELECTRICAL ENERGY the flat part with teeth, while the pinion is a gear.
Electrical energy is energy derived from electric Advantages of rack and pinion mechanism are
potential energy or kinetic energy.Electrical energy • This assembly gives good mounting convenience.
refers to energy that has been converted from electric
to potential energy. This energy is generated by the • Gear losses are maximum up to 5 percent .
combination of electric current and electric potential • Approximate efficiency of rack and pinion
which is delivered by an electrical circuit. mechanism is about 95 percent.
IV. EQUIPMENTS REQUIRED FOR THIS
IDEA
1. RACK AND PINION
A rack and pinion is a type of linear part that
comprises a circular gear ( pinion) engaging a linear
gear ( rack), which converts rotational motion into linear
motion. Driving the pinion to rotatory motion causes
the rack to be driven linearly.

2. BALL BEARINGS
The basic energy conversion taking place is first from
A ball bearing is a type of rolling-element bearing
kinetic energy to mechanical energy and then from
that uses balls to maintain the separation between the
mechanical energy to electrical energy. The kinetic
bearing races. Ball bearing is used to decrease rotational
energy of the vehicle which is wasted at the floor is
friction and it supports radial and axial loads.
converted to mechanical energy of the unit below the
floor by the rack and pinion mechanism. This
mechanical energy is converted to electrical energy
by using a generator.
III. MECHANISM USED
The mechanism used in the assembly is the rack and
pinion mechanism. It converts reciprocatory motion to
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 697
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3. SPUR GEAR
Spur gears are a cylindrical shaped toothed
component used in industrial equipment to transfer
mechanical motion as well as control speed, power,
and torque. These simple gears are cost-effective,
durable, reliable and provide a positive, constant speed
drive to facilitate daily industrial operations.

6. FLYWHEEL
Flywheel, heavy wheel attached to a rotating shaft
so as to smooth out delivery of power from a motor to
a machine. The inertia of the flywheel opposes and
moderates fluctuations in the speed of the engine and
stores the excess energy for intermittent use.

4. SPROCKET AND CHAIN DRIVE


A sprocket is a toothed wheel that fits onto a shaft.
It is prevented from rotation of the shaft by a key that
fits into keyways in the sprocket. The main use of the
chain is used to connect two sprockets.One sprocket
is the driver one. The other sprocket is the driven
sprocket.
7. SPRING
Spring is an element which possesses elasticity and
its function is to expand and contract to recover its
original shape when it is loaded or unloaded. It changes
its shape according to the load applied. It absorbs
energy either due to shocks or due to vibrations. Springs
are usually made out of hardened steel.

5. PAWL AND RATCHET


The purpose of a ratchet and pawl is to allow a
shaft to rotate in one direction only. A ratchet is a wheel
with a shape similar to a circular saw blade or horizontal
milling cutter. A ratchet fits onto a shaft and is locked
onto the shaft by a "key". The key fits into slots in the
shaft and ratchet wheel.

698 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

8. SHAFT V. WORKING OF THE SYSTEM


A shaft is a rotating machine part , usually it is
circular in cross section, which is used to transmit power
from one part to another.

9. DYNAMO
When a vehicle moves on the dynamic plates it
The function of the dynamo is to change mechanical creates a vertical motion.Then this motion is converted
energy into electricity. The control gear associated with to rotational motion.For this process a rack & pinion
the dynamo regulates the current output according to mechanism is used. The load of the vehicle is act upon
the demands on the electric system and the state of the when the plate is transmitted to rack and pinion
battery. arrangements. This vertical motion is converted to
rotary motion and transmitted to a sprocket
arrangement. The sprocket arrangement consists of
two sprockets - one larger diameter and the other of
smaller diameter. The axis of the pinion is coupled to
the larger sprocket. The pinion and the larger sprocket
are mounted on the same shaft.
Now the larger and smaller sprockets are connected
with each other through a chain drive. Smaller sprocket
is mounted on the other shaft. The smaller sprocket
consists of a pawl and a ratchet which avoids the rotation
10. BATTERY in the reverse direction of the shaft on which the smaller
sprocket is mounted. Thus, the shaft on which the
It is a device which stores electrical energy generated smaller sprocket is mounted rotates in one direction
from the generator. The energy is stored in the form of only. i.e. it rotates only when the rack moves downward
chemical energy in the battery. This energy can be used due to the load of the vehicle. When the rack moves
as and when it is required. upward to return to its initial position, the rotation of
the shaft is avoided by the pawl and ratchet.
As the sprocket arrangement is connected by a chain
drive the speed available at the larger sprocket is
characteristically multiplied at the smaller sprocket.Thus
a larger speed is obtained. The axis of the smaller
sprocket is coupled to a gear arrangement which
consists of two gears with different dimensions. The
gear wheel with the larger diameter is coupled to the
axis of the smaller sprocket and these two are mounted
on the same shaft. The speed that has been increased
at the smaller sprocket wheel is handed to this gear
wheel of larger diameter. The smaller gear is meshed
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 699
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

to the larger gear. Therefore, as the larger gear rotates, arms. The EMF is generated as the armature cuts the
it increases the speed of the smaller gear and multiplies magnetic field flux, already present due to the magnets
it to more intensity. (Now, as the armature continuously rotates, the
Though the speed due to the rotational motion direction of the current induced in its arms changes
achieved at the larger sprocket wheel is less, the final constantly. As a result of this we get an alternating
speed achieved is high, as the power is transmitted to current, which has sinusoidal nature characteristics.Thus
gears. The smaller gear is coupled to the dynamo or electric current is achieved and it is stored in storage
generator. Between the smaller sprocket and the larger sources such as a battery and used whenever required.
gear, a flywheel is mounted on the same shaft to adjust
the fluctuation in the energy . Flywheel also makes the
energy consumption uniform so that the shafts will rotate
with certain speed consistently.
Then mechanical energy is available at the output of
the motion conversion system.In this system the
mechanical energy available at the smaller gear is
converted to electrical energy by means of a dynamo
or generator. The smaller gear is coupled to the dynamo
or generator. The conversion will be directly
proportional to traffic density.
A Dynamo or Generator consists of a stationary
structure, called the stator, which provides a constant
magnetic field, and a winding called the armature, which VI. POWER CALCULATION
rotates within that field. The armature is a soft iron
core on which a copper coil of turns is mounted and it Mass of car (W) = 1000kg(approx)
is connected to the shaft of the smaller gear. So as the g = gravitational acceleration = 9.81
smaller gear rotates, the shaft also rotates and relatively
the armature is also turned around the shaft axis. The Weight of car = 1000 * 9.81
armature has two rings, each connected to one end of = 9810 N
the armature. These rings rotate with the armature.To Work done = Weight * displacement
these armature rings, brushes are connected. This
assembly is known as slip ring & brush assembly. The = 9810* 0.10
brushes are a stationary part of this assembly and are = 1079.1
generally made of carbon. The output of the brushes is
Work done per minute= 1079.1/60
connected to the outer circuit for measuring current.
As the armature rotates with current induced in its arms, = 17.98 W
the brushes transmit this current to the outer circuit. For 60 minutes (1 hour) = 17.98 * 60
The field magnets are designed such that they are =1079.1 W
concave at the inner side and entirely cylindrical in
shape. The reason for this is, it enables the magnets to For 24 hours (1 day) = 1079.1 * 24
generate a radial magnetic field. As the armature rotates = 25898.4 W
in the radial magnetic field about an axis perpendicular
to the magnetic field, an EMF (electro-magnetic force)
is generated which induces current in the armature

700 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VII. BLOCK DIAGRAM X. CONCLUSION


This paper introduces another innovative method of
green power generation in order to contribute towards
the development of the country by enriching it with
utilization of available resources in a more useful
manner. Due to population explosion, the current power
generation has become insufficient to fulfil our
requirements. In the upcoming days, as demand for
electricity is increasing rapidly, it will prove a great boon
to the country and also to the world, since it will save
a lot of electricity from power plants which is wasted
VIII. ADVANTAGES in illuminating the street lights. This research can be used
to develop our country by enhancing more and more
1) We can have annual electricity generation with the utilization of its sources in a more appropriate process.
help of this method without depending on other
The development of a country is directly proportional
factors.
to the way in which it uses power supply in a sufficient
2) Power generation takes place reasonably and by using and efficient manner. Now is the need of an hour when
non-conventional energy sources which will help to these types of inventive ideas should be brought into
preserve the conventional energy sources for our
practice. This idea not only provides an alternative, but
adjacent future use.
also helps to develop the economy of the country.
3) There is no usage of any fossil fuel hence electricity Development of every country will be the development
is generated by renewable means. of the world.
4) Energy generation with less pollution.
XI. REFERENCES
5) Simple construction, mature technology and easily
1. N. Fatima, J. Mustafa (2012), Production of electricity by the
maintainable. method of road power generation, Int. J. advances in Electrical
6) This method requires less measure of floor area and and Electronics Engineering, 1: 9-14.
also the traffic is not obstructed. 2. S.A. Jalihal, K. Ravinder, T.S. Reddy (2005), Traffic
characteristics of India, Proc. Eastern Asia Society for
7) It is economical and not difficult to install. Transportation studies, 5: 1009-1024.
8) This method is promising due to its good efficiency 3. R. Gupta, S. Sharma, S. Gaikwad (2013), A revolutionary
and energy recovery criteria. technique of power generation through speed breaker power
generators, Int. J. Engineering. Research and Technology, 2(8):
IX. APPLICATION 1879-1883.
4. A.K. Sharma, O. Trivedi, U. Amberiya, et al. (2012) Development
• Street Lights can be provided with electricity of speed breaker devices for generation of compressed air on
generated by this method. highways in remote areas. Int. J. Recent Research and Review, 1:
11-15.
• Traffic Signals can be run by using the electricity
5. S. Priyadarshani, (15 June 2007), Generating electricity from
generated by this method.
speed breakers. Down to Earth.
• Sign boards on the roads can be blown with the help 6. N.V. Bhavsar, V. A. Shah, (2015), Electricity generation by speed
of this method. breaker using spur gear mechanism, Int. J. Research in Applied
Science and Engineering Technology, 3(4): 1164- 1169.
• Boards near the bus-stops can be highlighted by using
7. W. Knight, (21 Aug 2001), Smart speed bumps reward safe
this method of generating electricity. drivers,
• This method can also be used on the check posts on 8. http://www.newscientist.com/article.ns?id=dn1178. F. N. C.
highways. Anyaegbunam, (2015), Electric power generation by speed

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 701


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

breaker generators, IOSR J. Engineering, 5(9): 17-21. M. Ramadan, 19. A. K. Singh, D. Singh, M. Kumar, et al. (2013), Generation of
M. Khaled, et al. (2015), Using speed bump for power generation, electricity through speed breaker mechanism, Int. J. Innovations
In: The 7th International Conference on Applied Energy, Energy in Engineering and Technology, 2(1): 20-24.
procedia, pp.867-872.
20. A. Mishra, P. Kale, A. Kamble, (2013), Electricity generation
9. A. Kaur, S. K. Singh, Rajneesh, et al. (2013), Power generation from speed breakers, The Int. J. of Engineering and Science,
using speed breaker with auto street light, Int. J. Engineering 2(11): 25-27.
Science and Innovative Technology, 2(2): 488- 491.
21. H. Singh, Omprakash. (2016), Energy generation from speed
10. P. Vishnoi, P. Agrawal, (2014), Power generation by kinetic energy breaker by rack and ratchet mechanism, Int. J. Advance Research
of speed breaker, MIT Int. J. Electrical and Instrumentation and Innovative Ideas in Education, 2(3): 4183- 4187.
Engineering ,4(2): 90-93.
22. G. R. Prabu, G. Ethiraj, (2015), Electricity generation by speed
11. C. B. Prakash, A. V. R. Rao, P. Srinuvas, (2014), Road power breaker, Int. J. Advanced Research in Electrical, Electronics and
generation by speed breaker, Int. J. Engineering Trends and Instrumentation Engineering, 4(5): 4799-4808.
Technology, 11(2): 75-78.
23. K. P. Singh, P. Singh, (2014), Eco-friendly electricity generator
12. F. Najuib, N. Gupta, P. Rawat, et al. (2014), Energy efficient from busy road, Int. J. Emerging Trends in Engineering and
power generation using speed breaker with auto street lights, Int. Development, 3(4): 307-313.
J. Engineering Research and Management Technology, 1(1): 223-
24. Speed limits and reduction. (27 Sept 2006), Eastleigh Borough
228.
Council, http://www.eastleigh.gov.uk/ebc-3053. A. S. Fawade,
13. M. Sailaja, M. R. Roy, S. P. Kumar, (2015), Design of rack and (2015), Air compression and electricity
pinion mechanism for power generation at speed breakers, Int.
25. Generation by using a speed breaker with rack and pinion
J. Engineering Trends and Technology, 22(8): 356-362.
mechanism, Int. J. Modern Engineering Research, 5(1): 23- 28.
14. S. Srivastava, A. Asthana, (2011), Produce electricity by the use
26. A. P. Rao, A. K. Kumar, S. Suresh, (2014), Power generation
of speed breakers, J. Engineering Research and Studies, 2(1):
from speed breaker by rack and ratchet mechanism, Int. J. Current
163-165.
Engineering and Technology, sp. issue 2: 549-552.
15. N. Kumar, P. Saini, M. Kumar, (2016), Automatic road light
27. J. Goldemberg, T. B. Johansson, A. K. N. Reddy, et al. (1985),
controller through electricity generation from speed breaker, Int.
Basic needs and much more with one kilowatt per capita, Ambio,
J. Engineering Technology Science and Research, 3(4): 17-25.
14: 190-200.
16. S. English, (11 Nov 2005), Smart road hump will smooth the
28. A. K. N. Reddy, B. S. Reddy, (1994), Substitution of energy
way for safe drivers, https://web.archive.org/web/
carriers for cooking in Bangalore, J. Energy, 19(5): 561- 571.
20060113164245/
29..V. Aswathaman, M. Priyadharshini, (2011), Every speed breaker
17. http://www.timesonline.co.uk/article/0,,2-1867157,00.html
is now a source of power, In: 2010 International Conference on
18. Ankita, M. Bala, (2013), Power generation from speed breaker, Biology, Environment and Chemistry, IPCBEE, Singapore, pp.
Int. J. Advance Research in Science and Engineering, 2(2). 234-23.

702 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Welding Technology
Gokulapriyan G1, Balaganesh S2, Hareeswer M3, Harshavartthan A4, Cheran B5, Hariprasath S6
1,2,3,4,5,6
Mechanical Engineering, Bannari Amman Institute Of Technology, Erode,India
Email: Gokulapriyan.me19@Bitsathy.ac.in1, Balaganesh.me19@Bitsathy.ac.in2, Hareeswer.me19@Bitsathy.ac.in3,
Harshanartthan.me19@Bitsathy.ac.in4, Cheran.me19@Bitsathy.ac.in5, Hariprasath.me19@Bitsathy.ac.in6

Abstract: Welding is a fabrication process that "hot" more relating to red-hot or a swelling rage; in
joins materials, usually metals or thermoplastics, contrast to samodfæst, "to bind together with rope or
by using high heat to melt the parts together and fasteners").The term "weld" is derived from the Middle
allowing them to cool, causing fusion. Welding is English verb "well" (wæll; plural/present tense: wælle)
distinct from lower temperature metal-joining
or "welling" (wællen), meaning: "to heat" (to the
techniques such as brazing and soldering, which
maximum temperature possible); "to bring to a boil".
do not melt the base metal..
The modern word was likely derived from the past-
INTRODUCTION tense participle, "welled" (wællende), with the addition
Welding is a fabrication process that joins materials, of "d" for this purpose being common in the Germanic
usually metals or thermoplastics, by using high heat to languages of the Angles and Saxons. It was first
melt the parts together and allowing them to cool, recorded in English in 1590, from a version of the
causing fusion. Welding is distinct from lower Christian Bible that was originally translated into English
temperature metal-joining techniques such as brazing by John Wycliffe in the fourteenth century. The original
and soldering, which do not melt the base metal. In version, from Isaiah 2:4, reads, "...thei shul bete togidere
addition to melting the base metal, a filler material is their swerdes into shares..." (they shall beat together
typically added to the joint to form a pool of molten their swords into plowshares), while the 1590 version
material (the weld pool) that cools to form a joint that, was changed to, "...thei shullen welle togidere her
based on weld configuration (butt, full penetration, fillet, swerdes in-to scharris..." (they shall weld together their
etc.), can be stronger than the base material (parent swords into plowshares), suggesting this particular use
metal). Pressure may also be used in conjunction with of the word likely became popular in English sometime
heat or by itself to produce a weld. Welding also between these periods.
requires a form of shield to protect the filler metals or TYPES OF WELDING
melted metals from being contaminated or oxidized.
Many different energy sources can be used for welding, Plastic Welding or Pressure Welding The piece of
including a gas flame (chemical), an electric arc metal to be joined are heated to a plastic state and
(electrical), a laser, an electron beam, friction, and forced together by external pressure (Ex) Resistance
ultrasound. While often an industrial process, welding weldingo Fusion Welding or Non-Pressure Welding The
may be performed in many different environments, material at the joint is heated to a molten state and
including in open air, under water, and in outer space. allowed to solidify (Ex) Gas welding, Arc welding.

ETYMOLOGY METHODS

The term "weld" is of English origin, with roots from Some of the most common current welding methods
Scandinavia. It is often confused with the Old English are:
word, weald, meaning "a forested area", but this word 1. Shielded metal arc welding (SMAW), also known as
eventually morphed into the modern version, "wild". The "stick welding."
Old English word for welding iron was samod (to bring 2. Gas tungsten arc welding (GTAW), also known as
together) or samodwellung (to bring together hot, with TIG (tungsten, inert gas).

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 703


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3. Gas metal arc welding (GMAW), also known as MIG high thermal and electrical conductivity as well as being
(metal, inert gas). characteristically ductile. Three of the most commonly
4. Methods Flux-cored arc welding (FCAW), very used crystal lattice structures in metals are the body-
similar to MIG. centred cubic, face-centred cubic and close-packed
5. Submerged arc welding (SAW), usually called Sub
hexagonal. Ferritic steel has a body-centred cubic
Arc. structure and austenitic steel, nonferrous metals like
aluminum, copper and nickel have the face-centred
6. Electroslag welding (ESW), a highly productive
cubic structure.Ductility is an important factor in ensuring
process for thicker materials.
the integrity of structures by enabling them to sustain
PROCESS local stress concentrations without fracture. In addition,
structures are required to be of an acceptable strength,
These processes use a welding power supply to
which is related to a material's yield strength.
create and maintain an electric arc between an electrode
and the base material to melt metals at the welding point. ADVANTAGES OG WELDING
They can use either direct current (DC) or alternating
Dissimilar metals which canot be welded can be
current (AC), and consumable or non-consumable
joined by brazingo Very thin metals can be joinedo
electrodes. The welding region is sometimes protected
Metals with different thickness can be joined easilyo In
by some type of inert or semi-inert gas, known as a
brazing thermal stresses are not produced in the work
shielding gas, and filler material is sometimesThese
piece. Hence there is no distortiono Using this process,
processes use a welding power supply to create and
carbides tips are brazed on the steel tool holders
maintain an electric arc between an electrode and the
Disadvantageso Brazed joints have lesser strength
base material to melt metals at the welding point. They
compared to weldingo Joint preparation cost is moreo
can use either direct current (DC) or alternating current
Can be used for thin sheet metal sections.
(AC), and consumable or non-consumable electrodes.
The welding region is sometimes protected by some RESULTS
type of inert or semi-inert gas, known as a shielding
This paper has summarised significant recent
gas, and filler material is sometimes used as well.
developments in both traditional and emerging welding
METALLURGY processes. It is clear that progress is being made, and
this should lead to improved quality, greater reliability
Covalent bonding takes place when one of the
and lower costs for the offshore industry. The
constituent atoms loses one or more electrons, with the
importance of welding technology to the offshore sector
other atom gaining the electrons, resulting in an electron
is well recognised, but there is still great scope for
cloud that is shared by the molecule as a whole. In
improvement.
both ionic and covalent bonding the location of the ions
and electrons are constrained relative to each other, REFERENCES
thereby resulting in the bond being characteristically 1. Howse D S, Scudamore RJ, Booth GS 'Yb fibre laser/MAG
brittle.Lifetime extension with after treatment methods hybrid processing for welding of pipelines'. IIW document IV-
Metallurgy Metallic bonding can be classified as a type 880-05, 2005.
of covalent bonding for which the constituent atoms 2. Thomas WM, et al 'Friction Stir Welding' International patent
are of the same type and do not combine with one application GB9125978.9, Dec 1991.

another to form a chemical bond. Atoms will lose an 3. Verhaeghe G 'The fibre laser - a newcomer for material welding
and cutting' Welding Journal vol 84 No 8, Aug 2005, P56-60.
electron(s) forming an array of positive ions. These
electrons are shared by the lattice which makes the
electron cluster mobile, as the electrons are free to move
as well as the ions. For this, it gives metals their relatively

704 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fiber Reinforcement Composite Material


Gaurav Tamrakar1, Priyanka Gupta2
1
Department of Mechanical Engineering, Kalinga University, Naya Raipur (CG)
2
Department of Chemistry, Kalinga University, Naya Raipur (CG)
Email: gaurav.tamrakar@kalingauniversity.ac.in1, priyanka.gupta@kalingauniversity.ac.in2

Abstract- An FRP composite is described as a wherein the matrix is a metal or a ceramic. Fiber-
polymer this is reinforced with a fiber. The chief strengthened plastic (FRP) (additionally called fiber-
characteristic of fiber reinforcement composite is bolstered polymer, or fiber-bolstered plastic) is a
to carry load alongside the length of the fiber and
composite material, that is product of a polymer matrix
to provide intensity and stiffness in particular
strengthened with fibers. The fibers are commonly glass
direction. FRP represents a category of materials
that falls into a class known as composite materials. (in fiber glass), carbon, aramid, or basalt. Not often,
Fiber strengthened Polymer (FRP) are utilized in other fibers consisting of paper, wooden, or asbestos
almost each form of advanced engineering systems, had been used. The polymer is usually an epoxy,
with their utilization starting from plane, helicopters vinylester, or polyester thermosetting plastic, even
and spacecraft via to boats, ships and offshore though phenol formaldehyde resins are nevertheless in
platforms and to vehicles, sports activities goods, use [1-9] Fiber-strengthened polymer (FRP), also
chemical processing system and civil infrastructure Fiber- bolstered plastic, is a composite material made
which include bridges and homes. The application from a polymer matrix bolstered with fibers. The fibers
of FRP composites maintains to develop at an are usually glass, carbon, or aramid, although other
outstanding charge as these substances are used
fibers along with paper or wooden or asbestos were
extra of their present markets and end up installed
once in a while used. The polymer is generally an epoxy,
in noticeably new markets. in the offered studies
paintings, one-of-a-kind grade sort of fiber vinylester or polyester thermosetting plastic, and phenol
reinforcement composite is given and the author formaldehyde resins are nevertheless in use. FRPs are
implemented MOOSRA approach so as to examine commonly used inside the aerospace, automobile,
the best as in line with given their homes. marine, and creation industries. The authors conducted
Keywords- Fiber Reinforcement Composite, few literature surveys to find the information and relevant
MOOSRA, method, exclusive Grade, proper method so that it will evaluate the exceptional fiber
reinforcement composite between several as according
I. INTRODUCTION to given their characteristics. The fibers (or, in some
Composite materials are engineered substances cases, debris) are regularly alternatively complex; for
made from or greater constituent materials with instance, improvements may be Sought in creep, put
considerably distinct physical or chemical qualities on, fracture longevity, thermal balance, and many others
which continue to be separate and distinct in the finished [1]. Composite materials include or more substances
shape. Maximum composites have sturdy, stiff fibers in that retain their respective chemical and physical
a matrix which is weaker and less stiff. The goal is characteristics when blended together. FRP composites
commonly to make a issue which is robust and stiff, are exclusive from conventional production substances
regularly with a low density. Mass produced material like metal or aluminum. FRP composites are anisotropic
typically has glass or carbon fibers in matrices based (residences obvious inside the direction of implemented
on thermosetting polymers, consisting of epoxy or load) while steel or aluminum is isotropic (uniform
polyester resins. From time to time, thermoplastic houses in all guidelines, impartial of applied load).
polymers can be desired, because they're moldable after therefore FRP composites homes are directional, that
initial production. There are further lessons of composite means that the best mechanical houses are inside the
course of the fiber placement [2-9].
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 705
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

II. TYPES OF FIBRE REINFORCED there exists different brands too, e.g Twaron, Technora
COMPOSITE and SVM. The module of the fibers is 70-2 hundred
There are exclusive sorts of fiber strengthened GPa with closing elongation of 1.5-5% depending at
polymer are: glass fiber, carbon, aramid, extremely the high-quality. Aramid has a high fracture quality and
excessive molecular weight polyethylene, is consequently used for helmets and bullet-proof
polypropylene, polyester and nylon. The alternate in clothes. Aramid fibers are highly sensitive at high
properties of those fibers is due to the raw materials temperatures, moisture and ultraviolet radiation and
and the temperature at which the fiber is fashioned. consequently now not broadly utilized in civil engineering
packages. Similarly aramid fibers do have troubles with
A. Glass fiber reinforced polymer relaxation and stress corrosion.
Glass fibers are made up of mixing silica's and, III. PROCEDURAL STEPS
limestone, folic acid and other minor substances. The
mixture is heated until it melts at about 1260°C. The Step 1: Fiber-strengthened polymer (FRP), statistics
molten glass is then allowed to flow through holes in a in opposition to young's modulus, power, and density,
platinum plate. The glass strands are cooled, accrued coefficient of thermal enlargement, and thermal
and wound. The fibers are attracted to increase the conductivity and density, respective is given in table 1.
directional strength. The fibers are then woven into Mind set at table 2.
various bureaucracies for use in composites. Primarily Step 2: Built a normalized selection matrix through
based on an aluminum lime borosilicate composition normalization components [1] and to assemble weighted
glass produced fibers are taken into consideration the normalized matrix, proven in table 3.
main reinforcement for polymer matrix composites
Step 3: Rank the special grade type of fiber
because of their high electrical insulating quality, low
reinforcement composite by applying MOOSRA
susceptibility to moisture and excessive mechanical
method, MOOSRA method as consistent with given
residences. Glass is usually an excellent impact resistant
their properties, end result is shown in table 4
fiber however weighs more than carbon or aramid. Glass
fibers have wonderful traits same to or higher than metal IV. CONCLUSION
insure forms.
Composite materials are engineered or evidently
B. Carbon fiber reinforced polymer: occurring substances designed or greater constituent
materials with substantially exceptional physical or
Carbon fibers have a high modulus of elasticity, two
chemical qualities which remain separate and awesome
hundred-800 GPa. The closing elongation is 0.3-2.5
in the finished shape. Maximum composites have
% in which the decrease elongation corresponds to the
robust, stiff fibers in a matrix that's weaker and less
better stiffness and vice versa. Carbon fibers do now
stiff. The objective is normally to make an issue which
not soak up water and are proof against many chemical
is powerful and stiff, frequently with a low density.
solutions. They with stand fatigue excellently, do not
Industrial material typically has glass or carbon fibers
pressure corrode and do no longer show any creep or
in matrices primarily based on thermosetting polymers,
relaxation, having much less relaxation as compared to
such as epoxy or polyester resins. Sometimes,
low relaxation high tensile pre-stressing steel strands.
thermoplastic polymers can be preferred, due to the
Carbon fiber is electrically conductive and, consequently
fact that they are moldable after preliminary
might deliver galvanic corrosion in direct contact with
manufacturing. There are similarly types of composite
metal.
wherein the matrix is a metallic or a ceramic. Within the
C. Aramid fiber reinforced polymer: offered studies work, exclusive grade form of fiber
Aramid is the fast form for aromatic polyamide. A reinforcement composite is given and the author carried
well known trademark of aramid fibers is Kevlar but out MOOSRA approach with the intention to examine

706 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the high-quality as according to given their residences. [5] Oncu, M.E., Karasin, A., Y?lmaz,S., "behavior of strengthed
concrete sections with cfrp under axial loading". Journal of New
M55J is the nice than other as scoring is excessive World Sciences Academy Engineering Sciences, Vol. 5(3), 2010
1.379. p.p. 515-525.
[6] Erdemli S. and Karasin, A., "Use of FRP compos?te mater?al for
REFERENCES: strengthen?ng re?nforced concrete", European Scientific Journal.,
[1] Z. Hashin,"Analysis of Composite Materials - A Survey", ASME Vol. 10 (3), 2014, p.p. 41-49.
Journal of Applied Mechanics,Vol. 50, 1983, pp.481-505. [7] Rousakis, T.C., Manolitsi, G.E. and Karabinis, A.I., "FRP
GUIDELINE NO. GD-ED- 2210 PAGE 1 of 9 APRIL 1996. strengthening of columns - parametric finite element analyses of
[2] R.M. Christensen, Mechanics of Composite Materials, John bar quality effect", Asia Pacific Conference on FRP in Structures
Wiley and Sons, New York, 1979. (APFIS), 2007.
[3] Fiber reinforced polymer composite material selection. [8] JSCE working group on retrofit design of concrete structures in
specification revision international institute for frp in construction,
[4] Lam L., and Teng, J.G., "Design- oriented stress-strain model for "Guidelines For Retrofit of Concrete Structures (Draft)", 1999.
FRPconfined concrete." Construction and Building Materials,
Vol. 17, 6-7, 2003, pp. 471-489. [9] Roylance, D., introduction to composite materials'. Department
of Materials Science and Engineering, Massachusetts Institute
of Technology, Cambridge, MA, 02139, 2000.
TABLE: 1
Fiber reinforcement composite material grade type

Trade Trade Tensile Thermal Thermal Conduct.


Strength CTE (PPM/0F) Conduct.
Na me/Type Name/Type (Btu/hrft-0F)
(Ksi) (Btu/hrft-0F)
T3 00 33.5 5 30 -0.3 5 0.064
AS4 33.5 5 30 -0.3 5 0.065
IM7 41.1 7 10 -0.5 9 0.065
T50 56.4 3 50 -0.55 40 0 .0 654
UHMS 64 5 50 -0.55 40 0.067
P75S 75 3 00 -0.7 2 107 0.072
P10 0S 105 3 25 -0.8 300 0.078
Kevlar®49 18 5 25 -2.2 5.3 0.052
E-glass 10.5 5 00 2.8 0.56 0.094
S2-glass 12.6 6 65 3.1 0.56 0.09
Quartz 10 5 00 0.3 0.56 0.0795
K11 00 145 550 -0.9 676 0.0813
M4 6J 63.3 6 11 -0.5 676 0.0665
M5 0J 69 5 69 -0.55 57 0.0672
M5 5J 78.2 5 83 -0.61 90 0.69
M6 0J 85.3 5 69 -0.61 88 0.0694
XN-50 75 5 30 -0.8 100 0.0773
XN-70 105 5 30 -0.9 180 0.078
XN-80 114 5 30 -0.9 235 0.078

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 707


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE: 2
Attitude of Fiber reinforcement composite properties

Trade Young's Tensile Strength (Ksi) CTE Thermal Conduct. Density


Na me/Type Modulus (PPM/0F) (Btu/hrft-0F) (Lb/in 3)
(Msi)
T30 0 + + + + +
AS4 + + + + +
IM 7 + + + + +
T50 + + + + +
UHMS + + + + +
P75S + + + + +
P100 S + + + + +
Kevlar®49 + + + + +
E-glass + + + + +
S2-glass + + + + +
Quartz + + + + +
K11 00 + + + + +
M46 J + + + + +
M50 J + + + + +
M55 J + + + + +
M60 J + + + + +
XN-50 + + + + +
XN-70 + + + + +
XN-80 + + + + +
TABLE: 3
Normalized matrix of Fiber reinforcement composite material grade type

Trade Young's Modulus Tensile CTE Thermal Conduct. Density(Lb/in3)


Name/Type (Msi) Strength (Ksi) (PPM/0F) (Btu/hr- ft-0F)
T300 0.105 0.228 -0.056 0.005 0.085
AS4 0.105 0.228 -0.056 0.005 0.086
IM7 0.129 0.305 -0.093 0.008 0.086
T50 0.177 0.150 -0.102 0.038 0.086
UHMS 0.201 0.236 -0.102 0.038 0.088
P75S 0.236 0.129 -0.134 0.100 0.095
P100S 0.330 0.140 -0.149 0.282 0.103
Kevlar®49 0.057 0.226 -0.409 0.005 0.069
E-glass 0.033 0.215 0.520 0.001 0.124
S2-glass 0.040 0.286 0.576 0.001 0.119
Quartz 0.031 0.215 0.056 0.001 0.105
K1100 0.455 0.236 -0.167 0.634 0.107
M46J 0.199 0.263 -0.093 0.634 0.088
M50J 0.217 0.245 -0.102 0.053 0.089
M55J 0.246 0.251 -0.113 0.084 0.911
M60J 0.268 0.245 -0.113 0.083 0.092
XN-50 0.236 0.228 -0.149 0.094 0.102
XN-70 0.330 0.228 -0.167 0.169 0.103
XN-80 0.358 0.228 -0.167 0.221 0.103

708 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE: 4
Ranking orders

Trade Name/Type Young's Modulus (Msi)


T300 0.366
AS4 0.368
IM7 0.436
T50 0.349
UHMS 0.461
P75S 0.426
P100S 0.705
Kevlar®49 -0.053
E-glass 0.893
S2-glass 1.021
Quartz 0.408
K1100 1.266
M 46J 1.091
M 50J 0.501
M 55J 1.379
M 60J 0.573
XN-50 0.511
XN-70 0.662
XN-80 0.742

Fig: 1: Ranking orders of Fiber reinforcement composite


material grade type

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 709


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Moisture Absorption Characteristics of 3D Printed


PLA-Carbon Fiber Composites
Dr.A.Mahamani1, K.Guna Sekhar2, K.Mounika3, N. Jyothish4
1,2,3,4
Mechanical Department, Vemu Institute of Technology, Chittoor, India
Email: arumugammahamani2017@gmail.com1

Abstract- Polymer Matrix Composite (PMC) is composites are directly proportional to the volume filler
a composite material comprises of a diversity of reinforcing into the composites. The existence of the
tiny/short/ continuous fiber embedded into the filler carries most of the load during service applications.
organic polymer matrix. This material is intended 3D printing adds up as a revolutionary manufacturing
to transfer loads between the fibers over a matrix.
technique in which the layer-by-layer manufacturing
The addition of fiber enhances the mechanical
approach keeps away with the usage of costly molds,
properties, moisture resistance, and thermal
properties. PLA is a biodegradable material and is allowing the fabrication of highly controlled parameters
used as a matrix material. The moisture absorption in addition to the manufacturing of complex assemblies
of composite samples causes dimensional variation [2]. Embedding carbon fiber is one of the suitable
and spoils the dimensional accurateness. The 3D options for 3D printed polymer composites. The greater
printing process is employed to print composite moisture absorption causes the dimensional change and
samples. Printing speed, layer thickness, and spoils the dimensional accuracy. Further, moisture
nozzle diameter are selected as 3D printing process absorption enhances the weight of the composites in
parameters. The objective of the paper is to study turn reduces the mechanical properties [3]. The study
the moisture absorption characteristics of 3D on moisture absorption helps to assess the thermos-
printed PLA-Carbon fiber composites under
physical, chemical, and mechanical behavior of the
variable printing process parameters. Analysis of
polymer matrix composites. Pandian et al.[4] noted that,
the results illustrates that the sample printed by
using 50 mm/s printing speed, 0.1 mm layer there is a decrement in the flexural, tensile, and impact
thickness, and 0.2mm nozzle size has minimum characteristics when the composites are exposed to
moisture absorption. This experimental study on water immersion. Moradi and Aminzadeh [5]
moisture absorption supports the prediction of the established the relationship between mechanical
thermos-physical, chemical, and mechanical properties and infill patterns and found that the triangular
characteristics of polymer matrix composites. The infill pattern has greater tensile strength and E-modules.
establishment of moisture absorption behavior of Liua and Lei [6] investigated the mechanical behavior
the PLA-based composites will find numerous real- of 3D printed PLA composite samples with different
time applications. fillers such as aluminum, copper, ceramic, wood, and
Keywords-Polymer, Carbon fiber, Polylactic carbon fiber and observed that the raster angle and
acid, 3D printing, Moisture absorption build orientations have a significant impact on mechanical
behavior.
I. INTRODUCTION
A polymer-based composite is a dual-phase material II. MATERIALS AND METHODS
in which reinforcing fillers are embedded into a polymer PLA is a thermoplastic polymer derived from lactic
matrix. As a result, the mechanical properties of the acid and widely used for manufacturing biodegradable
polymer composites improved than the pure polymer products, such as planting cups and plastic bags. PLA
[1]. Composite properties have relied upon the is being used as a matrix material for manufacturing the
properties of basic materials such as fibers and composites. Carbon fiber is a very hard and strong
polymers. However, the stiffness and strength of the material with lightweight. It is five times harder than steel
710 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and twice as stiff. PLA Carbon fiber filler is made in


such a way that the fine carbon fiber powder is imparted
into a PLA polymer in order to enhance the mechanical
properties of the materials. The pictorial view of the
carbon fiber embedded PLA composite filament is
shown in Fig.1. The cuboid rail guide printer is used for
printing the composite samples and the photographic
view of the 3D printer is shown in Fig 2. The 3D printer
Fig.2 Cuboid rail guide 3Printer
works by ejecting liquid material over a little spout that
moves everywhere to print.

Fig 3. PLA-Carbon fiber composite sample


Fig.1. PLA-Carbon fiber filament
Table 1 Experimental layout
Printing speed, layer thickness and nozzle diameter Experiment Speed Layer Nozzle size
are selected as 3D printing process parameters. The No (mm/s) thickness Diameter
composite samples are designed by CURA software (mm) (mm)
and prepared the dimensions 10 mm X 10mm X 3mm 1. 50 0.1 0.2
2. 50 0.1 0.4
as per ASTM standard. The experimental layout for 3. 50 0.1 0.6
the present work is illustrated in the Table 1. The 4. 50 0.15 0.4
composite samples are printed under various 5. 50 0.2 0.4
experimental conditions are depicted in the Fig 3. Water 6. 85 0.15 0.4
absorption test was carried out through direct immersion 7. 100 0.15 0.4
8. 50 0.1 0.2
of PLA-carbon fiber composite sample in normal water 9. 50 0.1 0.4
at room temperature for up to 30 days. After 30 days
Table 2 Moisture absorption
each specimen is removed and washed with tissue paper
and then weighing through electronic balance. The Experiment Weight Weight Percentage
moisture absorption is estimated as percentage of weight No before after of weight
moisture moisture gain (%)
gain by samples and it is estimated by the ratio amongst (gram) (gram) (gram)
the weight difference between the sample before and 1. 1.15 1.18 2.542
after weight and weight of the after moisture absorption. 2. 1.17 1.179 0.763
As per the previously mentioned procedure, the 3. 1.18 1.19 0.840
4. 1.16 1.18 1.695
moisture absorption is estimated as percentage of the
5. 1.17 1.18 0.847
weight gain and illustrated in the Table 2. 6. 1.12 1.14 1.754
7. 1.15 1.19 3.361
8. 1.02 1.024 0.391
9. 1.17 1.18 0.847

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 711


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. RESULT AND DISCUSSION IV. CONCLUSION


From the experimental result, the percentage of The present study deals the Moisture absorption
moisture absorption under different experimental characteristics of the3D printed PLA-Carbon fiber
conditions are estimated and illustrated in the Fig 4. It composites. Polymer composites are printed different
can be noted from the Fig.4, the sample used for process parameters and moisture absorption test is
experiment 8 has least value of moisture absorption. carried out. Analysis of the results shows that the
The corresponding process parameters are 50 mm/s composite sample prepared under 50 mm/s printing
printing speed, 0.1 mm layer thickness and 0.2mm speed, 0.1 mm layer thickness and 0.2mm nozzle size
nozzle size. It may be attributed that the slower printing has lower moisture absorption. Further, greater printing
speed offers sufficient time to cool the deposited speed and nozzle size allows more moisture absorption.
materials. Lower size layer thickness also contributes The study on moisture absorption helps to assess the
for enhancement of binding of one layer with other layer thermos-physical, chemical and mechanical behavior
and reduce the micro-gap between the layers. Hence, of the polymer matrix composites. The individual effect
the entrapment of water will be reduced. Further, the of 3D printing process parameters on moisture
lower size nozzle allows less volume of materials and absorption and the influence of carbon fiber on moisture
facilitate for deposition along with filling of micro-cavities absorption could studied as future work in order to
on the previously printed layers. This phenomenon also understand the complete mechanism of moisture
supported for lower moisture absorption. On the other absorption.
hand, the experiment number 7 yields greater moisture
absorption. The corresponding process parameters are V. ACKNOWLEDGEMENT
100 mm/s printing speed, 0.15 mm layer thickness and The authors gratefully acknowledge the support from
0.4 mm nozzle size. Grater printing speed and nozzle K.Chandra Sekhar, A.R.Leelasai, B.Raviteja, R.
size allows micro-pore formation at few places on the Ganesh Kumar and R. Rakesh
PLA surface. This mechanism permits more moisture
REFERENCES
storage and enhance the moisture absorption. The
individual effect of 3D printing process parameters on [1] G. T. Mahesha, B. K. Subrahmanya, and N. H. Padmaraja,
"Biodegradable natural fiber reinforced polymer matrix
moisture absorption and the influence of carbon fiber composites: Technical updates," in INTERNATIONAL
on moisture absorption could studied to understand the CONFERENCE ON INVENTIVE MATERIAL SCIENCE
moisture absorption. APPLICATIONS?: ICIMA 2019, 2019.
[2] X. Wang, M. Jiang, Z. Zhou, J. Gou, and D. Hui, "3D printing of
polymer matrix composites: A review and prospective," Compos.
B Eng., vol. 110, pp. 442-458, 2017.
[3] R. M. V. G. K. Rao, M. Chanda, and N. Balasubramanian, "Factors
affecting moisture absorption in polymer composites part II:
Influence of external factors," J. Reinf. Plast. Compos., vol. 3,
no. 3, pp. 246-253, 1984.
[4] A. Pandian, M. Vairavan, W. J. Jebbas Thangaiah, and M.
Uthayakumar, "Effect of moisture absorption behavior on
mechanical properties of basalt fibre reinforced polymer matrix
composites," J. Compos., vol. 2014, pp. 1-8, 2014.
[5] M. Moradi, A. Aminzadeh, D. Rahmatabadi, and A. Hakimi,
"Experimental investigation on mechanical characterization of
3D printed PLA produced by fused deposition modeling (FDM),"
Fig 4 Moisture absorption characteristics Mater. Res. Express, vol. 8, no. 3, p. 035304, 2021.
[6] Z. Liu, Q. Lei, and S. Xing, "Mechanical characteristics of wood,
ceramic, metal and carbon fiber-based PLA composites fabricated
by FDM," J. Mater. Res. Technol., vol. 8, no. 5, pp. 3741-3751,
2019.

712 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Non-Chemical Water Treatment for Enhancing - pH


Factor in Drinking Water
Dr. K. Naveena Latha1, Dr. P. Ram Reddy2, Dr. D.V.Ravi Shankar3
1,3
Department of Mechanical Engineering, TKR College of Engineering and Technology, Telangana, India
2
Department of Mechanical Engineering, Former Jawaharlal Nehru Technological University, Hyderabad, India
Email: naveenalathakaramkonda@tkrcet.com1, ramreddy1944@gmail.com2, shankardasari64@gmail.com3

Abstract: Water - An element essential for Keywords: Alkalinity. Acidic Nature, pH value,
existence of all the living beings on the face of the Non- Chemical Water Treatment, Pressure Drop
Earth. The fact that only 10% of the total water Chamber, Cavitation, Alkaline Water, Water
available for consumption can be used for drinking Scarcity.
purposes can never be ignored and thus it makes
inevitable to study about effective utilization of INTRODUCTION
water by adopting various methods to replenish and Both natural and human causes have made a
reuse the available water resources. noticeable decline in the available drinking water
The pH of water is one of the prime quality of resources. The Global water crisis scenario quotes that
concern which makes the water usable of drinking more than 2.1 billion people still live without safe
purposes. The acidic or alkaline nature of water drinking water across the globe. Indian city Chennai in
determines the use of water for specific utilities. Tamil Nadu State and cities like Cape Town in the
Alkaline water is more suitable for drinking African continent have seen the worst days of water
purposes and also for aqua culture. The acidity and
scarcity in the recent past. Railway wagons were utilized
alkalinity describe the waters capacity to neutralize
strong acids. The definition of pH is based on the
to transport drinking water for about 250kms to supply
logarithmic transformation of the hydrogen ion the residents of Chennai City. With the existing water
concentration (H+).[2] scarcity scenario, the domestic and industrial sector
faces a major challenge in water consumption. Most
The experimental study is made on improving
researchers and industries today focus on replenishing
the pH value of water making it suitable for
drinking. The proven method of Pressure drop and reusing of water which reduces the stress on water
method of water treatment is effective in increasing demand. [1]
the pH value of water making it usable for drinking The pH Overview
purposes. The pressure drop method of water
treatment uses the effect of pressure drop caused Temperature, salinity, hardness, pH, acidity, and
by passing of water through a convergent nozzle in alkalinity are fundamental variables that define the quality
the closed chamber at various inlet air pressures. of water. Although all six variables have precise,
The precipitate formation reduces the TDS and unambiguous definitions, the last three variables are often
Hardness of water thus increasing the pH of water misinterpreted in aquaculture and fisheries studies.[9]
making it suitable for drinking purposes by further
addition of minerals.[15] The pH Value is an index of the Concentration of
Hydrogen Ion [H+] in water. The technical definition
The pressure drop created enhances the higher
levels of calcium carbonates which results in
of pH is that it is a measure of the activity of the hydrogen
increasing the alkalinity of water. The experimental ion [H+] and is reported as the reciprocal of the
study resulted in the increase of pH value from logarithm of the hydrogen ion activity. Therefore, a
7.1to 7.91 which accounts to11.5% increment. water with pH value 7 has 10-7 moles per litre of
hydrogen ions. The pH scale ranges of 0 to 14 with 0
being acidic and 14 being alkaline. The ideal pH level
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 713
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

of alkaline ionized water for long term human slows down the effects of aging also reduces diabetic
consumption is between 8.5 to 9.5. This pH value and kidney disorders[1,2]
affects the most biological and chemical processes and This characteristic of alkaline water keeps the human
thus considered as an important parameter in water body hydrated allowing the water pass in and out of
quality study. [2] the cells more easily and also helps in flashing out the
The quantitative assessments of C02 sea water can toxins in the body more effectively.
be obtained through determinations of alkalinity and The alkaline water due to its vivid beneficial
pH.[9] characteristics also enhances the aquatic life and thus
The pH value of water is an intensity factor, whereas improves the productivity of aquaculture. [21]
the acidity and alkalinity are the capacity factors.
Alkalinity is the waters capacity to neutralize strong acids Working Principle of Pressure Drop Chamber
and Acidity is the water capacity to neutralize strong The pressure Drop Chamber method of Water
bases. treatment is a proven method of Non -Chemical Water
pH of Common Liquids treatment. The Pressure drop method allows the water
pass through two oppositely faced convergent nozzles
Vinegar 3.0
in a closed chamber. The water thus colliding oppositely
Wine 2.8 - 3.8 creates a low pressure in the middle of the chamber
Beer 4-5 with causes cavitation. This results in rapid formation
Milk 6.3 - 6.6 and collapse of bubbles in the chamber releasing
Seawater 8.3 enormous amounts of energies required for precipitate
(Source: Driscoll, 1986) formation. [15]
Alkaline Water and its Advantages The Pressure Drop Method of water treatment
comprises of a Pressure Drop Chamber and
pH values of water will determine its utility.
Convergent Nozzles which are assembled as shown in
Alkaline ionized water with its pH levels between the Fig.1.1
8.5 to 9.5 is considered ideal for long terms human
consumption.
Alkaline water with higher pH levels help balance
the acidity in the human body this benefits the people
suffering from acids reflects, diabetics, cancer and other
critical deceases caused by high acid levels in the
body.[1]
Pure water doesn't contain any minerals and thus
has a lower Ph levels. Alkaline water due to its higher
pH levels has these dissolved minerals which can be
absorbed by the human body. Drinking alkaline water
enhances hydration, improves acid base balance and
anaerobic exercise performance for sports persons.[1]
Alkaline water with higher pH ideal pH value is made FIG:1: Experimental set up of pressure drop assembly

up of small cluster of water molecule which can be The Chamber length for the experimental setup is
absorbed better by the human body as compared to considered as 200, 300 and 400mm and the
normal water. Long term consumption of alkaline water Convergent nozzles have been designed based on the

714 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

L/D ratio 1.5. The chamber design and the nozzle design Experiment 1.
are as shown in Fig 1.2 and 1.3 The water is allowed to pass through the pressure
drop chamber of length 200mm and Convergent nozzle
of exit diameter 12mm with varying air pressures of
1,3,5 and 7 bar.
The water is collected after a settling time of 30 min
and is sent for analysis. The results are plotted in the
graph below.

Fig:2: Various Length of chamber lengths

Fig:4:ph values increases from various pressure values of 200


mm chamber length

It is observed that the pH value of water increased


from 7.1 to 7.21 under inlet air pressure of 1 bar. As
the inlet air pressure increases, the pH value of water
increased from 7.1 to 7.3 at 3bar, 7.34 at 5 bar and
7.36 at 7 bar inlet air pressure. It indicates that at a
higher air pressure of 7 bar the water alkalinity increases.
Experiment 2.
The water is passed through the Pressure Drop
Chamber of length 300mm and nozzles of exit diameter
12mm with varying pressures of 1,3,5 and 7 bar. The
sample is collected after 30min of settling time and is
sent for analysis further.
Fig:3: convergent Nozzle dimensions
The results are detailed as below.
Experimental Approach
The Pressure Drop Method assembly is further
experimented in the following sequential manner.
The water is allowed to pass through the converging
nozzles in the pressure drop chamber at varying
pressures to analyze the variation of pH in the water.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 715


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

formation increases, thus making the water more


alkaline and fit for human, domestic and aquaculture
utility.
CONCLUSION:
The experimental investigation of Water Alkalinity
(pH value) improvement through Non Chemical Water
treatment is effective and sustainable. The experiment
concluded that as the inlet air pressure to the pressure
Fig:5:ph values increases from various pressure values of 300
mm chamber length
drop chamber increases the water alkalinity also
increases even at varying chamber lengths. The pH value
It is investigated that the pH value of water noticeably of water increased at 3%, 11% and 10% respectively
increased at higher pressures. The pH value of water in 200, 300 and 400mm pressure drop chambers
increased from 7.1 to 7.91 with an incremental air respectively.
pressure from 1 to 7 bar which accounts to11% increase
thus making the water alkaline enough for human The experiment concluded that higher the volume
consumption. of air induced in to the designed cavitation chamber
(which is increasing the oxygen supply to the chamber
Experiment 3. increased the alkalinity of the water making it more
The water is passed through the Pressure Drop usable for drinking purposes.
Chamber of length 400mm and nozzles of exit diameter
12mm with varying pressures of 1,3,5 and 7 bar. The
sample is collected after 30min of settling time and is
sent for analysis further.
The analysis of the water indicated the following
values of pH at various pressures.

REFERENCES:
[1] B.Rubik., "Studies and observations on the health effects of
drinking electrolyzed-reduced alkaline water". B. Journal in ,WIT
Transactions on Ecology and The Environment, Vol 153,© 2011,
ISSN 1743-3541.
[2] Craig S. Tucker, Rawee Viriyatum, Claude E. Boyd.,
"Interpretation of pH, Acidity, and Alkalinity in Aquaculture
Fig:6:ph values increases from various pressure values of 400 and Fisheries", North American Journal of Aquaculture 73:403-
mm chamber length 408, 2011. American Fisheries Society 2011, ISSN: 1522-2055.
It is evident from the table and graph above that, [3] Abdul Nasir Laghari, Gordhan Das Walasai, Abdul Rehman Jatoi.,
the pH value of water increases as the inlet air pressure " Performance Analysis of Water Filtration Units for Reduction
of pH, Turbidity, Solids and Electricity Conductivity". Journal
increases. The increase in 10% of pH value of water in Engineering, Technology & Applied Science Research Vol. 8,
indicates under 7 bar inlet air pressure, the precipitate No. 4, 2018, 3209-3212.

716 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[4] Sabrina Chelli, Adnan Falah, Rami El Khatib., "A Comparison [12]Lawrence E. Armstrong, Matthew S.Ganio, Jennifer F. Klau,
Study of Water Quality among Different Regions of Sharjah and Evan C. Johnson, Douglas J. Casa, and Carl M. Maresh., "Novel
Ajman in the United Arab Emirates".Avestia Publishing hydration assessment techniques employing thirst and a water
International Journal of Environmental Pollution and Remediation intake challenge in healthy men". Appl. Physiol. Nutr. Metab.
Volume 2, Issue 1, Year 2014 ISSN: 1929-2732 DOI: 10.11159/ 39: 138-144 (2014) dx.doi.org/10.1139/apnm-2012-0369.
ijepr.2014.002.
[13]Sanetaka Shirahata,Shigeru Kabayama, Mariko Nakano, Takumi
[5] C. R. Ramakrishnaiah, C. Sadashivaiah And G. Ranganna., Miura, Kenichi Kusumoto, Miho Gotoh, Hidemitsu Hayashi,
"Assessment of Water Quality Index for the Groundwater in Kazumichi Otsubo, Shinkatsu Morisawa, and Yoshinori
Tumkur Taluk, Karnataka State", ISSN: 0973-4945; CODEN Katakura., "Electrolyzed-Reduced Water Scavenges Active
ECJHAO E-Journal of Chemistry http://www.e-journals.net Oxygen Species and Protects DNA from Oxidative Damage".
2009, 6(2), 523-530. Received 18 August 2008; Revised 29 Biochemical And Biophysical Research Communications 234,
November 2008; Accepted 11 December 2008. 269-274 (1997) Article No. Rc976622.
[6] Basavaraja Simpi, S.M. Hiremath, KNS Murthy, [14] Kokichi Hanaoka, Dongxu Sun, Richard Lawrence, Yoshinori
K.N.Chandrashekarappa, Anil N Patel, E.T.Puttiah., "Analysis Kamitani , a, cc b Gabriel Fernandes., "The mechanism of the
of Water Quality Using Physico-Chemical Parameters Hosahalli enhanced antioxidant effects against superoxide anion radicals of
Tank in Shimoga District, Karnataka, India". Global Journal of reduced water produced by electrolysis". Biophysical Chemistry
Science Frontier Research Volume 11 Issue 3 Version 2011 Type: 107 (2004) 71-82. Received 8 July 2003; received in revised
Double Blind Peer Reviewed International Research Journal form 22 August 2003; accepted 22 August 2003
Publisher: Global Journals Inc. (USA) ISSN: 0975-5896.
[15] Dr. P Ram Reddy et al. "Non- Chemical water Treatment Process
[7] Jakub ChyckiID, Anna Kurylas , Adam Maszczyk , Artur Golas for TDS Reduction in cooling Tower Specific Study on Electrical
, Adam Zajac., "Alkaline water improves exercise-induced Conductivity & Turbidity" .December 2018,151-158, Scopus
metabolic acidosis and enhances anaerobic exercise performance indexed journal. International Journal of Mechanical and
in combat sport athletes." e0205708. The effectiveness of alkaline production Engineering Research and Development (IJMPERD)
water as an improvement in anaerobic performance. (2018) .PLoS ISSN(P):2249-6890,ISSN(E):2249-8001,Vol 8,Issue 6, scopus
ONE 13(11). index paper
[8] S. M. Shirreffs., "Hydration in sport and exercise: water, sports [16] Ref Annual Report 2017-Word Bank Group, Www.World Bank.
drinks and other drinks". Journal compilation © 2009 British Org/En/About/Annual Report.
Nutrition Foundation Nutrition Bulletin, 34, 374-379.
[17] AQUASTAT survey-2011, "Irrigation In Southern And Eastern
[9]By H. Dennig, J. H. Talbolt, H. T. Edwards And D. B. Dill., Asia", Edited By Karen Krenken, food, and agriculture
"Effect Of Acidosis And Alkalosis Upon Capacity For Work. Organisation Of The United Nations Rome,2012, ISBN 978-92-
From the Fatigue Laboratory". Morgan Hall, Harvard University, 5-107282-0.
Boston (Received for publication September 16, 1930).
[18] Dong Li, "Simulation of cavitation induced by water hammer",
10]Soetanto Hartono, Sukadiono., "The Effects of Sodium Bicarbonate science direct journal of hydrodynamic,2017,29(6):972-978.
and Sodium Citrate on Blood pH, HCO3-, Lactate Metabolism
[19] Kanchan Chavan, B Bhingole, J Raut, and A B Pandit, "Numerical
and Time to Exhaustion". Sport Mont 15 (2017) 1: 13-16 Original
Optimization of converging-diverging cavitation nozzles", Journal
scientific paper UDC 612.12:796.056.
of Physics: Conference Series 656 (2015) 012138.
[11]Louise M. Burke and David B. Pyne., "Bicarbonate Loading to
[20] David Nicholas, Philip Vella, Ph.D.," Chemical Free Bacteria
Enhance Training and Competitive Performance. International
and Legionella Control: A Case Study Using Hydrodynamic
Journal of Sports Physiology and Performance". 2007;2:93-97
Cavitation", report on VRTX Technologies Schertz, Texas,2014.
© 2007 Human Kinetics, Inc. Burke is with the Dept of Sports
Nutrition, and Pyne, the Dept of Physiology, Australian Institute [ 2 1 ] ( S o u r c e : h t t p : / / w w w. e p a . g o v / b i o i n d i c a t o r s / p d f /
of Sport, Belconnen, ACT 2616 Australia. Chapt4_WQS_final.pdf )

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 717


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Review on Wire + Arc Additive Manufacturing of AA


7075 Correlation of Arc Mode Microstructure &
Mechanical Properties
P. Koteswara Rao1, Dr. K.L. Narayana2
1
Research Scholar, Mechanical Engineering Department, K L UNIVERSITY, Guntur.
2
FIE, Dean R&D (Adviser), K L UNIVERSITY, Guntur.
Email: Koteswararaoprathipati@tkrcet.com1, drkln@kluniversity.in2

Abstract: Wire arc additive manufacturing improves production efficiency and manufacturing
(WAAM) is a promising approach to producing flexibility [3, 4]. Laser beams, electron beams, and
large-scale metal structures. The investigation on electric arcs are commonly used heat sources during
the WAAM of aluminum alloys and Titanium alloys additive manufacturing of metallic components [5-7].
has lasted for over 16 years and covered multiple
When laser beams or electron beams are selected as
alloy systems. However, fundamental research on
the WAAM of quaternary Al-Zn-Mg-Cu alloys is
the heat source, the energy control is accurate, and the
still lacking. This review paper focuses on component shape is relatively precise [8, 9]. Therefore,
understanding the micro structural characteristics investigations regarding additive manufacturing based
and mechanical properties of an ultra-high-strength on laser and electron beams are thorough [10-12].
alloy fabricated by WAAM. Results indicate that a Direct energy deposition and power bed fusion are the
single deposition layer consists of two types of general additive manufacturing processes used when
columnar grains with different micrographs and laser beams or electron beams are selected as the heat
origins. Nanoscale second phases are observed to source [13, 14].
precipitate during the manufacturing process with
location-dependent sizes and volume fractions due Wire arc additive manufacturing (WAAM) adopts
to different thermal histories. The micro hardness an arc as the heat source and metal wire as the feedstock
of the cross-section exhibits a special un-uniform material. Generally, the primary cost of the metal wire
distribution between 75-164 HV0.2 from the is approximately 10% of the same weight of metal
substrate to the top of the component. The WAAM powder. During the WAAM process, the metal wire is
deposited component shows higher overall tensile heated, melted, and then transferred to the melt pool
properties than the as-fabricated spray formed and then solidifies at the melt pool boundary and forms
counterpart. The average yield strength and digitally designed components [15, 16]. WAAM is a
ultimate strength are higher in the vertical direction
kind of droplet based additive manufacturing process,
than in the horizontal direction, while the difference
in elongation is small.
which is very promising for the direct fabrication of
complex thin walled parts [17, 18]. WAAM features a
Keywords: Additive Manufacturing; AA 7075; high deposition rate, which is suitable for fabricating
Microstructure; Mechanical Property large scale components [19,20]. Furthermore, WAAM
1. INTRODUCTION features advantages such as low cost and low wastage
rate, and thus WAAM is an advantageous alternative
Additive manufacturing transforms the fabrication of additive manufacturing process to other methods based
a structurally complicated three-dimensional (3D) on laser and electron beams [21,22]. The dominant
component into stepwise additions of thin material layers factor that affects the component morphology,
guided by a digital model [1, 2]. Additive manufacturing microstructure, and mechanical properties during
enables the fabrication of structurally complex WAAM is the heat input. However, differences in heat
components without using a mold, which significantly

718 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

input exist when different arc modes are adopted even conducted on the different locations of the components,
if the wire feeding rate is held constant. and the fracture morphologies were analyzed to reveal
Another particular phenomenon found in WAAM is the relationships between the metal transfer modes and
the transfer of liquid droplets across the arc from the mechanical properties.
wire electrode to the melt pool [23, 24]. The liquid A major benefit of the WAAM process relates to
droplet temperature is higher than the solidus the low capital investment, as the components of a
temperature, and part of heat is transferred to the melt WAAM machine may be derived of open source
pool by the liquid droplet [25]. However, differences equipment, sourced from an array of suppliers in the
in liquid droplet transfer exist when different metal mature welding industry [30]. The processing
transfer modes are adopted even if the wire feeding characteristics may also make the WAAM process
rate is held constant. Therefore, what is essential but preferable compared to the alternative fusion sources.
seldom reported in the literature is to reveal what and For example, WAAM does not does not need a
how the metal transfer mode affects the component vacuum environment to operate as required in electron
morphology, microstructure, and mechanical properties beam based methods [31]. As such, prolonged set up
during WAAM. Cong et al. [26] systematically and ramp down times which can lead to over-aging in
investigated the effects of different metal transfer modes precipitate hardened materials can be avoided [32].
during the cold metal transfer (CMT) process on the Whilst inert shielding gas may not be required in electron
porosity characteristics of additively manufactured Al- beam DED to avoid atmospheric contamination, there
6.3%Cu alloys, and their results indicated that heat input is an elevated susceptibility to element depletion and
is one of the critical factors that enables the CMT pulse evaporation during processing [33]. In comparison to
advanced (CMT-PADV) process to control the laser based methods, the use of the electrical arc offers
porosity rate. Luo et al. [27] conducted WAAM on a higher efficiency fusion source [34]. This is of benefit
aluminum alloys using pulsed arcs and non pulsed arcs, from an energy consumption perspective, in particular,
and their results indicated that pulsed arcs can achieve for reflective metal alloys of poor laser coupling
higher droplet transfer frequencies and that the size of efficiency such as aluminium, copper [35] and
the droplet in the pulsed arc approach is smaller than magnesium [36]. With typical layer heights of 1-2 mm,
that in the non pulsed arc approach. Although some surface waviness of 500 ?m [37] and deposition rates
characteristics of WAAM under various arc modes have up to 10 kg/hr, WAAM productivity and material
been documented in the literature, the component removed is similar to laser based and electron beam-
morphology, integrity, microstructure, and mechanical based DED approaches. Research and developments
properties are not comprehensively demonstrated or have allowed the WAAM process to become highly
understood. Stainless steel 316L is a kind of austenitic capable in a number of materials, including aerospace
stainless steel that is widely used in marine and offshore titanium alloy Ti-6Al-4 V and nickel bronze, where
equipment, automobiles, and nuclear reactors due to static mechanical properties close to those found in
its outstanding corrosion resistance, high strength, high wrought and cast can be produced [38]. Present there
ductility, and relatively low cost [28,29]. Arc current are several commercial WAAM machine manufacturers
and arc voltage data were collected during the additive and/or service providers able to produce WAAM
manufacturing process to evaluate the manufacturing components in a number of materials. However, high
process stability. X-ray CT tests were conducted on quality production of WAAM parts is only achievable
tensile samples of the component to evaluate the when the specific materials processing challenges related
structural integrity of the manufactured component. The to the high-levels of heat input of the WAAM process
microstructures at different locations in the components are addressed. Williams, et al. [39] and Ding et al.
were characterized to reveal the relationship between regarded the management of the high levels of residual
the arc modes and microstructures. Tensile tests were stress and distortion as the primary heat related material

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 719


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

processing challenge in WAAM. Ding et al. considered


the surface finish of WAAM parts another major
concern to dimensional compliance as well as premature
part failure. Practical methods of mitigating these issues
were presented, but were limited in scope primarily to
build strategies for the management of residual stress.
Pan et al. [40] Summarized of static mechanical
properties achieved in WAAM research, reporting the
Figure 1. WAAM system
welding technology and processing condition, e.g. heat
Table 1 Deposition parameters
treated, interlayer cooling etc. however, the mechanisms
Wire Inter-pass
of material property improvements were not discussed. EP
Current
EN
Current
EN-EP
Balance
AC
Frequency
Arc
length
Deposition
speed
feed temperature
speed
This project identifies the full range of materials (A) (A) (%) (Hz) (mm) (cm/min)
(cm/min)
220 120 80 105 4 10 130 80
processing challenges in WAAM. The primary process
selections and ancillary processes that may be used in A single-pass multilayer component was
WAAM are classified by the authors and the strategies manufactured with the WAAM system, as shown in
in which they may be deployed to overcome these Figure 2. The length, width, and height are 250 mm, 10
challenges are presented. Finally, future challenges and mm and 55 mm, respectively. Cross-section of the
opportunities in the area of WAAM are identified. fabricated component.

2. EXPERIMENTAL WORK
2.1 Material and methods
The 7055-Aluminum alloy flat plates join was with
the WAAM system shown in Figure 1, which consisted
of a Miller Dynasty 350 GTAW power supply, a GTAW
Figure 2. Single-pass multilayer component: (a) The
torch, a preheating platform, a three-degrees-of- fabricated component, (b) Cross-section of the fabricated
freedom moving table, a wire feeder, and a control component
system. For the WAAM process, the preheating For the tests on the tensile properties, samples were
platform was heated to a certain interlayer temperature cut in two directions: horizontal and vertical, as shown
(80 ? in this experiment). When depositing a single layer, in Figure 3. Eight test samples were cut for each
the welding torch remained static, while the moving table direction. All samples were polished with metallographic
traversed a pre-set trajectory. When one layer was abrasive paper. Tensile tests were carried out with
deposited, the welding torch was lifted to the next layer, Instron-5569 at room temperature with a loading
and the moving table returned to the starting place. The velocity of 2 mm/min. Sample fractures were observed
temperature of the layer was detected with a Tachyon with an FEI Quanta 200FEG SEM to investigate the
1024 ?core thermal imager. When it decreased to the fracture mechanism.
pre-set level, the next layer was deposited. The
deposition parameters used in this work are presented
in Table 1. SAL7055 aluminum wires with a diameter
of 1.2 mm were used as feedstock.

Figure 3. Cutting locations and dimensions of tensile

720 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3. RESULT AND DISCUSSION of the cross-section. These second phases are


continuously distributed on grain boundaries, forming a
3.1 Second phase and distribution of alloy complex network. Skeletal structures are observed
elements within the different phases, as shown in Figures 4.b-d.
To characterize the distribution of alloy elements in This indicates that they are eutectics with the matrix.
as-deposited 7055-Al at the micro-scale, electron As shown in Figure 4.d, a small number of gray phases
probe micro analysis (EPMA) was performed in the are wrapped by white phases. EDS analysis was
middle part of the cross-section. As shown in Figure 4, conducted on seven points within the second phase,
the results indicate severe element segregations. The marked in Figure 4. The chemical constituents of those
solute distribution coefficients of main alloy elements white phases are similar. The proportions of Zn, Mg
Zn, Mg, and Cu are less than 1.0. Thus, during non- are almost identical, while the proportion of Cu is lower,
equilibrium crystallization, they enrich on grain and the content of Al is high. It is difficult to determine
boundaries and dendritic boundaries to form residual the definite phase types from the tested chemical
second phases. This kind of distribution is detrimental compositions without evidence of crystal structures as
to the mechanical properties and corrosion resistance the alloy elements dissolve during non-equilibrium
because intermetallic at this scale is brittle and has a solidification. The gray phases have a high content of
large electric potential difference with the matrix Several the impurity element Fe, and the Cu content is higher
studies on cast AA-7055 aluminum alloy have proven than the Zn and Mg contents. Thus, they can be inferred
that the main second phases in the solidified state are T to be Al7Cu2Fe.
(Al2Mg3Zn3), (Mg(Zn,Cu,Al)2), S(Al2CuMg), and
(Al2Cu). We conducted microregion X-ray diffraction
(XRD) in the middle part of the cross-section. As shown
in Figure 5, the diffraction peaks of -Al and (Mg
(Zn,Cu,Al)2) are identified.

Figure 5. Micro region XRD of as-deposited 7055-Al

The bright-filed images show that nanoscale second


phases is also present in the Al matrix. Three samples
from different layers were observed to determine
whether the nanoscale second phases form during the
solidification process or the subsequent deposition
process. Their distances to the top of the component
are 4 mm, 20 mm, 40 mm. Bright-field images taken at
the same magnification are shown in Figure 6 a, b, and
Figure 4. SEM images of as-deposited 7055-Al: (a) Low- c. We found that the matrix in the last deposition layer
magnification BSE image of the middle part on the cross- is free of precipitates. Alloy elements are mainly
section, (b) second phases on grain boundaries, (c) second
phases inside grains, (d) grey phases wrapped by white dissolved into the matrix and distributed. Inside the large
phases. second phases, while abundant second phases
SEM and EDS were used to characterize these precipitate out in the lower part. Their sizes tend to
second phases. Figure 4.a shows a low magnification increase as the observed location experiences more
backscattered electron (BSE) image of the middle part thermal cycles during manufacturing. Thus, the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 721


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

nucleation and growth of these nanoscale second phases Locations near the top of the component (Position A)
may have occurred in the subsequent deposition experiences no effective thermal cycles within the
process. precipitation temperature range. Alloy elements are still
soluted in the matrix. After that, locations closer to the
substrate experiences more effective thermal cycles
(Position B and C). The precipitates are more likely to
nucleate and grow larger. However, as the distance to
heat source also increases, the peak temperatures of
subsequent thermal cycles may decrease below the
precipitation temperature range, so the growth of the
precipitates cannot keep continuing. The sizes of the
precipitates finally achieve stability (Position D). We
examined these nanoscale second phases in more detail
by using HADDF.
Figure 6. Second phases at different locations: (a) 4mm, (b) 3.2 Mechanical Properties
20mm, and (c) 40mm to the top of the component; (d) a
schematic figure of the formation mechanism of second 3.2.1 Micro hardness
phases

During the information of these second phases, the Micro hardness tests were carried out on the cross-
solid solubility, diffusion rates of alloy elements, and section of as-deposited 7055- Al to evaluate the
temperature are the three main influencing factors. The micromechanical properties. We focused on the
bright-filed image of the last deposition layer indicates hardness uniformity at different layers. An interval of 1
that the requirement for solid solubility in the matrix can mm was chosen along the vertical direction, and 5 points
be met. For the diffusion rates of the alloy elements, were tested at each location. The hardness distribution
the cooling rates during deposition are much less than is shown in Figure 7. The hardness increases significantly
that of water quenching, which is usually conducted from the bottom to the top of the cross-section. The
during solution treatment. Thus, the vacancy densities chemical composition of the substrate is different, due
are also lower, which can be an obstacle for alloy to the dilution effect, the first few points have the lowest
elements to diffuse in the solid-state. However, because hardness. Below a height of 20 mm, the hardness
Al has high thermal conductivity, the subsequent distribution stabilizes at around 75 HV0.2. However, it
deposition reheats the deposited layers to increase the increases at a rate of 3.8 HV0.2/mm to 164 HV0.2 up to
equilibrium vacancy concentration and the diffusion rates a height of 45 mm. Above 45mm, the hardness
of the alloy elements. With regard to the temperature, decreases gradually to 136 HV0.2. This non-uniform
the subsequent deposition can be regarded as a short hardness distribution significantly differs from that of
non-isothermal aging process. Validated thermal other aluminum alloys fabricated by WAAM.
process numerical studies [3,11] indicate that the peak
temperatures of successive thermal cycles caused by
subsequent deposition on a single layer can exceed 120
- 200, which is the required temperature range for the
formation of  phases. Thus, the requirement of
temperatures or thermodynamic driving forces can also
be achieved. Therefore, precipitation and growth can
proceed during the WAAM process for this type of
aluminum alloy. As shown in Figure 6, the sizes of the Figure 7. Hardness distribution on the cross-section
precipitate depend on the local thermal history.

722 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The hardness distribution can be explained by the 148.3±15.9 MPa, 230.7±12.0 MPa, and 3.3±1.0 %,
evolution of the second phase. For the top region above respectively. The results from different samples show
45 mm, the alloy elements are dissolved in the Al matrix, significant dispersion, especially for elongation. This
and the strengthening mechanism is mainly solution indicates that the as-deposited 7055-Al is not sufficiently
strengthening. As discussed in the second phase can homogeneous. The average yield strength and ultimate
precipitate out during the deposition process for as- strength are 16.8 % and 7.6 % higher in the vertical
deposited 7055-Al. For the lower part of the direction than in the horizontal direction. In contrast,
component, the strengthening mechanism gradually the difference in average elongation according to
changes to precipitation strengthening. Thus, we direction is small, considering the large fluctuations in
observed the hardness increasing from the top of the the test data.
specimen to the height of 45 mm after several
subsequent thermal cycles. The strengthening effect of
second phases with incoherent sizes can be expressed
by the Orowan mechanism [33]: wherec is the shearing
stress required by dislocations, f and R are the volume
fraction and radius of the precipitates, G is the shear
modulus,  is the Poisson's ratio, b is the Burgers vector,
and r0 is the radius of the dislocation core. The model
indicates that the strengthening effects are highly sensitive Figure 8 Tensile properties of as-deposited 7055-Al: tensile
curves of (a) horizontal and (b) vertical specimens, strengths
to the sizes and volume fractions of the second phase. and elongations of (c) horizontal and (d) vertical specimens
However, because the subsequent thermal cycles during
Table 2 shows a comparison of tensile properties
WAAM can be regarded as isothermal aging with
between the as-deposited specimen and 7055-Al in
relatively high peak temperatures for the deposited
other states. Compared with other as-fabricated states,
metal, the growth rate of the second phase after
the WAAM deposited 7055-Al exhibits greater strength
nucleation is very fast [29,31,34]. This increases the
and elongation than the spray formed counterpart
growth in size and reduces the volume fractions, which
without further extrusions [35], and higher elongation
further degrades the strengthening effects. Thus, the
than the direct chilling cast counterpart [36]. However,
hardness decreases significantly from the height of 45
compared with those that have been subjected to hot
mm to 20 mm and finally reaching a stable state.
working and heat treatments [35, 37, 38], the WAAM
3.2.2 Tensile tests deposited 7055-Al shows inferior overall tensile
properties. There are two reasons for the poor
Tensile tests were carried out on as-deposited 7055-
performance. On the one hand, there are ubiquitous
Al to evaluate the macromechanical
porosities in the as-deposited has been observed during
properties. Samples were tested in both horizontal WAAM, the solutes are depleted by the large second
and vertical directions to compare the anisotropies that phases. The solution strengthening and precipitating
have been observed in other as-deposited materials. strengthening effects are still weaker than the heat-
Figure 8 shows the tensile properties. We labeled the treated specimens.
tensile test samples by the test direction and sample
ID. For example, H-3 represents the third test sample
in the horizontal direction. Figure 8a and b show the
tensile curves of the 16 specimens, while Figure 8 c
and d give the strength and elongations obtained from
tensile curves. The average yield stress, tensile stress,
and elongation of as-deposited 7055-Al are

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 723


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 2. Mechanical properties of 7055-Al in different states surfaces: (a) Low magnification image of the front
Manufacturing
Heat treatment Temper
Yield
Strength
Tensile
Strength
Elongation fracture, (b) intergranular fracture region, (c)
Technique (%)
(MPa) (MPa)
Waam CAST 148 230 3.2 transgranular fracture region, d) finger-like
Solution: 450°C/24h
Waam
Aging: 120°C /12h
T6 608 667 10 protuberances on the surface of the shrinkage porosity,
Solution:470°C /24h
Waam
Aging: 120°C /12h
T6 562 620 11 (e) secondary crack initiates from the shrinkage porosity,
Solution: 475°C /1h
Aging: 120°C /24h and (f) broken large second phases
Waam Regression: 160°C T77 720 732 7.2
/0.5h Re-aging: 120°C
/24h The profiles of the tensile test specimens are
observed to examine the crack propagation path. As
3.3 Fracture analysis
illustrated in Figure 10a and b, broken second phases
Figure 9 shows the typical morphology of fracture and porosities are observed distributed along the crack
surfaces of WAAM deposited 7055-Al. As illustrated propagation path for samples in both horizontal and
by Figure 9a, the fracture surfaces are characterized vertical directions. Figure 10c shows a second crack
by numerous exposed external surfaces of columnar initiates from continuous second phases and propagates
dendrites, indicating the fracture path is predominantly along the grain boundary. Moreover, porosities are
intergranular. However, as marked by the yellow found connected by the second crack in Figure 10d.
arrows, there are also ruptured dendrites along the The second crack propagates along the continuous
cross-section, which proves the fracture path still has second phases between porosities. The above
some transgranular contributions. Figure 9b magnifies observation reveals that the continuous second phases
the external surfaces of columnar dendrites. Cleavage and porosities are weaknesses of the WAAM deposited
facets that are visible almost everywhere reveal the as- 7055-Al. They can act as crack sources individually.
deposited specimens exhibit the brittle cleavage fracture In addition, porosities are geometric discontinuities
mode. Figure 9c magnifies a cross-section of columnar themselves, which may further accelerate the crack
dendrites. The surface consists of shearing dimples with propagation by connecting the cracks initiate from
sizes from 4.2 to 6.6 ?m. As shown by Figure 9d, e, second phases.
and f, there are porosities and broken second phases
in the gaps of the columnar dendrites, and second
cracks are found initiate from them. Finger-like
protuberances on the internal surfaces of porosities are
clearly observed, proving they are shrinkage metal, as
shown in Figure 7. These porosities reduce the load
area and facilitate the propagation of cracks during
tensile tests and even cause local brittle fractures,
according to the research of Ma et al. [39]. On the
other hand, although precipitation
Figure 10. SEM images of side fracture
surfaces: low magnification BSE image for the side
fracture of (a) horizontal and (b) vertical specimens;
(c) secondary crack initiates from net-shaped second
phases; (d) porosities play a vital role in crack
propagation by connecting cracks from second phases
4. CONCLUSIONS
In this review paper the Al-Zn-Mg-Cu aluminum
Figure 9. SEM images of front fracture alloy 7055-Al was successfully fabricated by GTAW-

724 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

based WAAM. The microstructure characteristics and 5. REFERENCES


mechanical properties were comprehensively analyzed [1] J.R. Tumbleston, D. Shirvanyants, N. Ermoshkin, R.
for the first time. Janusziewicz, A.R. Johnson, D. Kelly, K. Chen, R. Pinschmidt,
J.P. Rolland, A. Ermoshkin, E.T. Samulski, J.M. DeSimone,
The conclusions are summarized as follows: Continuous liquid interface production of 3D objects, Science
347 (2015) 1349-1352.
(1) A single deposition layer consists of two types of
columnar grains originating from the bottom fusion [2] D.L. Bourell, Perspectives on additive manufacturing, Ann. Rev.
Mater. Res. 46 (2016) 1-1
lines and the starting position of the deposition layer.
During the subsequent deposition, columnar grains [3] R.L. Truby, J.A. Lewis, Printing soft matter in three dimensions,
Nature 540 (2016) 371-37
originating from the starting position of the deposition
layer are partially remelted, and columnar grains [4] J.H. Martin, B.D. Yahata, J.M. Hundley, J.A. Mayer, T.A.
Schaedler, T.M. Pollock, 3D printing of high-strength aluminium
originating from the bottom fusion lines mostly
alloys, Nature 549 (2017) 365-369.
survive. This results in the periodicity of the grain
morphologies observed in different sections. [5] Z. Gan, G. Yu, X. He, S. Li, Numerical simulation of thermal
behavior and multi component mass transfer in direct laser
(2) Mg(Zn, Cu, Al) 2 and Al 7Cu2Fe Precipitation of deposition of Co-base alloy on steel, Int. J. Heat. Mass Transf.
nanoscale second phases is found to occur during 104 (2017) 28-38.
the manufacturing process. Under the heat influences [6] Y.S. Lee, M.M. Kirka, R.B. Dinwiddie, N. Raghavan, J. Turner,
of the subsequent deposition process, nanoscale R.R. Dehoff, S.S. Babu, Role of scan strategies on thermal gradient
and solidification rate in electron beam powder bed fusion, Addit.
second phases nucleate in the supersaturated matrix
Manuf. 22 (2018) 516-527.
and grows larger than 1.0 m. These second phases
are identified by HRTEM, HAADF, and nanoscale [7] W. Ou, T. Mukherjee, G.L. Knapp, Y. Wei, T. DebRoy, Fusion
zone geometries, cooling rates and solidification parameters during
EDS as T(Al 2Mg3Zn 3) and (Mg(Zn, Cu, Al) 2) wire arc additive manufacturing, Int. J. Heat. Mass Transf. 127
phases. (2018) 1084-1094.
(3) The micro hardness exhibits a special non-uniform [8] M. Zi?tala, T. Durejko, M. Pola?ski, I. Kunce, T. P?oci?ski, W.
distribution on the cross- section because of different Zieli?ski, M. ?azi?ska, W. St?pniowski, T. Czujko, K.J.
Kurzyd?owski, Z. Bojar, The microstructure, mechanical
sizes and volume fractions of second phases along
properties and corrosion resistance of 316L stainless steel
the vertical direction. The hardness stabilizes near fabricated using laser engineered net shaping, Mater. Sci. Eng. A
75 HV0.2 below a height of 20 mm and then increases 677 (2016) 1-10.
with height at a rate of 3.8 HV0.2/mm to 164 HV0.2. [9] D.D. Gu, W. Meiners, K. Wissenbach, R. Poprawe, Laser additive
Above 45mm, the hardness decreases to 136 HV0.2. manufacturing of metallic components: materials, processes and
mechanisms, Int. Mater. Rev. 57 (2012) 133-164.
(4) The average yield stress, tensile stress, and elongation
of as-deposited 7055- Al are 148.3±15.9 MPa, [10] T. DebRoy, H.L. Wei, J.S. Zuback, T. Mukherjee, J.W. Elmer,
J.O. Milewski, A.M. Beese, A. Wilson-Heid, A. De, W. Zhang,
230.7±12.0 MPa, and 3.3±1.0%, respectively. The Additive manufacturing of metallic components - process,
average yield strength and ultimate strength are 16.8% structure and properties, Prog. Mater. Sci. 92 (2018) 112-224.
and 7.6% higher in the vertical direction than in the
[11] C. Körner, Additive manufacturing of metallic components by
horizontal direction, while the difference in elongation selective electron beam melting - a review, Int. Mater. Rev. 61
is small. The WAAM deposited component shows (2016) 361-377.
higher overall tensile properties than the as fabricated [12] D. Herzog, V. Seyda, E. Wycisk, C. Emmelmann, Additive
spray formed counterpart. Fracture path of the as- manufacturing of metals, Acta Mater. 117 (2016) 371-392.
deposited 7055-Al is predominantly intergranular with [13] G.L. Knapp, T. Mukherjee, J.S. Zuback, H.L. Wei, T.A. Palmer,
some trans granular contributions, while the fracture A. De, T. DebRoy, Building blocks for a digital twin of additive
mode is the cleavage fracture. Continuous second manufacturing, Acta Mater. 135 (2017) 390-399.
phases and porosities are the major weaknesses. [14] H.J. Willy, X. Li, Z. Chen, T.S. Herng, S. Chang, C.Y.A. Ong, C.
Li, J. Ding, Model of laser energy absorption adjusted to optical
measurements with effective use in finite element simulation of
selective laser melting, Mater. Des. 157 (2018) 24-34.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 725


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[15] W.E. Frazier, Metal additive manufacturing: a review, J. Mater. [29] Y. Zhong, L.-E. Rännar, L. Liu, A. Koptyug, S. Wikman, J.
Eng. Perform. 23 (2014) 1917-1928. Olsen, D. Cui, Z. Shen, Additive manufacturing of 316L stainless
steel by electron beam melting for nuclear fusion applications, J.
[16] A. Horgar, H. Fostervoll, B. Nyhus, X. Ren, M. Eriksson, O.M.
Nucl. Mater. 486 (2017) 234-245.
Akselsen, Additive manufacturing using WAAM with AA5183
wire, J. Mater. Process. Technol. 259 (2018) 68-74. [30] G.C. Anzalone, C.L. Zhang, B. Wijnen, P.G. Sanders, J.M. Pearce,
A Low-cost Open source metal 3-D printer, IEEE Access. 1
[17] H. Yi, L. Qi, J. Luo, N. Li, Hole-defects in soluble core assisted
(2013) 803-810.
aluminum droplet printing: metallurgical mechanisms and
elimination methods, Appl. Therm. Eng. 148 (2019) 1183-1193. [31] J.O. Milewski, Lasers, Electron Beams, Plasma Arcs, Additive
Manufacturing of Metals, Springer International Publishing, 2017,
[18] H. Yi, L. Qi, J. Luo, D. Zhang, H. Li, X. Hou, Effect of the
pp. 85-97.
surface morphology of solidified droplet on remelting between
neighboring aluminum droplets, Int. J. Mach. Tools Manuf. 130- [32] W.J. Sames, K.A. Unocic, G.W. Helmreich, M.M. Kirka, F.
131 (2018) 1-11. Medina, R.R. Dehoff, S.S. Babu, Feasibility of in situ controlled
heat treatment (ISHT) of inconel 718 during electron beam melting
[19] J. Ding, P. Colegrove, F. Martina, S. Williams, R. Wiktorowicz,
additive manufacturing, Addit. Manuf. 13 (2017) 156-165.
M.R. Palt, Development of a laminar flow local shielding device
for wire+arc additive manufacture, J. Mater. Process. Technol. [33] K. Taminger, R. Hafley, Electron beam freeform fabrication: a
226 (2015) 99-105. rapid metal deposition process, Proceedings of Third Annual
Automotive Composites Conference, Troy, MI, 2003, pp. 9-10.
[20] J. Xiong, Y. Lei, H. Chen, G. Zhang, Fabrication of inclined thin-
walled parts in multi-layer single-pass GMAW-based additive [34] M.A. Jackson, A. Van Asten, J.D. Morrow, S. Min, F.E.
manufacturing with flat position deposition, J. Mater. Process. Pfefferkorn, A comparison of energy consumption in wire-based
Technol. 240 (2017) 397-403. and powder-based additive-subtractive manufacturing, Procedia
Manuf. 5 (2016) 989-1005.
[21] J. Zhang, X. Zhang, X. Wang, J. Ding, Y. Traoré, S. Paddea, S.
Williams, Crack path selection at the interface of wrought and [35] D.D. Gu, W. Meiners, K. Wissenbach, R. Poprawe, Laser
wire+arc additive manufactured Ti-6Al-4V, Mater. Des. 104 (2016) additive manufacturing of metallic components: materials,
365-375. processes and mechanisms, Int. Mater. Rev. 57 (3) (2012) 133-
164.
[22] D. Yang, C. He, G. Zhang, Forming characteristics of thin-wall
steel parts by double electrode GMAW based additive [36] J. Guo, Y. Zhou, C. Liu, Q. Wu, X. Chen, J. Lu, Wire arc additive
manufacturing, J. Mater. Process. Technol. 227 (2016) 153-160. manufacturing of AZ31 magnesium alloy: grain refinement by
adjusting pulse frequency, Materials 9 (2016) 823-836.
[23] A. Scotti, V. Ponomarev, W. Lucas, Interchangeable metal transfer
phenomenon in GMA welding: features, mechanisms, [37] S.W. Williams, F. Martina, A.C. Addison, J. Ding, G. Pardal, P.
classification, J. Mater. Process. Technol. 214 (2014) 2488-2496. Colegrove, Wire + arc additive manufacturing, Mater. Sci. Technol.
32 (7) (2016) 641-647.
[24] A. Scotti, V. Ponomarev, W. Lucas, A scientific application
oriented classification for metal transfer modes in GMA welding, [38] F. Martina, S.T. Williams, P. Colegrove, Improved microstructure
J. Mater. Process. Technol. 212 (2012) 1406-1413. and increased mechanical properties of additive manufacture
produced ti-6al-4v by interpass cold rolling, Annual International
[25] H. Yi, L. Qi, J. Luo, D. Zhang, N. Li, Direct fabrication of metal
Solid Freeform Fabrication Symposium - An Additive
tubes with high quality inner surfaces via droplet deposition
Manufacturing Conference, Austin, Texas, USA, 2013, 2013,
over soluble cores, J. Mater. Process. Technol. 264 (2019) 145-
pp. 490-496.
154.
[39] D. Ding, Z. Pan, S. van Duin, H. Li, C. Shen, S. van Duin, Z.
[26] B. Cong, J. Ding, S. Williams, Effect of arc mode in cold metal
Pan, D. Ding, H. Li, C. Shen, Fabricating superior NiAl bronze
transfer process on porosity of additively manufactured Al-
components through wire arc additive manufacturing, Materials
6.3%Cu alloy, Int. J. Adv. Manuf. Technol. 76 (2015) 1593-
9 (8) (2016) 652-662.
1606.
[40] Z. Pan, D. Ding, B. Wu, D. Cuiuri, H. Li, J. Norrish, Arc welding
[27] Y. Luo, J. Li, J. Xu, L. Zhu, J. Han, C. Zhang, Influence of
processes for additive manufacturing: a review, Trans. Intelligent
pulsed arc on the metal droplet deposited by projected transfer
Weld. Manuf. 1 (1) (2018) 3-24
mode in wire-arc additive manufacturing, J. Mater. Process.
Technol. 259 (2018) 353-360.
[28] C. Wang, X. Tan, E. Liu, S.B. Tor, Process parameter optimization
and mechanical properties for additively manufactured stainless
steel 316L parts by selective electron beam melting, Mater. Des.
147 (2018) 157-166.

726 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Behaviour of Artificially Introduced Circular Defect in


Glass/Epoxy Composites Under Four Point Bending
Srikar Gemaraju1, Kiran Kumar Yadav A2, K.Vengal Rao3 , K. Ismail4, M.Venkataiah5
1,3
Mechanical Department, VFSTR, Vadlamudi
2
Mechanical Department, TKRCET, Hyderabad
4
Mechanical Department, PVPSIT, Vijayawada
5
Mechanical Department, VLITS, Vadlamudi

Abstract - In the present work, woven E-glass/ Numerous studies have been conducted on the
epoxy composite containing artificial defect under delamination of unidirectional composite laminates
flexural loading were conducted. The composite comprised of fibrous pre-pregs. And failures could be
consisted of five layers with a sequence of [0o/90o/ noticed as pure matrix cracking and debonding at the
0o/90o /0o]. The artificial defect is circular in shape matrix/fiber interface. Currently, bidirectional fibers are
with uniform thickness. Artificial delaminations with
used in the majority of industrial applications. Woven
different sizes were used. The effect of artificial
delamination on the flexural strength of the
fabric is an example and is widely used because it offers
laminated composite was investigated. Results a number of advantages over unidirectional fabric,
indicate that the flexural strength of artificially which include less manufacturing errors, reduction in
delaminated samples is lower than laminated labor, high fatigue resistance, increased fracture
samples due to the occurrence of local buckling in toughness, high in-plane specific stiffness and strength,
the specimen. high impact resistance and good handling properties.
Keywords: Laminate, Artificial Delamination, As a result, the demand for woven fabric composites
Flexural Strength & Circular Defect in various industries has expanded significantly. Many
authors investigated the influence of artificial
I. INTRODUCTION delaminations in the shapes of rectangle, circle [1, 2],
Composites are employed in aeroplane, automotive ellipse [1, 2], strip [2, 3] and triangle [3] on the flexural
and defence applications because they have higher behaviour of woven fabric composites.
strength to weight and stiffness to weight ratios than The comprehensive review suggests that there is still
metals, making them a better choice than metals for a lack of interest in the flexural behaviour of woven
these applications. There are different types of damage fabric composites when artificial delamination is
that can occur in reinforced composites. These include introduced at various locations in subsequent plies in
fiber breakage, matrix cracking, debonding of the fiber the thickness direction. Thus, the purpose of this work
from the matrix, and delamination. Delamination is a is to evaluate the flexural strength of a plain weave E-
failure that occurs out of the plane in the laminate and glass/epoxy composite that has been subjected to
results in the separation of successive laminae. It can artificial circular delamination of uniform thickness at
occur in any laminate. When it comes to damage modes, many locations. Additionally, delaminations of various
delamination is a prominent one that can occur during sizes were considered.
the manufacturing process as well as be caused by
various service loads. Local buckling occurs when a The in-depth review still indicates lack of interest
delaminated composite is caused by the bending of the on flexural behavior of woven fabric composites when
laminates. The flexural stiffness of the composite will artificial delamination is created at various locations in
be reduced when local buckling occurs [1]. adjacent plies in the direction of thickness. Hence, the
aim of this work is to determine the flexural strength of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 727


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

plain weave E-glass/epoxy composite suffering from


artificial circular delamination of uniform thickness
considered at various locations. The delaminations of
different sizes were also considered.
II. MATERIALS AND METHODS
Laminates consisted of five layers of 13 mil E-glass
4H satin plain weave fabric (456 GSM) reinforced with
epoxy. Laminates were manufactured by match die
mould (MDM) to the size of 390 mm × 340 mm. A
thickness of the laminate is 2 mm. The resin mixture
Figure 1. Location of Circular Artificial Delamination in
consisted of epoxy L12 and Hardener K6 in the ratio between Layers 1-2 and 4-5
of 10:1. During fabrication of composites,
polytetrafluoroethylene (PTFE) film of 80 m thickness Flexural Tests
in circular shape was placed at the center of the When a beam is loaded in flexure at two central
specimen in the contact plane of plies to create artificial points and supported at two outer points, the stress in
delamination. The stacking sequence of the composite outer fibers is maximum which occurs between the two
is [0o/90o/0o/90o/0o]. An artificial defect was located at central loading points of the load span. This flexural
the centre of the load span of the specimen. Circular stress has been calculated using equations below for
delaminations with diameters of 3mm, 6mm, and 10mm any point on the load-deflection curve for relatively small
were used. Each delamination of the same size is located deflections for a load span of one-third of the support
in contact planes of layers 1-2 (compressive side of span. The ultimate flexural strength,b, maximum strain,
the specimen) and 4-5 (tensile side of the specimen) of max and modulus of elasticity, Eb were calculated [9]
separate specimens as shown in Figure 1. The using equations given below.
specimens are confirmed to the dimensions of 100 mm
× 20 mm were separated from the laminates at low
feed rates to avoid delamination at the edges. The edge
faces were then filed with an emery paper of 320 grit In the above expression,
size. The loading and support spans of four-point
bending specimen as per ASTM standards (D 6272- P Load acting on the load span, N
10) [4] are shown in Figure 2. Four point bending tests L Length of the specimen, mm
were performed on the samples in the universal testing
b Width of the specimen, mm
machine of 5kN capacity as shown in Figure 3. The
GFRP specimen used for testing is as shown in Figure d Thickness of the specimen, mm
4.

Figure 2. Loading diagram in four point bending

728 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

initially along the longitudinal axis. As the load was


increasing it extended in transverse direction also.
Table 1: Flexural Strength of Control Specimen

S.No Breaking Flexural Average


Load (N) Stress, σ strength
(MPa) (MPa)
1. 381.7795 305.42
2. 388.0265 302.85
3. 395.5623 308.73 305.67
4. 390.0265 305.15
5. 394.4613 308.83
Table 2: Flexural strength of specimen containing
delamination size of dia 3 mm located in between 1-2 layers

S. Breaking Flexural strength, Average


Figure 3. UTM with bending fixture containing specimen No lo ad (N) σ (MPa) strength (MPa)
1. 447.4288 260.36
2. 454.7968 264.65
3. 449.4880 262.36 263.57
4. 451.9681 263.65
Figure 4. Typical GFRP Composite Specimen 5. 458.9038 266.86
Table 3: Flexural strength of specimen containing
RESULTS AND DISCUSSIONS delamination size of dia 6 mm located in between 1-2 layers

Tables 1 to 7 give the flexural test data of control S. Breaking Flexural Average
(artificial defect free) and artificial delamination (artificial No load (N) strength, σ (MPa) strength (MPa)
1. 442.9038 262.78
defect) specimens for the artificial defects of three
2. 416.7218 250.14
different sizes 3 mm, 6 mm and 10 mm placed in 3. 448.7968 265.80 256.59
between layers 1-2 and 4-5. For each data point of 4. 426.7218 252.47
flexural strength, five specimens were tested and their 5. 422.7968 251.80
average was taken. The flexural strength of the control Table 4: Flexural strength of specimen containing
specimen is 305.67 MPa. The data of Tables 1 to 7 delamination size of 10 mm located in between 1-2 layers

were plotted in Figures 4 and 5 to compare the flexural S. No Breaking load Flexural Average
strengths of artificial defect specimens with control (N) strength, σ strength (MPa)
(MPa)
specimen. From these diagrams, it has been observed 1. 434.6635 252.80
that the flexural strength of artificial defect specimen is 2. 432.4804 251.89
less than that of the control specimen. And also, it can 3. 430.6814 250.88 251.36
be noted that the flexural strength decreases with the 4. 431.4954 251.25
increase in the size of the artificial defect located in 5. 428.6814 250.02
contact plane of the same adjacent layers. For the Table 5: Flexural strength of specimen containing
delamination size of dia 3 mm located in between 4-5 layers
artificial defect of the same size located in between
different layers, the flexural strength increases due to S. Breaking Flexural Avera ge
No load (N) strength, σ strength
the decrease in local buckling. The amount of local (MPa) (MPa)
buckling on the compression side of the specimen on 1. 330 .3893 248.76
layer 1 towards the loading side was very large. A 2. 423.31 1 330.38
typical specimen with delamination extended in 3. 351.08 5 274.02 27 0.82
4. 341 .1674 259.94
transverse and longitudinal directions during flexure is
5. 362 .6588 276.31
shown in Figure 6. This damage began developing

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 729


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 6: Flexural strength of specimen containing CONCLUSIONS


delamination size of dia 6 mm located in between 4-5 layers

S. Breaking Flexural Average An experimental study was conducted to determine


No load (N) strength, strength (MPa) the effect of artificial delamination size and its location
σ (MPa) on flexural behavior of E-glass/epoxy composite. On
1. 365.3244 265.69 the basis of this study, the following conclusions may
2. 302.7024 233.41
3. 310.6894 248.55 260.09 be drawn.
4. 330.2894 251.65 • Flexural strength of artificial defect specimen is less
5. 325.6834 251.13 than that of control (artificial defect free) specimen.
Table 7: Flexural strength of specimen containing
delamination size of 10 mm located in between 4-5 layers • Flexural strength decreases with the increase in the
size of the artificial defect located in contact plane of
S. Breaking Flexural Average
No load (N) strength, σ strength the same adjacent layers.
(MPa) (MPa) • A decrease of flexural strength is due to an increase
1. 3 32.5094 250.36
of local buckling in the specimen.
2. 3 18.1368 242.39
3. 3 20.8474 2 43.3 254.24 REFERENCES
4. 3 30.3987 240.29
5. 3 35.6015 249.75 1. Wenran Gong, Jinlong Chen, EA Patterson: "An experimental
study of the behavior of delaminations in composite panels
subjected to bending", Composite Structures, Vol. 123, 2015, pp
9-18.
2. YelizmPekbey, OnurSayman: "A Numerical and Experimental
Investigation of Critical Buckling Load of Rectangular Laminated
Composite Plates with Strip Delamination", Journal of
REINFORCED PLASTIC AND COMPOSITES, Vol. 25, No.7,
2006, pp 685-697
3. ZuleyhaAslan, FatihDaricik: "Effects of Multiple Delaminations
on the Compressive, Tensile, Flexural and Buckling Behaviour of
E - Glass / epoxy Composites", Composites Part B, Vol. 100,
2016, pp 186-196
Figure 4: Comparision among flexural strengths of control 4. ASTM Standard D6272-10, Standard Test Method for Flexural
and artificial defect (in 1-2 layers) specimens Properties of Unreinforced and Reinforced Plastics and Electrical
Insulating Materials by Four-Point Bending, American Society
for Testing and Materials, 2006
5. R. Craven, L. Iannucci, R. Olsson: "Delamination Buckling: A
Finite element study with realistic delamination shapes, multiple
delaminations and fibre fracture cracks", Composites: Part A,
Vol. 41, 2010, 684 -692.
6. Th. Lorrit, G. Marion, R. Harry, H. Wargnier: "Onset of free -
edge delamination in composite laminates under tensile loading",
Composites Part B, Vol. 34, 2003, pp 459-471.

Figure 5: Comparision among flexural strengths of control


and artificial defect (in 4-5 layers) specimens

Figure 6: Tested specimen in flexure showing delamination

730 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Review Study on Materials of Earth Air Heat


Exchanger
Niraj R. Shingala1, Dr. Chetankumar M. Patel2
1
Mechanical Engineering, V.V.P. Engineering College, Rajkot - Gujarat
2
Mechanical Engineering Department , R.K. University, Rajkot - Gujarat
Email: niraj.shingala@gmail.com1, chetan.patel@rku.ac.in2

Abstract- The temperature of earth at below vertically. Vertical loops go deeper. Horizontal loops
ground level around 2 to 5m, is almost remain are sometimes buried at depth. Temperature regime at
constant through out of year. This temperature this depth and on the far side is stable, with no diurnal
called as Earth Undisturbed temperature EUT. fluctuation and with solely a tiny low seasonal or annual
This EUT is higher than atmospherics temperature variation[1].
in winter season. While in reverse condition can
find in summer season. In summer season, EUT is The temperature waves dampen as they penetrate
always lower than atmospherics outside through layers of soil. High frequency waves do
temperature. The heat exchange is set up at below therefore faster. Consequently, diurnal fluctuations (one
ground approximately 2 to 5m. The heat exchanger cycle per day) diminish inside but a meter. However,
is device exchange heat and give satisficed the annual wave (one cycle per year) penetrates deeper.
utilization of EUT. In summer, the ambient is air Its amplitude of fluctuation is far smaller. Massive mass
pass through this below ground heat exchanger and
of soil at a stable, close to constant, temperature permits
provide cooling effect to any domestic and
its use as sink and supply of heat. Geothermal energy
industrial building with the help of EUT. While
opposite in winter season the ambient is air pass as renewable, free of cost, availability during year days
through this below ground heat exchanger and & eco-friendly in nature being popular for domestic
provide cooling effect to any domestic and and commercial applications [2].
industrial building with the help of EUT. In both Earth Air heat exchangers (EAHE) are sometimes
season like in summer and winter; heat exchanger utilized for energy cooling/heating of structures, such
gives efficient result of cooling and heating result
as, residential buildings, hospitals. Application of such
respectively. It was found that our aim of designing
made us to face designing and analysing of it by a system is predicted to cut back the consumption of
implanting various types of basic fundamentals voltage [3]. Completely different approaches are utilized
related to the concepts of Heat Exchanger for analysing the styles of EAHE. In arid regions, like
Jodhpur, India, the close temperature becomes as high
Keywords-component, formatting, style, styling,
as five hundred C, throughout summer. In such a vicinity,
insert (key words)
the applying of EAHE thought, visible of a lower soil
I. INTRODUCTION temperature compare to the atmosphere, is predicted
Geothermal Energy is renewable resource like to play a possible role in cooling of permanent likewise
biomass energy and solar energy. So with the use of as semi-permanent structures with reduced electricity
geothermal energy, Heating Ventilation and Air- consumption. It is stressed that such a system is
Conditioning HVAC application can be satisfied. In integrated with alternative energy driven natural
summer season, Earth Air Heat exchanger (EAHE) is ventilation [4]..
convert the hot atmospherics air into cool and in winter,
cool atmospherics heat into hot. sometimes comprises
loop(s) of pipe buried within the ground horizontally or

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 731


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

greenhouses in hot-arid tannin, with borderline or no


use of water. smart quality water is inveterately scarce
there.
3. Girja Sharan et al. He has suggested that an outsized
a part of Gujarat within the North-west region of Asian
nation is semi-arid. For better air circulation of air,
for highest thermal conductivity and low specific heat,
best material was Steel material used for pipe and as
a result, it transfers heat from air to earth. The lands
Figure 1: Earth Air Heat Exchanger are less fitted to agriculture. farming is thus common.
Productivity of oxen is but additionally low thanks to
II. LITERATURE REVIEW issues of feed and thanks to climatically stresses,
1. Miroslaw Zukowski et al. He suggested results of specially heat. Environmental management of farm
from simulation data and experimental data buildings - animal homes, greenhouses- in semi-arid
investigations of thermal C.O.P. of earth air heat areas may be a special challenge. there's widespread
exchanger (EAHE). This natural energy-based shortage of water; rural grid is vulnerable to
system will reduce heating masses. The temperature interruptions many times daily. oxen homeowners don't
difference between the two locations for three provide importance to animal comfort as a method to
different materials-polyvinyl chlorine, (PVC), boost productivity. The HVAC business and
polycarbonate (PC), and polyethylene (PE). The professionals haven't created efforts to develop
temperature difference was lowest in the PC case systems compatible with the region's setting and
and highest in the PE case, though these differences political economy of farming. Towards that, the earth-
were not significant. The authors have used - tube-heat-exchanger based mostly systems seem to
Energyplus (energy simulation computer code) to be additional fitted to farm sector in semi-arid climate.
calculate the capacity of earth air heat exchanger in we have a tendency to gift the expertise of
domestic's buildings. For simulations, author has victimisation such systems for environmental
observed parameter like EUT and other temperature management in dwellings of menagerie animals, and
related to soil and pipe was calculated by greenhouse in arid space of tannin. Mention has
CalcSoilSurfTemp. additionally been fabricated from the continued work
to put in additional such systems within the milk cow
2. Girja Sharan et al. Girja Sharan et al. ETHE consists housing.
of Diameter 10centimeter and length was 50 m and
material of Pipe is Mild Steel pipe with wall thickness
of 3 mm. Especially made fins have been installed on
the outer surface of the pipe, all along the 50 m length.
Fins are made of thin GI strip spirally wound over the
pipe and then spot-welded at several points. There
are 40 fins per meter length. As per his observation
write-up describes the event and a few applications Fig. 2. Working Principal of Earth-air heat exchanger
of earth tube heat exchangers in Gujarat. Work made 4. L. Chandra, Praveen Garg, Rohit V. Maitri et al. The
public here was delivered as Nanubhai Amin potential exists for considerably increasing the
Memorial Lecture at Electrical analysis and performance of shallow ponds used as supplemental
Development Association, Vadodara as a part of a heat rejecters in GSHP systems. any analysis is
part of, eleven could 2004. Cummins Foundation- usually recommended within the following areas:
IIMA Laboratory for Environmental Technology in improvement of the planning procedure and
Arid Areas has been engaged in development of management strategy. Hybrid ground supply
ETHE within the recent years. As stated, this was apparatus systems have several degrees of freedom;
impelled by ought to realize ways that to chill there are trade-offs between the reduction in size of

732 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the bottom loop device, the dimensions of the pool, 7. Raluca Teodosiu, Lidia Nicult et al. They addressed
and also the management strategy. To additional totally earth-air device (EAHX) implementation for
perceive this, further analysis victimisation the Romanian dwellings. the target is to assess the
simulation techniques developed during this paper is potential of this resolution for ventilation energy
required. This analysis would additionally take into savings and greenhouse emission emissions
consideration the economic prices and edges, that reductions. Numerical transient coupled model (single-
we've got not investigated. further validation of the pipe EAHX - ventilation - building) is developed
model, victimisation information from an operating exploitation Trnsys as simulation tool. The simulations
system, would be helpful. Extension of the model to square measure administered for typical Romanian
hide deep pools for things wherever associate existing single-family detached home, taken under
pond or lake is offered. consideration 3 totally different climate regions. for
every case, careful results square measure conferred
5. Upamanyu Bangale Samir Deshmukh et al. India is
regarding EAHX thermal behaviour and its edges in
largest producer of fruit and vegetable in world state
terms of energy savings and anti-pollution effects for
of affairs however handiness of fruit and vegetable
recent air pre-heating and pre-cooling inside
per capita is considerably low thanks to post-harvest
mechanical ventilation of the house.
loses that is concerning twenty fifth to half-hour of
production that the demand of refrigeration and air- 8. Amanda Pertzborn, Gregory Nellis et al as per their
con has been increased. Building or cluster of buildings observation, a summary of the work being conducted
with thermal insulation and cooling system during on GSHPs at the University of Wisconsin - Madison
which biodegradable food or product will be hold on has been conferred. The work to this point has found
for numerous length of your time to cut down that styles supported TMY weather information could
deterioration with necessary temperature and under-predict the specified part sizes as a result of
humidness is named as cold storage. In cold storage the particular year-to-year weather variation is
cooling system brings down the temperature ab initio neglected. Initial validation of the part wants to
throughout start off however thermal insulation simulate the GHX (the DST model) has shown that
maintains the temperature soon ceaselessly. during the model will predict the outlet temperature of the
this read, the easy methodology is given to calculate GHX for brief term simulations, however extra
heat transfer by analytical method conjointly try has validation is needed. extra validation of the DST model
been created to attenuate the energy consumption is performed as information is collected from the
by substitution a hundred and fifty metric linear unit location in Madison similarly as from extra sites in
enlarged phenyl ethylene (EPS) by a hundred-metric city, NV. the warmth pump part model will be valid.
linear unit Poly ester foam (PUF) insulation. The
9. Trilok Singh Bisoniya et al. The Earth air heat
methodology is valid against actual knowledge
exchanger (EAHE) will be recent or new
obtained from sphenisciform cold storage settled in
advancement which might be effectively for the
Pune, India.
heating and cooling load calculation. several authors
6. Stuart J. Self, Bale V. Reddy, brandy A et al. They observed equations, models and procedures about
had investigated that geothermic heat pumps square EAHE. The model EAHE utilised for a observations
measure extremely economical heating technologies of equations and main objective is that to find out the
that yield reductions in dioxide emissions, the potential earth's undisturbed temperature (EUT) The model
rejection of fuel usage and economic blessings. Heat also help to calculate Reynold number Re, Nusselt
pumps utilize considerably less energy to heat a Number Ne, and others parameters for pipe and soil.
building than different heating systems. several The prepared equations are used to change in design
variations of geothermic systems for heating exist, to calculate Co-efficient of heat and other
with totally different configurations appropriate in performance parameters.
several things and most locations round the world.
10.Rakesh Kumar, A.R. Sinha et al. They addressed that
decide among heating choices, it's vital to see the
new improvement methodology supported GA is
advantages for various ground setup choices, usually
applied as a generative and search procedure to
in terms of potency, emissions and social science.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 733


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

optimize the look of earth-to-air device. The GA is EAHE for area heating and cooling of a house in
employed to come up with doable style solutions, that Delhi-India. this paper deals with the experimental
square measure evaluated in terms of passive heating outside annual performance analysis of the 2.32 kWp
and cooling of building, employing a careful thermal electrical phenomenon (PV) grid situated at delhi -
analysis of non-air-condition building setting the results solar energy park. electrical load nearly about ten-
from the simulations square measure afterward kilowatt h/day that is compare with the electrical air
accustomed more guide the GA search to seek out blower of associate earth air tunnel heat exchanger
the high-energy solutions for optimized style used for cooling/heating of the soddy, ceiling fan,
parameters. the particular drawback self-addressed fluorescent tube-light, computer, submersible pump,
during this study is that the size of earth-to-air device etc. The outside efficiencies, power generated and
in a very non-air-conditioned residential building. lost in PV system elements were determined
exploitation hourly experimental measured knowledge
for one year on typical clear day in monthly.
13. Rohit Misra, Vikas Bansal, Ghanshyam Das Agrawal
et al. [2013] has investigated that length of pipe
increase, the outlet air temperature from EAHE
reduce. It had been discovered that with increase in
pipe diameter, the outlet air temperature of EAHE
will increase as a result of the convective heat transfer
coefficient at inner surface of pipe similarly as overall
heat transfer constant at earth- pipe interface
decreases at higher pipe diameters. With increase
Graph 1: EUT vs Days thorough of pipe buried, outlet air temperature of
EAHE system decreases. So, pipes of EAHE system
11. Sujata Nayak and G.N. Tiwari (2009) investigated
ought to be put in as deeply as potential however it
the theoretical performance of earth heat exchanger
increases excavation value. So, it's suggested to stay
concern with greenhouse exploitation energy and
depth of buried pipe deals at 2m. The outside air
exergy analysis ways. The utilization of solar energy
temperature of EAHE system will increase with
through the electrical phenomenon system and EAHE
increase in air flow rate. This is because of the air
for heating and cooling of greenhouse. Calculations
flow rate is exaggerated, the time to that air remains
are in dire straits the four varieties of weather
to bear with ground is reduced. The performance of
conditions (a. b, c and d types) in Indian capital, India.
EAHE cannot be exaggerated solely by decreasing
The paper was compares with greenhouse air
the air flow rate as a result of the cooling capacity of
temperatures once it's operated with photovoltaic/
EAHE system depends each on air flow rate and
thermal throughout daytime including the planet air
temperature distinction. So, each air flow rate and
tunnel heat exchanger in the dark, with the air
temperature distinction ought to be thought-about at
temperatures, The results conclude that air
an equivalent time.
temperature within greenhouse may be magnified by
7-80C throughout the winter season, once system is 14. Viaka Bansal and Misra et al. they observed that the
operated with the electrical phenomenon, coupled with utilization of material like PVC for the cooling capacity.
earth air tunnel device in the dark. From the results This aim of the planning of the duct system. The
it's seen that hourly helpful thermal energy generated, practical works was created as an example EAHE
throughout the day time and already dark, when model. This paper applicable of small residential. For
system is operated with electrical phenomenon this application, suitable steel material and non-ferrous
including the planet air tunnel heat exchanger, is 33MJ material like brass material can be possible. So thermal
and 24.5 MJ. conductivities of Ferrous & non-ferrous materials are
different. The Co efficient of performance also
12. Arvind Chel and G.N. Tiwari (2010) Investigated the
depend on materials of tube or pipe. So, useable
complete electrical phenomenon integrated with
energy is less as compared to conventional system.

734 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

They have used lower cost of steel material or steel Vertical direction with parallel. In the summer, good
graded material used. The COP of EAHE depend on cooling rate calculated based on steel graded material.
Mass flow rate of air. The COP also depends on Also suggested that PVC material can be used but
Materials of Pipe. thermal conductivity less as compared to steel graded
materials. The mass flow rate of air and speed pf air
15. Trilok Bisoniya et al. They have prepared EAHE
increased, in result temperature decrease but COP is
model for calculating parameter like pipe length, radius
slightly decrease as per their expected.
and depth of buried pipe. An Authors prepared 1D
and 2D of EAHE for Find out earth undisturbed
temperature at different depth level. As well as 3D
model is developed for performance analysis of Earth
Air Heat Exchanger. The CFD is used For a heat
transfer analysis of 3D model. Even also they
concluded that CFX, CFD200, FLUENT and ADINA
can be used for complicated fluid flow analysis of
Earth air heat exchanger. The energy equation can
be given efficient analysis of EAHE
16. Jakhar et al. The Author has used TRYNSYS 17.0
used for analysis of Earth Air Heat Exchanger The
experimental setup was established in Ajmer location Figure 3: Vertical EAHE & Horizontal EAHE
of India. The results were calculated as per thermal 19. Chaturvedi et al. he has done his Experimental set
climates conditions of Ajmer. There was a galvanised up of EAHE in Bhopal region. The EAHE consist of
iron duct used for star air heating purpose. So, its Multiple pipes in parallel direction in summer climates.
also known as Star Air Heating Duct (SAHD). They It found that there was impact on output due changing
have found that variable in air conditions affect the material like PVC and Steel or other ferrous materials.
performance of EAHE. But the others parameters But diameter, length and arrangement of pipe affect
like thermal conductivity of duct, soil diffusivity and COP of EAHE. The COP of EAHE depends on
design of EAHE also can be improved coupled with Materials of pipe, but also depend on soil diffusivity
other system. and performance parameters. The final conclusion
17. Ahmed et al. The author used Rockhampton - as per his suggestion that material of pipe is not play
Australia for experimental set up for EAHE. They used role in COP of EAHE.
used two shipping containers. Vertical EAHE and 20. Rahul Rathee & Dr Atul Lanjewar investigated that
Horizontal EAHE are set up in two containers. So, after learning the views of authors. evokes of all this
Materials of Container play use role in this set up. attempt we have a tendency to could proceed that
Air blower is used for sucked atmospheric air and The technology of cooling system with ground
blow inside set up. There are 20 PVC pipes are used coupled condenser reduces energy consumption, fuel
experimental work. The researchers had also price and heating and cooling system seems to be
prepared CFD Model based Experimental set up. the flexible, multi-functional, and also the overall constant
soil temperature also calculated in summer days at of performance of the device may be abundant
different depth levels. From the CFD analysis results improved. The conventional air-conditioner may be a
show the common temperature for HEAHE was massive shopper of power while in cooling system
larger than VEAHE. Thus, concluded that VEAHE with ground coupled condenser cut back power
provides a lot of reduction in temperature drop than consumption. During this system the seasonal thermal
the HEAHE. Thus, VEAHE is preferred to use for storage ability of the soil, that encompasses a
Australian weather. temperature delay compared to the outside
18. Dubey et al. as per suggested of researcher, he has temperature. This temperature difference between
used open loop type EAHE used. In the experimental the outside temperature and also the soil temperature
work consist of three pipes. These pipes arranged in permits a cooling result of the new summer air. So,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 735


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the utilization of the hold on cold within the ground 23. Kumar et al. he has used MATLAB for analysis of
with the suggests that of Associate in Nursing EAHE. For better thermal analysis, he had used Fast
underground device produces positive result on the Furrior Transform mehtod and FDM method. He is
C.O.P. any future scope in cooling system with ground indian researcher.he has setup expermental work in
coupled condenser is that the feasibleness of this MATHURA. He has calculated COP, Heat transfer
method for extreme summer and extreme winter is Co efficeient and overall heat transfer. He has also
can be studied. The modified cooling system looks to concluede that piping matereial like MS or any Steel
be attention-grabbing system for rainy climate and material gave good performance in result. But PVC
awaits additional any investigation. The temperature material only saved cost of Material of Pipe. Thermal
of soil at completely different depth may be obtained conductivites of Both Pipe material like steel and PVC
during the bottom cooling as condenser. The impacted on COP of EAHE. The cooling capacity
experiment on different types of soil within the pit was calculted 456KWH for particular experimental
and compared with this result obtained and that soil work. He has suggested that for economical set up,
offer higher results. length of pipe and larger diameter shoul be kept in
experimental work. Bassed on Cooling and heating
21. Sansui et al. he has suggested soil material and pipe
capacity calculted
material are very useful for peromance of EAHE.
As well as during simulation of EAHE, he has found
different soil temperature at 5meter depth or below
ground level. He has done his research work in Islamic
university in Asian contion. Also, he has experienced
that soil having grasss coated. The soil is sandy type.
Pipe material might not be affetct the performace of
EAHE. As well as, tyeps of EAHE also not supported
pareamter for COP EAHE. The air velocity slightly
affect the COP of EAHE.

Figure 5: EAHE with thermal Insulation

24. Singh et al. he has prepared small testing EAHE


setup in Classrrom. He has used this EAHE set up
for calculated cooling and Heating potentional for
different class room. He hase duct with having zigzag
Fig 4 CFD Analysis of EAHE arrangement. He hase used PVC material and
22. Xamána et al. he has used 3 cities of Maxico for his galvanized Steel material in Pattern of Ducts. The
Experimental set up of Earth Air Heat Excahnger. small pipes were PVC materila in cross section. He
So, differeent atmospherics cliamate condition found has departed set up in 3 sections. First section and
during his work and COP were different at 3 cities of last section were inner and out let. The middle part
Mexico. He has used 2 experimental setup for EAHE. was recess. Recess and outer part havind PVC
One EAHE having thermal Polystyere insulation. material. While other having galvanised material
While other EAHE having there is no insulation. So, insection. He has calculated COP of all section for
Material of Polystyeren affect therimal performace summer and winter season. So, cooling capcacity
of EAHE. He has calculated Reynold Number was calcuted for both seasons. He has also used ANSYS
1500 at 3 different Maxico Cities. He has used Ciudad and CATIA for better thermal analysis of EAHE.
Jaurez which is city of maxico, thermal insulation used He has also given final conclusion that summer season
in EAHE during winter season only. While other 2 having good COP result as compared to winter season
cities of maxico and merida, used thermal insulation according comfort cliamtet or suitable claimte for
in summer condtion. EAHE.

736 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

25. D. Bastien and A.K. Athienitis investigated that a water and outlet was fashioned using PVC pipes and
simple transient model that may predict the bricks. Results show the utmost wetness recorded
temperature and ventilation requirements for a home- was ninety eight. Irrespective of the water
scale greenhouse was developed. A lively system temperature, outlet temperature vary between 25-
consisting of buried pipes within the soil beneath the 26°C. Results also show variation of outlet temperature
greenhouse was confirmed to expeditiously lower with air flow rate. it had been seen that mistreatment
temperature fluctuations within the cold greenhouse of bamboo with hydra kind plaster within the tunnel,
from 1°-26°C to 3°C-24°C. Reducing temperature reduces the outlet temperature by 10-15°C which
fluctuation even additional would be extremely helpful. reduces the electricity consumption. Thus, this sort
To attain this, future work on optimisation of thermal of tunnel configuration is incredibly effective for
storage and pipe characteristics are going to be agricultural and residential buildings. EAHE provides
carried out. Condensation in pipes throughout the day recent air ventilation and is other than atmosphere. It
was found to be negligible within the tested conditions. conjointly reduces the CO2 emission that helps in
Changes within the active system characteristics and atmosphere management.
in greenhouse operation conditions are going to be
thought-about to attain important condensation in pipes III. CONCLUSION
so as to reduce ventilation necessities. The From above literatures, following conclusions are
requirement for a back-up heat for cloudy days made observed
of a device that may heat the soil beds from the
thermal storage of the Alston vale House are going 1. At a depth of concerning 1.5 to a pair of m the
to be evaluated temperature of ground remains nearly constant. This
constant temperature is termed earth's undisturbed
26. Khandelwal et al. he had selected Jaipur city for temperature. The earth's undisturbed temperature
Experimental set up of EAHE. He has developed remains invariably over that of close air temperature
experimental set up in MNIT. In MNIT, he had used in winter and the other way around in summer.
library for his research work or EAHE experimental
work. There were 4 rooms in MNIT, Jaipur city. The 2. Finally, different materials offer a variety of thermal
library cliamte condition also affect thermal conductivity, which is vital to the conductive heat
peroformance of EAHE. Because library had split transfer process to or from the ground via the pipe.
Air condtioning system. He had calculalted heating This factor is also controlled by the designer along
and cooling load for library rooms. He had used long with the pipe boundary shape. The chosen material
72m pipe with steel material. He had calculated must be compatible with the process fluids, and it
coolind load 72kw as well as ventilation.. during must have a low resistance to heat flow so that it
experimental work, it was experienced that 11.5°C does not become the overriding factor in the
temperature drop. Evenalso another found that conductive heat transfer process.
confort temperature was 26.7°C to 28.6°C for library.
ACKNOWLEDGMENT (HEADING 5)
27. Choudhury et al. investigated Associate in Nursing
experimental study of EAHE style mistreatment low
I must thankful to Dr. Nirav P. Maniar and Dr.
price material like Bamboos and hydra kind to cut Rupesh V. Ramani for provide technical support in
back energy consumption. Associate in Nursing open selection of best 27 review papers for paper. I am also
loop EAHE system was accustomed predict the thankful to Dr. Jiten J. Makadia sir helped in
potential of EAHE. The experiment was conducted reviewpaper.
in Arunachal Pradesh. The study principally focuses
on the employment of domestically accessible
materials. Out of all domestically accessible materials
bamboo was selected for the pipe material. The
thermal conductivity of bamboo was inflated by
mistreatment hydra kind plaster. PVC pipes were
used to install sensors for the live of gradient. The

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 737


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [15] Ashish Kumar Chaturvedi, "Performance of earth tube heat


exchanger cooling of air-a review", International Journal of
[1] Bisoniya TS, Kumar A, "Design of earth-air heat exchanger Engineering & Robotics (2015) 378-382.
system", Geothermal Energy springer Journal 24 (2015) 311-
318. [16] Varun Chandrasekhar "Geothermal Energy Resources, India:
Country Update", Proceedings World Geothermal Congress 2010.
[2] Bisoniya TS, Kumar A, Baredar "Experimental and analytical
studies of earth-air heat exchanger (EAHE) systems in India: a [17] R.L. Sawhney, D. Buddhi, N.M. Thanu, An experimental study
review". Renewable and Sustainable Energy Reviews19 (2013) of summer per-formance of a recirculation type underground
238-246. airpipe air conditioning system,Building and Environment 34
(1998) 189-196.
[3] Girja Sharan, "Development and Some Applications of Earth
Tube Heat Exchanger in Gujarat", Journal of Agricultural [18] Al-Ajmi, F. et al. 2006. The cooling potential of earth-air heat
Engineering (2004) 1-20 exchangers for domestic uses.

[4] Sharan G., and Jadhav, R (2003). "Performance of Single Pass [19] Singh SP (1994) Optimization of earth-air tunnel system for
Earth Tube Heat Exchanger: An Experimental Study." Journal of space cooling. Energy Convers Manag 35(8):721-725
Agricultural Engineering, 40:1, (2003), 1-8. [20] Sujata Nayak, G.N. Tiwari, Energy metrics of photovoltaic/
[5] Arvind Chel, G.N.Tiwari, "Performance evaluation and life cycle thermal and earthair heat exchanger integrated greenhouse for
cost analysis of earth to air heat exchanger integrated with adobe different climatic conditions ofIndia, Applied Energy 87 (2010)
building for New Delhi composite climate" Energy and Buildings 2984-2993.
41 (2009) 56-66. [21] Bojic M., Papadatris G. "Kyritsis S. Energy from a two-pipe,
[6] Jens Pfafferott, "Evaluation of earth-to-air heat exchangers with earth-to-air heat exchanger." Energy 24 (1999): 519-523
a standardised method to calculate energy efficiency", Energy [22] Spengler R W and Stombaugh D P (1983), "Optimization of
and Buildings 35 (2003) 971-983. Earth-Tube Heat Exchanger for Winter Ventilation of Swine
[7] Anil Kumar, Prashant Baredar, "Experimental and analytical Housing", pp. 1186-1193, Trans. ASAE.
studies of earth-air heat exchanger (EAHE) systems in India: A [23] SodhaMS, SharmaAK, SinghSP, BansalNK, Kumar A .Evaluation
review",Renewable and Sustainable Energy Reviews 19 (2013) of an earth- air-tunnel system for cooling/heating of a hospital
238-246. complex. Building and Environment 1984;20(2):115-22.
[8] Miroslaw Zukowski, "Assessment of the cooling potential of an [24] H., Wang S., Zhu D. "Modeling and evaluation of cooling capacity
earth-tube heat exchanger in residential buildings" Building and of earth-air-pipe systems." Energy Conversion and Management
Environment, (2011) 41: 235-244. 48 (2007): 1462-147.
[9] Rohit Misra, Vikas Bansal, Ghanshyam Das Agrawal, Jyotirmay [25] Bhutta Muhammad Mahmood Aslam, Nasir Hayat, Bashir
Mathur, Tarun K. Aseri. "CFD analysis based parametric study Muhammad Hassan, Khan Ahmer Rais, Ahmad Kanwar Naveed,
of derating factor for Earth Air Tunnel Heat Exchanger." Applied Khan Sarfaraz. "CFD applications in various heat exchangers
Energy 103 (2013): 266-277. design: A review." Applied Thermal Engineering 32 (2012): 1-12.
[10] L. Chandra, "A Stepwise Modeling Approach for Designing an [26] A. Chel, J.K. Nayak, G. Kaushik, Energy conservation in honey
Earth-Air Heat Exchanger in Jodhpur Region of Rajasthane", storage building
School of Mechanical Engineering, 2202-2209 (2014).
Using Trombe wall, Energy and Building 40 (2008) 1643-1650.
[11] Manojkumar Dubey "Earth Air Heat Exchanger in Parallel
Connection", International Journal of Engineering Trends and [27] Kumar R, Kaushik SC, Garg SN (2006) Heating and cooling
Technology (2013) 2463-2467. potential of an earth-to-air heat exchanger using artificial neural
network. Renew Energy 31(80):1139-1155.
[12] Upamanyu Bangale, "Heat transfer analysis of cold storage"
International Journal of Advances in Engineering & Technology [28] Bhardwaj SS, Bansal NK (1981) Temperature distribution inside
(2014) 889-886. ground for various surface conditions. Build Environ 10(3):183-
192.
[13] Thomas Woodson "Earth-Air Heat Exchangers for Passive Air
Conditioning: Case Study Burkina Faso", Journal of Construction [29] Bisoniya TS, Kumar A, Baredar P (2015) Energy metrics of
in Developing Countries, 17(1) 2012, 21-32, 2012. earth-air heat exchanger system for hot and dry climatic conditions
of India. Energy and Buildings 86:214-221.
[14] Raluca Teodosiu, "Utilization of Earth-air heat exchangers in
Energy and pollution savings for Romanian dwellings", Recent
Advances in Engineering (2011) 163-168.

738 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Low Cost Portable Biogas Digester for Methane


Capturing from Cow Dung
Mohammad Zafar Anwar1, Md. Afzal Ali2, R. Venumadhav3
1,2,3
Mechanical Engineering Department, KITS, Singapur, India
Email: zafarwase@gmail.com1, afzal4science@gmail.com2, jyomadhav77@gmail.com3

Abstract- The people living in poor and rural I. INTRODUCTION


areas of developing counties always facing the
problem of basic energy therefore renewable
In 2015, the United Nations Development
energy sources are necessary to mitigate this Programme (UNDP) proposed 17 Sustainable
problem. In villages, people use firewood as a fuel Development Goals to be accomplished by 2030. In
for heating and cooking purposes but it produces that the seventh number goal states the need for
pollution and smoke that are dangerous for human affordable, clean, and sustainable energy access for the
health. Firewood also contributes in deforestation people. A study says one in seven people from the
which causes distortion or imbalance in the worldwide does not have access to electricity and most
ecosystem. Rural areas inhabitants can use biogas of them are in rural areas, in addition to this around
as a replacement for cooking gas to reduce their three billion people using unhealthy fuels for cooking
gas bill. Biogas consists of methane CH4 (55-70%), [1]. Portable biogas digesters can play an important
CO2 (25-50%), H2O (1-5%), H2S (0-0.5%), N2 (0-
role in those rural areas to meet the energy demands
5%) and NH 3 (0-0.05%). Methane gas produce
from a biogas digester in anaerobic condition
and satisfy the UNDP goals with an emphasis on clean
(absence of oxygen) however, operating a large and green energy.
digester in a densely populated places and One of the major challenges for developing countries
insufficient areas can be challenging due to is waste management system but in several countries,
inefficient waste management systems. On the waste management is top of their priorities' list because
other hand, using a small-scale portable biogas
of their negative effects on environment, individual social
digester could overcome these problems. In this
work, low cost portable biogas digester is designed
responsibilities and efforts to reduce the pollution and
and evaluated for biogas production from natural greenhouse gas emissions that cause global climate
sources available in India such as cow dung, food change. Today the disposing of wastes is unacceptable
waste and plant waste. The parameters tested were because of its undesirable effects, even using landfills
the biogas production rate, pH value of slurry and for bury waste is also not considered an optimal
temperature of slurry. The results showed that the practice, as environmental standards call for the
pH value decreases as the process going on as the utilization of waste management through the recovery
bacteria produces fatty acid. It also observed that process, recycling nutrients, and using organic matter
biogas production rate depends on climate to produce biogas. The organic materials that come
condition i.e. in hot climate condition the gas from animal manure, trees and human waste produces
production is high compared to rainy and cold days.
biogas as a renewable energy and offers a good fertilizer
This design, while applicable for a typical rural
Indian family and can also be utilized globally.
for agriculture uses. In addition to this anaerobic
digestion reduces the amount of non-useful materials
Keywords-portable biogas digesters, biogas, and increases the utilization factor of the energy
renewable energy sources, waste management, cow conversion process. Biogas is a by-product of organic
dung
matter under anaerobic decomposition process. It is a
combustible gas consisting primarily of CH4 (55-70%)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 739


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and CO2 (25-50%) and other gases like H2O (1-5%), A. Benefits of Biogas
H2S (0-0.5%), N2 (0-5%) and NH3 (0-0.05%) that • Biogas systems produce clean energy for household
are produced when the waste is fermented in the use. After an initial investment on biogas plant there
absence of the oxygen. The biomass slurry that remains is no need to spend more money on fuel and no more
in the digester after the complete fermentation process, smoke and pollution produce from wood or charcoal.
which is rich in macro and micronutrients, can be used
• Biogas makes cooking quicker and easier than
as an organic fertilizer in agricultural field. cooking with firewood.
In 1859, the first biogas digestion plant was built at • A farm with a biogas system is a cleaner and safer
a leper colony in Bombay, India [2]. Anaerobic place, it kills the bacteria in livestock manure.
digestion (AD) reached England in 1895 when biogas
was recovered from a "carefully designed" sewage • Biogas system produces excellent and safe fertilizers
for the agriculture purpose.
treatment facility and used to fuel street lamps in Exeter
[3]. The development of microbiology as a science led • Biogas systems can play major role against global
to research by Buswell and others in the 1930s to warming by allowing to burn methane from organic
identify anaerobic bacteria and the conditions that waste, instead of letting it escape into the atmosphere
promote methane production [4]. Since then, the where it adds to the greenhouse effect.
process was applied and developed for sewage B. Biogas Digester
treatment. In the early 1970s the energy crisis prompted
Biogas produce by decomposition of organic waste
interest in renewable energy and raised awareness about
in a biogas digester. The size of a digester can vary
alternatives of energy sources such as biogas from AD.
according to its application and capacity from a small
The interest in biogas production received more traction
household system to a large commercial plant having
with the confirmation of the scarcity of fossil fuels along
thousands cubic meters. Farmers mostly use cow dung
with the need for finding sustainable and environmentally
as a feedstock to feed into digester. Two simple biogas
friendly methods of recycling and treating human, animal,
digester designs have been developed, the fixed dome
and organic waste.
type digester and the floating dome digester. The
There are over 35 million biogas plant installations digestion process is same in both digesters but the gas
worldwide, widely spread in Europe and North collection method is different. In the floating type dome,
America; however, these installations are plant-based, the water sealed cover is provided in the digester in
while India and China focus on household biogas order to stop the gas leakage when the floating dome
production [5]. The anaerobic digestion now is using rises as gas is produced and acts as a storage chamber,
globally as a wastewater treatment method for methane whereas the fixed dome type has a lower gas storage
production with livestock manures. But several factors capacity and requires good sealing in order to prevent
affect the anaerobic digestion process; temperature, pH gas leakage when the high pressure developed by gas
value, carbon nitrogen ratio, pressure and different in the digester. Both the digesters have been designed
feedstock will degrade at different rates and produce for use with animal waste, food waste and plant waste.
different amounts of methane. Through co-digestion The biomass is fed into the digester via the inlet pipe
schemes the different wastes with wastewaters can be and undergoes fermentation process under anaerobic
mixed together and treated, the mixing process of condition in the digestion chamber. The temperature is
different substrates improves the methane production quite important factor in digestion process because
and reduces the life cycle costs. A biogas digester is an bacteria do their work best at temperatures between
airtight enclosed container that facilitates anaerobic 30- 60oC. It takes from 2 to 8 weeks to digest the
digestion process of biodegradable waste such as animal biomass, depending on the temperature. The extra slurry
manure and domestic wastes. or decomposed slurry is removed at the outlet for use
as a fertilizer.

740 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Due to lack of space in the home for biogas digester, • Feeding rate
the portable biogas digester can be installed into the Optimum feed rate should be maintained in the
building or building rooftop. The size of digester will digester. At higher feeding rate the retention period of
depend on how much biogas needed to meet daily biomass will be less and undigested Slurry may come
cooking (and lighting) requirements, the availability and out.
amount of biomass and water available on place.
Portable biogas digesters are built using FRP (Fiber • Carbon to nitrogen ratio
reinforced plastic) and it can be fixed in a small area. The optimum C/N ratio is 30:1 for maximum
Water jacket models prevent biogas from leakage are microbiological activity.
most efficient among different designs. Portable biogas
• Seeding
plants having two portions, one is the digester where
fermentation process occurs and another portion where In order to accelerate the fermentation process, a
biogas is collected and stored. Both the portions are small amount of digested slurry containing a methane
separated using water jacket, which is also acting as forming bacteria is added to the freshly charged slurry.
safety relief when excess gas is produced. As the regular This process is known as seeding. Seeding helps to
supply of water is essential for operation, the rainwater start and accelerate the digestion process.
harvesting could help for the biogas plant. • Mixing or stirring
C. Operational Parameters Mixing of slurry get uniformity in substrate
Operation of a biogas plant is affected by the concentration and temperature, prevents the deposition
following factors: of solids at the bottom and break down the scum layer.
• Temperature II. MATERIALS AND METHODS
The methane forming bacteria works best in A. Source of Feedstock
temperature ranges 20-60oC. Digestion at higher
Cow dung is solely used as the prime source for
temperature proceeds more rapidly than at lower
biogas production. Cow dung generate from 3-5 cattle/
temperature. The gas production decreases sharply
day can run a simple 8-10 m3 biogas plant which is
below 20oC and almost stops at 10oC
able to produce 1.5-2 m3 biogas per day which is
• Pressure sufficient for the family 6-8 persons, can cook meal for
The minimum pressure in the digester should be 6- 2 or 3 times or may light two lamps for 3 hrs or run a
10cm of water column i.e., 1.2 bar which is ideal for refrigerator for all day and can also operate a 3-KW
proper functioning. It should never be allowed to exceed motor generator for 1 hr [6]. In this paper cow dung
40-50 cm of water column. Excess pressure inhibits has been taken for studies. Food waste can also be
release of gas from slurry and leakage in masonry. used in the digester which includes vegetables, fruits
and other items. The treatment process of food waste
• Solid to moisture ratio in the biomass products gives hazardous waste. The usage of chemicals
The water and solid mass should be in equal is one of the main reasons for this.
proportion. If water content is too high in the slurry, the
B. Sample Collection
gas production will drop. If water content is too low,
acids will form and it hinder the fermentation process. A sample of 200 kg cow dung has been taken for
biogas production and equal proportion of water which
• pH value
mix together in the digester and forms semi solid state
During methane forming stage, pH value 6.5 to 7.5 called slurry. The slurry formation is shown in fig.1.
should be maintained. In the acid forming stage, pH
value may be around 6 or less.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 741
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 1 Slurry formation

C. Cow Dung Characterization Fig. 2 Experimental setup

Cow dung is not a waste product but do purify all E. Reactor Operation
the waste present in the nature [7]. The study was
The cow dung slurry was fed to the reactor from
conducted on a cow dung sample collected from dairy
the inlet with the help of funnel and the floating drum
farm. The waste was mixed with equal quantity of tap
was placed in the digester. Before keeping the floating
water approximately 200L to form slurry.
drum in the digester the gas valve was opened in order
D. Experimental Setup to allow the air come out from the gas chamber. To
make the fermentation process fast, the place was
A completely recycled anaerobic reactor made from
selected so that the sun radiation can fall directly on the
two polyethylene water tank (used for drinking water
digester. The fermentation process under anaerobic
storage). The floating type gas reactor consists of a
condition produced biogas which was collected in the
water tank as a digester having capacity 400L and
gas chamber.
another water tank for gas storage having capacity 250L
as shown in fig.2. As the gas produces in the digester
and collected in the another tank which act as floating
dome, raises up due to pressure created by biogas.
This digestion system for AD of cow dung consists of
with arrangement for feed, recirculation is made by 400L
container, biogas collection and measurement by using
250L container, 90mm T joint, 90mm male adapter,
90mm cap, 90mm PVC pipe, Elbow 63mm, 63mm
male adapter 2, 63mm check nut, 63mm PVC pipe,
12.5mm male adapter, 12.5 galvanized elbow, PVC
adhesive seal, 50mm Ball valve, 63,50 and 12.5mm
barrel piece, Funnel and Teflon tape.

742 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. EXPERIMENTAL RESULT It can be seen from the graph, the gas production
TABLE I BIOGAS PRODUCTION IN LITRE AND PH VALUE increases first up to day 10 days rapidly but then it
OF SLURRY starts slowing down the production rate as acid
Date No. of Gas pH valu e concentration increases in the digester and pH decreases
Day Production below 7 after 17- 19 days. Water was added to dilute
(Litre)
4th Feb 1 0 7.25 which increases the pH, gas production again starts
5th Feb 2 0 7.24 increasing. Therefore, it can be concluded that acid
6th Feb 3 8 7.22 concentration greatly affects the biogas production.
7th Feb 4 16 7.20
8th Feb 5 24 7.15 During the experiment the climate change was affected
9th Feb 6 33 7.10 the biogas production.
10th Feb 7 46 7.08
11th Feb 8 54 7.05 pH value
12th Feb 9 71 7.08 7.4
13th Feb 10 75 7.11 7.2
14th Feb 11 84 7.15
15th Feb 12 87 7.12 7
16th Feb 13 96 7.10 6.8
17th Feb 14 104 7.05
18th Feb 15 112 7.02
6.6
19th Feb 16 129 7.01 6.4 pH value
20th Feb 17 142 7.00
6.2
21st Feb 18 146 7.00
22nd Feb 19 150 6.98 1 3 5 7 9 11131517192123252729
23rd Feb 20 151 6.93
24th Feb 21 163 6.91 No. of Days
25th Feb 22 165 6.90 Fig. 4 pH value V/s day
26th Feb 23 175 6.86
27th Feb 24 188 6.82
The pH values of the slurry before during and after
28th Feb 25 196 6.79 digestion were determined with a digital pH meter. The
29th Feb 26 200 6.71 graph shows that first the pH value is on higher side i.e.
1st March 27 210 6.70 nearly 7 under this pH increased gas production was
2nd March 28 214 6.65
3rd M arch 29 222 6.60 observed. As reaction inside the digester continues, it
stars decreasing and after day 19 it becomes acidic.
From the above result shown in table1 it has been
Water added to dilute and thus pH increases.
seen that the biogas production increases as days passes
but pH value of slurry reduces as the process going on IV. CONCLUSION
as the bacteria produces fatty acids. It has been After the thorough study on the performance of
observed that 60 to 70% of gas production takes place biogas digester and evolution of acidogenic reactor, the
in the range of 7.2 to 6.8. If the pH value decreases following collusion has been reached. As a result of the
below 5 the acid formation starts which slow down the treatment of cow dung under anaerobic digestion, the
gas production rate. useful bi product, bio-gas has been produced with a
Gas Production ( Litre) considerable rate of decrease in the values of pH, acidity
250
and alkalinity. Through the successful anaerobic
200
150 processing of cow dung inside the reactor, methanogen
100 gradually converts the organic acids into the methane
50 Gas Production ( Litre)
0
gas and carbon dioxide, which indicates that the waste
1 4 7 10 13 16 19 22 25 28 has better anaerobic biodegradability. Thus achieves a
No. of Days
waste of resource utilization. The results show that
reactor can treat animal waste with high contaminated
Fig. 3Gas Production V/s day
load.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 743


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [9] Bodkhe S.Y. and Vaidya A.N. 'Complete recycle bioreactor for
anaerobic digestion of organic substrates: Food waste' Research
[1] United Nations Development Programme. The Sustainable Journal of Chemistry and Environment Vol.16 (2) June (2012)
Development Goals Report 2018; United Nations: New York,
NY, USA, 2018. [10]Brown RC (ed) (2003) Biorenewable resources-engineering new
products from agriculture. Lowa state press, London
[2] Meynell, P-J. (1976). Methane: Planning a Digester. New York:
Schocken Books. pp. 3. [11]QingXian, X., XueFang, G., BiFen, L., Lei, Q., & Bin, L 2014
Comparison on biogas production of different biogas digesters
[3] McCabe, J; Eckenfelder, W. eds. (1957). Biological Treatment Acta Agriculturae Zhejiangensis, 26(1), 194-199.
ofSewage and Industrial Wastes. Two volumes. New York:
Reinbold Publishing. [12]Mansur, A., Taufik, A., & Janari, D 2015 Design of Portable
Digester for Domestic and Restaurant Organic Solid Waste
[4] Buswell, A.M.; Hatfield, W.D. (1936). Bulletin 32, Anaerobic Processing as Clean Biogas In Replacing LPG as Alternative
Fermentations. Urbana, IL: State of Illinois Department of Energy Source. Prociding International Conference on Information
Registration and Education. Technology and Engineering Application, 4 (133-138)
[5] Kemausuor, F.; Adaramola, M.; Morken, J.; Kemausuor, F.; [13]Sodha M.S., Ram S., Bansal N.K. and Bansal P.K., 1987. Effect
Adaramola, M.S.; Morken, J. A Review of Commercial Biogas of PVC greenhouse in increasing the biogas production in
Systems and Lessons for Africa.,Energies 2018, 11, 2984 temperature cold climate conditions. Energy Conversion and
[6] Werner U, Stöhr U, Hees N (1989) Biogas plants in animal Management, 27(1): 83-90
husbandry. Deutsches Zentrum für Entwicklungstechnologien- [14]M. Kaoma, Potential Greenhouse Gas Emissions Reduction
GATE. through Production and Utilization of Biogas from Pig Manure -
[7] Randhawa, G. K. & Kullar, J. S. Bioremediation of Case Study for Zambia, A dissertation, Agricultural Engineering,
pharmaceuticals, pesticides, and petrochemicals with gomeya/ School of Engineering, University of Zambia, Lusaka, 2013.
cow dung. ISRN Pharmacol. 7 (2011) [15]Beenu and S. Sodhi, "Generation of Biogas energy and its uses",
[8] Deublein, D.; Steinhauser, A. Biogas fromWaste and Renewable International Journal for Research in Applied Science &
Resources: An Introduction, 2nd ed.; WILEY-VCH: Deggendorf, Engineering Technology (IJRASET), Volume 4 Issue VIII, August
Germany, 2010; ISBN 9783527327980. 2016.

744 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Underwater Renewable Energy (Underwater Windmill)


(Renewable Energy)
Navaneethan S1,Pradeep R.V2,Navaneetha Krishnan P3,Mutharasu A4,Karthick5, Kumaran Jawahar M6
1,2,3,4,5,6
Department Of Mechanical Engineering, Bannari Amman Institution Of Technology (Atonomous),
Sathyamagalam, Erode
Email: navaneethans.me19@bitsathy.ac.in1, pradeep.me19@bitsathy.ac.in2, navaneethakrishnan.me19@bitsathy.ac.in3,
mutharasu.me19@bitsathy.ac.in4, karthick.me19@bitsathy.ac.in5, kumaran.me19@bitsathy.ac.in6

Abstract: We are living in a world where rain, tides, and geothermal heat, which are renewable.
almost 80% of energy in demand is supplied by An Underwater windmill like a device that extracts
sources such as natural gas, coal or oil, which are power from the tides. Tidal stream turbines are
quickly waning. International treaties for the described as underwater windmills. This technology is
climate control have boosted the research in the
similar to wind energy technology, with the rotor blades
field of Renewable energy from oceans. Ocean has
driven not by wind power but by tidal currents. They
different currents at different depths. Windmills are
usually used to extract power from wind energy. are driven by the kinetic energy of moving water as
Underwater windmills are used to extract energy same as the way that wind turbines rotate by moving
from the water flow of oceans. Underwater water. The generator is placed into a marine current
windmills can also be called as Tidal stream that typically results when water being moved by tidal
turbines. Tides are used to throw water against forces. Tidal stream turbine can majorly help in
slanting blades and make them spin. This, source production the energy.
of energy will prove to be highly efficient with high
energy density, provided economical and technical MAIN PARTS OF UNDER WATER
problems are solved. Tidal stream turbines play a WINDMILL:
major role in generation of energy by renewable 1. Turbines
sources. They are driven by the kinetic energy of
moving water; the generator is placed in moving 2. Gear box
water that typically result when water being flowing
3. Generator
underwater currents around the world to make this
form of marine renewable energy worth pursuing. 4. Cables
Protection of sea life is also important. Due to the
5. Support
considerable amount of solid over air underwater
windmill has slow rotation.
Keywords: Renewable energy, underwater
windmill, turbine, power.

INTRODUCTION:
Renewable energy sources have major role in
decreasing of emissions of the carbon dioxide (CO2)
into atmosphere. Renewable energy technologies are
becoming an increasingly favourable alternative to
conventional energy sources to assuage fossil fuel
related issues. Renewable energy is energy which
comes from natural resources such as sunlight, wind,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 745


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

BLOCK DIAGRAM:

The underwater turbines are draft to work with water


flow from either the front or the back. This allows to
take back-and-forth motion of tidal wave systems. In
WORKING OF UNDER WATER
contrast to wind turbines, underwater turbines can
WINDMILL:
predict the amount of electricity. Water flow rates are
comparably stable from one day to the next day. This
makes it easy to predict the amount of electricity that
will be generated.
PRINCIPLE OF UNDER WATER
WINDMILL:

A flow of fluid moves a set of blades creating


mechanical energy which is then converted to electrical
Underwater turbines work as similar as usual. Three energy. They are equally troublesome for
bladed rotors are placed on a vertical stack and it is environmentalists, as wind turbines interrupt bird flights
moved by the motion of the water. The rotor rotates a just as water turbines can disturb underwater life. One
magnetic coil generator in the shaft housing which creates advantages water turbine enjoy over other sources of
an electrical current. The high velocity of water generates renewable energy is a predictable tide table. Ocean
more electricity. energy device works on the same principles as a
windmill, where large underwater rotors, shaped like
propellers, are driven by the huge mass of flowing water
to be found at certain places in the sea. The technology
consists of rotors mounted on steel piles (tubular steel
columns) set into a socket drilled in the seabed. The
rotors are driven by the flow of water in much the same

746 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

way that windmill rotors are driven by the wind, the VERTICAL AXIS TURBINE:
main difference being that water is more than 800 times Unlike with horizontal turbines, the shaft that the
as dense as air, so quite slow velocities in water will blades are connected to is positioned vertical to the
generate significant amounts of power. The energy ground. In this type, all the main components are located
generated, being derived from tides has the added close to the ground - in fact, the wind turbine itself is
significant advantage of being predictable. near the ground. This type is easy to maintain, does not
TYPES OF UNDER WATER WINDMILL: incur high construction and transportation costs, and
does not have to face the wind.

1. HORIZONTAL AXIS TURBINE


2. VERTICAL AXIS TURBINE
HORIZONTAL AXIS TURBINE: MAINTENANCES:
Maintenance of the device while it is submerged in
fast currents would be exceptionally challenging and
expensive, so a key patented feature of the technology
is that the rotor and drive train (i.e., gearbox and
generator) can be raised completely above the surface.
Once raised, any maintenance or repairs can readily
be carried out from the structure attended by a surface
vessel.

They are the most commonly used type of wind


turbine. They have all their components (shaft, blades,
generator) atop a tall tower. The blades face directly
into the wind, and the shaft is positioned horizontal to
the ground. The blades are connected to the shaft, and
rotation happens when the wind hits the blades.
Consequently, a gear on the shaft's end turns the
generator.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 747


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

ADVANTAGES: REFERENCES:
• There are no fuel costs. 1. Ganesh Fodase, Assistant Professor, Mechanical Engineering,
2. Pimpri-Chinchwad college of Engineering and Research, Ravet,
• The initial construction costs are high; but the overall Pune.
maintenance is affordable. Other than renewable
3. Andreas Uihlein and Davide Magagna, Wave and tidal current
resources such as wind power, the ebb and flow of energy- A review of the current state of research beyond
the ocean tides are entirely predictable and consistent technology (2016).
and aren't affected by outside forces such as the
4. Prandle D, Simple theory for designing tidal power schemes,
weather. Advances in Water Resources, 1984.
• Tidal energy produces no emissions. 5. MERLIN SUBHA.G, ASSISTANT PROFESSOR(GRADE1),
DEPARTMENT OF ELECTRICAL ENGINEERING,
• Hidden directly underneath the water. PANIMALAR COLLEGE OF ENGINEERING,
POONAMALEE, CHENNAI.
• Tidal energy independent on oil reserves from other
countries. 6. http://www.ecopedia.com/energy/how-do-underwater-turbines-
work/
• Reduce the depends upon fossil fuel. 7. https://electricalacademia.com/renewable-energy/horizontal-axis-
wind-turbine-hawt-working-principle-single-blade-two-blade-
DISADVANTAGES: three-blade-wind-turbine/

• Off shore turbine expense more than wind turbine. 8. Rakesh Patel, A review on underwater Windmill, International
Journal for technical education and research innovations.
• Due to underwater function, it expenses more.
• Because of salt content, there will be corrosion to
steel.
• Fishing has to be restricted in the areas of the power
plant.
• Damages habitat up to 500km away.
• Construction under water is difficult.
• Noise abatement.
CONCLUSION:
The importance of renewable energy is essential
nowadays. More and more people have recognized
the importance of the renewable energy, the vast coastal
and offshore areas contributes one of renewable
resources, i.e. the tidal stream energy, to the entire
energy consumption. In the underwater windmill, the
upcoming projects are under construction due to its
predictability of generating power. Tides play a very
important role in the formation of global climate as well
as the ecosystems for ocean habitants.

748 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Effect of Production Characteristics on Production of


Biodiesel from Acacia Seeds
P.Jaya Prakash1, Dr.J.M.Babu2, A.T.Praveen Kumar3
1,2
Mechanical Department, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, India
3
Mechanical Department, Siddharth Institute of Engineering & Technology,Puttur, India
Email: padmavathi643@gmail.com1, jmbabu@veltech.edu.in2, praveenatlive@gmail.com3

Abstract- Day by day the demand for fossil fuels 1. INTRODUCTION:


is increasing, which causes more dependency on
foreign countries. This is the emerging time to
The major part of all energy consumed worldwide
search for an alternate fuels, since biofuels can be comes from petroleum as largest single source,
extracted from plant based which have attracted a exceeding charcoal, natural gas, hydro and nuclear.
great attention as replacements for conventional However, these sources are limited, and will be
diesel to decrease reliance on fossil based-oil and exhausted. Looking for alternative sources of energy is
also called as an eco-friendly fuel. Biodiesel is of vital importance, thus renewable energy sources are
becoming prominent among the alternative sources developed worldwide, owing to high oil prices and to
of energy due to its economic, environmental and limit greenhouse gas emissions (3). Vegetable oils are a
social values. This paper reports the production renewable and potentially inexhaustible source of
and Characteristics of biodiesel from Acacia seeds. energy, non-toxic, biodegradable in water, contains less
The acacia oil has high free fatty acid content; hence
sulfur compounds and has a high flash point (>130°C).
two step Trans-esterification process has been
carried out to produce the biodiesel. The oil from Historically, it is believed that Rudolf Diesel himself
seeds is extracted by using Solvent Extraction started research with respect to the use of vegetable
Method because of high yielding compared to oils as fuel for diesel engines (7). Due to their high
mechanical extraction. For the Transesterification viscosity and low volatility, the direct use of vegetable
process, the effects of Catalyst concentration, oils in fuel engines is problematic; they do not burn
reaction time, reaction temperature and rotational completely and form deposits in the fuel injector of diesel
speed of the on biodiesel yield have been studied. engines, and formation of toxic acrogenic. Different
The Transesterification reaction of Acacia oil with ways have been considered to reduce the high viscosity
Methanol alcohol using potassium hydroxide as of vegetable oils: Dilution of vegetable oil with diesel
catalyst has been deliberated for the production of fuel; Micro emulsions with short chain alcohols; Thermal
biodiesel. It has been found that optimum values
Decomposition; Catalytic cracking; Transesterification
of catalyst concentration and reaction time are
0.1% w/w and 1 hour respectively. The with ethanol or methanol (7). Among all these
physicochemical property of acacia biodiesel as an alternatives, the Transesterification seems to be the best
alternative fuel for diesel engine was characterized choice, as the process is relatively simple and the
through ASTM standards for fuel tests. From the characteristics of fatty acid esters (biodiesel) are very
observed characteristics of Acacia biodiesel, it can close to those of diesel fuel (8). Transesterification is a
be easily used as an alternative fuel for CI engines reversible reaction where triacylglycerols are converted
without doing any modification in the Engines to fatty acid alkyl esters and glycerol. Due to the
Key words: Acacia Biodiesel, Characterization, apparently insoluble nature of the two main reactants
Production, Methanol, Potassium hydroxide, (oil and alcohol), the use of a catalyst is necessary as it
Petroleum diesel & Trans-esterification improves the solubility and accelerates the reaction rate
.Several vegetable oils, with a diversified composition
in fatty acids, are studied for the preparation of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 749


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

biodiesel: Castor, cottonseed, Jatropha, palm,


Pongamia, rapeseed, rubber, soybean, sunflower and
virgin oils (9-15). To the best of our knowledge, very
little Research references about the oil composition and
bio fuel production from Acacia seeds.
Acacia is the most significant genus of the family
Leguminosae, commonly known as Babool in India. It
was estimated that there are roughly 1380 species of
Acacia worldwide, about two-thirds of them native to Figure 2. Acacia pods after Mature
Australia and the rest spread around tropical and
subtropical regions of the world (1). Acacia nilotica
(family Leguminosae) generally grows to a height of
about 15 - 18 m with a 2 - 3 m diameter (see Fig. 1 ).
The bark is slate green in young trees and nearly black
in mature trees. The pods are normally 7 - 15 cm long,
green and tomentose when immature and greenish black
when mature (see Fig. 2). The pods are indehiscent
and deeply constricted between the seed giving a
necklace appearance (1). 8 to 12 Seeds are present
per pod. The seeds are compressed, ovoid, dark brown
shinning with hard testa (see Fig. 3). Acacia nilotica is
naturally widespread in drier areas of Africa (Senegal,
Egypt) and Asia (India, Burma and Srilanka). In India
Figure 3. Acacia Seeds
it is distributed in forest areas, road sides, farm lands,
tank foreshores, wastelands etc (1). Acacia nilotica 2. EXPERIMENTATION
grows under climatic conditions ranging from sub
2.1 Collection of Acacia seeds
tropical to tropical. It can withstand extreme
temperatures (>50o C) and conditions of drought. It The Acacia pods are collected from the Acacia trees
can also grow at any type of soil; saline (soluble salt in and around Pathakotha cheruvu Village, Guntakal,
content below 3%) or alkaline (up to PH 9) (1). In this Anantapur and Andhra Pradesh. The seeds are then
article, the process to produce biodiesel from oil removed from the pods for further processing. The fatty
extracted from Acacia seeds through Transesterification acid composition of Acacia oil taken from the literature
process is discussed. In addition to this, the physical is given in Table 1.
properties of the biodiesels are measured and reported. Table 1. Fatty acid Composition of Acacia Oil

S.N0 Fatty Acids Percentage


1 Myristic acid (C14:0) 0.4
2 Palmitic acid (C16:0) 15.7
3 Stearic acid (C18:0) 9.0
4 Arachidic acid (C20:0) 1.2
5 Vaccenic acid (C18:1) 29.0
6 Linoleic acid (C18:2) 44.5

*** In CXX:Y, XX indicates the length of the carbon


chain and Y indicates the number of double bond

Figure1.Acaciatree

750 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2.2 Oil Production by Solvent Extraction used for esterification was 9:1. Sulphuric acid was used
Method as catalyst at 1 % w/w of oil. Sulphuric acid has been
Oil has been extracted from Acacia seeds through slowly added to the methanol and mixed well. Then the
solvent extraction process. The apparatus consisted of mixture has been added to the preheated oil. The
a heating mantle which could hold a round bottomed esterification has been carried out for about 2 hours.
flask of 2 L capacity (see Fig 4). Soxhlet extraction The reactant mixture has been allowed to stand in a
chamber has been attached on top of the flask and on separating funnel for 24 hours. The oil layer that got
top of the extraction chamber a condenser has been settled at the bottom has been separated and used for
fitted. 0.5 Kg of seed powder has been used for the trans-esterification.
extraction each time. The seeds were finely powdered Transesterification reaction has been carried out in
by a dry grinder and added to the extraction chamber. a similar experimental set up (see Figure 5). The trans-
An hydrous n-Hexane (organic solvent) has been added esterification parameters such as Methanol to oil ratio,
to the flask and the temperature of the flask has been reaction temperature and speed of the stirrer have been
maintained at 50oC using a temperature controller maintained as constant for all experiments at 6:1, 60oC
mechanism. At this temperature, the hexane gets and 600 rpm respectively. The concentration of catalyst
vaporized and reaches the condenser where it gets (potassium hydroxide) and reaction time have been
condensed and trickles in to the extraction chamber. varied from 0.5 % to 2% and 0.5 hr to 2 hrs respectively
The powdered seeds percolate in n-Hexane solvent the biodiesel yield has been measured and compared.
there by the oil content from the seeds gets dissolved in Optimum catalyst concentration & reaction time for
to the solvent. The extraction chamber has been maximum biodiesel yield is 1% w/w and 1 hour.
designed in such a way that when the solvent reaches a Maximum Biodiesel Yield in two stage process is 87%
certain level, it overflows and trickles back in to the
flask. This process has been repeated till most of the
oil from the seeds powder is extracted by the solvent.
Then, distillation has been carried out to separate oil
from n-Hexane. The oil thus produced has been filtered
using filter paper. Then degumming process has been
carried out in a centrifuge with water to remove water
soluble phospholipids. The degummed oil has been then
treated with sodium sulphate to remove any traces of
moisture remain in oil. The oil yield in this extraction
process was about 18.8% by weight concentration
2.3 Transesterification of Acacia seed oil
Preparation of biodiesel from acacia seed oil by
Transesterification, it is a process of using methanol
(CH3OH) in the presence of catalyst Potassium
hydroxide (KOH) to chemically brake there molecule
of raw oil into ester and glycerol. This process is a
reaction of the oil with an alcohol to remove the glycerin,
a byproduct of biodiesel production.
Due to Higher Fatty Acid, two stage Trans-
esterification Method is used in extraction Process. The
Figure 4. Soxhlet apparatus used for Solvent Extraction
oil is preheated up to 500C, Methanol to oil molar ratio Method

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 751


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Figure 5. Adding Methanol & KOH Solution to Acacia Oil on


Mechanical stirrer
Figure 6. Effect of catalyst concentration on biodiesel yield
After stirring the oil-KOH-alcohol solution at 600C
for 60 minutes the solution is transferred to a glass 2.3.2 Effect of Reaction Time on Biodiesel Yield
container. Now leave the glass container for 48 hours, The Transesterification process has been attempted
due to gravity the separation takes place and biodiesel with reaction time of 30 minutes to 2 hour keeping molar
gets collected in the upper portion of the glass container ratio 6:1 at 60 ± 0.1o C with catalyst concentration of
whereas glycerin gets collected in the bottom portion. 0.5% to 2% w/w of oil. From Fig. 7, it is observed that
This glycerin is removed from the container. Then the the conversion of methyl ester has been lower at 30
biodiesel is washed with water. Again glycerin gets min reaction time. However when the reaction time was
separated from the biodiesel and is removed. The increased to 1 hour, the yield has been maximum. Any
biodiesel is washed with water repeatedly until no further increase in reaction time has not drastically
glycerin is there in the biodiesel. Now this biodiesel is yielded more methyl ester.
heated to 1000C to vaporize the water content in it.
The resulting product is the biodiesel which is ready for
use as an alternate for Petroleum Diesel .
2.3.1 Effect of Catalyst Concentration on
Biodiesel Yield
The influence of catalyst concentration on the methyl
ester conversion of the acacia oil has been studied with
catalytic loading of 0.5% to 0.2 % w/w at 60 ± 1o C
with methanol oil ratio as 6:1. From Fig. 6, it is observed
that methyl ester yield has been less when the catalyst
concentration was lower at 0.5% w/w. The optimal yield
has been achieved with 1% w/w catalytic concentration.
Any further increase in the catalytic concentration has
adversely affecting the methyl ester yield that may be
probably due to saponification process

Figure 7. Effect of reaction time on biodiesel yield

752 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2.4 Determination of Characterization of Acacia The calorific value for petroleum diesel is 45.4MJ
Biodiesel kg-1 whereas for the seed oil of Acacia extracted is
The oil obtained using the non-polar organic solvents 35.70 MJ kg-1. This low energy content is due to the
(n-Hexane) from the seeds of Acacia was used for the presence of chemically bound oxygen in the fatty acid
determination of physico-chemical properties, which is chains. The viscosity is an important physical property
important from biodiesel aspect. Some properties of of a liquid fuel, the kinematic viscosity values for the
oil were determined and are shown in Table- 2. In our acacia seed oil recorded at 40°C in our experiment is
experiments, we recorded the density to be 0.886 gm/ 4.15 cst was in the range recommended by ASTM.
ml at 30°C for n-Hexane extracted seed oil of acacia. From Literature it is reported that the ASTM standard
The density of the seed oil is similar to those of the for biodiesel viscosity is 1.9-6.0 cst at 40°C. The other
other vegetable oil, it is higher than the acceptable ranges important Physical Properties are Flash & Fire Point
of petroleum diesel (0.820-0.845 gm/ml) as per the which is done on Closed cup apparatus. The experiment
current ASTM requirement. Biodiesel is considerably is done by PMCC and result Flash & Fire Point was
more susceptible to autoxidation than petroleum diesel noted as 80oC & 90oC. From this results it is clear that
and autoxidation is a serious threat to biodiesel fuel not much difference lies in the physico-chemical
quality. Thus, oil obtained from the seed of acacia was properties of acacia seed oil as shown in table 3,
characterized by lower contents of unsaturated fatty extracted using n-Hexane compared ASTM Standards..
than other vegetable oils, where affects directly the Table-3 Comparsion of Physico-Chemical Properties of Acacia
Biodiesel
oxidation stability of the biodiesel from which it was
S.No Property Value ASTM criteria
produced. This low degree of unsaturation is expressed Standards
o
by the iodine value obtained for the biodiesel produced 1 Density@30 C (gm/ml) 0.886 0.860- Satisfied
0.890
124.48, which it is in agreement with IS: 548 (PART- 2 Kinematic Viscosity @ 40oC 4.15 1.9-6.1 Satisfied
1) 1964 (Reaffirmed 2010) standard. This result (cst)
3 Flash Point (oC) 80 50-90 Very
indicated that such a biodiesel can present a suitable Close
4 Fire Point (oC) 90 100-110 Very
chemical stability against oxidation. Close
Table-2 Physico-Chemical Properties of Acacia Biodiesel 7 Acid Value (mm KOH/gm) 0.11 0.5 max Satisfied
9 Sulphur (%) 0.08 10 max Satisfied
S.No Property Value Method 10 Gross Calorific Value 8534 8500-8700 Satisfied
1 Density@30o C 0.886 I.S.1448 (Kcals/Kg)
(gm/ml) (PART 32)
2 Kinematic 4.15 I.S.1448 3. CONCLUSIONS
Viscosity @ 40 oC (PART 25)
(cst) From the seeds of the acacia tree, Oil was obtained
3 Flash Point (oC) 80 I.S.1448
(PART 21) with 10.8% yield by using solvent extraction process.
4 Fire Point (oC) 90 I.S.1448 A biodiesel was formed by Transesterification of the
(PART 21)
5 Cetane Index 44.60 ASTM D 976-
crude oil by using conventional catalyst KOH and
91 methanol. Based on the results obtained in this study
6 Carbon Residue 0.57 I.S.1448 regarding the characterization of crude oil for various
(%) (PART 122)
7 Acid Value (mm 0.11 I.S.1448 physico-chemical properties demonstrated that, almost
KOH/gm) (PART 2) all the important properties of seed oil from Acacia
8 Iodine 124.48 IS:548
(PART-1)- methyl esters are in agreement with the biodiesel making
1964 it a potential candidate to be an alternative economical
(Reaffirmed
2010) bio fuel, in view to limited supply of natural fossil fuel.
9 Sulphur (%) 0.08 I.S.1448
(PART 33)
10 Gross Calorific 8534 I.S.1448
Value (Kcals/Kg) (PART 6)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 753


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES 14. A.S.Ramadhas, S.Jayaraj & C.Muraleedharan," Biodiesel


production from high FFA rubber seed oil", Fuel, volume 84,
1. C.adikesavan, K.Raja gopal & J.Selwin Rajadurai, "Production 335-340,2005.
and Characterization of Biodiesel from Acacia nilotica seeds",
International Journals of ChemTech Research, Volume 8, No 2, 15.M.Dias Joana, C.M.Alvim-Ferraz Maria & F.Almeida Manuel,
2015 "Comparison of the Performance of different homogeneous alkali
catalysts during transesterification of waste and virgin oils and
2. M. BABU Jonnalagadda, N.V.sai Deepak Raj, Pruthviraj Bharmal evaluation of biodiesel quality", Fuel, volume 87, 3572-3578,2008.
& M.Balaji, "Experimental Investigation on the Production of
Linseed Biodiesel Yielding and Properties Evaluation",AIP 16. J.M. Babu, J.M., Prasad, K.S., Ganji, P.R., Ravikiran & C., Velu,
Conference Proceedings 2311, 020028, 2020 "Analysis on the effect of pilot injection strategies on combustion
and emission characteristics of palm-munja biodiesel/diesel blend
3. A.Cheriti1, M.F.Talhi1, N.Belboukhari1, Y.Belhadjadji & S.Ghezali, on CRDI diesel engine", International Journal of Ambient Energy,
"Biodiesel production by transesterification of Acacia raddiana 2019
seed oils", Chemical Technology, Volume 6 Issue 1,2010
17. Rachan Kamakar, Krishnendu Kundu & Anita Rajor. "Fuel
4. J.M.Babu, Dr.R.Velu, Abdul Nayeem & B.Yeswanth Singh, Properties and emission characteristics of biodiesel produced
"Experimental Investigation on Production of Lotus Seed Bio- from unused algae grown in india", Petroleum Science,15:385-
Diesel and Properties Evaluation", Advances in Natural and 395, 2018
applied Sciences,11(4), 539-543, 2017
18.Vishal Saxena, Niraj Kumar & Vinod Kumar Saxena, "Biodiesel
5. P.Ravi Chandra Ganesh, K.Hema Chandra Reddy, J.M.Babu & synthesis from Acacia concinna seed oil: A comprehensive study",
M.Sarath Chandra,"Experimental Investigation of Performance, Energy Sources, Part A: Recovery, Utilization, and Environmental
Emissions and combustion Characteristics of a Di-Diesel Engine Effects, ISSN: 1556-7036,2018
Fuelled with Aqueous Cerium Oxide and Aqueous Aluminium
Oxide Nano Particle Additives", Lecture Notes in Mechanical 19. K.C Akashkumar, P. Nagesh, J.M.Babu & J.Aatmesh Vora,
Engineering, Springer Singapore, PP 85-96,2020 "Production and engine performance and emission evaluation of
karanja and jatropha-based biodiesel", Proceedings of the 19th
6. B Ashok, K Nanthagopal, D Arumuga Perumal, JM Babu, Anmol Asia Pacific Automotive Engineering Conference & SAE-China
Tiwari and Akhil Sharma,"An investigation on CRDi engine Congress, Volume 486, PP 1119-1133, Special Issue SAE-China
characteristic using renewable orange-peel oil', Energy 2017
conversion and management, Volume 180, PP 1026-1038, 2019
20. Riyazuddeen Khan, Ruchi Srivastava, Mather Ali Khan, Pravej
7. A.P.Vyas, J.L.Verma & N.Subrahmanyam,"A Review on FAME Alam, Malik Zainul Abdinc and Mahmooduzzafara, "Variation
Production Processes," Fuel,Vol. 89, issue 1, 2010. in oil content and fatty acid composition of the seed oil of Acacia
8. A.W.Schwab,M.O.Baghy & B.Freedman, "oils: Dilution of species collected from the northwest zone of India", wiley Online
vegetable oil with diesel fuel;. Micro emulsions with short chain Library, 2012
alcohols, Fuel, volume 66,1372-1375,1987. 21. J.M. Babu, R.Velu, U.S. Kalyan Rao & A.M., Yatish, "A critical
9. S.M.P.Meneghetti, M.R.Meneghetti, C.R.Wolf, E.C.Silva, review on EGR technique to reduce the diesel engine emissions",
G.E.S.Lima, M.A.Coimbra, J.I.Soletti & S.H.V.Carvalho;., International Journal of Mechanical and Production Engineering
"Ethanolysis of Castor and cotton seed oil:A systemic study Research and Development, Special Issue,PP 23-28, 2018
using classical catalyst", Journal of the American Oil Chemists' 22. Bargali, K. & Bargali, S.S. "Acacia nilotica: a multipurpose
Society,Volume 83, NO 9, 2006. leguminous plant", Nature and Science", 7(4): ISSN 1545-0740,
10.R.Sarin & M.Sharma, "Jatropha-palm biodiesel blends: an optimum 2009.
mix for Asia", Fuel, volume 86,1365-1371, 2007. 23. TALHI M. Fouzi , CHERITI Abdelkrim & BELBOUKHARI
11.L.Soh-Kheang, C.Soo-Mooi & C.Yuen, "Oxidative stability and Nasser, "Biodiesel production by Transesterification of Acacia
storage behavior of fatty acid methyl esters derived from palm raddiana Oils Under Heterogeneous catalysis", Journal of
oil", Journal of the American Oil Chemists' Society, volume 83, Scientific Research, Volume 1, 2010
947-952,2006. 24.A.Garba, B. Sallau, S. Ibrahim, M. Abarshi, A. Muhammad, M. S.
12.P.T.Scott, L.Pregelj, N.Chen, J.S.Hadler, M.A.Djordjevic & Galadima & S. Babangida, " Biodiesel Production by Lipase
P.M.Gresshoff, " Pongamia Pinnata: an untapped resource for Mediated Transesterification of Acacia Nilotica Seed Oil",
the biofuels industry of the future", Bioenergy Research.,1, 2- Nigerian Journal of Basic and Applied Science, ISSN 0794-5698,
11,2008. 2018

13.M.Mittelbach & P.Tritthard' "Diesel fuel derived from vegetable 25. J.M. Babu, M.S.Sikarwar, M.S. & R.Velu, "Experimental
oils, III. Emission tests Using methyl esters of used frying oil", investigation on the effect of diesel engine performance when
Journal of the American Oil Chemists' Society, volume 65, 1185- operated with palm Munja biodiesel", International Journal of
11,1988. Mechanical and Production Engineering Research and
Development, Special Issue,PP 213- 220, 2018.

754 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Application of Evaporative Cooling on the Condenser of


Window-Air-Conditioner
Ch. Sreenivasa Rao
Associate Professor, Department of Mechanical Engineering, GIST, Nellore, India

Abstract: Reduction of energy consumption is countries, the performance of the air condenser drops
a major concern in the vapor compression down and the air conditioner works improperly since
refrigeration cycle especially in the area with very the temperature and the pressure of thecondenser
hot weather conditions (about 50°C), where increase and the compressor is forced to workunder
window-air-conditioners are usually used to cool
the greater pressure ratio, which results in more power
homes In this weather condition performance of
consumption.
air condenser window-air-conditioners decrease
sharply and electrical power consumption increase Another problem which was reported with
considerably. These problems have activated the application of air condenser in hot weather area is related
research programs in order to improve the to the highstories buildings. In these buildings the hot
performance of window-air-conditioners by air from air conditioners of lower stories rise up and
enhancing heat transfer rate in the condenser. In provide a hot flow field around the air conditioners of
this article, a new design with high
higher stories as shown in Fig.1. Sometimes, the increase
commercialization potential for incorporating of
evaporative cooling in the condenser of window- in the air temperature isso high that the air conditioner
air-conditioner is introduced and experimentally trip down. In order to prevent this problem the hot air
investigated. A real air conditioner is used to test is required to be cool down before passing over the
the innovation by putting two cooling pads in both condenser.
sides of the air conditioner and injecting water on It is generally believed that the coe?cient of
them in order to coold own the air before it passing
performance (COP) of an air conditioner decreases
over the condenser. The experimental results show
that thermodynamic characteristics of new system
about 2-4%by increasing each °C in condenser
are considerably improved and power consumption temperature [1]. So the COP of an air conditioner
decreases by about 16% and the coefficient of could dropdown as much as 40% in hot weather
performance increases by about 55%. condition. This large reduction of COP means more
electric power consumption for air conditioners in
Keywords:Window-air-conditioner; Evaporative
cooling; Coefficient of performance; Water
summer when the demand for electric power is already
injection; Energy reduction high and the increase in power consumption of air
conditioners create more pressure on the power
1. INTRODUCTION network which is not desirable. Therefore, it is very
Air condenser is generally used in small size important to decrease the power consumption of air
residential air conditioners like window or split type, conditioners in very Different designs for applying
for heat rejection process in the cycle. The reason is to evaporative cooling in an existing residential air
make the system assimple as possible without any need conditioner could be introduced. Concern should be
to the water connection line and other equipment. This taken to employ a design with best performance and
idea seems reasonable as far as the air temperature in minimum side effects. There are two methodsfor
summer is moderate andnot too high (about 40 °C). evaporative cooling in condensers namely direct and
But when the air temperature increase and approach indirect method. Indirect method water is directly
50 °C or higher, as it happens inmany Middle East injected on the condenser and provides cooling effect.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 755


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

This method hot ambient temperature. To do this, it is They reported theelectric energy saving of 20% for the
required to decrease the temperature of the ambient retrofitted systemwhen ambient air temperature was
air before it passes over the condenser coil, in order to 34°C. Hajidavalloo[5] investigated the effect of
decrease temperature and pressure of the condenser. evaporative cooling of window-air-conditioner by
The simple and cheapest way for cooling the ambient injecting water directly on the condenser and reported
air temperature is employing the evaporative cooling 10% reduction in power consumption. Although the
system. problem in air conditioner performance in very hot
weather condition have been reported for long time but
there is little work to address the problem and offer
appropriate solution. There are many questions about
the ways of applying evaporative cooling in the system
and also the amount of expected improvement in COP
after retrofitting especially in very hot weather condition.
In order to specify the best arrangement and optimum
design of evaporative cooling in the residential air
conditioner, much works are required. In this work an
experimental investigation was performed to evaluate
the application of media pad evaporative cooling system
in a 1.5-ton window-air-conditioning system in very
hot weather condition.
2. SYSTEM DESIGN AND
EXPERIMENTAL SET-UP
Has many side effects including mineral deposits and
corrosion of the condenser coils. Therefore, this method
hasrarely been used in residential air conditioners. In
the indirect method water is injected on the evaporative
media padwhich is located in the way of air over the
condenser and provides cooling effect by evaporation
of water. Media pads are cellulose bound cardboard
structures which are cross-fluted to increase the contact
This could result insignificant energy and demand area between air and water. The average life expecting
savings overall since there are millions o fair of the media pad evaporative cooler is of the order of
conditioners in the residential sector and any small five years. With clean waterit may last up to 10 years
reduction in power consumption of an air conditioner [6]. The place where the media pad should be installed
could save huge amount of megawatt in the network. is an important aspect of the design. The media pad
Although the application of evaporative cooling in large should be placed where it gives the best cooling
industrial refrigeration systems were investigated[2,3], performance and also takes minimum space from air
but there is little work to investigate the application of conditioner. Since the window-air-conditioners are
evaporative cooling on small size refrigeration system. designed to have minimum space, therefore the limitation
Goswamiet al. [4] employed an evaporative cooling of space should be considered in the design.In this work
on existing 2.5 ton air conditioning system by using two evaporative media pads, each with 3 cm thickness
media pad. They put four media pad around condenser were installed in both sides of air conditioner togive the
and inject water from the top by a small water pump. largest area available for cooling without increasing the
total volume of the air conditioner as shown in Fig. 2.

756 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Hot ambient air passes over the evaporative media


pads and after cooling down passes over the condenser
and finally exits from back side of the condenser as
shown in Fig. 3. A water circulation system was built to
spray water on the top of the media pad. It includes a
small pump, tank and water injection pipe as shown in
Fig. 4. Individual power meter was used to measure
the electrical current consumption of the compressor.
Temperatures of refrigerant and circulation air at 3. EXPERIMENTAL RESULTS AND
different points were recorded with T-Type thermo DISCUSSIONS
couples and the signals were connected to computer Many preliminary experiments were performed to
by using data acquisition system type MIO-64E-3 and prepare the setup for getting reliable
analyzed by LabView program from National data.Inordertohavea basis for comparison and also to
Instrument. For temperature measurement, the surface specify the effect ofevaporative cooling on the air
of tube was polished to remove any rust or dust and conditioner, each experiment was performed in two
then the thermocouple probe was laid down on the consequent stages. In the first stage, conventional air
surface. Inorder to reduce the thermal contact resistance conditioner was used in the experimentwithout using
between thermocouple probe and tube surface, thermal media pad and the data were recorded after steady
grease was used in the point of contact. An insulating state condition was established. Then, the air conditioner
tape was wrapped around the tube to push the probe was turned off and the condenser of air conditioner
against the tube surface and also prevent any convection was retrofitted by evaporative cooling very fast and
effect of ambient air on the temperature readings. The the second stage of the experiment was performed. The
pressure in both ends of condenser and evaporator were time difference between two stages was small (about
measured byspecial Bourdon gauges suitable in 15 min.), sothe weather condition for two experiments
refrigeration system. The water consumption rate due was the same. In all experiments the data were recorded
to evaporation effect was measured by measuring water after steady state condition was established and the
level decrease in the tank during the test period. properties of refrigerant and air remained constant.
Many tests were performed to determine the effect of
evaporative cooling on the performance of air
conditioning system. The results of an experimental run
(run A) are shown in Table 1. Fig.5 shows the results
on P-h diagram.A sshown in this figure, by applying the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 757


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

evaporative cooling, pressure in the condenser reduced


from 2360 kPa to1530kPa,which shows a 35%
reduction, but the pressure in the evaporator reduced
from 486 kPa to 408 kPa which shows a 17%
reduction. Therefore, pressure ratio across the cycle
reduces from 4.75to 3.75 which has 21% reduction.
This reduction is an indication of power reduction in
the system. Also, as it shown in Table1, the condenser
temperature in the retrofitted system reduced about 17
°C while the evaporator temperature reduced about 6
°C which is another indication of reduction in pressure
ratio of cycle. Electric current consumption reduces
about 15% and reach to 9.2 A from 10.9 A. An
interesting fact that shows the degree of reliability and
accuracy of the experimental results is the compatibility
of temperature and pressuredata in the condenser which
were measured independently. As shown in Table1, the
condenser temperature in conventional test is about 58
°C and from thermodynamic tables it can be seen that
the saturation pressure of R-22 in this temperature is
2333kPa. On the other hand, the pressure reading in
run A shows at this temperature, the condenser pressure
is about 2360 kPa which has negligible difference with
the saturation pressure of R-22 in 58°C. The same
closeness in temperature and pressure readings also
exists for data in the evaporator which indicates the
reliability of experimental results.

The experimental results for another run (run B) are


shown in Table 2. In this run the pressure was not
measured in the cycle due to two reasons. First, it was
found from the previous run that there are little
differences between the experimental pressure reading
and the one specified based on saturation temperature
reading from thermodynamic tables. Second, it was also
found that thepressure drop in condenser and
evaporator are negligible and can be ignored. Generally
measuring the pressure inthe refrigeration cycle is di?cult
because the refrigerant tends to escape from the
pressure gauge connections and fittings and in the
longterm it may leak outside. So itwas decided to
remove the pressure gauges and specify pressure data
based on the temperature reading and thermodynamic
saturation table.Fig.6 shows the results of this run on

758 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

P-h diagram. As shown in Table 2, the condensing The experimental results for another run (run B)
temperature reduced about 10 °C while the evaporator areshown in Table 2. In this run the pressure was not
temperature reduction is about 2.5°C which is an measured in the cycle due to two reasons. First, it was
indication of reducing the pressure ratio across the found from the previous run that there are little
compressor. Exit air temperature from condenser differences between the experimental pressure reading
reduces about 14 °C while the exit air temperature is and the one specified based on saturation temperature
almost constant. Electric power reduction in this run is reading from thermodynamic tables. Second, it was also
about 16%. Water circulation rate was about 217l/hand found that thepressure drop in condenser and
water evaporation rate was 7.5l/h. evaporator are negligible and can be ignored. Generally
measuring the pressure inthe refrigeration cycle is difficult
4. CALCULATION AND RESULTS because the refrigerantt ends to escape from the
In order to calculate the cooling capacity, refrigerant pressure gauge connections and fittings and in the
effect and COP, it is required to specify thermodynamic longterm it may leak outside. So itwas decided to
properties of refrigerant at different sections of the cycle remove the pressure gauges and specify pressure data
based on the experimental results. Tables 3 and 4 show based on the temperature reading and thermodynamic
the thermodynamic properties of refrigerant for saturation table.Fig.6 shows the results of this run on
conventional and evaporative runs respectively based P-h diagram. As shown in Table 2, the condensing.
on data from Van Wylen and Sonntag[7]. Actual power
consumption canbe obtained by using Eq.(1) since the
voltage, current and cos/ are known. Mass flow rate
can be obtained by Eq. (2). Cooling capacity and COP
can be obtained by using Eqs. (3) and (4), respectively.
In Eq.(4) subscripts (1), (2), (3) and (4) stand for exit
conditions from evaporator, compressor, condenser and
capillary tub respectively.

Qc =

B=

The results of calculation for power consumption,


mass flowrate, cooling capacity, refrigeration effect and
COP for run A are shown in Table 5. The results show
power consumption decrease about 15% and cooling
capacity increase about 33%. Mass flowrate increases
12% and refrigerant effect increase 19%. The COP
which is themost important parameter increase about
55%. This in dicates that by employing evaporative Table 6 shows the results of calculation for run B.
cooler not only power consumption decreases but also As shown in the table, power consumption decreases
cooling capacity also increases. about 16% and COP increases about 31% which show
considerable savings.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 759


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

5. CONCLUSIONS REFERENCES
The application of evaporative cooling in the small 1. Y.A. Cengel, M.A.Boles, Thermodynamics An Engineering
Approach, thirded., McGraw-Hill, Boston, 1998.
sizerefrigeration system was emphasized for regions of
very hot weather condition. A novel design for 2. R.J.Dossat, Principal of Refrigeration, Prentice Hall, New Jersey,
1991.
employing in direct evaporative cooling system in a
3. W.K. Brown, Fundamental concepts integrating evaporative
window-air-conditioner was introduced. The potential techniques in HVAC systems, ASHRAE Transactions 96 (Part
of commercialization of thisdesign is very high and it 1) (1990)1227-1235.
could also be easily applied on existing air conditioners. 4. D.Y. Goswami, G.D. Mathur, S.M. Kulkarni, Experimental
The performance of air conditioner was experimentally investi-gation of performance of are sidential air conditioning
investigated with and without media pad evaporative system with an evaporatively cooled condenser, Journal of Solar
Energy Engineering 115(1993) 206-211.
cooling on the condenser. The experimental result
5. E. Hajidavalloo, Increasing COP of window air conditioner in
revealed that with evaporative cooling system the power very hot weather of Khoozestan, Research Project Report to
consumption decreased and cooling capacity and Management and Programming Organization, 2001.
coefficient of performance increased considerably. It 6. Munters Catalog, Evaporative Cooling Media, Fort Myers.Fl,
was recommended to use indirect evaporative January1986.
condenser in very hot weather condition instead of 7. G. J.VanWylen, R.E.Sonntag, Fundamental of Classical
conventional air condenser to save electric power and Thermodynamics, thirded., JohnWiley and Sons, New
increase cooling capacity. Economic analysis based on York,1986.

local prices shows the energy saving can pay for the
cost associate with retrofitting the condenser in less than
1 year.

760 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Synthesis of Fuel from Waste Plastic


Kiran Kumar Yadav A1, Srikar Gemaraju2, K.Vengal Rao3, M.A. Mateen4, P.Hemalatha5
1
Mechanical Department, TKRCET, Hyderabad
2,3
Mechanical Department, VFSTR, Vadlamudi
4
Mechanical Department, CMR University, Bangalore
CSE Department, VMTW, Hyderabad

Abstract- Plastics have woven their way into our are a sort of material that can't be deteriorated effectively
daily lives and now pose a tremendous threat to in a brief period of time. Generous amounts of plastic
the environment. Over a 100million tones of have gathered in the regular habitat and in landfills. Those
plastics are produced annually worldwide, and the squanders can be classified according to their origins.
used products have become a common feature at
They are
overflowing bins and landfills. Though work has
been done to make futuristic biodegradable - Industrial
plastics, there have not been many conclusive steps
- Municipal
towards cleaning up the existing problem. Here,
the process of converting waste plastic into value These gatherings have various characteristics and
added fuels is explained as a viable solution for properties and are exposed to various management
recycling of plastics. Thus two universal problems strategies. Huge amounts of plastic wastes arise as a
such as problems of waste plastic and problems of by-product or defective
fuel shortage are being tackled simultaneously. In
this study, plastic wastes were used for the pyrolysis product in industry and agriculture. Main
to get fuel oil that has the same physical properties c2onstituents of municipal solid waste are food waste,
as the fuels like petrol, diesel etc. Pyrolysis runs wood, paper, cardboard, plastics, rubbers, metals. On
without oxygen and in high temperature of about the other words, more than half of the municipal solid
300°C which is why a reactor was fabricated to waste elements are organic species in this mainly
provide the required temperature for the reaction. thermoplastics, which can be used as energy sources.
The waste plastics are subjected to The conventional MSW removal strategy is landfill. In
depolymerisation, pyrolysis, thermal cracking and
light of the life span of plastics, removal to landfill may
distillation to obtain different value added fuels
essentially be putting away issues for what's to come.
such as petrol, kerosene, and diesel, lube oil etc.
Converting waste plastics into fuel hold great For instance, plasticizers and other added substance
promise for both the environmental and economic synthetics have been displayed to filter from landfills.
scenarios. The extent of varies accordingly, particularly pH and
organic content.
Key words: Pyrolysis, Plastic Waste, Flash Point,
Fire Point, Viscosity. 1.2 PLASTICS
INTRODUCTION As a brief introduction to plastics, it can be said that
Plastic waste is viewed as a possibly modest plastics are 4 synthetic organic materials produced by
wellspring of synthetics and energy. Parts of us have polymerization. They are typically of high molecular
experienced an assortment of items that utilization plastic mass, and may contain other substances besides
materials today. polymers to improve performance and/or reduce costs.
These polymers are made of a series of repeating units
Because of the expanding level of private utilization known as monomers. Therefore, polymers can be
of this plastic 1 materials enormous measure of molded or extruded into desired shapes. There are two
squanders is released to the climate. Plastic materials main types of plastics: thermoplastics and thermosetting

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 761


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

polymers. Thermoplastic scan repeatedly softens and The types of plastics and their piece will condition
melt if enough heat is applied and hardened on cooling, the transformation Process and will decide the pre-
so that they can be made into new plastics products. treatment prerequisites, the burning temperature for the
Thermosets or thermosetting plastics can melt and change and hence the energy utilization required, the
take shape only once. They are not suitable for repeated fuel quality yield, the vent gas creation (for example
heat treatments; therefore, after they have solidified, arrangement of risky vent gases like NOx and HO),
they stay solid. Plasticis perhaps the most ordinarily the fly debris and base debris piece and the capability
utilized materials in day-by-day life which can be of substance erosion of the equipment.
arranged from multiple points of view, for example, in Major factors to be considered while selection is:
light of its compound construction, amalgamation cycle, - Smooth feeding for equipment
thickness, and different properties.
- Effective conversion
1.3 SELECTION OF WASTE PLASTICS
- Well-controlled combustion
Squander plastics are quite possibly the most
encouraging assets for fuel creation in view of its high As shown in below table PE, PP and PS
warmth of burning and because of the expanding 5 thermoplastics are ideal as feedstock in the creation of
accessibility in neighbourhood networks fluid hydrocarbons. The expansion of thermosetting
plastics, wood, and paperlo the feedstock prompts the
arrangement of carbonous substances and brings down
the rate and yield of fluid items.
The municipal plastic waste comprises of 80%
thermoplastics and 20% thermosetting plastic. Since
thermoplastics are can be further processed, basic types
of thermoplastics can be used. Simple and common
thermoplastics are polyethylene and polypropylene.
For our experiment, we took Polypropylene 2as the
Selection of waste plastic raw material for the following reasons and factors.
In contrast to paper and wood, plastics don't - One of major factor to consider PP over PE is the
assimilate a lot of dampness and the water content of carbon footprint.
plastics is far lower than the water content of biomass,
for example, yields and kitchen squanders. - PP is abundantly used in Plastic bags; plastic bottles
so raw material is easy to get.
The change strategies for squander plastics into fuel
rely upon the sorts of plastics to be focused on and the - The crystallinity of PP is less than PE.
properties of different squanders that may be utilized - PP fuel has more calorific value than all fuels.
simultaneously.
As a result, we preferred Polypropylene over
Moreover, the successful change expects innovations Polyethylene and other polymers.
to be chosen by neighbourhood monetary, natural,
social and specialized attributes. By and large, the II. PLASTIC PYROLYSIS
t4ransformation of waste plastic into fuel requires 2.1 FACTORS AFFECTING PLASTIC
feedstock which are non-perilous and flammable. PYROLYSIS
Specifically, each kind of waste plastic change strategy
has its own reasonable feedstock. The central point affecting the plastic pyrolysis
interaction 7 and pyrolysis item atomic appropriation

762 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

incorporate synthetic sythesis of the feedstock, breaking III. EXPERIMENT PROCEDURE


temperature and warming rate, activity pressure, reactor Pyrolysis is the compound deterioration of natural
type, home time and use of impetus substances by warming the word is initially instituted
2.2 CRACKING TEMPERATURE AND from the Greek-determined components pyro "fire" and
HEATING RATE lysys "disintegration". Pyrolysis is normally the principal
Temperature is one of the most important operating substance response that happens in the consuming of
variable, since the temperature dominates the cracking numerous strong natural energizes, material, similar to
reaction of the polymer materials. Not all of the polymer wood, and paper, and furthermore of certain sorts of
materials can be cracked by increasing the temperature. plastic. Anhydrous Pyrolysis cycle can likewise be
Van der waals force is the force between the molecules, utilized to create fluid fuel like diesel from plastic waste.
which attracts molecules together and forestalls the Pyrolysis innovation is warm debasement measure
breakdown of particles. At t5he point when the without oxygen. Plastic waste is treated in a barrel
vibration of atoms is adequately extraordinary, the shaped reactor at temperature of 300ºC-350ºC. These
particles will dissipate from the outside of the article. days, plastics squander is exceptionally hurtful to our
Be that as it may, the carbon chain will be broken if inclination additionally for people. Plastic isn't effectively
energy instigated by van der Waals power along the decomposable its effect in preparation, environment,
p7olymer chains is more noteworthy than the enthalpy for the most part influence on ozone layer so it is
of the C-C bond in the chain. important to reuse these waste plastic into valuable things
.so we reuse this waste plastic into a helpful fuel.
This is the reason why high molecular weight
polymer is decomposed rather than is boiled when it is 1. Raw Materials.
heated. In theory, the temperature of thermal breaking 2. Methodology.
the C-C bonds should be constant for a given type of
3. Pyrolysis Process.
plastic (polymer). However, 8this temperature has been
found to differ in different studies. 4. Filtration and Purification.
Temperature is one of the most important operating 5. Fuel Testing and Analysis.
variables, since the temperature dominates the cracking
RAW MATERIALS
reaction of the polymer materials. Not all of the polymer
materials can be cracked by increasing the temperature. The raw materials utilised in this study were derived
Van der Waals force is the force between the molecules, from Polypropylene (PP) type plastic Density = 1.30-
which attracts molecules together and forestalls the 1.58 g/cc; Crystalline melting temperature ™ = 168-
breakdown of particles. At the point when the vibration 175 ºC such as plastic bottle waste gathered from
of atoms is adequately extraordinary, the particles will scavengers around Keputih Sukolilo Surabaya,
dissipate from the outside of the article. Be that as it Indonesia. Dirt was washed off the plastic waste, after
may, the carbon chain will be broken if energy instigated which it was then cut into small pieces, with sizes of
by van der Waals power along the polymer chains is 1×3 cm with the use of enumerator machines, to
more noteworthy than the enthalpy of the C-C bond in significantly reduce the volume of the sample chamber
the chain. in the reactor.
This is the reason why high molecular weight - The Raw material used for extracting oil by the
polymer is decomposed rather than is boiled when it is process of Pyrolysis is Polypropylene (PP).
heated. In theory, the temperature of thermal breaking
- The "Material Safety Data Sheet" is given below
the C-C bonds should be constant for a given type of
with detailed information about various safety aspects
plastic (polymer). However, 8this temperature has been
of the material used.
found to differ in different studies.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 763


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

FIRE FIGHTING MEASURES Line l: High pressure is used in which the plastic is
Flash Ignition Temperature: 335°C used for extracting 32 the fuel by the process of
vaporization of plastic.
Auto Ignition Temperature: 350°C
Line 2: Filtration system is provided in the
Flammable Limits: NA
equipment which helps to decrease the flux content in
Suitable Extinguishing Media: Water, Foam, Carbon case of high thickness plastic or low thickness plastic.
Dioxide, Dry chemical powder.
Line 3: Water is used for the process of
For Safety reasons, unsuitable extinguishing media: condensation where the extracted fuel is in the form of
None gaseous state.
Protective Equipment: Respiratory & Eye protection Line 4: After completion of condensation the fuel is
for firefighting personnel Special hazards caused by the stored in a container that which consists of low flux
material, its products of combustion or resulting gases: content comparing to method-1 due to low thickness
In case of fire it can release: Carbon dioxide (C02), of the plastic and high pressurized container.
and when lacking oxygen (02), carbon monoxide (CO),
Ketones & Aldehydes. The products of the burning 44 At last the gaseous produced in the containers while
are dangerous. The formation of hydrocarbons and the process is running out they are exposed in to the
aldehydes are possible in the initial stages of a fire atmosphere.
(Especially in between 400°C and 700°C). - In this process the high pressurized container is
Additional information: Heat value: 8000 -11000 placed on burner.
kcal/kg. - The Plastic material placed in the container starts
METHODOLOGY melting and then evaporation takes place at certain
temperature.
PRODUCTION METHOD:
- The petrol is collected in the CONTAINER 1.
1. Extraction of petrol from plastic we need heavy
equipped machinery in cause of safety as we are - Leaving low amount of flux due to the low thickness
dealing with petrol and the emission of gases which of plastic and 4 high pressurized container and filtration.
are inflammable when reacted to atmospheric air.
- The excess steam is further sent out and mixed
2. High Pressurized Container is used to overcome with the atmospheric air.
defect of flux content 4 in the fuel which is extracted
from plastic. FILTRATION & PURIFICATION
3. High Pressurized Container with filtration chamber The fuel collected in the collecting chamber will be
which is capable of burning plastic at maximum impure. There will be wax, greese, and other impurities.
temperature is taken in which a nozzle connected to
So to remove the impurities, the following processes
it which is responsible for flow of petrol.
were carried out.
4. The most important are the pipe lines which are
connected through the whole equipment. - Gravity separation.
Listed below: - Filtration with filter paper.
Gravity separation is the basic process. In this
process the impure fluid is poured in a container in which
the bottom part is like a funnel. So, when the fluid is
poured, the denser liquid will settle down below. Most
probably the water was found. Then the waxy and
Fuel Extract form Plastic greasy substance which was pale greenish yellow was

764 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

found immediately above the water. Finally, most of


the polypropylene oil is seen above in the top most
layer. So, by opening the valve at the bottom, all the
unwanted substance are removed. Remaining oil is
processed further.

• The Flash Point of the fuel extracted from plastic


waste is given as per the testing report from vitro
labs: 52°C
Schematic Diagram of Production Plant of Plastic Derived • The Fire Point of the fuel extracted from plastic waste
Fuel is given as per the testing report from vitro labs: 55°C
In filtration process, the substances which are in • The Kinematic Viscosity at 40°C of the fuel extracted
colloidal state can be removed. The filter paper will from plastic waste 6 is given as per the testing report
allow the molecules which are smaller than its pores. from vitro labs: 6.80 cst.
So, the various size of smaller pores will give more clean • The Density of the fuel extracted from plastic waste
fuel. Thus, the collected samples are to be tested by is given as per the testing report from vitro labs: 1.90
appropriate methods. In such a way we analysed the gm/cc.
products for their existence in the range of gasoline,
• The Calorific Value of the fuel extracted from plastic
diesel and petroleum.
waste is given as per the testing report from vitro
FUEL TESTING AND ANALYSIS labs: 10400 kcal/kg

The purified fuel is to be tested to find out its The high thickness of the plastic tends to the high
characteristics. In order to interpret the quality and flux content in the 53 liquid fuel that traced from the
properties of fuel, various tests were carried out in the plastic. The high flux content of the liquid fuel can be
laboratory 30 under various testing conditions. decreased by the process of filtration and the solid
plastic must be heated in high pressurized chamber.
The tests performed were:
Due to the high flux content produced during the
Flash Point, Fire Point, Density, Kinematic Viscosity, process of extraction of fuel decreases the flaming
Calorific Value. characteristics of plastic fuel so to reduce the flux content
the highly equipped machinery filtration is required. This
RESULT & DISCUSSION
filtration may also reduce the density of the plastic fuel.
By heating the nearby ignition chamber with warmer
of 2,000 watts in 11 a temperature scope of 200 to CONCLUSION
350 degree Celsius we get approx. 560 ml fuel oil by - Pyrolysis of hydrocarbon polymers is a very
warming of burning around 455 minutes the layer of oil complex process, which consists of hundreds of
shows up on the water level. Following two hour we reactions and products. Several factors have significant
get 500 ml of fuel oil. effects on the reactions and the products.
- Based on previous research, this chapter
investigated the fundamental plastic processes and
reactions. With temperature increasing, plastic will go
through glassy state, rubbery state, liquid state, and
decomposition.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 765


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

- Decomposition of plastic in an inert environment 5. Agarwal Avinash Kumar, Biofuels (alcohols and biodiesel)
applications as fuels internal combustion engines, Journal of
into liquid is called pyrolysis. There are four stages of Energy and Combustion Science, 33,233-71 (2007).
reactions during the plastic pyrolysis process: initiation,
6. Murtha NH., patel M. premnath V. plastic materials flow analysis
propagation, hydrogen transfer, and termination for India, resources, conservation and recycling 2006.
reactions. 7. SivasankerS. Catalysisin petroleum refining. Catalysis; 2002:362-
- It was found that heavy molecular weight 376.

hydrocarbons produced from primary cracking can be 8. Ner?n C., Domeno C., Moliner R., Lazaro M.J., Suelves I.,
Valderrama J.J. (2000) Anal. Appl. Pyrolysis, 55, 171-183.
further cracked into light molecular weight products
through a secondary cracking process. This secondary 9. Hajekova E., Mlynkova B., Bajus M., Spodova L.J. (2007) Anal.
Appl. Pyrolysis, 79, 196-204.
cracking process has significantly influence on the
10. Preliminary study on the conversion of different waste plastics
distribution of the product. This process converts heavy into fuel oil, munich, GRIN Verlag, http://www.grin.com/en/
hydrocarbons into gas or light liquid product. ebook/206451/preliminary-study-on-the- onversion-of-differcnt-
wastcplastics-into-ruel.
REFERENCES
11. European Association of Plastics Recycling Website:http://
1. Mani M., Subash C. and Nagarajan G., Performance emission www.eproplasticsrecycling.org
and combustion characteristics of a DI diesel engine using waste
12. Oluwafunmilayo A. Aworanti, Samuel E. Agarry, Ayobami O.
plastic oil, Applied Thermal engineering, 29,2738-2744 (2009).
Ajani. dvances in chemical Engineering and Science, 2012 http://
2. Yuan, X., Converting Waste Plastics into Liquid Fuel by dx.doi.org/10.4236/aces.2012.24054 Published Online October
Pyrolysis:Developments in China, in Feedstock Recycling and 2012 (http://www.SciRP.org/journal/aces)
Pyrolysis of Waste Plastics, J. Scheirs and W. Kaminsky, Editors.
13. RECOUP, Recycling of Used Plastics webpage: http://
2006, John Wiley & Sons,Ltd: Changsha, P.R. China.
www.recoup.org/
3. Murugan S., Ramaswamy M.C. and Nagarajan G., The use of
14. Plastics Recyclers Europe, How to boost plastics recycling and
tyre Pyrolysis oil in diesel engines, Waste Management, 28,
increase resource efficiency - Strategy Paper, 2012.
(12),2743-2749 (2008).
4. Rajesh Guntur and Deva Kumar M.L.S., Experimental evaluation
of a diesel engine with blends of diesel-plastic Pyrolysis oil,
International Journal of engineering Science and Technology, 3(6),
(2011).

766 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Influence of Cerium Oxide Nanoparticles Additive


Blended in Palm oil Biodiesel Used as Alternative Fuel
in the Diesel Engine
Dr. Hanchate Suresh Babu Rao1, Gopavaram Sudarsana Reddy2, Thudmella Pavan Kumar3
1,3
Dept. of Mechanical Engineering, Chaitanya Bharathi Institute of Technology, Proddatur, Kadapa Dist., A.P., India.
2
Dept. of Mechanical Enginering, VEMU Institute of Technology, Chittoor., A.P., India.
Email: hsbr110479@gmail.com1, gsr.gopavaram@gmail.com2, thudimella.pavankumar@gmail.com3

Abstract- The world is confronted with serious consumption [1]. Therefore, the researchers suggested
problems like the fossil fuel depletion and biodiesels are a viable alternative to diesel fuel in the
environmental degradation. Fossil fuels in near diesel engine. Biodiesel can be prepared from various
future will become rare due to its indiscriminate renewable feedstock like vegetable oils - palm oil,
extraction and consumption. The present research
sunflower oil, peanut oil etc., are edible oils and
work on experimental investigate the effect of
jatropha, calophyllum inophyllum, karanja, etc., are
using cerium oxide (CeO2) nanoparticle additive
(30ppm, 60ppm, 90ppm and 120ppm) in palm oil non-edible oils [3, 6, 8, 10]. The biodiesel properties
B20 blend biodiesel ( as 20% biodiesel and 80% are like rich oxygen content, higher kinematic viscosity,
diesel) in a single cylinder four stroke diesel reduced smoke emission and diluted level of pollutants
engine. The experimental results reveal that B20 from engine exhaust (CO, HC and particulate matter).
blend biodiesel at 90ppm of CeO 2 nanoparticles The biodiesel's emission characteristics are better than
additive found significant reduction emissions petro-diesel fuel except for NOX emission [13]. To
nitrogen oxide (NOX), carbon dioxide (CO), control NOX emissions from the C.I engines, various
unburnt hydrocarbons (UBHC) and smoke. researchers have been described strategies like engine
However, brake specific fuel consumption (BSFC) modification like EGR (Exhaust Gas Recirculation),
is decreased with significant from increase brake
increasing/decreasing injection timing, injection pressure
thermal efficiency (BTE) by doping of CeO2 from
and adulteration of fuel [25, 27]. Among these fuel
30 ppm to 120 ppm. B20 biodiesel blend with 90
ppm of CeO2 nanoparticles additive as optimum alterations with nanoparticles in biodiesel results in
blend out of the test blends. reducing the level of pollutants at the engine exhaust
and eventually, increases engine performance.
Keywords- Biodiesel, palm oil, Cerium oxide,
Nanoparticle blended with fuel shown better thermal
nanoparticles, Performance, Exhaust emissions.
properties, which is mainly due to the higher surface
I. INTRODUCTION area to volume ratio of the nanoparticles also resulting
in increased oxidation of HC and acting as an oxygen
World oil supplies are reaching the point where the
buffer against NOx [19].
demand for fossil fuels may outstrip the supply, and the
oil prices are increasing significantly. Besides, Many researchers used different additives to
combustion of petroleum-based oils and its derivatives biodiesel and found reduced emissions and increased
such as petrol, diesel, etc., discharges greenhouse gases performance [41, 42, 43]. Acetone blended with Palm
into the atmosphere causing global warming. However, biodiesel given a significant reduction in HC, NOX,
the total petroleum reserves are depleting day by day CO and smoke emissions when compared to palm
due to indiscriminate extraction and lavish consumption. biodiesel [27, 29]. V Sajith et al., 2010 conducted
However, the total petroleum reserves are depleting experiments with cerium oxide as nanoparticle additive
day by day due to indiscriminate extraction and lavish in Jatropha biodiesel (20 ppm, 40 ppm & 80 ppm)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 767


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

had shown increased brake thermal efficiency by 1.5% has most widely recognized as a potential alternative
and there is a significant reduction of NO by 30% and fuel [2, 13].
hydrocarbon emissions by 40%. Ajin et al., 2011 Figure 1 shows the various biodiesel feedstock oil
experimentally observed that the CeO2 as a nano- yield. Palm oil has shown a high productivity when it is
additive in diesel improved the BTE by 5% and a compared to other oils. The palm oil productivity is
reduction of HC and NOX emission by 45% and 30% about 5945 litres per hectare and which is about 14
respectively. From the various metal oxides copper, iron, times higher than soybean oil.
cerium and cobalt have used as fuel additives. Among
all nanoparticles additives, cerium oxide has exhibited
a high catalytic activity due to its high surface-to-volume
ratio, which improves the brake thermal efficiency and
reduces the emission [15]. Selvan et al., 2009
experimentally investigated the effect of cerium oxide
nanoparticle with diesel and biodiesel as fuel in diesel
engine and observed the brake thermal efficiency was
increase and a drastic reduction in HC and NOX
emission. The performance and emission characteristics
of the CI engines improves due to the doping of alumina Figure 1: Various biodiesel feedstock production oil yield
[16].
nanoparticles in the biodiesel emulsion fuels, which leads
to ignition delay and reduced peak pressure 2. MATERIALS AND METHODS
1.1. About palm oil 2.1 Preparation of palm oil biodiesel:
Botanical name of oil palm is Elaeis guineensis. It is Different researchers have developed methods for
an ancient tropical plant from the West African tropical biodiesel preparation from various feedstocks [14, 15,
rainforest where it was grown wild and later it was 16]. The following is the process for converting palm
developed into an agricultural crop. Oil palm produces oil to biodiesel.
two different types of oils: palm oil and palm kernel oil. Palm oil is collected and is preheated to 600C
Palm oil is used in wide variety of food products such separately. A 0.5 g of NaOH and methanol (9:1
as cooking oil, margarine and shortenings and palm methanol to oil ratio) are mixed properly to form Sodium
kernel oil is used as a raw material in the production of methoxide. The preheated oil is slowly poured in Sodium
non-food products like cosmetic, soaps, toiletries, methoxide, keeping the stirrer on. The mixture is allowed
detergents etc. is the most productive oil palm variety stir in a magnetic stirrer for 1hour at 400 rpm maintaining
which can produce 10-35 tonnes/ hectare of fresh fruit 550C reflux. Then the mixture is poured in separating
bunch (FFB) palm oil annually. The palm oil is a tropical funnel and left it undisturbed for 1hour in a separating
perennial plant and it can grow well in lowland with funnel and thus formed glycerin is removed which are
humid places. formed at the bottom layer. The top layered oil is
The palm oil tree is unbranched and single-stemmed required one and it is separated to the next step.
can grow up to 20-30m height. The flowers are Water washing has done to wash the soaps out of
produced in dense clusters which each individual flower the biodiesel with warm water, 3 to 4 times. Add a
is small with three sepals and three petals. The leaves small amount of dilute acetic acid in biodiesel before
are pinnate and can reach between 3 and 5m long. The adding the water. Thus the pH of the solution should be
fleshy orange reddish coloured fruits grow in large and closer to neutral and takes out any catalyst suspended
tight female bunches each fruit weigh as much as 10- in the biodiesel. The biodiesel is water washed gently
40 kg and contain up to 2000 fruitlets. Palm oil biodiesel with warm water at 500C temperature to remove

768 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

impurities for three to four times. Then the washed oil A single cylinder, four stroke water cooled diesel
is heated above 1000C to remove water particles and engine was used to conduct the performance, emission
excess methanol. Moreover, thus obtained product is and combustion test. An electrical generator used for
the required palm oil biodiesel. loading the engine. AVL 444 N Di-Gas analyzer and
AVL 437C Smoke meter used for emission studies.
2.2 Characterization of Cerium Oxide
The following Table1 is the specification of the engine:
nanoparticle
Table 1. Specification of the diesel engine.
There are various methods to synthesis CeO 2
Type Single cylinder, four
precipitation, hydrothermal, sol-gel method, stroke, water cooled
microemulsion method and other methods [23-30]. diesel engine
Among the various preparation methods, microwave- Stroke 110mm
assisted solution method is an inexpensive and simple Bore 88mm
Rated output 5.2 kW
method to prepare the nanoparticles. The synthesis of Rated speed 1500 rpm
CeO2 nanoparticles was done by method - Solvothermal Compression ratio 17.5
technique [23]. Loading device Electric generator
The synthesis of CeO2 nanoparticles has carried out
4. RESULTS & DISCUSSION
by using Solvothermal technique. X-ray diffraction
method (XRD) characteristic peaks corresponding to The experimental investigation has been conducted
the (111), (200), (220), (311), (222), (400), (331) and in order to find the performance, combustion and
(420) planes are located at 2? = 28.6°, 33.1°, 47.5°, emissions analysis with diesel, biodiesel blend B20 and
56.4°, 59.1°, 69.4°, 76.7° and 79.1° respectively. CeO2 nanoparticle as additive to B20 (30ppm, 60ppm,
90ppm and 120ppm). The above modified fuels are
fuelled in diesel engine and the thus obtained
experimental results are compared with diesel fuel.
4.1 Properties of fuels used
The properties of the above modified fuels along
with diesel fuel are shown in Table 2. The various
physicochemical properties of the above modified fuels
were carried out and the thus obtained results are
compared with the pure diesel (D100). The main
objective of the investigation was to find the variations
in the properties of the fuels. Also, to find the effect of
Figure 2. XRD of synthesized cerium oxide nanoparticles. the level of inclusion of CeO2 nanoparticles addition of
the B20 biodiesel blend. The test fuels shown an
3. EXPERIMENTAL SETUP
increasing trend for the flash and fire points with the
The experimental investigation was carried out. The increase in dosing level, which indicates a continual
properties of modified fuels are compared with diesel decrease in the volatility of the test fuels with increases
fuel. The properties studied were the calorific value, in the quantity of the CeO2 nanoparticle additive [5, 8].
viscosity, flash point and fire point. The standard ASTM The CeO2 nanoparticles additive to the modified fuels
procedures were used during experimentation. The increase the fluid layer resistance and thus there is an
performance tests were conducted on research engine increase the kinematic viscosity [9].
(single cylinder four stroke diesel engine) using test fuels
and also, the emission characteristics were found by
using exhaust gas emission analyzer.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 769


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 2: Properties of the modified fuels and Diesel.

D100 B20 B20+30ppm B20+60ppm B20+90ppm B20 +120ppm


Kinematic 2.5
Viscosity 3.29 3.32 3.38 3.53 3.98
@40°C in cSt
Flash point 0C 45 52 56 64 72 74
Fire point 0 C 56 59 63 72 79 81
Density @1 5°C 834 852 857 860 863 866
in kg/m3
Calo rific value 42 ,538
41,094 41,1 62 41,214 41,319 41,325
in kJ/kg

4.2 Performance and emissions of test fuels on 4.2.2 Brake Specific Fuel Consumption (BSFC)
diesel engine:
Due to lower calorific value of the biodiesel's, BSFC
4.2.1 Brake Thermal Efficiency (BTE) of the biodiesel is higher when compared to diesel fuel
[3]. Figure 4 depicts variations in the BSFC with load
Due to biodiesel has lower calorific value the
for the palm oil biodiesel blends with CeO2 nanoparticles
biodiesel's BTE is less than diesel fuel [3]. Figure 3
doped in biodiesel and diesel fuel. Due to increase in
shows variations in the BTE with load for the palm oil
dosing of CeO2 nanoparticles in biodiesel from 30 ppm
biodiesel blends doped with CeO2 nanoparticles and
to 120 ppm, favouring enhanced combustion.
diesel fuel [41]. The result depicts that the BTE of the
Therefore, the BSFC decreases with the increase in
diesel engine continuously improved by the increased
the dosing levels of the particles, except for
dosing levels of CeO2 nanoparticles additive in B20
B20+120ppm, due to more agglomeration and lowered
biodiesel blend. The enhancement in BTE for the CeO2
catalytic action. B20+90ppm blend shown lower BSFC
nanoparticles additive in B20 biodiesel blend doped
out of other biodiesel blends except for diesel.
fuels from 30ppm to 120ppm is mainly due to the
occurrence of better fuel combustion and the
nanoparticles dopes promotes combustion in the engine
[6, 43]. Above 90ppm dosing level of the CeO 2
nanoparticle increased, due to more agglomeration of
particles, the catalytic action is lowed and lessen the
BTE at 120ppm. The results depicts that the BTE of
blend B20+90ppm of CeO2 has highest efficiency in
the modified blends of biodiesel but less than diesel
fuel at all loads. Figure 4. Variation of brake specific fuel consumption (BSFC)
for the modified fuels and diesel.

4.2.3 Unburned hydrocarbon (UBHC) emission


Due to lower calorific value and incomplete
combustion of fuel, UBHC emission of biodiesel is lower
than diesel fuel. Figure 5 illustrates variation in UBHC
emission with load for the palm oil biodiesel blends
doped with CeO2 nanoparticles and diesel fuel. Due to
CeO2 nanoparticles additive doped in biodiesel blends
from 30ppm to 120ppm increases the oxidation of
Figure 3. Variation of brake thermal efficiency (BTE) for hydrocarbon. Therefore, promotes a complete
modified fuels and diesel. combustion in the engine. For B20+120ppm, due to

770 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

more agglomeration and lower catalytic action, the 4.2.5 Nitrogen oxides (NOX) emission
UBHC of B20+90ppm blend is lower than other Figure 7 illustrate the variation in NOx emission with
modified fuels and diesel fuel. The chemical reaction load for the palm oil biodiesel blends with CeO2
during combustion are: nanoparticles doped and diesel fuel. The CeO 2
......(1) nanoparticles additive doped in biodiesel blends from
…....(2)
30ppm to 120ppm. The NOx emission has increased,
in order to reduce it, CeO2 nanoparticles additive added
to B20 biodiesel blend. Due to high thermal stability,
oxidation of hydrocarbon forms Ce2O3 is formed
equation (2) and again reduction of NO occur due to
deoxidizing to CeO2. The chemical reaction during
combustion is:
……(3)

Therefore, due to the CeO2 nanoparticles additive


to biodiesel blends, lower NOx emission occurs for
the modified fuels doped upto 90ppm, and the NOx
Figure 5. Variation of unburned hydrocarbon (UBHC) for the
modified fuels and diesel. emission B20+90ppm biodiesel blend are lower than
other modified fuels except for B20+120ppm biodiesel
4.2.4 Carbon monoxide (CO) emission blend.
Due to low calorific value and incomplete
combustion, carbon monoxide emission of the biodiesel
is less than diesel. Figure 6 shows the variation in CO
emission with load for the palm oil biodiesel blends with
CeO2 nanoparticles doped and diesel fuel. The additive
CeO2 nanoparticles doped in biodiesels promotes better
combustion, CO emissions from the diesel engine
depends on the fuel properties, due to the ability of
nanoparticles to convert CO to CO2. Therefore, CO
of B20+90ppm biodiesel blend is lower than other
modified fuels (except B20+120ppm biodiesel blends) Figure 7. Variation of Oxides of Nitrogen (NOX) for the
modified fuels and diesel.
and diesel fuel.
4.2.6 Smoke Emissions
Figure 8 illustrates variation in smoke emission with
load for the palm oil biodiesel blends with CeO2
nanoparticles doped and diesel fuel. The CeO 2
nanoparticles additive doped in biodiesel blends from
30ppm to 120ppm, the decreased in smoke emission
are detected due to higher surface area to volume ratio
and improved combustion. Therefore, with increase in
dosing of the nanoparticles, the smoke emission reduces
Figure 6. Variation of carbon monoxide (CO) for the modified except for B20+120ppm. Hence, smoke emission of
fuels and diesel. B20+90ppm blend is lower than other modified fuels
and diesel fuel.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 771


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[4] Sadhik Basha J, Anand R B 2013 The influence of nano additive


blended biodiesel fuels on working characteristics of a diesel
engine Journal of Brazilian society of Mechanical Sciences and
Engineering, 35 257-264.
[5] Ganesan.S, Dineshbabu Munuswamy, Prabhu Appavu,
Arunkumar.T and Yuvarajan Devarajan 2019 Effect of EGR &
Nanoparticles on performance and emission characteristics of a
Diesel engine fuelled with palm biodiesel and diesel blends Journal
of Oil Palm Research, Vol. 31 (1) 130 - 137.
[6] Sajith V, Sobhan C B, Peterson G B 2010 Experimental
investigations on the effects of cerium oxide nanoparticle fuel
additives on biodiesel", Advances Mechanical Engineering 1- 6.
Figure 8. Variation of smoke for the modified fuels and
[7] Ajin C. Sajeevan and Sajith V 2013 Diesel engine emission
diesel.
reduction using catalytic nanoparticles: An experimental
5. CONCLUSION investigation", Journal of Engineering. 589382.
[8] Dutta P, Pal S, Seehra M S, Shi Y, Eyring E M and Erust R D
The outcome of the experimental investigation work 2006 Concentation of Ce3+ and oxygen vacancies in cerium oxide
was observed and the following effects on performance nanoparticles Chemistry of Materials, vol. 18, no. 21, 5144 -
and emission of engine by CeO2 nanoparticles doping 5146
in B20 palm oil biodiesel blends at 30 ppm to 120 ppm: [9] Selvan V A M, Anand R B and Udayakumar M 2009 Effects of
cerium oxide nanoparticle addition in diesel and diesel-biodiesel-
• A maximum increment of 1.23% in BTE and a ethanol blends on the performance and emission characteristics
maximum of 2.56% decrement in BSFC by CeO2 of a CI engine", Journal of Engineering and Applied Science,
nanoparticles doping in B20 biodiesel blend palm oil vol.4, no. 7.
was found in B20+90ppm biodiesel blend at maximum [10]Sadhik Basha J and Anand R B 2011 Role of nanoadditive blended
load. biodiesel emulsion fuel on the working characteristics of a diesel
engine Journal of Renewable and Sustainable Energy 3, 023106.
• A maximum reduction in unburned hydrocarbon and [11]Ashraful A M 2014 Production and comparison of fuel properties,
carbon monoxide emissions were observed by CeO2 engine performance and emission characteristics of biodiesel from
nanoparticles doping in palm oil B20 biodiesel blend various non-edible vegetable oils: A review", Energy conversion
are 19.7% and 15.4% respectively. and management, 80 202-228.
[12]Suresh Babu Rao H, Dr. Venkateswara Rao T and Dr. Hema
• Smoke and NOx emissions were reduced by CeO2 Chandra Reddy K, 2013 Palm oil and Calophyllum inophyllum
nanoparticles doping in palm oil B20 biodiesel blend oil are Potential feed stocks for future biodiesel in compression
with maximum reduction of 4.6% and 5.9% ignition engines: A Review International Journal of Mechanical
respectively in biodiesel blend B20+90ppm. Engineering & Technology (IJMET). vol. 4, Issue. 5, 301-312.
[13]Girdhar Joshi, Jitendra K. Pandey , Sravendra Rana, Devendra S.
Therefore, from the experimental investigation work Rawat 2017 Challenges and opportunities for the application of
concluded that B20+90ppm of palm oil biodiesel blend biofuel, Renewable and Sustainable Energy Reviews 79 850-
as best biodiesel blend of modified fuels and can be 866.
considered as an alternative fuel for the diesel engine. [14]Sahoo PK, Das LM 2009 Process optimization for biodiesel
production from Jatropha, Karanja and Polanga oils Fuel
REFERENCES 88(9):1588-94.
[1] Agarwal A K, 2003 Biofuels (alcohols and biodiesel) applications [15]Sahoo PK, Das LM, Babu MKG, Naik SN 2007 Biodiesel
as fuels for internal combustion engines Progress in Energy & development from high acid value polanga seed oil and
Combustion Science, 33 231-277. performance evaluation in a CI engine Fuel 86(3):448-54.
[2] Mohamad Azri Sukiran, Soh Kheang Loh and Nasrin Abu Bakar [16]Ong H C, Silitonga A C, Masjuki H H, Mahlia, Chong, Boosroh
2018 Conversion of pre-treated oil palm empty fruit bunches 2013 Production and comparative fuel properties of biodiesel
into bio-oil and bio-char via fast pyrolysis Journal of Oil Palm from non-edible oils: Jatropha curcas, Sterculia foetida and Ceiba
Research Vol 30 (1).121- 129. pentandra Energy Conversion and Management 73 245-255.
[3] Ambarish Datta and Bijan Kumar Mandal 2012 Biodiesel [17]Ganapathy T, Gakkhar R P, Murugesan K 2011 Influence of
Production and its Emissions and Performance: A Review injection timing on performance, combustion and emission
International journal of Scientific & Engineering Research, vol. 3, characteristics of Jatropha biodiesel engine, Appl. Energy 88
Issue 6. (12) 4376-4386.

772 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[18]Ashok B, Nanthagopal K, Thundil Karuppa Raj R, Pradeep application on the combustion and exhaust emissions in a diesel
Bhasker J, Sakthi Vignesh D 2017 Influence of injection timing engine, Appl. Therm. Eng. 95 115-124.
and exhaust gas recirculation of a Calphyllum inophyllum methyl
[32]Qi D, Leick M, Liu Y, Chia-fon F L 2011 Effect of EGR and
ester fuelled CI engine, Fuel Processing Technology 167 18-30.
injection timing on combustion and emission characteristics of
[19] Murugesan A, Subramaniam D, Vijayakumar C, A. Avinash, N. split injection strategy DI-diesel engine fueled with biodiesel,
Nedunchezhian 2012 Analysis on performance, emission and Fuel 90 (5)1884-1891.
combustion characteristics of diesel engine fueled with methyl-
[33]Arul Prakasajothi Mahalingam, Dinesh Babu Munuswamy,
ethyl esters J. Renewable and Sustainable Energy. 4 (6) 063116.
Yuvarajan Devarajan and Santhanakrishnan Radhakrishnan 2018
[20]Rashedul H.K., Masjuki H.H,. Kalam M.A, Ashraful A.M, Investigation on the emission reduction technique in Acetone-
Ashrafur Rahman S.M., Shahir S.A. 2014 The effect of additives Biodiesel aspirated diesel engine". Journal of Oil Palm Research
on properties, performance and emission of biodiesel fuelled Vol 30 (2) 345 - 349.
compression ignition engine, Energy Conversion and Management
[34]Yung Chee Liang, Harrison Lau Lik Nang and Choo Yuen May
88 348-364.
2013 Physico-chemical properties of biodiesel produced from
[21]Bhupendra Singh Chauhan, Naveen Kumar, Haeng Muk Cho, Jatropha curcas oil and palm oil Journal of Oil Palm Research
Hee Chang Lim 2013 A study on the performance and emission Vol 25 (2) 159 - 164.
of a diesel engine fueled with Karanja biodiesel and its blends,
[35]Ulf Neuling and Martin Kaltschmitt 2017 Review of biofuel
Energy 56 1-7.
production - feedstock, processes and markets Journal of Oil
[22]Palash S M, Masjuki H H, Kalam M A, Masum B M, Sanjid A, Palm Research Vol 29 (2) 137 - 167.
Abedin M J 2013 State of the art of NOx mitigation technologies
[36]Adeeb Hayyan, Shahidah Nusailah Rashid, Maan Hayyan, M Y
and their effect on the performance and emission characteristics
Zulkifliy, Mohd Ali Hashim and Nurul Alfaa Osman 2017
of biodiesel-fueled Compression Ignition engines, Energy
Synthesis of novel eutectic catalyst for the esterification of crude
Convers. Manag. 76 400-420.
palm oil mixed with sludge palm oil Journal of Oil Palm Research
[23]Kumar E, Selvarajan P, Muthuraj D 2013 Synthesis and Vol 29 (3) 373 - 379.
Characterization of CeO2 nanocrystal by Solvothermal route,
[37]Denis J Murphy 2014 The future of oil palm as a major global
Materials Research 16(2): 269 - 276.
crop: opportunities and challenges Journal of Oil Palm Research
[24] Chen PL and Chen IW 1993 Reactive Cerium (IV) Oxide Vol 26 (1)1- 24.
Powders by the Homogeneous Precipitation Method. Journal of
[38]Mirzajanzadeh M, Meisam Tabatabaei, Mehdi Ardjmand,
American Ceramic Society 76:1577-1583.
Alimorad Rashidi, Barat Ghobadian, Mohammad Barkhi,
[25]Djuricic B and Pickering S 1999 Nanostructured cerium oxide: Mohammad Pazouki, 2015 A novel soluble nano-catalysts in
preparation and properties of weakly-agglomerated powders. diesel-biodiesel fuel blends to improve diesel engines performance
Journal of the European Ceramic Society. and reduce exhaust emissions, Fuel 139 374-382.
[26]Wu NC, Shi EW, Zheng YQ and Li WJ.2002 Effect of pH of [39]Saifuddin M, Goh P E, Moneruzzaman W. S. H, K. M. and
Medium on Hydrothermal Synthesis of Nanocrystalline Fatima A, 2014 Biodiesel Production from Waste Cooking Palm
Cerium(IV) Oxide Powders. Journal of American Ceramic Oil and Environmental Impact Analysis, Bulgarian Journal of
Society.85:2462-2468. Agricultural Science, 20 (No 1) 186-192.
[27]Hirano M and Kato E 1996 The hydrothermal synthesis of [40]Sanjid A, Masjuki H. H.. Kalam M. A, Ashrafur Rahman S.
ultrafine cerium (iv) oxide powders. Journal of Materials Science M.,.Abedin M.J,. Palash S. M 2013 Impact of palm, mustard,
Letters 15:1249-1250. waste cooking oil and Calophyllum inophyllum biofuels on
performance and emission of CI engine Renewable and Sustainable
[28]Li LP, Lin XM and Li GS, Inomata H 2001 Solid solubility and
Energy Reviews 27 664-682.
transport properties of Ce 1-x N dxO 2- nanocrystalline solid
solutions by a sol-gel route. Journal of Material Research [41]Devarajan Y, Jayabal R K, Ragupathy D and Venu H 2016
16:3207- 3213. Emissions analysis on second generation biodiesel. Frontiers
Environ. Sci. Eng., 11(1),3.
[29]Masui T, Fujiwara K, Machida KI, Adachi GY, Sakata T and
Mori H. 1997 Characterization of Cerium(IV) Oxide Ultrafine [42]Venkata Ramanan M and Yuvarajan D 2016 Emission analysis
Particles Prepared Using Reversed Micelles. Chemistry of on the influence of magnetite nanofluid on methyl ester in diesel
Materials. engine. Atoms. Pollution Res., 7(3); 477-481.
[30]Sumalin Phoka, Paveena Laokul, Ekaphan Swatsitang, Vinich [43]Shaafi T, Sairam K, Gopinath A, Kumaresan G, Velraj R 2015
Promarak, Supapan Seraphin, Santi Maensiria 2009 Synthesis, Effect of dispersion of various nanoadditives on the performance
structural and optical properties of CeO 2 nanoparticles and emission characteristics of a CI engine fuelled with diesel,
synthesized by a simple polyvinyl pyrrolidone (PVP) solution biodiesel and blends-Areview, Renewable and Sustainable Energy
route, Materials Chemistry and Physics 115 423-428. Reviews 49 563-573.
[31]Can O, Oztürk E, Solmaz H, Aksoy F, Çinar C, Yücesu H S 2016
Combined effects of soybean biodiesel fuel addition and EGR

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 773


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Computer Aided Design and Analysis of Heat Sinks


With Square, Circular and Rectangular Fins of
Different Sizes Using ANSYS
Vennapusa Vijayabhaskar1, Dr. Kolla Srinivas2
1
Department of Mechanical Engineering, Mahatma Gandhi Institute of Technology, Hyderabad, India
2
Department of Mechanical Engineering, RVR& JC College of Engineering, Guntur, India
Email: vvijayabhaskar_mct@mgit.ac.in1, dr.kollasrinivas@gmail.com2

Abstract- Heat sinks are widely used in


electronic devices to cool the motherboards in CPU
and many electronic devices. Heat sinks with
variety of cross sections by varying their size of
cross section and keeping height as same are
designed using SOLIDWORKS and analyzed with
real time parameters like heat input and convective
environment as input using ANSYS. Finally the best
among all types is determined.
Keywords-Heat sink, Design, Analysis

INTRODUCTION
Fig 1.heat sink in a CPU
A heat sink is a component that increases the heat
flow away from a hot device. It accomplishes this task 2. MATERIALS & METHODOLOGY
by increasing the device's working surface area and
2.1. An motherboard of a CPU of
the amount of low-temperature fluid that moves across
37.5mmx37.5mmx1mm generates heat at a rate of
its enlarged surface area. Based on each device's
80W.A heat sink needs to be designed so that the
configuration, we find a multitude of heat sink
component temperature remains below 80 C when the
aesthetics, design, and ultimate capabilities. A heat sink
ambient temperature is 30C. A finned heat sink will be
works by moving heat away from a critical component.
used. It is required to design a heat sink that fulfils these
Nearly all heat sinks accomplish this task in four basic
requirements. So, different designs are developed and
steps
evaluated for their performance and cost. Later the
1. The source generates heat. designs are to be investigated by changing fin thickness
2. Heat transfers away from the source as how that affects the performance of the heat
sink.fig.1,2,3 and 4 shows the designed models of
3. Heat distributes throughout the heat sink reactangular along the length, square, circular and array
4. Heat moves away from the heat sink of rectangular shape with height 60mm as fixed for all.
Further size of the each fin is changed.
Electronic circuit boards generate heat during
Table.1: heat sinks studied
processing data, that heat is absorbed by base of heat
sink. Further that heat diffuse into whole heatsink by Heat sinks Thickness(mm)
conduction. A fan is provided in a proper position to Rectangle 2x60 3x60 4x60 5x60
Square 2x2 3x3 4x4 5x5
drag atmospheric air over all the surface of heat sink
Circular Φ2 Φ3 Φ4 Φ5
and to discharge outside of the device Array of Rectangular ----- 2x3 2x4 2x5

774 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2.2 The most commonly used material in making


heatsinks for CPU is 6063-T5. The following table gives
the properties of it
Table.2:properties of Al 6063-T5

Property Aluminium 6063-T5


Density 2.70 g/cc
Tensile Strength 186 MPa
Yield Strength 145 MPa
Modulus of Elasticity 68.9 GPa
Coefficient of Thermal 21.8μm/m-°C|
Expansion @ 20.0 - 100 °C Fig.2.4:rectangular fin along the length
Temp
Thermal Conductivity 209 W/m-K 3. RESULTS AND DISCUSSIONS:
Convective heat transfer co-efficient h=31W/m2C
is chosen from literature and analysis is carried out.

Fig.2.1: Rectangular fin along the length

Fig.3.1: Temperature distribution Square fin 4mm side

Fig.2.2:Square fin along the length

Fig.3.2: Temperature distribution Rectangular 2mmx60mm

Fig.2.3:Circular fin along the length

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 775


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES
[1] Kyoungwoo Park., Park-Kyoun oh., Hyo-Jae Lim., The
application of the CFD and Kringing method to an optimization
of heat sink, International Journal of Heat and Mass Transfer 49
(2006) 3439-3447 ,Elsevier 2006.
[2] Matthew B. de Stadler., Optimization of the geometry of a heat
sink, university of Virginia, Charlottesville, VA22904.
[3] Kim D., Jung J., Kim S.,Thermal optimization of plate-fin heat
sinks with variable fin thickness, International Journal of Hear
and Mass Transfer 53(2010) 5988-5995,Elseveir,2010.
[4] Koga A., C Edson., Nova H., Lima C., Silva E., Development of
heat sink by using topology optimization , International Journal
of Hear and Mass Transfer 64 (2013) 759-722 .
Fig.3.3: Temperature distribution Circular of dia 2mm [5] Ndao S., Peles Y., Jenson M.K., Multi-objective thermal design
Table 3.1: Motherboard temperatures with heat sink optimization and comparative analysis of electronics cooling
technologies, International Journal of Hear and Mass Transfer
Heat sinks BASE OR MAXIMUM
52 (2009) 4317-4326, Elseveir, 2009.
TEMPERATURE
THICKNESS 2mm 5mm 3mm 4mm [6] TsongC.,and Chen H.,Multi-objective optimization design of plate
Rectangle 74.32 86.86 81.89 84.06 fin heat sink using a direction based genetic algorithm,Journal of
Square 87.39 79.3 72.5 73.1 the Taiwan Institute of chemical Engineers 44(2013) 257-265
Elesevier 2013 .
Circular 70.57 83.65 79.3 80.62
Array of ----- 71.49 69.46 77.53 [7] Lin Lin, Yang YangChen ,Optimization of geometry and flow rate
Rectangular distributin for double layer microchannel heat sink,International
journal of Thermal Sciences 78(2014 158-168 ELSEVIER.
[8] anhoto P., Reis A., Optimization of forced convection heat sinks
with pumping power requirements , International Journal of Hear
and Mass Transfer 54 (2011) 1441-1447,Eleseveir 2010.
"PDCA12-70 data sheet," Opto Speed SA, Mezzovico,
Switzerland.
[9] Kim D., Jung J., Kim S.,Thermal optimization of plate-fin heat
sinks with variable fin thickness, International Journal of Hear
and Mass Transfer 53(2010) 5988-5995,Elseveir,2010.
[10] R.Mohan and Dr.P.Govindrajan., Thermal analysis of CPU with
Composite pin fin heat sinks, International journal of engineering
Fig.3.1.maximum temperatures in different heat sinks science and technology vol2(9),2010,4051-4062.
[11] S.C.Fok, W. Shen, F.L.Tan., Cooling of portable hand held
4. CONCLUSIONS electronic devices using phase change materials in finned heat
Among all heat sinks, the best performer is decided sinks, International journal of thermal sciences 49(2010) 109-
117,Elsevier, 2009.
based on lowest temperature of heat sink under given
[12] S P Pawar and N C Ghuge Design and analysis of heat sink
conditions. optimization and its comparison with commercially available
• The rectangular array heat sink with 2mm thickness heat sink , M-17 Mech PGCON 2015.
and 4mm width has the lowest temperature of
69.460C, at which motherboard will work safely in
terms of heat
• Next to 2mmx4mm rectangular array heat sink, heat
sink with 2mm dia circular fins has the lowest
temperature 70.570C

776 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Security, Privacy and Reliability Issues in IoT


Renu Bala
Research Scholar, MBA Department, Chaudhary Devi Lal University, Sirsa (Haryana)
Email: Renu820kamboj@gmail.com

I. INTRODUCTION the various regulatory realms' requirements. Han et al.


The widely used term, the Internet of Things, is a (2018) presented a study of smart IoT artefacts on
concept used to describe an ecosystem in which billions service configuration issues. Based on several topics,
of resource-constrained objects are linked to the including smart IOT object systems for IoT I.P., target
Internet and communicate independently. With so many implementations, service configuration, etc, the author
IoT solutions linked to objects, the environment in which presented a complete survey. This study's main
they are put is smarter. Whereas the Internet of Things weaknesses were availability, not evaluating reaction
time as a critical quality factor, cost, and scalability. Lee
is leading more intelligent alteration of today's
environment, new kinds of hurdles and various et al. (2019) defined the design layers in this analysis,
opportunities have emerged to fulfil IoT growth such as the layers of awareness, network, facilities, and
requirements. Those wireless devices and have low GUI. The advantage of this analysis is that it poses
power are considered an undeniably, more feasible complicated, open-ended IOT issues and challenges.
option of different IoT use cases. The Internet of Things Miraz (2019) addressed the subject, such as healthcare
enables billions of devices to capture and share real- systems. The lack of conducted research was that
time information to provide intelligent services through various kinds of energy consumion and reliability were
network connectivity. Therefore, IoT facilitates the not examined as quality factors.
remote control and access to connected devices in III. PROTECTION AND PRIVACY ISSUES
proper network availability. Even worse, previous time IN IOT
network architecture, for example, enterprise networks
Since IoT has become a critical element of the
or conventional transport protocols constructed on the
Internet's future with its increased use, it needs to resolve
theme of time-out, could not handle IoT requirements
protection and trust functions adequately. Researchers
reliably, scalable, seamlessly, and cost-effectively.
are aware of the vulnerabilities that exist in many IoT
II. LITERATURE REVIEW devices at present. The foundation of IoT is laid on the
Bello and Zeadally (2017) explained existing IOT current wireless sensor networks SN), so IOT inherits
environment networking standards and showed how the same privacy and security concerns architecturally
to satisfy objects' QoS needs to allow a smarter IoT as WSN. Various attacks and vulnerabilities on IoT
ecosystem. Besides, to meet various requirements such systems demonstrate that wide-ranging security designs
as reliability, security, availability and scalability etc., an are still required to secure data and systems from end
analysis is provided on the risks of a shortage of cross- to end. In general, many attacks take advantage of
domain combination in different kinds of applications vulnerabilities in specific devices, thereby gaining access
and IoT environments. It was carried out in order to to their systems and thus rendering protected devices
provide IoT facilities. The study's main strength was vulnerable. This protection gap also encourages
that it provided categorisation for the current different comprehensive security solutions consisting of efficient
network and application layer standards in various research on applied data and system security
fields, including transport, smart cities, grid systems and cryptography, non-ryptographic security techniques,
architecture, etc. The key downside of the conducted and frameworks that help developers build secure
research is that it does not include statistical details on applications on heterogeneous devices. More research

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 777


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

on cryptographic security services that can operate on also poses significant challenges. Until data has been
resource-constrained IoT devices is required. This will obtained, it must be used intelligently to accomplish
allow numerous eligible users, regardless of the smart IoT functions. To achieve automated decision-
inadequate user interfaces available with almost all IoT making, it is therefore essential to develop machine
devices, to use and deploy IoT systems securely. learning methods and artificial intelligence algorithms,
Additional areas such as data confidentiality, resulting from neural works, genetic algorithms,
trustworthiness and authenticity of communication evolutionary algorithms, and many other systems of
parties, message credibility, and additional safety criteria artificial intelligence.
should also be included and the IoT's security and
security aspects. This may include functionality such as V. SENSING AND SURVEILLANCE OF IOT
being able to prevent several parties from Even if monitoring and sensing technologies have
communicating. For example, smart objects must be made considerable progress, they are continually
prevented in business transactions from enabling the improving, emphasising energy efficiency and shape.
access of rivals to sensitive information on the devices To obtain instantaneous data, sensors and tags are
and, thus, from maliciously using this information. typically required to be continuously active; this aspect
is essential for energy efficiency, especially in life
IV. DATA PROCESSING, ANALYSIS AND extension. Simultaneously, recent developments in
MANAGEMENT ISSUES IN IOT nanotechnology/ biotechnology and miniaturisation have
Due to IoT's heterogeneous nature and the large enabled the production of nanoscale actuators and
scale of data collected, especially in this era of Big Data, sensors.
the processing, analysis, and data management process
are incredibly challenging. Most applications currently VI. CONCLUSION
use centralised systems to unload data and conduct The IoT can best be described as a CAS (Complex
computer-intensive tasks on an international cloud Adaptive System) that will continue to evolve, requiring
network. However, there is a constant concern that new and creative types of software engineering, system
traditional cloud architectures are not efficient in engineering, project management, and various other
transporting the vast volumes of data produced and disciplines to further develop and manage it in the
consumed by IOT-enabled devices and in order to coming years. It is application areas are very varied to
sustain the accompanying computational load further allow it to support different customers, who have
meet timing constraints at the same time. Therefore most different needs in turn. Three groups of users, people,
systems rely on current technologies to overcome this society or societies and organisations represent the app.
problem, such as mobile cloud computing and fog The IoT, as discussed in the application portion of this
computing, both based on edge processing. The research paper, has, without a doubt, a considerable
implementation of Information-Centric Networking potential to be a massively disruptive force that will have
(ICN) in the IoT is another research path in data a positive effect on millions of lives worldwide, and to
management. As these information-centric systems some degree already. As various governments
provide support for efficient retrieval of content and worldwide have shown an interest in the IoT idea by
access to resources, they tend to be very useful in access offering more funding in the field that is intended to
and transfer, managing, and distributing generated encourage more research, it has become even more
content. However, this approach poses numerous apparent. The Chinese government is a good example.
problems, such as competently expanding the ICN Countless study groups from various parts of the world
paradigm across the fixed network edge, taking static have been initiated and continue to be initiated, and
and mobile IoT devices, and distributing the ICN their main goal is to undertake research related to IoT.
features to resource-constrained devices. Data analysis When more and more research studies are performed,
and its meaning play a key role in IoT performance; it new dimensions begin to emerge for the IoT processes,

778 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

technologies involved, and that can be connected, [11] Mazayev, A. et al., "Interoperability in IoT through the Semantic
Profiling of Objects" IEEE Access, Vol. 6, Issue 1, pp. 19379-
paving the way for even more IOT application 19385, 2018.
functionality.
[12] Miraz, M. H. et al., "A Review on Internet of Things (IoT)
Internet of Everything (IoE) and Internet of Nano Things (IoT)"
VII. IMPLICATIONS OF STUDY Internet Technologies and Applications (ITA), pp. 219- 224,
The study will offer guidance to the organisations to 2015.

understand the different concepts related to IoT. Various [13] Miraz, M. et al., "Internet of Nano-Things, Things and
Everything: Future Growth Trends" Future Internet, Vol. 10,
issues related to the IoT security, privacy and survival Issue 8, pp. 68-74, 2018.
etc. have been mentioned in the study. It throws the
[14] Miraz, M. H. and Ali, M., "Applications of Blockchain
light on the different aspects of IoT, so it will offer a Technology Beyond Cryptocurrency" Annals of Emerging
wide range of guidance to the researchers to conduct Technologies in Computing (AETiC), Vol. 2, Issue 1, pp. 1-6,
the studies in respective fields. 2018.
[15] Miraz, M. H. "Blockchain of Things (BCoT): The Fusion of
REFERENCES Blockchain and IoT Technologies" Advanced Applications of
Blockchain Technology, Vol. 3, Issue 2, pp. 35-42, 2019.
[1] Alansari, Z. et al., "Internet of Things: Infrastructure, Architecture,
Security and Privacy" International Conference on Computing, [16] Patel, K. K. et al., "Internet of Things IoT: Definition,
Electronics Communications Engineering (iCCECE), pp. 150- Characteristics, Architecture, Enabling Technologies, Application
155, 2018. Future Challenges" International Journal of Engineering Science
and Computing, Vol. 6, Issue 5, pp. 6122-6131, 2016.
[2] Alansari, Z. et al., "Challenges of Internet of Things and Big Data
Integration" Emerging Technologies in Computing, Vol. 4, Issue [17] Porkodi, R. and Bhuvaneswari, V., The Internet of Things (IoT)
2, pp. 47-55, 2018. Applications and Communication Enabling Technology
Standards: An Overview, International Conference on Intelligent
[3] Ansari, D. B. et al., "Internet of Things (IoT) Protocols: A Brief
Computing Applications, Vol. 3, Issue 2, pp. 324-329, 2014.
Exploration of MQTT and CoAP" International Journal of
Computer Applications, Vol. 179, Issue 2, pp. 9-14, 2018. [18] Rajguru, S. et al., "Analysis of Internet of Things in a Smart
Environment" International Journal of Enhanced Research in
[4] Borgia, E. et al., "Internet of Things: Research Challenges and
Management and Computer Applications, Vol. 4, Issue 4, pp.
Solutions" Computer Communications, Vol. 89, Issue 90, pp. 1-
40-43, 2015.
4, 2016.
[19] Rehman, H. U. et al., "Future Applications and Research
[5] Chaudhry, J. A, "A Survey of Distributed Certificate Authorities
Challenges of IoT" International Conference on Information and
in MANETs" Annals of Emerging Technologies in Computing
Communication Technologies (ICICT), Vol. 10, Issue 6, pp. 68-
(AETiC), Vol. 2, Issue 3, pp. 11- 18, 2018.
74, 2017.
[6] Cooper, J. and James, A., "Challenges for Database Management
[20] Ryan, P. J. and Watson, R. B., "Research Challenges for the
in the Internet of things" IETE Technical Review, Vol. 26, Issue
Internet of Things: What Role Can OR Play?" Systems, Vol. 5,
5, pp.320-329, 2009.
Issue 1, pp. 1-34, 2017.
[7] Data, A. S. et al., "Sensor Networks Attacks Classifications and
[21] Soomro, S. et al., "Artificial Intelligence Enabled IoT: Traffic
Mitigation" Annals of Emerging Technologies in Computing
Congestion Reduction in Smart Cities" IET 2018 Smart Cities
(AETiC), Vol. 2, Issue 4, pp. 28-43, 2018.
Symposium, pp. 81-86, 2018.
[8] Jain, R., "A Congestion Control System Based on VANET for
[22] Sundareswaran, V. and Null, M. S., "Survey on Smart Agriculture
Small Length Roads" Annals of Emerging Technologies in
Using IoT" International Journal of Innovative Research in
Computing (AETiC), Vol. 2, Issue 1, pp. 17-21, 2018.
Engineering & Management (IJIREM), Vol. 5, Issue 2, pp. 62-
[9] Mahmud, S. H. et al., "Potentials of Internet of Things (IoT) in 66, 2018.
Malaysian Construction Industry" Annals of Emerging
[23] Taseko, P., "Application of Internet of Things in logistics-Current
Technologies in Computing (AETiC), Vol. 2 Issue 1, pp. 44-52,
Challenges" Ekonomia, Vol. 7, Issue 4, pp. 54-64, 2015.
2018.
[24] Sanjay, S. V. and Tamale, G. R., "Medicine Reminder and
[10] Mano, Y. et al., "Exploiting IoT Technologies for Enhancing
Monitoring System for Secure Health Using IoT" Procedia
Health Smart Homes Through Patient Identification and Emotion
Computer Science, Vol. 78, Issue 1, pp. 471-476, 2016.
Recognition" Computer Communications, Vol. 4, Issue 1, pp.
178-190, 2015.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 779


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Bamboo: An Eco-Friendly Material for Structural


Applications
Dr. Asheesh Kumar1, Mr. V. Vijaya Bhaskar2, Dr. P. Badari Narayana3
1,2,3
Department of Mechanical Engineering, Mahatma Gandhi Institute of Technology, Hyderabad, India
Email: mailasheesh@gmail.com1, vvijayabhaskar_mct@mgit.ac.in2, pbadarinarayana_mct@mgit.ac.in3

Abstract- With time human being has appearance of the environment, the safety, many
discovered many combinations of material to fulfill reduce the effect of global warming, acid rain and
their needs for structural applications. The process various other environmental problems, many wastes can
involved to manufacture maybe energy consuming be hazardous to animals etc., so obviously its beneficial,
as well as by products main not be eco-friendly. however they can often be expensive for exam bio fuel
there are various applications in which higher
is more expensive than normal fuel, also many of the
strength may not be the prime requirement. For
such applications eco-friendly material having the material and products are being developed.
intermediate properties can be used. Moreover, Conventional building technologies like burnt bricks,
the properties of eco-friendly materials can be steel and cement are high in cost, utilize large amount
enhanced without any harm to the environment. in of non-renewable natural resources like energy,
this work eco-friendly material bamboo for minerals, top-soil, forest cover etc. So eco-friendly
structural applications will be discussed. building materials play unmatched role for construction
Keywords-Eco-friendly, composite, structural, purposes.
bamboo, natural fibers Eco-friendly, or green material or environment
I. INTRODUCTION friendly material is beneficial or non-harmful to the
environment, and resource efficient aswell as reusable
In modern era a lot of development in manufacturing and recyclable and biodegradable materials[1]-[4].
processes and techniques came. Now it is possible to Eco-friendly materials reduce waste, pollution and use
prepare more stable biodegradable products. of energy. Damage due toEco-friendly materials to the
Moreover, now it's a known fact that to maintain balance environment is less. The materials used for structural
in the nature the ultimate fact that the fate of any material applications will require some strength based on their
that entering the environment should be biodegradable. applications. Such as in RCC that is the reinforcement
So always the oobjectives should be aiming to use is mild steel bars which have high tensile strength and
material which can be recycled or converted to suitable when used in combination with the concreate which
forms which nature can handle.The production and use has high compressive strength. Theamalgamation of mild
of Eco-friendly will not damagethe environment, few steel and concreate and steel gives the required
eco-friendly materials and techniques red shown in properties in RCC. Although the composites are
Figure 1. mentioned in modern era, but have been used in the
past also such as mixture of soil water with plant waste
have been used for preparation of walls of houses so
that the wall will have high compressive strength as well
as high bending strength. In this paper different types
of eco-friendly materials which are used for structural
applications will be discussed in detail [5]-[10].

Figure 1. Eco-friendly Materials and Techniques

780 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

II. ECO-FIENDLY MATERIALS Table1. Mechanical properties of natural fiber and


comparison with other natural fibers [9]
CLASSIFICATION
Eco-friendly materialsare classified (as shown in
Figure 2) based on their sources and functions. The
source of eco-friendly material may be reusable
materials, recycled materials or materials for efficiency.
Based on for what function the material is used eco-
friendly materials can be broadly categorized as materials
for disposal and treatment, materials for social health
and materials for energy. Disposal and treatment Composites made of bamboo are very much useful
materials include materials for waste treatment, materials and find applications in many places.Laminated bamboo
for environment load reduction, materials for ease is the product where strips of the culm wall are laminated
disposal and recycle etc.. Materials for social health into a board.
include hazard free materials, materials for human health
impact reduction. In the category of energy materials
include materials for energy efficiency and materials for
green energy.Recycled Materials which can be used in
construction industries are Eco-cement, coal ash
concrete, glass ceramics from wastes, recycled plastics.

Figure 3. The Cross-section view of bamboo [9]

Laminated bamboo find application in making


surfaces. Now lot of structural applications are available
where bamboo has been used for structural
applications. Bamboo has been used to make schools
sport complex, homes, office, security cabin and even
Figure 2. Classifications of Eco-friendly Materials[11] a airport in Madrid as can be seen in Figure 5. The
bamboo has excellent bending properties. Although in
III. PROPERTIES OF BAMBOO Madrid airport its application is in the rooftop instead
Ash shown in Table 1where mechanical properties structural load wearing member.
of bamboo are compared with other natural fibers. The
density of bamboo is comparably low than others and IV. STRUCTURES DEVELOPED FROM
tensile strength also comparable to others. Due to low BAMBOO
density of bamboo and higher strength it has benefit of Bamboo possesses high self-generation rate;some
having higher strength to weight ratio.The cross-section species grow up to three feet within 24 hours. Bamboo
of the bamboo is shown in Figure 3. keeps on growing itself after harvesting. Bamboo is not
a wood it's a perennial grass grows mostly everywhere
except Europe and Antarctica. Bamboo has been most
the promising material having applications such as
decking, Garden terrace, flooring, Wall covering Figure
4 and Figure 5 shows Bamboo architecture: Bali's

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 781


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Green School and the curved bamboo ceiling in Madrid friendly materials will lead to minimization of waste,
International Airport. pollution and use of energy. Which will help in stablishing
a better balance with the nature.
REFERENCES
[1] E. I. Akpan, B. Wetzel, and K. Friedrich, "Process design for
performance improvement in purely ecofriendly composites for
structural applications," J. Appl. Polym. Sci., vol. 137, no. 21,
pp. 1-14, 2020, doi: 10.1002/app.48719.
[2] K. J. Kowalski et al., "Eco-friendly Materials for a New Concept
of Asphalt Pavement," Transp. Res. Procedia, vol. 14, pp. 3582-
3591, 2016, doi: 10.1016/j.trpro.2016.05.426.
[3] M. A. Dweib, B. Hu, A. O'Donnell, H. W. Shenton, and R. P.
Figure 4. Bamboo architecture: Bali's Green School [12] Wool, "All natural composite sandwich beams for structural
applications," Compos. Struct., vol. 63, no. 2, pp. 147-157,
Bamboo possess a high strength-to-weight ratio, 2004, doi: 10.1016/S0263-8223(03)00143-0.
even more comprehensive strength than brick and [4] P. Antov, V. Jivkov, V. Savov, R. Simeonova, and N. Yavorov,
concrete, and has long life. Having more compressive "Structural application of eco-friendly composites from recycled
wood fibres bonded with magnesium lignosulfonate," Appl. Sci.,
strength and long life makes it suitable for flooring and vol. 10, no. 21, pp. 1-12, 2020, doi: 10.3390/app10217526.
cabinetry. Although, bamboo requires treatment to resist
[5] T. Cardinale, M. D'amato, R. Sulla, and N. Cardinale, "Mechanical
insects and rot.The bamboo may face a problemof and physical characterization of papercrete as new eco-friendly
swelling due to water absorption of water and crack.If construction material," Appl. Sci., vol. 11, no. 3, pp. 1-11, 2021,
the bamboo is not treated, then due to presence of starch doi: 10.3390/app11031011.

it is prone to insects attack. [6] M. Doddamani, "Dynamic mechanical analysis of 3D printed


eco-friendly lightweight composite," Compos. Commun., vol.
19, no. March, pp. 177-181, 2020, doi: 10.1016/
j.coco.2020.04.002.
[7] L. Senff, R. M. Novais, J. Carvalheiras, and J. A. Labrincha,
"Eco-friendly approach to enhance the mechanical performance
of geopolymer foams: Using glass fibre waste coming from wind
blade production," Constr. Build. Mater., vol. 239, p. 117805,
2020, doi: 10.1016/j.conbuildmat.2019.117805.
[8] B. Behforouz, V. S. Balkanlou, F. Naseri, E. Kasehchi, E. Mohseni,
and T. Ozbakkaloglu, "Investigation of eco-friendly fiber-
reinforced geopolymer composites incorporating recycled coarse
aggregates," Int. J. Environ. Sci. Technol., vol. 17, no. 6, pp.
3251-3260, 2020, doi: 10.1007/s13762-020-02643-x.
Figure 5. The curved bamboo ceiling in Madrid International
Airport [13] [9] A. P. Morales, A. Güemes, A. Fernandez-Lopez, V. C. Valero,
and S. de La Rosa Llano, "Bamboo-polylactic acid (PLA)
V. CONCLUSIONS composite material for structural applications," Materials
(Basel)., vol. 10, no. 11, pp. 1-22, 2017, doi: 10.3390/
Eco-Friendly materials may not be fit for high end ma10111286.
applications where the strength requirement is high, or [10]M. H. Abu Elella et al., Xanthan gum-derived materials for
the high temperature stability is the requirement. But applications in environment and eco-friendly materials: A review,
these materials are biodegradable nature which is the vol. 9, no. 1. Elsevier B.V., 2021.
way nature balances. Moreover, for structural [11]H. X. Nguyen, T. Honda, and R. Yamamoto, "Classification of
ecomaterials in the perspectives of sustainability," pp. 706-709,
applications they have desirable properties in low load
2008, doi: 10.1109/vetecf.2003.240406.
applications. Eco-friendly materials like bamboo have
[12] https://theconversation.com/bamboo-architecture-balis-green-
proved and can be used along with the conventional school-inspires-a-global-renaissance-121248
materials to get the desired properties. The use of eco-

782 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[13]Ramage, Michael H., Bhavna Sharma, Darshil U. Shah, and


Thomas PS Reynolds. "Thermal relaxation of laminated bamboo
for folded shells." Materials & Design 132 (2017): 582-589.
[14] Mussig, J. Industrial Application ofNaturalFibres: Structure,
Properties, and Technical Applications; A John Wiley and Sons,
Ltd.: Bremen, Germany, 2010
[15] Ashby, M.F. Materials and the Environment: Eco-Informed
Material Choice; Butterworth-Heinemann Elsevier Science:
Oxford, UK, 2012.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 783


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Design and Analysis of Horizontal Boring Spindle


Mr. M. Mahesh
Mechanical Department, VEMU Institute of Technology, P.Kotha Kota, Chittoor, A.P. INDIA
Email: masarapumahesh2000@gmail.com

Abstract- The boring bar is one of the most the existing hole is a through hole), or it may be
widely used types of tool holders in metal cutting supported at one end (which works for both, through
operations. The turning process subjects the tool holes and blind holes). Line boring (line boring, line-
to vibrations and cutting in deep work piece cavities boring) implies the former. Back boring (back boring,
is likely to result in high vibration levels. The back-boring) is the process of reaching through an
consequences of such vibration levels generally
existing hole and then boring on the "back" side of the
results in: reduced tool life, poor surface finishing
and disturbing sound. Internal turning frequently work piece (relative to the machine headstock).
requires a long and slender boring bar in order to The first boring machine tool was invented by John
machine inside a cavity, and the vibrations generally Wilkinson in 1775.
become highly correlated with one of the
Boring is used for enlarging an existing hole. This is
fundamental bending modes of the boring bar.
Different methods can be applied to reduce the used for getting an accurate size and a better finish to
vibrations, the implementation of the most efficient hole, this improves the quality of work. Boring can do
and stable methods require in depth knowledge small works with accurately and effectively but when
concerning the dynamic properties of the tooling used for making large holes the required boring machine
system. Furthermore, the interface between the should be a special type.
boring bar and the clamping house has a significant
influence on the dynamic properties of the clamped II. MATERIALAND METHODS
boring bar. This report focuses on the dynamic MATERIAL
properties of a boring bar that arise under different
PROPERTIES HIGH SPEED CARBIDE
clamping conditions of the boring bar and are STEELS (HSS) ALLOY
introduced by a clamping house (commonly used Density 7.6 kg/m3 15.25 kg/m3
in the manufacturing industry). The dynamic Young’s modulus 233 GPa 699-696 GPa
properties of a boring bar (for different cases of Ther mal conductivity 20.2 W/M-K 28-88 W/M-K
Poisson’s ratio 0.28 0.2
boundary condition of the boring bar) are presented
partly analytically but also experimentally. METHODOLOGY FOR DESIGN AND
ANALYSIS OF HORIZONTAL BORING
I. INTRODUCTION
SPINDLE
In machining, boring is the process of enlarging a
MODELING
hole that has already been drilled (or cast) by means of
a single-point cutting tool (or of a boring head containing DESIGN PROCESS CAD
several such tools), such as in boring a gun barrel or an Initially 2D drawings were created using sketcher
engine cylinder. Boring is used to achieve greater toolbar; tools in profile tool bar such As line, circle,
accuracy of the diameter of a hole, and can be used to rectangle, points, reference lines etc.… and sketch
cut a tapered hole. Boring can be viewed as the internal- references like grid, vertex, and dimensions are used.
diameter counterpart to turning, which cuts external Modules of PRO/E, Catia V5.
diameters.
1. Sketcher
There are various types of boring. The boring bar 2. Part Design
may be supported on both ends (which only works if

784 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3. Assembly IV. FINITE ELEMENT METHODS


4. Drawing The finite element method is numerical analysis
Analysis Process technique for obtaining approximate solutions to a wide
variety of engineering problems. Because of its diversity
1. Importing the Model: and flexibility as an analysis tool, it is receiving much
2. Defining Material Properties attention in engineering schools and industries. In more
and more engineering situations today, we find that it is
3. Defining Element Type:
necessary to obtain approximate solutions to problems
4. Meshing the model rather than exact closed form solution. It is not possible
to obtain analytical mathematical solutions for many
III. GEOMETRIC MODELING
engineering problems. An analytical solutions is a
CatiaV5 R15 is an interactive Computer Aided mathematical expression that gives the values of the
Design and Computer Aided Manufacturing system. desired unknown quantity at any location in the body,
The CAD functions automate the normal engineering, as consequence it is valid for infinite number of location
design and drafting capabilities found in today's in the body. For problems involving complex material
manufacturing companies. The CAM functions provide properties and boundary conditions, the engineer resorts
NC programming for modern machine tools using the to numerical methods that provides approximate, but
CatiaV5 R15 design model to describe the finished part. acceptable solutions.
CatiaV5 R15 functions are divided into "applications"
of common capabilities. These applications are BASIC APPROACH TO FEA SOFTWARE:
supported by a prerequisite application called "CatiaV5 Basic approach for any finite element analysis (FEA)
R15 Gateway". can be divided in to three parts
CATIA V5 R15 is fully three dimensional, double • Pre - processors
precision system that allows to accurately describing
• Solver
almost any geometric shape. By combining these
shapes, one can design, analyze, and create drawings • Post - Processor
of products. PRE - PROCESSOR
PART DESIGN IN CATIA Pre - processor mainly contains building of model,
The Part Design course is designed to teach you the meshing, assigning materialproperties etc.
fundamentals of the CATIA V5 R20 Part Design SOLVER
workbench. Modeling techniques used to create and
edit designs and feature-based solids are explored. The Solvers are geometric task oriented. These are
below figure 1. Shows the part design of boring bar. developed for specific applications. Solvers are
designed based on continuum approach where in
construction of mass, momentum and energy equation
of state, thermodynamic equations as and when required
for each of the elements and the solution is obtained by
interpreting these solutions.
POST - PROCESSOR
Fig1:Boring bar model sketch Here the results of the analysis are read and
interpreted. They can be presented in the form of a
table, a contour plot, deformed shape of the component

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 785


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

to the mode shapes and natural frequencies if


frequencies are involved. Other results are available for
fluids, thermal and electrical analysis types.
V. ANALYSIS OF HORIZONTAL BORING
MACHINE
ANSYS Stands for Analysis System Product. Dr. Fig 3: HSS with 100 mm length
John Swanson founded ANSYS. In 1970 with a vision
to commercialize the concept of computer simulated Carbide Alloy and HSS with 150 mm length bar
engineering, establishing himself as one of the pioneers The frequency of Carbide alloy and HSS boring bar
of Finite Element Analysis (FEA). ANSYS Inc. with 150m length with standard diameter at different
supports the ongoing development of innovative modes are as follows
technology and delivers flexible, enterprise wide
engineering systems that enable companies to solve the
full range of analysis problem, maximizing their existing
investments in software and hardware. ANSYS Inc.
continues its role as a technical innovator. It also supports
a process centric approach to design and manufacturing,
allowing the users to avoid expensive and time
consuming "built and break" cycles. ANSYS analysis Fig 4: Carbide Alloy with 150 mm length
and simulation tools give customers easeof use, data
compatibility, and multiplatform support and coupled
field multi-physics capabilities.
Meshed model of boring bar

Fig 5: HSS with 150 mm length bar

Carbide Alloy and HSS with 160 mm length bar


Fig 2:Meshing of horizontal boring spindle The frequency of Carbide alloy and HSS boring
bar with 160m length with standard diameter at different
VI. RESULT AND DISCUSSION
modes are as follows
Carbide Alloy and HSS with 100 mm length bar
The frequency of carbide alloy and boring bar with
100m length with standard diameter at different modes
are as follows

Fig 6: Carbide Alloy with 160 mm length

Fig 2 : Carbide Alloy with 100 mm length

786 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

S.No BORING FREQUENCIES FREQUENCIES


BAR LENTH OF HSS (Hz) OF CARBON
(mm) ALLOY (Hz)
1. 100 mm 60668 hz 78206 hz
2. 150 mm 60620 hz 74349 hz
3. 160 mm 20272 hz 20279 hz
4. 200 mm 16473 hz 32331 hz
5. 250 mm 12970 hz 24872 hz

Fig 7: HSS with 160 mm length


VII. CONCLUSION

Carbide Alloy and HSS with 200 mm length bar 1. The model and analysis of CNC Horizontal Boring
spindle using Professional Engineering software
The frequency of carbide alloy and HSS boring bar CATIA and ANSYS Work bench was performed in
with 200m length with standard diameter at different the presentwork.
modes are as follows 2. A comparative study between HSS Spindle and
Carbide Alloy is carried out with respective to
frequency.
3. The following conclusion can be drawn from the study
• For 100mm Boring Cutter, the Carbide alloy spindle
produces
Fig 8: Carbide Alloy with 200 mm length
92387 Hz-86600 Hz = 5787 Hz
• For 150mm Boring Cutter, the Carbide alloy spindle
produces
77519 Hz-74349 Hz = 3170 Hz
• For 160mm Boring Cutter the Carbide alloy spindle
produces
Fig 9: HSS with 200 mm length 74314 Hz-70863 Hz = 3451 Hz
Carbide Alloy and HSS with 250 mm length bar • For 200mm Boring Cutter the Carbide alloy spindle
produces
The frequency of carbide alloy and HSS boring bar
with 250m length with standard diameter at different 61606 Hz-60606 Hz = 1000 Hz
modes are as follows • For 250mm Boring Cutter the Carbide alloy spindle
produces
49456 Hz-47749 Hz = 1707 Hz
We finally concluded that, the Carbide Alloy is best
replacement in the place of HSS.
Fig 10: Carbide Alloy with 250 mm length VIII. FUTURE SCOPE
The following are the possible ideas for future work:
I. Spindle stiffness coefficients have substantial effects
on the spindle static and dynamicbehavior. To be able
to get more accurate results and predict the spindle
behavior, the stiffness values of the bearings can be
Fig 11: HSS with 250 mm length found experimentally and included in the analysis.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 787


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

II. Manufacturing drawings can be made for future 2. Gaurav Vohra, Palwinder Singh, Harsimran Singh Sodhi, - Analysis
prototype testing. and Optimization of Boring Process Parameters By Using
Taguchi Method, International Journal of Computer Science and
III. Prototype manufacturing and testing of the spindle Communication Engineering IJCSCE Special issue on -Recent
can be made. Advances in Engineering & Technology NCRAET-2013, ISSN
2319-7080
IV. Spindle with different properties or precision levels 3. K Ramesh, T Alwarsamy and S Jayabal, -Prediction of cutting
and their effects on the rigidity and accuracy can be process parameter in boring operations using artificial neural
investigated. networks?, Journal of Vibration and Control, DOI: 10.1177/
1077546313495253
IX. ACKNOWLEDGMENT 4. T.Alwarsamy, 1 2S.Vetrivel and 1S. Nadarajan, -Theoretical
Cutting Force Prediction and Analysis of Boring Process Using
Our first and foremost thanks to the almighty for his
Mathcad, World Applied Sciences Journal 12 (10): 1814-1818,
blessing in the successfully completion of my project 2011 ISSN 1818-4952
report. 5. M. Senthil kumar, K. M. Mohanasundaram and B. Sathishkumar,
-A case study on vibration control in a boring bar using particle
We express my sincere gratitude to my guide Mr.
damping'', International Journal of Engineering, Science and
M. SANKAR M.Tech, professor, Department of Technology Vol. 3, No. 8, 2011, pp. 177-184
Mechanical Engineering for his supervision and timely 6. G.M.Sayeed Ahmed, Hakeemuddin Ahmed , Syed Safiuddin
guidance switch valuable pieces of advice during the Samad, - Experimental Investigation of Effect of Tool Length on
course of my project. Surface Roughness during Turning Operation and its Optimization
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE)
X. REFERENCES e-ISSN 2278-1684,p-ISSN: 2320-334X, Volume 7, Issue 2 (May.
- Jun. 2013), PP 73-80
1. Show-Shyan Lin, Ming-Tsan Chuang, -Optimization of 6061T6
7. G.-L. Chern, Jia-Ming Liang, -Study on boring and drilling with
CNC Boring Process Using the Taguchi Method and Grey
vibration cutting, International Journal of Machine Tools &
Relational Analysis, The Open Industrial and Manufacturing
Manufacture 47 (2007) 133-140.
Engineering Journal, 2009, 2, 14-20 2]

788 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Development and Performance of Electro-Hydraulic


Excavator
Mohanraj K S1, A. Arun Negemiya2, C. Sangeevi3
1,2,3
Mechanical Department, SSIET, Tamilnadu, India
Email: ksmohanmit@gmail.com1, arunmech@siet.ac.in2, csangeevi@siet.ac.in3

Abstract- The heavy earth moving machineries energy saving and with reduced amount of time.(6)To
(HEMM) like hydraulic excavators play a major improve the productivity and safety of construction site
role in the construction and mining industries. In an integration of AMC/G with a multi-agent system and
an industry of mining and construction, a hydraulic the RTS. The use of RTS makes one to follow the correct
excavator plays a major role in action to perform a procedure of safety and productivity and also by
carry an heavy load. Employing the technology of
enhancing the transition of RTS through AMC/G causes
automation, an alternative solution is made to
replace the manual operation. By addressing the an great change in productivity, site safety and project
concept of automation in construction, the management.(7)In every mass production there should
inevitable usage of embedded is accumulated to be an shop floor section to carried out a specific tasks
introduce in earthmovers. In a mass production or to meet the production rate. Some of the shortcomings
construction site, unplanned work would lead to like unavailability of tools and sudden damage of tools
time-consuming and fault. To overcome the major and excess inventory control, between those above
disadvantage of time-consuming, so mentioned aspects. makes the operator weary to carry
implementation of automation is made on over the finished part from that place to testing. It also
excavators. This could be made workers do other causes intangible work load for operator.
work sequentially with half monitoring the working
process of excavator. This also favors the firm or 2. MATERIALS AND METHODS
industry to increase the work capability with an
adequate number of laborers.
The aim of this chapter is to describe various
materials used and methodology used to make different
Keywords- Excavator, Embedded programme, parts. The conceptualization, designing, analysis of links
solenoid valve, pneumatic actuators with their line diagrams are dealt in this chapter.
1. INTRODUCTION Fabrication of CPC and heat pipe are also discussed.
The characteristics of various components and their
As we see in the excavator part in the JCB is
specifications along with their dimensions were taken
operated by using manual lever mechanism with the help
into account.
of hydraulic concept facing an issue of inefficiency in
the system because of force reduction exerted on the Methodology
system. The following(3) have done on research about • Conceptual development of model
to eliminate the difficulties of ground clearance and
mechanical vibration of links.Through the LUCIE • Flow chart
programme made to follow the organized robotics • Collection of materials
following with the concept of automation.(4)The
concept of unmanned excavator made to offer facility • Fabrication
for local workers to automated in the hazardous area 2.1 Conceptual design
using sensor and camera recording.(5)While on the eye
The conceptual design of excavator done with the
of economy side especially coal mining industry, bucket
help of solidworks as shown in fig.1
wheel excavator plays an major role to increase the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 789
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig.1 Fig.2

2.2 Components involved 2.6 Rack and Pinion


The main components of a project are Rack and pinion, mechanical device consisting of a
• Frame bar of rectangular cross section (the rack), having teeth
on one side that mesh with teeth on a small gear (the
• Hydraulic cylinders pinion). The pinion may have straight teeth, as in the
• Solenoid valve figure, or helical (twisted) teeth that mesh with teeth on
the rack that are inclined to the pinion-shaft axis.
• Rack and pinion
If the pinion rotates about a fixed axis, the rack will
• PIC controller board
translate; i.e., move on a straight path. Some
• Oil reservoir automobiles have rack-and-pinion drives on their
• Bucket steering mechanisms that operate in this way.

2.3 Frame 2.7 PIC microcontroller


A frame is often a structural system that supports PIC microcontrollers ( Programmable Interface
other components of a physical construction and/or steel Controllers), are electronic circuits that can be
frame that limits the construction's extent. Frame has programmed to carry out a vast range of tasks. They
made up of mild steel with the dimensions 25×25×3. can be programmed to be timers or to control a
production line and much more. They are found in most
2.4 Hydraulic cylinders electronic devices such as alarm systems, computer
A hydraulic cylinder is a mechanical actuator that is control systems, phones, in fact almost any electronic
used to give a unidirectional force through a device. Many types of PIC microcontrollers exist,
unidirectional stroke. It has many applications, notably although the best are probably found in the GENIE
in construction equipment manufacturing machinery, and range of programmable microcontrollers. These are
civil engineering. Four cylinders used with following programmed and simulated by Circuit.
dimensions 40mm inner dia, 150mm stroke length 2.7.1 Input power supply
2.5 Solenoid valve Initially input voltage of 230V power is supplied to
Solenoid valves are electrically activated valves, PIC controller board.
typically used to control the flow or direction of air or 2.7.2 Transformer
liquid in fluid power systems. Used in both pneumatic
and hydraulic fluid power functions, the spool or poppet The transformer which incorporated in the board
design of most solenoid valves makes them perfect for step downs the voltage to 15V.
various functions and applications. It is 5/2 electrically 2.7.3 Bridge rectifier
operated valve and pressure limit is 8kgf/cm2 The used
valve is shown in fig.2. The four types of diode present in the board which

790 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

is known to be bridge rectifier again step down to 5V. 3.1. Embedded C program
It converts AC to DC supply. The embedded C program has the set of instructions
2.7.4 IC circuit to perform, monitor, automate the hydraulic excavator.
The following set of program have one of the illustration
This 5V is being processed by PIC16f877a in which for the working model of excavator. The working
the instructions are stored. These instructions are send operation of excavator approximately runs for 23 secs
to relays for individual operations. Inside the IC chip, with the extraction and retraction of every individual
contains RAM and ROM. It has 32-bit memory. arms and excavators bucket with set of allocated time
2.7.5 Relay: duration.
A relay is an electrically operated switch. It consists #include<pic.h>
of a set of input terminals for a single or multiple control #include"4 BIT LCD HEADER FILE.h"
signals, and a set of operating contact terminals. The
switch may have any number of contacts in multiple #define X1_WHEEL RD0
contact forms, such as make contacts, break contacts, #define X2_WHEEL RD1
or combinations thereof. The relay coil has Input voltage #define Y1_WHEEL RD2
15volts, output voltage 230volts and one input and two
input terminals. #define Y2_WHEEL RD3
Finally the operating voltage of 230V is supplied to #define Z1_WHEEL RC4
solenoid valve by the common supply unit from relay. void X_Forware()
3. PERFORMANCE TESTING {
The automation of excavator can be studied by using X1_WHEEL = 1;
both the Fluidsimu software and embedded C software. X2_WHEEL = 0;
TracePro is one of the most powerful and sophisticated
fluid flow analysis and design software. The Electro- }
hydraulic excavator model designed in solidworks is
imported to the Fluidsim software and the fluid flow
void X_Reverse()
were traced. The final result by the respective software
shows that flow of fluid through the respective hydraulic {
cylinders and with the help of micro-controller makes X1_WHEEL = 0;
it to study the sudden drop and time adjustment of fluid
flow inside the cylinders. With the help the embedded X2_WHEEL = 1;
C program helps to study the automation of excavator. }
The below figure 4.3 shown represent the input given
in the Fluidsim software.
void Y_Forware()
FluidSIM is a comprehensive software for the
creation, simulation, instruction and study of Y1_WHEEL = 1;
electropneumatic, electrohydraulic and digital circuits. Y2_WHEEL = 0;
You'll be able to create circuits easily by using
drag&drop. You only have to place the items in the }
circuit as you want to view them and build the circuit
intuitively. Simple and effective.
void Y_Reverse()

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 791


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

{ __delay_ms(3200);
Y1_WHEEL = 0; All_Stop();
Y2_WHEEL = 1; }
}
void Y_F_Dip()
void Z_Forware() {
{ Y_Forware();
Z1_WHEEL = 1; __delay_ms(6000);
} All_Stop();

void Z_Reverse() Z_Forware();


{ __delay_ms(3200);
Z1_WHEEL = 0; All_Stop();
} }

void All_Stop() void X_R_Dip()


{ {
X1_WHEEL = 0; X_Reverse();
X2_WHEEL = 0; __delay_ms(6000);
Y1_WHEEL = 0; All_Stop();
Y2_WHEEL = 0;
Z1_WHEEL = 0; Z_Forware();
__delay_ms(500); __delay_ms(3200);
} All_Stop();
}
void X_F_Dip()
{ void Y_R_Dip()
X_Forware(); {
__delay_ms(6000); Y_Reverse();
All_Stop(); __delay_ms(6000);
All_Stop();
Z_Forware();

792 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Z_Forware(); while(a)
__delay_ms(3200); {
All_Stop(); X_F_Dip();
} a--;
}
void main()
{ while(b)
TRISD=0X00; {
PORTD=0X00; Y_F_Dip();
b--;
TRISC=0X00; }
PORTC=0X00;
while(c)
ADCON1=0X06; {
X_R_Dip();
TRISB=0x00; c--;
PORTB=0X00; }

TRISE=0x00; while(d)
PORTE=0X00; {
Y_F_Dip();
Lcd_Initialization(); d--;
Lcd_String("hello",1,0); }
int a=3,b=1,c=3,d=1,e=3; e--;
while(1) }
{ Y_Reverse();
while(e) __delay_ms(6000);
{ All_Stop();
Lcd_Cursor(2,0);
Lcd_Data(e+48); while(1);
}
a=3,b=1,c=3,d=1; }

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 793


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

IV. RESULTS AND DISCUSSION 6. This relay could capable of acting swith, so it allows
the further voltage supply to next stage by following
The hydraulic excavator was designed and fabricated the instructions stored in IC chip.
as explained in chapter 3.1 to 3.12. Overall
specifications with economic analysis, cost estimation 7. Among the four relay only one is capable to allow
the supply for further stage and if one closes then
of various components used in the CPC and test results
another relay get opened the way for supply.
found were dealt in this chapter. In addition, the
comparison of results by varying different parameters 8. This relay converts the 12V to again 40V supply and
also done. then passed to the solenoid valve where the hydraulic
cylinders have connected.
4.1 Fabricated prototype 9. The compresser (4 ~7 bar) connected to the main
The design of the components was done using unit of solenoid valve from that it is distributed to the
Solidworks modelling software and fabricated. The individual valves.
evacuated tube, tanks, used were readily available in 10.When the signal is given to one of the valves, cylinders
the market. The temperature indicator, light was also retraces with the help of oil filling through compressor.
readily available in themarket. The fabricated prototype
have shown in fig.3. REFERENCES
[1] Bradley, D. A., & Seward, D. W. (1998). Journal of Intelligent
and Robotic Systems, 21(1), 73-97
[2] Ding, R., Zhang, J., Xu, B., & Cheng, M. (2018). Programmable
hydraulic control technique in construction machinery: Status,
challenges and countermeasures. Automation in Construction,
95, 172-192
[3] Gottvald, J., & Kala, Z. (2012). SENSITIVITY ANALYSIS OF
TANGENTIAL DIGGING FORCES OF THE BUCKET
WHEEL EXCAVATOR SCHRS 1320 FOR DIFFERENT
TERRACES. Journal of Civil Engineering and Management,
18(5), 609-620
[4] He, Q., Hao, P., & Zhang, D. (2008). Modeling and parameter
estimation for hydraulic system of excavator's arm. Journal of
Central South University of Technology, 15(3), 382-386.
[5] He, Q., Zhang, D., Hao, P., & Zhang, H. (2006). Modeling and
control of hydraulic excavator's arm. Journal of Central South
Fig.3 University of Technology, 13(4), 422-427.
[6] Lee, J., Kim, B., Sun, D., Han, C., & Ahn, Y. (2019). Development
4.2 Working of Unmanned Excavator Vehicle System for Performing
1. The working of the Electro-hydraulic excavator is Dangerous Construction Work. Sensors, 19(22)
described in this portion. [7] Masuti, P. M., & Dabade, U. A. (2019). Lean manufacturing
implementation using value stream mapping at excavator
2. The voltage of 430V is supplied to the circuit of micro- manufacturing company.
controller.
[8] Rossi, A., Vila, Y., Lusiani, F., Barsotti, L., Sani, L., Ceccarelli, P.,
3. The voltage is passed through the bridge rectifier to & Lanzetta, M. (2009). Embedded smart sensor device in
make the step-down the 430V-12V. construction site machinery. Computers in Industry, 108, 12-20.
[9] Zhang, S., Minav, T., Pietola, M., Kauranne, H., & Kajaste, J.
4. The voltage of 12V is passed to IC chip of PIC16f877a (2019). The effects of control methods on energy efficiency and
in which the instructions are stored to make the task position tracking of an electro-hydraulic excavator equipped with
performance of individual arm. zonal hydraulics. Automation in Construction, 100, 129-144.

5. The four individual relay which acts as switch and


ready to receive the 12V supply.

794 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Thermal Performance Investigation for Direction of


Twist of Inserted Twisted Tape in Evacuated Tube Solar
Water Heater
Hitendra Damarlal Chaudhary1, Dr. Sadanand A. Namjoshi2
1
Research Scholar, Madhav University, Pindwara (Sirohi), Rajasthan, India
2
Professor, Madhav University, Pindwara (Sirohi), Rajasthan, India
Email: chaudharyhiten43@gmail.com1

Abstract: All renewable energy resources not Considering the nature of solar power, a working solar
only reduce the carbon foot print but also help to energy generator requires two components. A collector
reduce dependency on fossil fuels too. The wind and a storage unit are the two components. The collector
energy, biomass and solar energy are the major merely absorbs the radiation that falls on it and turns a
alternative energy options; out of which solar fraction of it into other energy types (either electricity
energy which is available in ample quantity and can
and heat or heat alone). Because solar energy is non-
be used for cooking, heating and power generation
purpose too. The objective of present work is to constant, the storage unit is required; at times, only a
investigate effect of direction of twist of twisted very little amount of radiation will be collected. The
tape inserted in evacuated tube solar water heater. amount of energy generated by the collector will be
quite modest at night or during periods of thick cloud
Keywords: Solar Energy, Fossil Fuels,
cover, for example. The storage unit can store extra
Evacuated Tube Solar Water Heater, Twisted Tape.
energy generated during high-production periods and
1. INTRODUCTION release it when productivity lowers. In reality, a backup
The sun is the lifeblood of everything on the planet. power supply is frequently included as well, in case the
As society progresses, it uses energy in diverse forms amount of energy needed exceeds both the amount
at each stage. The level of development of a country is produced and the amount stored in the container. Solar
determined by its energy consumption per capita. This power for solar thermal power is the most potential of
leads to the more general conclusion that the higher the the unconventional energy sources, based on present
energy consumption per capita, the more developed industrial growth and environmental implications. Solar
the country. There are many different types of energy energy is an endless source of energy that has the
sources that can be classed as conventional or non- potential to meet a major fraction of all nations' future
conventional. However, given the limitations and harmful energy needs while causing the least amount of
nature of conventional sources, transitioning to non- environmental damage. Solar energy for solar thermal
conventional sources is becoming increasingly plants is the most probable of unconventional energy
necessary. Solar energy is a diverse energy source since sources, based on the current industry growth and
solar radiation is available all around the world, is non- environmental implications. Solar energy has been
polluting, and is simple to convert into numerous suggested as a possible alternative energy source for
required forms. There are three roles performed in any the future. The use of solar thermal energy is critical for
solar energy system for space heating: solar energy protecting the environment and traditional energy
collecting, storing, and distributing of that energy (heat) savings. S. Jaisankar et al. [1] investigated a number of
from storage to living area. These three roles are methods for improving the thermal efficiency of solar
performed in different ways by the two major kinds of water heaters. A full assessment of the limits of existing
solar space heating systems - active and passive. research, the research gap, and potential modifications
is also included. One of passive heat transmission

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 795


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

strategies that has been used is twisted tape. Although were alternately put in 18 mm ID and 20 mm ID
it is frequently used in heat exchangers, its use in solar evacuated tubes, with experimental observations taking
water heaters is limited. Anand Patel et al. [2, 3, 4] place every 30 minutes.
published experimental results on a solar water heater
that used helix and serpentine shaped tubing, and a solar
water heater that used phase change material (PCM).
O.P Shukla et al.[5] used CFD to evaluate the
performance of a solar water heater using a flat - plate
solar collector and evacuated tubes having fin tubes. Fig. 1(a) Experimental Set Up
For heating, a flow rate of around 2 litres per minute is
ideal. The heaters should be used intermittently to heat
a batch of water for 15 to 20 minutes, or until efficiency
drops under and then fresh water should be run through
it. Aman Sharma et al.[6] investigated the use of an
evacuated solar water heater in a variety of applications. Fig. 1 (b) Evacuated Tube with Twisted Tape

The efficiency of a single collector tube has been


captured using beam radiation, and it was discovered
that perhaps the incidence angle has a significant impact
on collector efficiency. By emptying the layer between
both the inner and outer tubes, convection loss is
Fig. 1 (c) Right- and Left-Hand twisted Tape
decreased. The influence of phase change materials on
the thermal performance of an evacuated solar water 3. RESULTS AND DISCUSSION
heating system was studied by Jain Pankaj et al. [7]. A In the present experimentation the observations are
possible solution for enhancing plant efficiency is phase taken at interval of 30 min using K type thermocouples
change material. The thermal performance of PCM placed at inlet and outlet of water tank for slow medium
inclusion into storage tanks was greatly improved in and fast flow rate of water. The water flow rate is
terms of energy capacity, processing time within an measured using conventional method of measuring flak
acceptable temperature range, and low DHW system. and stop watch.
2. EXPERIMENTATION 50

In the present work first of all three evacuated tubes


made from 20 mm inner diameter and 40 mm outer 40
diameter glass with 1m length in which twisted tapes A
with right hand side twist are inserted while other set
10
30 B
up of same dimensions twisted tape with left hand side
twist are inserted. All three tubes are connected to a
water tank made of mild steel with a black covering, 20 0
measuring 6" in diameter and 15" in length, from which
cold and hot liquid is recalculated in the systems using Fig. 2 Temperature Variation for Low Flow Rate A: Right hand
twisted tape in Evacuated Tube B: Left hand Twisted tape in
the convective current concept. The thermocouples of Evacuated Tube
the 'K' type are used to monitor the water temperature
at the inlet and output, as well as the temperature of the
human body. The mass flow rate of water is measured
using a measuring flask with a volume of 1000 ml.
Additionally, left- and right-hand pitch twisted tapes

796 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

50 REFERENCES:
1. S. Jaisankar, J. Ananth, S. Thulasic, S.T. Jayasuthakar, K.N.
Sheeba, A comprehensive review on solar water heaters,
40 Renewable and Sustainable Energy Reviews 15 (2011). PP. 3045-
A 3050.

10
2. Anand Patel and Sadanand Namjoshi, "Phase change material
30 B based solar water heater," International Journal of Engineering
Science Invention., vol. 5, no. 8, August 2016. PP. 31-34.
20 0 3. Patel A, Parmar H, Namjoshi S 2016 Comparative thermal
performance studies of serpentine tube solar water heater with
Fig.3 Temperature Variation for Medium Flow Rate straight tube solar water heater. IOSR Journal of Mechanical and
Civil Engineering (IOSR-JMCE) 13, PP. 79-83.
50
4. Anand Patel, Divyesh Patel, Sadananad Namjoshi Thermal
Performance Analysis of Helical Solar Water Heater, International
40 Journal of Innovative Technology and Exploring Engineering
A (IJITEE) ISSN: 2278-3075, Volume-5 Issue-3, August 2015. PP
30 67-69.
B 5. O.P Shukla, Deepanjal Kumar Gupta, Performance Evaluation
20
0 of Solar Water Heater by Using Flat Plate Collector and Evacuated
Tubes with Fin Tube Using CFD, October 2018 IJIRT Volume 5
10 Issue 5 ISSN: 2349-6002.

Fig. 4 Temperature Variation for High Flow Rate 6. Aman Sharma and A. K. Pathak, "Evacuated tube solar collectors
importance and innovations in wide range applications,"
Table 1 Mass Flow Rate of Water for Solar Water Heater International Journal of Scientific and Technical Advancements,
Flow Time Required to fill Flow Rate (lps) Volume 2, Issue 4, PP. 39-44, 2016.
1000ml Flask (s) 7. Jain Pankaj K, Mutalikdesai Sachin V, Bharambe Ganesh P,
Low 735 0.00136 Performance evaluation of evacuated glass tube solar collector
Medium 695 0.00144 with latent heat storage material 2016. IJEDR Volume 4, Issue 3
High 617 0.00162 | ISSN: 2321-9939.

1. From observations it is clear that flow rate is the


influencing factor and at high flow rate the gain in
temperature is low due to less retention time for water.
2. Most interesting observation in the present work is
as the flow direction of water is from left to right and
so in case of left twisted tape inserted in the more
increment in water temperature which may due to
opposite direction of rotation of flow which may cause
more holding period of water inside the tube and more
solar radiation is absorbed by water.

4. CONCLUSION
The most interesting conclusion drawn from the
present work is that the direction of twisted tape highly
influences the temperature gain of water in case of
evacuated tube solar water heater.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 797


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Review: Composite Materials Used in Medical Field


Komma Hema Mahesh Babu1, Dr. K. Prahlada Rao2
1
Research Scholar, Department of Mechanical Engineering, JNTUA,Anantapuramu. A.P., India
2
Professor, Department of Mechanical Engineering, JNTUA, Anantapuramu. A.P., India

Abstract- the word "composite" refers to the implementation of complex medical devices permit
combination, on a macroscopic scale, of two or increased patient survival, significantly improve quality
more materials, different for composition, of life and contribute to increase life expectancy. The
morphology and general physical properties. In word "composite" refers to a heterogeneous
many cases, and depending on the constituent combination, on a macroscopic scale, of two or more
properties, composites can be designed with a view
materials, differing in composition, morphology and
to produce materials with properties tailored to
fulfill specific chemical, physical or mechanical usually physical properties, made to produce specific
requirements. Therefore over the past 40 years physical, chemical and mechanical characteristics. The
the use of composites has progressively increased, combination of different elements results in a material
and today composite materials have many different that maximizes specific properties. The advantage of
applications, i.e., aeronautic, automotive, naval, and composites is therefore that they show the best qualities
so on. Consequently many composite biomaterials of their constituents, and often exhibit some properties
have recently been studied and tested for medical that the single constituents do not have. Moreover,
application. Some of them are currently composite materials allow a flexible design, since their
commercialized for their advantages over structure and properties can be optimized and tailored
traditional materials. Most human tissues such as to specific applications. Different types of composites,
bones, tendons, skin, ligaments, teeth, etc., are
already in use or currently investigated for various
composites, made up of single constituents whose
amount, distribution, morphology and properties biomedical applications, are presented in this paper.
determine the final behavior of the resulting tissue Specific advantages and critical issues related to the
or organ. Man-made composites can, to some use of composite biomaterials versus traditional materials
extent, be used to make prostheses able to mimic are also pointed out.
these biological tissues, to match their mechanical
behavior and to restore the mechanical functions 1. CARDIOVASCULAR APPLICATIONS
of the damaged tissue. Different types of Various congenital or acquired lesions related to the
composites that are already in use or are being heart and blood vessels lead to severe functional diseases
investigated for various biomedical applications are requiring surgical treatments. Cardiovascular devices
presented in this paper. Specific advantages and are therapeutic supports for heart and blood vessels.
critical issues of using composite biomaterials are
Thrombus formation is the most critical issue for
also described (Journal of Applied Biomaterials &
Biomechanics 2003; 1: 3-18)
materials placed in contact with blood and is strongly
dependent on surface characteristics, implantation site,
Keywords: Biomaterial, Composite, duration, local hemodynamics, etc. The development
Biocompatibility, Bio-functionality, Medical device, of a perfect hemocompatible material is still an unsolved
Prosthesis, Implant
problem. At present, composites are not used in clinical
The use of natural or synthetic materials to substitute practice but there are some studies on the possibility to
or integrate body functions or organs, damaged by use these materials as vascular grafts. Porous
traumatic or pathologic events, to assist tissue healing polyethylene terephthalate (PET),
or to correct abnormalities, dates far back to the polytetrafluoroethylene (PTFE) or polyurethane (PU)
beginning of medicine into ancient civilizations. impregnated with collagen or gelatin have been studied.
Therapeutic innovations and the design and
798 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Graft impregnation allows the preclotting procedure to


be avoided which is needed to minimize blood leakage;
it improves the dimensional stability of the graft and
seals the pores. After the collagen and gelatin in vivo
degradation, the porous wall of the graft allows the
ingrowth and firm anchorage of the host tissue to the
material. An arterial prosthesis made of PU fibers and
a mixture of PU and PELA (a copolymer of lactid acid
and polyethylene glycol (PEG)) has been obtained by
filament winding technology . At the time of implantation
the graft is dense preventing any blood loss, but the
matrix is resorbable in vivo, thus resulting in the
formation of a porous wall during the healing process,
that allows the tissue ingrowth into the pores. Fiber
orientation, amount and properties are selected in order
to produce elastic and mechanical properties that closely Fig. 1 - Miniplates made of 40 wt% u-HA reinforced PLLA.

match the properties of the natural vessel. 4. APPLICATIONS IN TISSUE


2. APPLICATIONS IN DENTISTRY ENGINEERING

The hard dental tissues, mainly enamel and dentine, Tissue engineering is an emerging area in medicine
are natural composites made of collagen and involving cells manipulation to promote the regeneration
hydroxyapatite (HA) microcrystals. The use of and healing of defective natural tissues or the
composites materials in dentistry, mainly polymeric development of biological substitutes that restore,
matrix composites, has considerably grown in the last maintain or improve tissue and organ functions. The
years substituting in some cases more traditional combination of natural or synthetic scaf folds with cells
materials. Polymer matrix composites are used in may provide an alternative to both organ transplantation
restorative dentistry to fill cavities, to restore fractured and implantation of mechanical medical devices unable
teeth and to replace missing teeth. to perform all functions of a tissue or an organ.

3. APPLICATIONS IN ORAL AND


MAXILLOFACIAL SURGERY
The most important reasons for oral and maxillofacial
surgery are: replacement of damaged or missing teeth,
replacement of resorbed bone tissue, replacement or
repair of temporomandibular joint and facial bones and
fixation of fractured facial bones.

Fig. 2 - Osteoblasts adhesion on HAPEXTM surface

5. ORTHOPEDIC APPLICATIONS
Orthopedics is the medical area where application
of the biomaterials is highly developed both for
commercialization and research purpose. The use of
composites in orthopedics offers a variety of new

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 799


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

implant design and the possibility to tailor specific device Current applications of composite biomaterials in
properties. Composite materials can reproduce both medicine are still remarkably less than expected a few
the macroscopic and microscopic structure and the most years ago. In many biomedical applications, the research
important mechanical properties of the natural tissues. and the testing of composites has been introduced and
Composites materials are studied and tested to improve highly developed, but only in a very few cases an
the performance and the long-term stability of femoral industrial production and commercial distribution of
stems and bone cement, to replace cartilage, to medical devices partially or entirely made of composites
reconstruct tendons and ligaments and as bone grafts. has started. The use of these materials requires a
complete understanding of the objectives and limitations
involved. The main critical issues are summarized as
follows:
• There are not enough reliable experimental and clinical
data supporting the long-term performance of
composites with respect to monolithic traditional
materials;
• The design of composite materials and components
is far more complex than that of conventional
Fig. 3 - Internal fixation devices made of u-HA reinforced monolithic materials as a consequence of the large
PLLA.
number of additional design variables that must be
considered;
• The available fabrication methods may limit the
possible reinforcement configurations, may be time
consuming, expensive, highly skilled and may require
special cleaning and sterilization processes;
• There are no satisfactory standards yet for the testing
of the biocompatibility of composite implants because
the ways in which the different components of a
composite material interact to control the overall
response to an implant are not completely understood;
• There are no adequate standards for the assessment
Fig. 4 - Commercial artificial ligament explanted because of
of composites fatigue performance because the
fatigue failure and synovitis onset. fatigue behavior of composite materials are far more
complex and difficult to predict than that of traditional
CONCLUSIONS materials.
The use of composite materials for biomedical The mentioned critical issues have to be solved
applications offers many new options and possibilities before widespread commercial use can be made of
for implants design. As a matter of fact, composite composites in biomedical applications. However, the
materials and components can be designed to obtain a future perspectives for the use of composite materials
wide range of mechanical and biological properties. The in medicine are encouraging and promising both in
implant structure and its interactions with the surrounding existing implants, where the use of more flexible materials
tissues can be optimized by varying the constituents, may enhance the prostheses stability, and in other
the type and distribution of the reinforcing phase and important clinical areas where the availability of new
adding coupling agents. materials may allow the development of entirely new
devices or surgical techniques. In any case the success

800 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

of biomaterials research and applications depends on 6. Puckett AD, Fitchie JG, Reynolds SA. Shear bond strengths of
dental composites cured at elevated temperatures. Proceedings
the effective co-operation of clinicians, chemists, of the Biomedical Engineering Conference; 1996; 151-2.
biologists, bioengineers and materials scientists.
7. Schedle A, Franz A, Rausch-Fan X, et al. Cytotoxic effects of
dental composites, adhesive substance, compomers and cements.
REFERENCES Dent Mater 1998; 14: 429-40. 8. Ferracane JL, Condon JR. In
1. Ramakrishna S, Mayer J, Wintermantel E, Leong KW. Biomedical vitro evaluation of the marginal degradation of dental composites
applications of polymer-composite materials: a review. under simulated occlusal loading. Dent Mater 1999; 15: 262-7.
Composites Science and Technology 2001; 1189-224. 9. Sarrett DC, Coletti DP, Peluso AR. The effects of alcoholic
2. Gershon B, Cohn D, Marom G. Compliance and ultimate strength beverages on composite wear. Dent Mater 2000; 16: 62-7.
of composite arterial prostheses. Biomaterials 1992; 13: 38-43. 10. Kinomoto Y, Torii M, Takeshige F, Ebisu S. Comparison of
3. Ensaff H, O'Doherty DM, Jacobsen PH. The influence of the polymerization contraction stresses between self- and light-curing
restoration-tooth interface in light cured composite restorations: composites. J Dent 1999; 27: 383-9.
a finite element analysis. Biomaterials 2001; 22: 3097-103. 11. Sandner B, Baudach S, Davy KWM, Braden M, Clarke RL.
4. Spahl W, Budzikiewicz H, Geurtsen W. Determination of Synthesis of BISGMA derivatives, properties of their polymers
leachable components from four commercial dental composites and composites. J Mater Sci Mater Med 1997; 39-44.
by gas and liquid chromatography/mass spectrometry. J Dentistry 12. Davy KWM, Kalachandra S, Pandain MS, Braden M.
1998; 26: 137-45. Relationship between composite matrix molecular structure and
5. Lovell LG, Lu H, Elliott JE, Stansbury JW, Bowman CN. The properties. Biomaterials 1998; 2007- 14
effect of cure rate on the mechanical properties of dental resins.
Dent Mater 2001; 17: 504-11.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 801


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

802 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Department of Civil Engineering

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 803
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

804 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Approach Towards Sustainability by Employing


Industrial Byproducts
Ashwathi R
Assistant Professor, Department of Civil Engineering, Bannari Amman Institute of Technology.
Email: ashwathisingh@gmail.com

Abstract- Concrete is the most important II. MATERIALS


component used in the construction industry
throughout the world, where the fine aggregate is Ordinary Portland Cement
generally natural sand. The use of sand in Cement is the most important ingredient of concrete.
construction activities results in the excessive
Selection of proper grade and quality of cement is
mining. Due to excessive mining, natural resources
are getting exhausted; results in increase in scour important factors, which play a vital role in this selection
depth and sometimes flood possibility. In order to of the type of cement, are compressive strength at
minimize these environmental issues alternative various stages, fineness and heat of hydration, alkali
materials can be used either replaced partially or content and dry calcium aluminates (C3A) content, the
completely. This paper focuses on identifying the values indicating the compressive strength of standard
best alternative material for fine aggregate. The cement sand mortar cubes in map at 28 days curing
preferable materials employed here are bottom ash, periods.
fly ash and recycled aggregate. This paper indicates
that the partial replacement materials can partially Although all material that go into concrete mix are
(10%, 20%, 30%) replace the fine aggregates essential, cement is very often the most important
without compromising on the properties of the because it is usually the delicate link in the chain. The
cement (M20 grade). function of cement is first of all to bind the stone and
Keywords: bottom ash, fly ash and recycled sand together and second to fill up the voids in between
aggregate sand and stone particles to form a compact mass. It
constitutes only about 20% of the total volume of
I. INTRODUCTION concrete mix; it is the active portion of binding medium
The ultimate objective of this project is to investigate and is the only scientifically controlled ingredient of
the feasibility of using bottom ash in concrete and to concrete. Any variation in it is quantity affect the
determine the optimum value of replacement in compressive strength of concrete mix. Portland cement
concrete. It also aims at developing the compressive refers as (Ordinary Portland Cement) is the most
strength of concrete by partial replacement of fine important type of cement and is a fine powder by
aggregate by using bottom ash without compromising grinding Portland cement clinker. The OPC is classified
the strength and properties of concrete. The materials into three grades namely 33 grade, 43 grade, 53 grade
used for the production of concrete are Ordinary depending upon the strength of 28 days. Generally use
Portland cement, natural fine aggregate, natural coarse of high cement offers many advantages for making
aggregate, Bottom ash and water. Bottom ash is used strong concrete.
as a partial replacement in concrete making. Fine Aggregate
Natural river sand confirming to zone II of IS: 383
were used as fine aggregate. Those fractions from 4.75

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 805
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

mm to 150 microns are termed as fine aggregate. The The incombustible mineral elements stick together
river sand and crushed sand are used in combination until they are heavy enough causes them to remove from
as fine aggregate conforming to the requirements of the bottom of the furnaces either in a wet or dry condition
IS: 383. The river sand is washed and screened, to and is transported to handling areas by conveyor or
eliminate deleterious materials and oversize particles. pipe. It is angular in shape and ranges in colour from a
medium brown or medium grey to almost black.
Coarse Aggregate Bottom ash is much coarser and more highly fused than
The fractions from 20 mm to 4.75 mm are used as fly ash, but has a similar chemical composition to fly
coarse aggregate. To know more about the concrete it ash. It does not have any cementations properties due
is very essential that one should know more about the to its larger sizes.
aggregate which constitute major volume in concrete.
Without the study of the aggregate in depth and range, Treatment of Bottom Ash
the study of the concrete is incomplete. The raw bottom ash is collected from the Waste-
Aggregate are the important constituents in concrete. to-Energy plant and taken to a special reprocessing
They give body of the concrete reduces shrinkage and facility. Ferrous (iron, steel) and non-ferrous metals
effect economic. The coarse aggregate may be of (such as aluminium, copper and zinc) are separated,
following types, and all particles above a certain size are broken down
in a crushing facility. The remaining combustible material
(i) Crushed gravels or stones obtained by crushing of is also removed. Then bottom ash is stored for ageing
gravels or hard stone. in order to improve its quality as a construction material.
(ii) Uncrushed gravels or stones resulting from the
natural disintegration of rocks. Bottom Ash Disposal
(iii)Partially crushed gravel obtained as a product of From the power plant, Bottom ash comes as slurry.
blending of above two types. Slurry can be stored in ash pond by the help slurry
pump and pipes.
The normal maximum size is gradually 10 to 20 mm;
however particles size up to 40mm or more have been Water
used in self compacting concrete. Locally available
Water is an important ingredient of concrete as it
coarse aggregate having the maximum size of 20 mm
actually participates in the chemical reaction with
was used in this work. The aggregates were washed to
cement. Since it helps to from the strength giving cement
remove dust and dirt and were dirt to surface condition.
gel, the quantity and quality of water are required to be
Bottom Ash looked into very carefully. Potable water available in
laboratory was used for mixing and curing the concrete
Bottom ash is a by-product of burning coal at thermal
specimens.
power plants. Bottom ash is formed when ash adheres
as hot particles to the boiler walls, agglomerates and As a general guidance, if the water is fit for drinking
then falls to the base of the furnace at a temperature it is fit for making concrete. However, some water
around 12000C. Hence the term "Bottom Ash" is containing a small sum of salt is not suitable for concrete.
coarse, with grain sizes spanning from sand to gravel, Portable tap water available in laboratory with pH value
granular, incombustible by-product, and solid mineral of 7.0± 1 and conforming to the required of IS: 456-
residue. 2000 was used.
Depending on the boiler furnace types, the bottom The strength of concrete depends mainly from the
ash collected is classified into two types: dry bottom binding action of hydrate cement paste gel. A higher
ash and wet bottom ash (more commonly referred to water - cement ratio or water - binder ratio will decrease
as boiler slag). the strength, durability, water - tightness and other related

806 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

properties of concrete. As per Neville, the quality of


water added should be the minimum required for
chemical reaction of hydrated cement, as any excess
of water good lad end up only in the formation of
undesirable voids (capillary Pores) in the harden cement
concrete paste.
The water used for making concrete should be free
from undesirable salts that may react with cement and
admixtures and reduce their efficiency. The water
available in the campus was used for mixing and curing Split tensile strength
of specimen's locally available portable water The split tensile strength is one of the most significant
conforming to IS 456 is used. properties that considerably affect the size and depth
Water is an important ingredient of concrete us it of cracking in structures. As the concrete is brittle in
chemically participates in the reactions with cement to nature, it is weak in tension and does not counter direct
from the hydration product, C-S-H gel. The strength tension. So, when tensile forces exceed its tensile
concrete depends mainly from the binding action of the strength cracks develop.
hydrated cement paste gel. Quality of water is required
to be looked very carefully. The water used for making
concrete should be free from undesirable salts that may
react with cement and admixtures and reduce their
efficiency.
HSC mix considerations, it is important to have the
compatibility between the given cement and chemical
and mineral admixtures along with the water used for
mixing. HSC with its high content of cementitious
material susceptible to a rapid loss of workability on
Flexural strength
account of high amount of heat of hydration is generated.
The flexural strength of concrete is employed in
III. TESTS AND DISCUSSIONS resisting compressive stress. The dimension of the beam
Compressive strength the pattern of loads has a significant impact one the
value of modulus of rupture. The flexural strength of
One of the most prominent and useful properties of concrete with 0%, 15%, 25% and 30% of replacements
concrete is its compressive strength which depends on were determined as per I.S. 516-1959.
various factors such as water-cement ratio, quality of
materials used, quality control during production of
concrete etc,. Concrete is strong in compression and
thereby used to resist compressive stress in the
structure. The compressive strength test on concrete is
carried out to measure the properties of the
compressive strength.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 807
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

IV. CONCLUSIONS [6] Aswathy P.U, Mathews M. Paul "Behaviour of Self Compacting
Concrete by Partial Replacement of Fine Aggregate with Coal
• From the research work carried over the strength Bottom Ash" International Journal of Innovative Research in
and durability of concrete, the following observations Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 10,
Volume 2 (October 2015), 45-52.
are made:
[7] P. Bhuvaneshwari and R. Murali "Strength Characteristics of
• The CBA is a low cost available industrial solid waste Glass Fibre on Bottom Ash Based Concrete" International Journal
which on incorporation with concrete helps in attaining of Science, Environment and Technology, Vol. 2, No 1, 2013, 90
strength, thereby paving way for an eco-friendly - 102.
environment. From the results, it's been inferred that [8] Govindarajan D, Keerthana M, Kumara raja G, Prasanna Kumar
25% replacement of CBA is found to be expedient. R "Experimental Investigation on Replacement of Fine Aggregate
with Bottom Ash in Concrete" International Journal of ChemTech
Therefore the optimum percentage is found to be
Research CODEN (USA): IJCRGG ISSN : 0974-4290 Vol.6,
25%. The durability properties also show optimal No.14, pp 5570-5574, Nov-Dec 2014.
results which help in indulging CBA in concrete.
[9] Jumah Jessica Jaleel V, Maya T M "Influence of Metakaolin on
Concrete Containing Bottom Ash as Fine Aggregate" International
Journal of Research in Advent Technology (E-ISSN: 2321-9637)
Special Issue International Conference on Technological
Advancements in Structures and Construction "TASC- 15", 10-
11 June 2015, 41-46.
[10]M. P. Kadam et al. "Effect of coal bottom ash as sand replacement
on the properties of concrete with different w/c ratio" International
Journal of Advanced Technology in Civil Engineering, ISSN:
2231-5721, Volume-2, Issue-1, 2013.
[11]M.P. Kadam and Y.D. Patil, "Effect of Coal Bottom Ash as Sand
Replacement on the properties of Concrete with different W/C
ratio", International Journal of Advanced Technology in Civil
Engineering, ISSN: 2231-5721, Volume 2, Issue 1, 2013, pp.45-
50.
REFERENCES
[12]Keppert, M., Pavlik, Z., Cerny, R., and Reiterman, P., Properties
[1] Abdus Salaam Cadersa, Jaylina Rana, Toolseeram Ramjeawon of Concrete with Municipal Solid Waste Incinerator Bottom Ash,
"Assessing the Durability of Coal Bottom Ash as Aggregate IACSIT Coimbatore Conferences, 2012, Vol. 28
Replacement in Low Strength Concrete", Journal of Emerging
[13]Kiran M, Sannakki & Sanjith J "Experimental Studies on
Trends in Engineering and Applied Sciences (JETEAS), (ISSN:
Replacement of Fine Aggregates by Bottom Ash for Developing
2141-7016) 5(5): 344-349 (2014).
High Strength Concrete" IMPACT: International Journal of
[2] Abhishek Sachdeva, Gobind Khurana "Strength Evaluation of Research in Engineering & Technology (IMPACT: IJRET)
Cement Concrete Using Bottom Ash as a Partial Replacement of ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 12, Dec.
Fine Aggregates" International Journal of Science, Engineering 2015, 45-48
and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-
[14]Dr.R.Madheswaran, M.Bharath, M.Anjali devi "Utilisation of
4098, ISSN (Print): 2395- 4752.
Pond Ash as Fine Aggregate" International Research Journal in
[3] Aditya Verma, Abhishek Kumar, Ashish Mishra, Arjit Verma Advanced Engineering And Technology (IRJAET) E - ISSN: 2454-
"Utilization of Pond Ash as Partial Replacement of Cement 4752 P - ISSN : 2454-4744 VOL 3 ISSUE 3 (2017) PAGES 2500
Concrete Mix" International Research Journal of Engineering and - 2503 RECEIVED : 25.05.2017 PUBLISHED : 19.06.2017.
Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 |
[15]Mahapara Abbas, Ravi Kumar, Dinesh Kumar "Study The Effect
Mar-2016 www.irjet.net p-ISSN: 2395-0072, pages: 511-515.
of Coal Bottom Ash And Limestone Dust as Partial Replacement
[4] P. Aggarwal, Y. Aggarwal, S. M.Gupta "Effect of bottom ash as of Sand and Cement" International Journal of Scientific Research
replacement of fine aggregates in concrete" Asian Journal of Civil and Education (IJSAE),Volume||4||Issue||05||May-2016||Pages-
Engineering (building and housing) vol. 8, no. 1 (2007), PAGES 53635372||ISSN(e):2321-7545.
49-62.
[5] Arumugam K, Ilangovan R, James Manohar D "A study on
characterization and use of Pond Ash as fine aggregate in Concrete"
International Journal of Civil And Structural Engineering Volume
2, No 2, 2011, 466-474.

808 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Experimental Investigation on Cement Concrete with


Partial Replacement of Sand by Waste Granite Powder
S.Ramprasath1, M.Gurusamy2
1
Assistant Professor, Department of Civil Engineering, Vemu Institute of Technology, Chittoor, Andhra Pradesh, India.
2
Research Scholar, Department of Civil & Structural Engineering,Annamalai University, Chidambaram, Cuddalore,
Tamilnadu, India.

Abstract-In modern days concrete made with resources are used more with small amount of support
cement is probably the most widely used artificial and the general conditions is kept safe from waste
material in the world. Despite this fact, concrete money put in bank. It is put a value on that stone-like
production is one of the concerns worldwide that paste producing is responsible for about 3% of the
impact the environment with a huge impact being complete anthrogenicgreenhouse gas emission and for
global warming due to carbon dioxide emission
5.25% of the complete anthrogenic CO2 emission. As
during the production of portland cement. On the
other hand, when industrial wastes are recycled or
about 50.48% of the CO2 given out during stone like
reused, Carbon dioxide(CO 2 ) emissions are building paste producing is related to the breakdown
reduced and a small amount of material is dumped of limestone during burning,mixing is taken into account
in a landfill and natural resources are saved. as a very working well way to get changed to other
Therefore an attempt is made to replace the cement from CO2 emission.
with granite powder in concrete. In this study, the
The move-forward of common building material
possibility of using granite powder with cement on
technology can get changed to other form the using up
the performance of fresh and hardened concrete.
In this experimental study, granite powder is used of natural resources and powder for a given time starting
in concrete as cementitious material a partial points and make less the weight down of pollutants on
replacement of cement. The replacement of cement general condition. Presently greatly sized amounts of
was made by the level of 6%, 12%, and 20% by granite powder are produced in natural stone processing
weight of cement. For each replacement, a plants with an important force of meeting blow on
compressive strength test was conducted. general condition and humans. This undertaking gives
Compressive strength after 7days, 14days, and 28 a detailed account of the able to be done of using the
days curing was done. From the test results, it was granite thick, soft, wet mix of the liquid and solid parts
found that concrete at the level of 20% partial dust in common building materials producing as not
replacement of cement with granite powder had complete, in the part putting in place of stone-like
better workability and strength of 14 days and 28
building paste.
days curing. The granite powder is available easily
and is free of cost. So it seems to be economical. In India, the granite and granite stone processing is
Keywords- Artificial materials, Global warming, one of the most getting on well industry the effect if
Granite powder. changing granite dust what is in on the physical and
machine-like properties of newly produced and
I. INTRODUCTION hardened common building material have been made
Going away from the waste materials to the general observation. Most common materials used in stone-
condition directly can cause conditions hard question like building paste producing added in plant or sites are
for this reason the use again of waste material has been to do with industry wastes. This is because of, in relation
emphasized. Waste can be used to produce new to the fact that making use of again to do with industry
products or can be used as admixtuires so that natural wastes as mixing materials has special to some science

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 809
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

or trade, money-related and conditions benefits in K. ShyamPrakash and Ch. HanumanthaRao , et.
addition to the moving a lower level of co2 emission al, results of experimental investigations conducted, it
from stone-like building paste producing granite powder is concluded that the quarry dust can be used as a
which is a side-effect of granite processing building in replacement for fine aggregate. It is found that 40%
which goods are made was studied by many persons replacement of fine aggregate by quarry dust gives
making observations for its use in common building maximum result in strength than normal concrete and
material and army fighting device producing as sand then decreases from 50%. The compressive strength is
giving another in place of or stone-like building paste quantified for varying percentage and grades of
giving another in place of material. concrete by replacement of sand with quarry
Granite power is obtained from the crusher units in dust.Ravindra Nagar, VinayAgrawal, AdityaRana,
the form of finer fraction. The highest compressive AnshumanTiwari, et. al, study investigates the feasibility
strength was achieved in samples containing 40% of using granite cutting waste (GCW) as a partial
granite power. This is a physical mechanism owing to substitute of river sand in high strength concrete based
its spherical shape and very small in size. granite powder on strength, durability& micro structural attributes at
dispenses easily in presence of superplasticizer and fills 0.30, 0.35 and 0.40 water cement ratios (w/c) by
the voids between the quarry sand, resulting in a well substituting 0%, 10%, 25%, 40%, 55% and 70% river
packed concrete mix .Granite power can be used filter sand by GCW suggested that 25-40% river sand can
as it helps to reduce the total voids content in concrete. be substituted by the GCW with a favourable influence
Granite powder and quarry rock dust improve on the investigated parameters. The optimum amount
pozzolanic reaction .The quarry rock dust and granite of GCW to be used in concrete depends significantly
powder can be used as 100%substitutes for natural upon water-cement ratio of concrete.Pradeep K. Goyal
sand in concrete .The compressive split tensile and et. al study is conducted to investigate the viable use of
durability studies of concrete made of quarry rock dust marble granite residue (MGR) in concrete mixes. Sand
nearly 15% more than the conventional concrete. The is replaced with GD along with cement (OPC grade
concrete resistance to sulphate attack was enhanced 43) is replaced with MP as 0%, 10%, 20%, 30% &
greatly. 40% by weight for M25 grade of concrete.

The combination of pozzloanic and filler action leads Joseph O. et al., (2012) concluded that the flexural
to increase in compressive and split tensile strengths, and tensile strength properties were found to compare
reduction in bleeding and segregation of fresh concrete, closely with those for normal concrete. Hence, concrete
reduction in permeability, reduction in alkali silica with mixtures of lateritic sand and quarry dust can be
reaction, reduction in sulphate attack, chemical attack used for structural construction provided the proportion
and corrosion attack, leading to increased durability of lateritic sand content is kept below 50%. Both flexural
and reduction in heat of hydration. From the test, specific and tensile strengths were found to increase with
gravity of the fine aggregate 2.65 was obtained. increase in laterite content. Further work is required to
get data for long-term deformation characteristics and
Granite powder can be used as filler as it helps to other structural properties of the experimental concrete.
reduce the total voids content in concrete. Granite These include: shear strength, durability, resistance to
powder and quarry rock dust improve pozzolanic impact, creep, etc. Also, it may be necessary to
reaction. The quarry rock dust and granite powder can investigate the optimum contents of lateritic sand and
be used as 100% substitutes for natural sand in quarry dust in relation to the structural properties of the
concrete. The compressive, split tensile and durability concrete. These will assist engineers, builders and
studies of concrete made of quarry rock dust nearly designers when using the materials for construction
15% more than the conventional concrete. The concrete works.
resistance to sulphate attack was enhanced greatly.

810 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. MIX DESIGN


Based on the physical properties of material and
tested as per IS: 4031-1996, IS: 383-1970, M20
grade concrete mix was designed as per IS: 10262-
2009.Mix proportion and its details are shown in table
2 and 3.
Characteristics compressive strength required in the
field at 28 days = 20Mpa
Maximum size of aggregate (angular) = 20 mm
Figure1. Waste Granite Powder
Degree of workability (compaction factor) = 0.90
Table.1 Physical Properties of Granite Powder
Degree of quality control = Good
S.No Specification Values
Specific Type of exposure = Mild
1 2.77-2.82
gravity(g/cc) Specific gravity of cement = 3.159
2 Density (Ibs/ft3) 166.5
3 Melting point (°F) Approx 3,000 Specific gravity of coarse aggregate = 2.70
4 Solubility in water Insoluble Specific gravity of fine aggregate = 2.631
5 Boiling point (°F) Approx 4,000 Water absorption of coarse aggregate = 1.8%
Black and white
Oder and Water absorption of fine aggregate = 1%
6 speckled rock no
Appearance
odder Free moisture of coarse aggregate = 0 %
7 Mohrs Hardness 7.0
Free moisture of fine aggregate = 2%
8 Vapor Pressure None
Table 2. Mix Proportion
Thermal
9 ~ 2.2 Water Cement Fine Aggregate Coarse Aggregate
Conductivity (K)
0.55 1 1.55 3.18
10 Particle Shape Irregular
Table 3. Details of Mix Proportioning
11 Color Pink, light gray,
dark gray Mix Details of mixing
O 1: 1.55: 3.18: 0.55
II. MATERIALS USED WGP1 R – 5% Cement+ 6% Granite p owder
WGP2 R – 10% Cement+ 12% Granite po wder
1. Cement-ULTRATECH brand, OPC 53 grade cement WGP3 R – 20% Cement+ 20% Granite po wder
was used.
IV. TESTS CONDUCTED
2. Fine Aggregate-River sand from kollidam river bed
were used. Workability test and strength test were conducted
3. Coarse Aggregate-Hard blue granite of size 20 mm for fresh concrete and compressive strength test was
and 12.5mm was used. The aggregate is in the shape conducted for 7 days 14 days and 28 days curing.
of angular.
V. TEST RESULT AND DISCUSSION
4. Water-The tap water having the pH value satisfying
the I.S.CODE was used. A. Slump Cone Results
5. Granite powder-Granite dust powder obtained from From the slump cone and compaction test results
the Granite factory at Mannargudi. shown in table 4, it is found that GD3 has higher slump
and compaction factor values.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 811
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 4.Slump and Compaction Factor values should be followed.


Mix Slump value in “mm” Compaction Factor 4. From the compression test results it is found that the
O 54 0.920
concrete mix with 20% replacement of cement with
WGP1 74 0.955
WGP2 57 0.928 Granite Dust Powder shows the higher compressive
WGP3 51 0.920 strength than the Reference concrete mix for both 7
days and 28 days curing.
B. Compressive Strength
5. From the experimental analysis, it is concluded that
Compressive strength of each concrete cube casted WPG3 mix, which is 20% replacement of Granite
for 7days and 28 days curing are given in the table5. Dust Powder, is found to be the most preferable one
Tests were conducted as per IS: 516-1999. when compared with other mixes by analyzing its
Compressive strength for reference concrete is 18.50 Compressive strength, Workability and Cost. It is
and 30.33 N/mm2. On referring table 5 it is found that recommended as favourable mix for both Structural
and Non- Structural applications.
concrete mix WGP3 has highest compressive strength
for 7 and 28 days cured concrete mix. REFERENCES
Table 5. Compressive Strength N/mm² [1] Felixkala T. and Partheeban P., "Granite powder concrete", Indian
Journal of Science and Technology Vol. 3 No. 3 (Mar 2010),pp.
Mix Strength after 7 Strength after 28
311-317
days curing N/mm² days curing N/mm²
O 18.50 30.33 [2] Nagabhushana and H. Sharadabai, ( Aug. 2011 ), " Use of Crushed
WGP1 23 35.60 Rock Powder as Replacement of Fine Aggregate in Mortar &
WGP2 32.44 37.50 Concrete", Indian Journal of Science and Technology.
WGP3 35.40 41.66 [3] Ali Ergun (2011), "Effects of the usage of diatomic and waste
granite powder as partial replacement of cement on the mechanical
50 properties of concrete", Construction and Building Materials
NORMAL
40 CONCRETE [4] Joseph O. Ukpata and Maurice E. Ephraim, "Flexural and strength
30 REPLACEMENT properties of Concrete using lateritic sand and quarry dust as
20 OF 6% WGP fine aggregate", ARPNJournal of Engineering and Applied
10 Sciences, vol. 7, no. 3, march 2012, pp. 324-331
REPLACEMENT
0 OF 12% WGP [5] IS: 383-1970, "Indian Standard Specification for Coarse and Fine
7 DAYS 14 28 Aggregate for Natural Sources for Concrete," Bureau of Indian
REPLACEMENT
DAYS DAYS Standards, New Delhi, Second revision, Feb. 1997.
OF 20% WGP
[6] IS: 516-1999,"Indian Standard Specification for method of test
Figure2. Graphical representation ofCompression test for Strength of Concrete of Test" Bureau of Indian Standards,
ResultsWaste Granite Powder Comparative New Delhi.
Conventionalconcrete.
[7] IS: 10262-2009,"Indian Standard Specification for Concrete Mix
VI. CONCLUSION Proportioning Guidelines" Bureau of Indian Standards, New Delhi,
2009.
From the experimental test results, Granite dust [8] IS: 4031[PT1]-1996,"Indian Standard Specification for Physical
powder found to be better performance in workability Test for Hydraulic Cement-Determination of Compressive
and strength properties. Strength, Bureau of Indian Standards, New Delhi.

1. The analysis of experimental data showed the reaction


of with granite powder in concrete improved
thestrength.
2. The disposal of granite powder should be maintained
properly due to its unpozzolonicproperty.
3. In this the effective use of granite powder can be
reduced the hazardness to the environment. At the
same, theeconomical utilization of granite powder

812 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Analysis and Design of Apartment Building Using


Software's
Sai Revanth1, D.Manoj2
1,2
Civil Department, Kamala Institute of Technology and Science, Karimnagar, Telangana, India
Email: sairevanthsabbani@gmail.com1, manohbx@gmail.com2

Abstract- STADD.pro and ETABS are the I. INTRODUCTION


present-day leading design software's in the
market. Many design Companies using this
Modern day computer software STAAD.pro have
ultimate encoded software. This project mainly reduced the task of the engineers to a great extent. Even
deals with the virtual analysis of the results the most sophisticated analysis is performed within a
obtained commencing the design of concrete frame very short time. Assumptions and approximations in
multi- story structure when designed using STAAD analysis have been considerably reduced. Every element
and ETABS software's separately. The design is scanned at a large number of points to determine the
involves load calculations and analyzing the whole worst stresses developed in it and designed accordingly
structure. The design methods used in STAAD.pro to satisfy the strength requirements. The serviceability
and ETABS analysis are Limit State Design requirements are also checked by the software. Without
conforming to Indian Standard Code of Practice. the knowledge of STAAD.pro it will practically
The main aim of structural engineer is to design a
impossible for the new generation budding engineers
safe and economical structure using technologies,
so that a structural engineer dares to tackle much
to gain a foothold in the industry.
more complex and large structures to design. Though there are various other structural design
STAAD.pro features a state-of-the art user software like E-Tabs, SAP, ROBOT, S-Frame etc.,
interface, visualization tools, and powerful analysis and STAAD.pro stands apart from the rest for its USP
and design engines with dynamic analysis and versatility. It has been 20 years since this particular
capabilities. From model generation, analysis and
software was first introduced in the market by Research
design to visualization and result verification,
EngineersInternational, USA which later was bought
STAAD.pro is the professional's choice. ETABS
is also a leading design software in present days by Bentley Systems. The word STAAD.pro is the
used by many structural designers. Here we had abbreviation for Structural Analysis and Design and it
also analyzed a regular structure using ETABS thoroughly complies with all the norms and regulations
software for the design. The dead load, live load, of ISO 9001 certification.
wind load and seismic loads are applied along with It is a vital software application through Finite
different load combinations. Concrete and
Element Method Analysis (FEM) that allows structural
reinforcement design are also obtained by using
this software. The detailing for beams, columns, engineers to fulfill their job done with massive speed
slab and footing is obtained in STAAD RCDC, Shear and high accuracy. Some of the top firms in the world
force, bending moment and displacement diagrams including structural consultants, engineering colleges use
are obtained safe within permissible limits. Staad Pro. Could you imagine how a 10-storied building
Similarly, calculations were done in ETABS software which at least took a month to analyze (leave the design
and the reinforcement percentage results are part) could be completed in 10 minutes. Building
compared between STAAD.pro and ETABS. construction in the engineering deals with the
Keywords-limit state method, Staadpro, construction of building such as residential houses. A
Etabs.staad Rcdc.) building or edifice is a structure with a roof and walls
standing more or less permanently in one place, such

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 813
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

as a house or factory. Buildings come in a variety of a really reasonable bundle for, Multi-storied building
sizes, shapes, and functions, and have been adopted investigation. The whole input information may be
throughout history for a wide number of factors, from produced either graphically or by writing simple English
building materials available, to weather conditions, to language based commands. It is prepared with the
land prices, ground conditions, specific uses and sophisticated algorithms and state of the craftsmanship
aesthetic reasons. illustrations, dwelling in an amazingly user-friendly
In ancient times, the buildings were not properly environment.
designed according to their requirements because of In this project the analysis and design of G+5
unavailability of good materials and no proper guidelines residential apartment building was designed. The plot
were there for how to use material for different purposes dimensions are 70 x 50 sq. ft contains five floors with
and what strength being required to support various parking in ground floor and each flat occupies an area
load. In that time no codes are available to check various of 1575 Sq.ft. It is residential complex, firstly; Plan is
conditions that prevail after the construction of buildings drafted in AutoCAD software and later it was imported
for various load combinations that's why the buildings in STAAD.pro software and structure generated by
were collapse after sometime due to seismic or wind giving geometric inputs and later applying the member
loads. To avoid this, we need to design a structure properties as per the code provisions and providing
properly. The aim of design the achievement of an support to structure and modelling is done. The dead
acceptable probability that structures being designed load, live load, wind load and seismic loads are applied
will perform satisfactory during their intended life. With and also different load combinations are applied and
an appropriate degree of safety, they should sustain all concrete and reinforcement detailing are also done by
the loads and deformations of normal construction and using this software the design for beams, columns, slab
have adequate durability and adequate resistance to and footing is obtained in STAAD.pro, Shear force,
the effects of seismic and wind. Structure and structural bending moment and displacement diagrams are
elements shall normally be designed by Limit State obtained safe within permissible limits. Similarly,
Method. Account should be taken of accepted theories, calculations were done in ETABS software and
experiment and experience and the need to design for compared the reinforcement percentage results between
durability. Calculations alone do not produce safe, STAAD.pro and ETABS.
serviceability and durable structures. Suitable materials,
quality control, adequate detailing and good supervision II. LITERATURE REVIEW
are equally important. To perform an accurate analysis TejavatVenkatesh et.al (2017), designed and
a structural engineer must determine such information analyzed a hospital building for seismic and wind forces.
as structural loads, geometry, support conditions, and The building was analysed for the reactions toward wind
materials properties. The results of such an analysis forces by using STAAD.Pro and earthquake loads were
typically include support reactions, stress and analyzed by Equivalent static method with base shear
displacements. The informationis then compared to criteria. The G+4 structure was analyzed for structural
criteria that indicate the conditions of failure. Advance stability towards considered forces
structural analysis an examine dynamic response, Aman md et al., (2011) The analysis and design of
stability and non- linear behavior. C+G+5 residential cum commercial building based on
Etabs is a stand-alone basic analysis program with the criteria defined by the IS codes on Stadd.Pro
a special reason highlights for structural plan and software. The load imposed were only dead and live
investigation of building frameworks. ETABS is simple load hence the load combination generated was
to utilize and user-friendly and it is unique in its capacity 1.5(D.L. + L.L.) after which the analysis of the building
to address the total range of tasks included within the was done for the Frame and the resulting Bending
process of structure investigation and plan. ETABS is moments and shear forces were studied. The detail of

814 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

all the building members was represented along with STAAD.Pro is more flexible when compared to
the functions of slab, beam, column, footing and ETABS software in terms of analysis of structure
staircase. From which it was concluded that the
horizontal deflections were within 20mm and the III. METHODOLOGY
structure was safe and economical. And not much
difference was obtained between the results from Kani's
method and Stadd.Pro
Anoop. A, et al., (2016) A project to design a G+5
floor structure at Kalakode, 4km from Paravoor. The
planning of the building was done using the software
Revit 2011 with the help of AutoCAD 2014, and the
structural analysis was done in Stadd.Pro.V8i The
project considered the load cases on basis of the Indian
standard codes IS1893:2002 for seismic load, IS 875
Part 3 for wind loads, IS 875 Part 1 for deadloads and
Part 2 for live loads. The combinations of these loads
were generated on the basis of IS 875 Part 5. And the
design was done on the basis of IS 456:2000. After
analysis, it was concluded that the graphical input
generation provided by Stadd. Pro allows the generation
of a graphical model of the structure IV. STATEMENT OF PROJECT
D. R. Deshmukh et.al (2016) Analysis and design Utility of building : Residential purpose
of G+19 Story building using Staad.ProThe design was • No: of floors : G+5
based on Indian Standards on Staad. Pro and was then
compared with respect to the one, made from the manual • Type of construction : RCC frame structure
calculation. The design loads considered were dead • Type of walls : Brick wall
load, live load, seismic load and wind load and were
• Concrete grade : M25
calculated on the basis of Indian Standards. It was seen
that the load was maximum when applied in the x- • Grade of steel : Fe 500
direction (parallel to shorter span) and the deflection • Bearing capacity of soil : 200KN/m2
increases as the height of building increases. The data
regarding take off for material was provided. The results V. GEOMETRIC PARAMETERS
obtained for base shear was 5% more in the case of • Beam = 0.305 m X 0.305 m
Stadd.Pro as compared to manually. It was concluded
• Column = 0.305 m X 0.46 m
in the study that Stadd.Pro is versatile software which
can be used to analyse a building and compute • Slab = 0.125 m
reinforcement. • Wall thickness = 0.230 m
D. Ramya et.al, (2015) compared the design and • Floor height = 3.048 m
analysis over a multi-storey G+10 building with • Riser = 0.150 m
STAAD.Pro and ETABS softwares. The basic wind
speed for this study was taken as 33.0 m/s and the • Thread = 0.280 m
shear force and bendingmoment over each of the • No: of columns = 168
component of the building was calculated for different • No: of beams = 271
combination of loads. This study shows that
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 815
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• No: of slabs = 90 VI. MODELLING IN STAADPRO


• No: of footings =24
A. FLOOR PLAN

A. Advantages of STAADPRO

B. CENTERLINE DIAGRAM 1. Easy to use interface,


2. Conformation with the Indian Standard Codes
3. Versatile nature of solving any type of problem
4. Accuracy of the solution

816 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VII. MODELLING IN ETABS importance factor and nature and type of soil in that
area loads are generated.
All loads are designed in with accordance with IS-
1893- Part (1) (2002).

Fig No.1 Earth quake load in X direction.

Fig No.2 Earthquake load in Z -direction

B. Wind load
The structure located in Hyderabad town was
B. Advantages of ETABS associated to self weight or dead load and the Intensities
1. Load combination as per your defined building code of wind loads were generated by taking into account
creates automatically; you do not need to define them the known wind intensities at diverse elevations and
individually which saves lots of time. firmly follow by the specifications of IS 875: part iii
2. Automatic creation of Earthquake and Wind load (1987). Wind speed is taken as 44 m/s in zone
saves lots of time to calculate them manually and
assign them in the 3D Mode
3. Different view options of the 3D model including a
plan view, any side elevation view, and also
customization view created by the modeler.
4. ETABS allows users for Graphic input and
modification. Using these features this software
ensures easy and quick model creation for any type Fig No.3 Wind load in+X-direction

of structure.

VIII. LOADS CONSIDERED


A. Earthquakes
The earthquake loads are applied in X- direction
and in Z-direction these loads stimulates thebuilding as
in Actual condition during earth quake. Select the type Fig No.4 Wind load in -X direction
of structure as per Hyderabad zone and select the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 817
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig No.5 Wind load in + Z direction. Fig No.9 Inner wall load=5.41 KN/m

Fig No.6 Wind load in -Z direction Fig No.10 Outer wall load = 10.83KN/m

C. Deadload
All the permanent structures of building form dead
loads comprise of the weights of walls, and partitions
floor finishes, false ceilings, false floors and the other.
Permanent constructions in the buildings. The dead load
loads may be calculated from the dimensions of various
members and their unit weights. As per IS 875:1987 Fig No.11 Parapet wall load = 2.07KN/m

part 1 D. Liveload
Live load is produced by the intended use or
occupancy of a building including the weight of movable
partitions, distributed and concentrated loads, load due
to impact and vibration and dust loads. As per IS
875:1987 part 2 (cl 2.8) Live load =2.5 KN/m2.

Fig No.7 Add self-weight =1KN/m

FIG NO 12 Liveload=2.5kn/m
E. Load combinations
1. 1.5DL +1.5LL
Fig No.8 Plate load = 4.15KN/m
2. 1.2DL+1.2LL+1.2WX
3. 1.2DL+1.2LL+1.2WZ
4. 1.2DL+1.2LL-1.20WX

818 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

5. 1.2DL+1.2LL-1.2WZ B. Column reinforcement detailing


6. 1.2DL+1.2LL+1.2EQX
7. 1.2DL+1.2LL+1.2EQZ
8. 1.2DL+1.2LL-1.2EQX
9. 1.2DL+1.2LL-1.2EQZ
10. 1.5DL+1.5WX
11. 1.5DL+1.5WX
12. 1.5DL-1.5WX
13. 1.5DL-1.5WZ
14. 1.5DL+1.5EQX
FIG NO 14.DETAILING OF COLUMN
15. 1.5DL+1.5EQZ
C. Slab reinforcement detailing
16. 1.5DL-1.5EQX
17. 1.5DL-1.5EQZ
18. 0.9DL-1.5EQZ
19. 0.9DL+1.5EQZ
20. 0.9DL-1.5EQX
21. 0.9DL-1.5EQZ
IX. REINFORCEMENT DETAILING OF
BEAM BY RCDC
A. Beam reinforcement detailing

FIG NO 15 DETAILING OF SLAB

FIG NO.13 DETAILING SECTION OF BEAM

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 819
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

D. Footing reinforcement detailing

Fig No 16 Footing reinforcement detailing

FIG NO 17 SHEARFORCE IN ETABS

Fig No 18 BENDINGMOMENT IN ETABS

Fig No 19 BENDINGMOMENT IN ETABS

FIG NO 20 BENDINGMOMENT IN ETABS

820 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

ETABS BEAM RESULTS

Fig No 21 DISPLACEMENT IN STAADPRO

X. RESULTS AND DISCUSSION


STAADPRO COLUMN RESULTS
• The percentage area of steel of beam in ETABS is
less as compared to STAAD.pro
• Percentage area of steel of column in STAAD.pro is
less as compared to ETABS.
• STAAD.pro is often utilized for general purposes.
• ETABS is most utilized for high rise projects.
• ETABS has more user-friendly input options to ETABS COLUMN RESULTS
generate the complex high rise structures model,
whereas in STAAD.pro it's difficult to model
discretely.
• Based on overall analysis and design we conclude
that ETABS is economical over STAAD.pro.
• It has observed that when a G+5 Multi storied high
rise structure with same beam and column dimensions
analyzed and designed for loads using both the
software's, there are many similarities and flexibility S.No Description % area of %area of
occurs in one another. The structure analysis of all steel in steel in
the frames models that includes different loading STAADPRO ETABS
conditions on beams, and columns has been done by 1 Beam 1.94% 1.90%
2 Column 1.29% 1.63%
using software's STAAD.pro and ETABS. The
parameters which are to be studied are shear forces, Comparative results between STAAD.pro and
bending moments and deflections as shown in above ETABS
figures. And the points resulted are as follows.
XI. CONCLUSION
STAADPRO BEAM RESULTS
• STAAD.pro and ETABS has the capability to
calculate the reinforcement needed for any concrete
section.
• The project contains a number of parameters which
are designed as per IS:456: 2000.The project helped
to gain knowledge about the software package
STAAD.RCDC and ETABS software.
• All the results of analysis and design are found to be
safe. The limit state method of design is used for
design of all components.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 821
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Based on overall analysis and design we conclude [7] SP 16 (1978): Design Aids for Reinforced Concrete to IS 456:1978
IS Code Book (Indian Standards).
that ETABS gives less percentage area of Steel than
STAAD.pro. [8] Aman, ManjunathNalwadgi, Vishal T, Gajendra, "Analysis and
design of the multistorey building by using STAAD
• It doesn't involve manual calculations hence it saves Pro",International Research Journal of Engineering and
time and increase efficiency. Technology (IRJET), Pg. 887-891, Volume: 03 Issue: 06, June-
2016.
XII. REFERENCES [9] Anoop. A FousiyaHussian, Neeraja.R, Rahul Chandran,
Shabina.S, Varsha.S, "Planning Analysis and Design of Multi
[1] IS 456: 2000 Code of practice for plain and reinforced concrete
Storied Building by Staad.Pro.v8i", International Journal of
[2] IS 875: 1987 (part 1) Code of practice for design loads (other Scientific & Engineering Research, Volume 7, Issue 4, April2016.
than earthquake) for building and structures part 1 Dead loads-
[10]D.R. Deshmukh, A.K. Yadav, S. N Supekar, A. B. Thakur, H. P
unit weights of building material and stored materials.
Sonawane, I. M. Jain, "Analysis and Design of G+19 Storied
[3] IS 875: 1987 (part 2) Code of practice for design loads (other Building Using Staad-Pro", Pg. 17-19, ISSN: 2248-9622, Vol. 6,
than earthquake) for building and structures: Imposed loads Issue 7, (Part-1) July 2016
[4] IS 875: 1987 (part 3) Code of practice for design loads (other [11]Tejavatvenkatesh ,md.Subhan "Design and analysis earthquake
thanearthquake) for building and structures: Wind loads. resistant hospital building"International journal of
research,volume 4, pg.no:10 (2017).
[5] IS: 875 (Part 5) - 1987 for Load Combinations, Indian Standard
Code of Practice for design Loads (Other Than Earthquake) For [12]D.Ramya, A.V.S.Sai Kumar "Comparative Study on Design and
Buildings and Structures. Analysis of Multistoreyed" 4(10), 125- 130, IJESRT, Oct 2015.
[6] SP 34 1987 Hand book on concrete reinforcement and detailing
by bureau of Indian standards.

822 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Durability Study on Fly Ash Aggregate Concrete with


Respect to Carbonation Test
Parthiban P1, S.Gunasekar2, Anju M J3
1,3
Department of Civil Engineering, Jyothi Engineering College, Thrissur, Kerala, India
2
Department of Civil Engineering, K.S. Rangasamy College of Technology Tiruchengode, India
Email: parthichevaux@gmail.com1, guna.skr87@gmail.com2, anjumj@jecc.ac.in3

Abstract- In this project, the durability of track the importance and impact of coarse aggregate
concrete with fly ash aggregates (FAA) is studied. on concrete strength.
M20 Grade concrete is selected and designed as
per IS method. The project's major goal is to use A. Fly Ash
(FAA) fly ash aggregates to replace traditional fine Fly ash is one of the wastes produced during coal
and coarse aggregates. Cement and fly ash are
burning. Fly ash is usually collected from power plant
mixed in proportions of 10:90, 12.5:87.5, 15:85,
chimneys, although it can also be found at the bottom
17.5:82.5, 20:80, and 22.5:77.5 to make fly ash
aggregates. The specimen cubes will be caste and of the furnace. Fly ash used to be discharged into the
tested for corrosion depth, workability, pull out atmosphere through the smoke stack, but pollution
strength and pH value of concrete at the end of 7, control technology specified in recent decades now
14 and 28-days curing. Fine aggregate and coarse requires it to be collected before being released. Most
aggregates were substituted with fly ash electric power production facilities in the United States
aggregates in all of these experiments. From the store it on-site.
results, the conclusions were drawn.
Fly ash is made up of silica (silicon dioxide, SiO2)
Keywords- Fly Ash Aggregates, Fine Aggregate, (both amorphous and crystalline) and lime (calcium
Coarse Aggregates, Strength. oxide, CaO). Besides its usage in concrete, where it
I. INTRODUCTION offers both technological and economic advantages to
manufacturers, fly ash is increasingly being employed
Concrete is a combination of cement, sand, in the synthesis of geopolymers and zeolites.
aggregate, and water that is homogeneous. It is
extremely strong in bearing compressive pressures, and II. LITERATURE REVIEW
as a result, it is becoming increasingly popular as a The results of a study on a sintered fly ash aggregate
building material across the world. As the circumstance are given. Material orthogonal testing and a short chilled
requires, use of available materials for concrete firing schedule test were used to create the aggregate.
production and their characteristics in both fresh and It had a high tensile strength (7.8 MPa) and a low water
hardened phases. In the past, most structures were built absorption rate (4.2 percent). This light weight aggregate
out of brick, steel, or wood, depending on the resources concrete has a compressive strength of more than CL60,
available and the nature of the job; however, concrete a slump of more than 20cm, a 60-minute slump loss of
has recently become a popular building material. less than 2cm, and an expansibility of more than 50cm.
Concrete has achieved such prominence in such a Such characteristics fulfil the contemporary concrete's
short time that it now accounts for more than 65 percent high strength and pumpability criteria. This innovative
of all new structures being built across the world. Similar technique has significant economic and social
to other constituents, coarse aggregate is an essential implications for the use of industrial waste residues as
factor to consider when producing better concrete; it well as environmental conservation.
has an impact on concrete strength, and this report will

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 823
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Concrete's mechanical properties and durability mass of the cementation's materials content. Typically,
were examined in an experimental study. These ratios FAC is suggested to get all of the benefits of fly ash
were utilised in self-compacting concretes (0.40 and concrete.
0.36 for water/binder) as well as ordinary Portland The FAC is defined by the following characteristics:
Concrete (OPC) (0.58 and 0.48 for water/cement)
(SCC). There were several methods used to analyse • Very low water to cementitious materials ratio
the properties of concrete including compressive and • Low cement and High fly ash content
splitting strengths as well as electrical resistivity as well
• Requires the application of a superplasticizer to obtain
as rapid chloride penetration (RCPT) and the open
the appropriate properties
circuit potential technique and AC impedance.
Concrete's compressive strength and splitting strength, In order to get the necessary workability, this form
for example, can be improved by carbonation. of concrete frequently requires the application of a
super plasticizer. The amount of fly ash produced is
Concrete's mechanical properties and durability
maximised by careful material selection, proportioning,
were examined in an experimental study. These ratios
and the use of chemical admixtures.
were utilised in self-compacting concretes (0.40 and
0.36 for water/binder) as well as ordinary Portland A. Fly Ash Properties
Concrete (OPC) (0.58 and 0.48 for water/cement)
(SCC). There were several methods used to analyse 1) Workability
the properties of concrete including compressive and When Portland cement is partially replaced with fly
splitting strengths as well as electrical resistivity as well ash in concrete, the amount of water required to achieve
as rapid chloride penetration (RCPT) and the open a particular consistency is reduced, and the workability
circuit potential technique and AC impedance. and slump for a given water content are increased.
Concrete's compressive strength and splitting strength,
for example, can be improved by carbonation. 2) Slump
Carbonation, on the other hand, increased the rate of Slump is a measure of the concrete's workability or
corrosion of reinforcing steel in corrosion tests. The fluidity. The slum of FAC is low because of the lower
following conclusions may be derived from the scope water content in this type of concrete. This low water
of this investigation. content is a result of the water reducing property of fly
(1) As exposure duration rises, the carbonation depth ash. If a higher slump is required for placement of
increases, and greater CO2 concentrations result in concrete it is essential to use a super plasticizer. The
increased carbonation depth for all combinations. dosage of this super plasticizer used will depend on the
characteristics of Portland cement and fly ash used for
(2) At the age of 28 days, the compressive and splitting
strengths of carbonated concrete are somewhat preparing the concrete mix.
greater than those of uncarbonated concrete. 3) Bleeding
(3) As the exposure duration rises, the electrical
Bleeding depends upon the concrete mixture
resistance of concrete increases, whereas the quantity
proportioning. Due of its relatively low water content,
of charge transferred reduces considerably as the
carbonation depth increases. FAC bleeds at insignificant to low levels. Therefore
curing of the concrete should commence as soon as
III. FLY ASH CONCRETE possible.
Engineered concrete systems that use fly ashes as a 4) Setting
partial substitute for fine and coarse particles are known
as fly ash concrete. Fly ash concrete is defined as The use of fly ash as replacement in conventional
concrete with a fly ash content of more than 35% by concrete has a retarding influence on the setting time of

824 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

concrete. The extent of retardation depends on several influenced by grain size distribution and material surface
factors such as the type of fly ash, the fly ash content, roughness. Green pellets were made in the present
the type of chemical admixtures and curing temperature investigation using a concrete mixer as a pelletiser and
of concrete. a combination of fly ash, regular Portland cement, and
When compared to traditional Portland cement water as a binder.
concrete, the ultimate setting time of FAC is two to b) Trial selection for preparing FAA
three hours longer. This is advantageous in hot weather
since it gives you more time to transport and place Each trial is selected separately for the preparation
concrete. Excessive set retardation can be prevented of aggregates. The cement and fly ash are weighted
in cold weather by increasing the temperature or utilising accordingly to meet the proportions appropriate for
set accelerating admixtures. cubes, slices. The quantity of aggregates needed for
casting is derived from the mix design of concrete of
IV. DETAILS OF AGGREGATE FORMING grade M20. Desired proportions such as cement, fly
ash and water are mixed together in the concrete mixer.
A. Production of Aggregate from Fly Ash 'Green Pellets' are formed by the process called
Fly ash aggregates are made out of ingredients such 'pelletisation'. The water is mixed thoroughly until a
as cement, fly ash, and water. Water is the binding bonding takes place between the cement and fly ash.
ingredient that allows the aggregate to form with good
bond properties. The topic of this project is the creation B. Processing and Curing of Fly Ash Aggregates
of FAA. It is described in full below. The prepared 'Green Pellets' is allowed to dry for a
day. Fly ash aggregates are then put for 7 days curing.
1) Proportion for fly ash aggregates The fly ash aggregates were weighted before and after
Water is the binder, which is used to enhance the curing process. It was found that no change was
workability of the aggregates. Cement and fly ash are observed.
components for aggregate preparation. The proportions TABLE 1. SIEVE ANALYSIS
of 15:85 are obtained and put through the 'Pelletisation'
Fine Aggregates Coarse Aggregates
procedure. IS CODE
<4.75mm 4.75mm to 20mm
2) Preparation of FAA C. Water
a) Pelletisation • Water lubricates the fine and coarse aggregates and
It is the agglomeration of moistened particles in a reacts chemically with cement to produce the
aggregate binding paste. It is also utilised to cure the
spinning drum or disc to generate a "fresh pellet" that
concrete after it has been cast into the forms.
may be handled further. The processes involved in the
balling phenomena of powdered materials are used to • Water used for both miming and curing should be
form pellets. When a fine-grained substance is free of a variety of harmful contaminants.
moistened, a thin liquid film forms on the grain's surface, • Portable water is typically regarded as adequate for
and bridges form where the moistened particles come concrete mixing and curing.
into touch with one another. Bonding forces emerge
• Water should not be utilised if it includes sugar, acid,
gradually when the particles spin into balls. A water or salt in excess.
bridge or meniscus is responsible for the first bonding
forces between particles. • For concrete preparation, ordinary tap water is
utilised.
Droplets encase the concave moisturising particle
clusters, which tend to create huge, irregular structures.
The effectiveness of the palletisation process is

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 825
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• On the nonporous plate, 400g of the specified cement


sample is maintained.
• To make a smooth cement paste, 30 percent water
by weight of cement is carefully added to the dry
cement and properly mixed. From the time the water
is added, the mixing takes 3 to 5 minutes to finish.
• Fill the vicat mould with the produced cement paste
and set it on the nonporous plate. The surface is
smoothed with a trowel until it is level with the mould.
• Any air from the sample is removed by gently shaking
the mould.
• Place the nonporous plate and the mould beneath the
Fig. 1. Formation of fly ash aggregates
plunger.
• The plunger is gradually lowered until it touches the
V. PRELIMINARY TEST ON MATERIALS
paste's surface, and then the indicator is set to zero.
A. Fineness Test on Cement • The plunger is immediately released, allowing the
paste to enter.
Procedure:
• Take note of the index scale reading when the plunger
Take 100gms of cement.
comes to a stop.
• Transfer the cement into I.S. Sieve No. 9 and sieved
• Several trial pastes with various percentages of water
it by rotational motion for 15 minutes
are produced, and the test is carried out until the
• Take the residue retained on I.S. Sieve No. 9 and needle pierced 5mm to 7mm above the bottom of the
determine its weight. mould. The outcomes are tallied.
• On the same cement sample, the experiment is TABLE 3. OBSERVATION AND CALCULATION
CONSISTENCY TEST ON CEMENT
repeated three times and the average weight of residue
is determined. Quantity of Penetration
Wt. of
water index
TABLE 2. OBSERVATION AND CALCULATION FINENESS OF Trial Cement
added reading
CEMENT taken (g)
% ml (mm)
Types of Cement Wt. of Wt. of Percentage Average 1 400 30 120 32
cement sample sample residue Wt. of percentage
W1(g) W2(g) residue of residue
2 400 31 124 19
W2/W1x100 3 400 31.5 126 12.5
Chettinadu 1 100 12.0 12.0 4 400 32 128 10.0
cement 2 100 10.0 10.0 12.33 5 400 32.5 130 5.0
3 100 15.0 15.0

Result: Result:

Average fineness of cement = 12.33% Standard consistency of given sample of cement =


32.5%
B. Consistency Test on Cement
C. Fine Aggregate Test - Specific Gravity Of
Procedure: Sand
• The nonporous plate and the mould are washed, Procedure:
cleaned, and dried.
• Weigh a clean, dry pycnometer with the cover on it
(W1g).

826 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Fill the pycnometer with 200g of dry sand and • Empty and carefully clean the pycnometer. Then, up
calculate the weight of the pycnometer with sand to the conical cap's grip, fill it with pure water and
(W2g). weigh it (W4g).
• Shake the pycnometer to remove the air by filling it • Calculate the specific gravity of coarse aggregate
with distilled water up to the hole in the conical cap. using the provided weights.
Then, using sand and water, calculate the weight of
the pycnometer (W3g). Observation and calculation:
• Empty and carefully clean the pycnometer. Then, up Weight of empty pyconometer (W1g) = 667gm
to the conical cap's grip, fill it with pure water and Weight of pyconometer + coarse aggregate (W2g)
weigh it (W4g). = 1140gm
• The specific gravity of sand is determined using the Weight of pyconometer + coarse aggregate + water
aforementioned weights. (W3g) = 1843gm
Observation and calculation: Weight of pyconometer + water (W4g) = 1545gm
Weight of empty pyconometer (W1g) = 667gm Specific gravity of coarse aggregate =
Weight of pyconometer + dry sand (W 2 g) = = [W2-W1]/ [(W4-W1)-(W3-W2)]
1120gm
= [1120-667]/ [(1552-667)-(1833-1120)] = 2.68
Weight of pyconometer + sand + water(W3g) =
1833gm Result:
Weight of pyconometer + water (W4g) = 1552gm Specific gravity of coarse aggregate = 2.68
Specific gravity of sand = Dry weight of sand/ Weight E. Concrete Mix Design
of equal volume of water
1) General
= [W2-W1]/ [(W4-W1)-(W3-W2)]
Mix design is the process of calculating the
= [1120-667]/ [(1552-667)-(1833-1120)] proportional amount of material in order to get the
= 2.63 required characteristics of concrete. As a result, mix
design is defined as the process of selecting acceptable
Result: concrete components and establishing their relative
Specific gravity of sand is = 2.63 amounts in order to produce concrete with the specified
characteristics in the most cost-effective manner
D. Coarse Aggregate Test feasible. The goal of mix design is to determine the
Procedure: material proportions that will result in concrete with the
desired characteristics. The proportions of the mix
• Weigh a clean, dry pycnometer with the cover on it should be chosen such that the resultant concrete has
(W1g). the necessary workability while still being fresh and can
• In the pycnometer, put roughly 200g of coarse be easily put and compacted for the intended use.
aggregate that has passed through a 10mm screen,
and calculate the weight of the pycnometer with 2) Types of Mix Design
coarse material (W2g). • Mix design technique according to Indian Standard
• Shake the pycnometer to remove the air by filling it suggested guidelines for concrete mix design.
with distilled water up to the hole in the conical cap. • British mix design method
Then, using coarse material and water, calculate the
weight of the pycnometer (W3g). • User mix design method

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 827
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Mix design method according to Indian Standard REFERENCES


recommended guidelines for concrete mix design. [1] R.V. Raikar, V.V. Karjinniand, and V.D., Gundakalle, Study on
strength parameters of steel fiber reinforced high strength concrete,
• ACI mix design method Journal of Applied Sciences and Engineering Research, 1(4)
TABLE 4. CONVENTIONAL CONCRETE TEST RESULTS (2012).

Averag e [2] A.A. Al-Azzawi, A.S. Ali, and H.K. Risan, Behavior of ultra-
Curing Strength in high performance concrete structures, ARPN Journal of
2 strength in
days N/mm Engineering and Applied Sciences, 6(5), (2011) 95-109.
N/mm2
12.42 [3] J.H. Xie, Y.C. Guo, L.S. Liu, and Z.H. Xie, Compressive and
7 12.89 flexural behaviours of a new steel-fibre-reinforced recycled
12.95
DAYS 13.53 aggregate concrete with crumb rubber, Construction and Building
15.36 materials, 79, (2015) 263-272
14 15.92 [4] T. Alagunatrayan, P. Mohanraj, S. Manishankar et al., Engineered
15.97
DAYS 16.64 cement composite enhanced reinforced concrete beams
20.12 usingflexural response: An experimental study, Materials Today:
28 20.53 20.71 Proceedings,https://doi.org/10.1016/j.matpr.2021.07.130
DAYS 21.49 [5] P. Parthiban, S. Kar, A. Kumar Mondal et al., Stress-strain
behaviour of (hpfrc) high-performance fibre reinforced concrete:
VI. CONCLUSIONS Anexperimental study, Materials Today: Proceedings,https://
doi.org/10.1016/j.matpr.2021.07.175
When carbon dioxide from the air penetrates
[6] Asok, G., & George, S. (2016). Investigation on hybrid concrete
concrete and mixes with calcium hydroxide to form using steel and polypropylene fiber. International Journal of New
calcium carbonate, a chemical reaction happens. As Technology and Research, 2(5).
we observed earlier, the conversion of Ca(OH)2 to [7] Parthiban, P. M. E., ME, M. R., MIE, D., & George, S.
CaCO3 by the action of CO2 results in a little shrinkage. Comparative Study on Strength Enhancement of Concrete Using
Magnetic and Normal Water. International Journal of New
• FAAs appear to have a low specific gravity, indicating Technology and Research, 2(5).
that they are light aggregates.
• M20 grade concrete cubes will be made with OPC
43 grade cement.
• Material orthogonal testing and a rapid chilled firing
schedule test revealed good strength and low water
absorption in sintered fly ash lightweight aggregate.
• This aggregate has a compressive strength of more
than CL60, a slump of more than 20cm, a 60-minute
slump loss of less than 2cm, and an expansibility of
more than 50cm in lightweight aggregate concrete.
Such characteristics fulfil the contemporary
concrete's high strength and pumpability criteria.

828 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Study of Treatment of Municipal Sewage from Khan


River (Indore, MP) by using Fenton Process Method
Mr. Aditya Narela
PG Student, School of Sciences, IGNOU, NEW DELHI\

Abstract - In this era the enemy of human Pollution and Environmental Concerns
population is pollution and water pollution is one
Khan has turned into a sewage dump yard, where
of the most responsible for many hazards. As the
population of Indore is going so fast, Indore is also many industries and municipal sewage have been
dealing with this problem and the prime example dumping solid as well as liquid wastes into it, since the
of this is Khan river. Large amount of waste water rapid industrialization in the70s. As an additional load,
is the major concern of this product. Fenton the household drainage is also dumped into the Kahn
Reaction applied to the treatment of municipal without any purification or cleaning. There have been
sewage water. The importance of water treatment several attempts to clean the river since 1985, but none
to the environment is discussed, followed by the of them have materialized till date.
benefits and limitations of treatment technique.
Chemical fundamentals are focused on the Need of the Project
generation of hydroxyl radicals. This method is Indore city is expanding leaps and bound. It is one
based on the use of radical generators like
of the fastest growing metropolitan cities in India. It's
hydrogen peroxide, Fenton's reagent.
developed industrial sector and the growing IT sector
The aim of study is to treat the water of municipal draws a large group of people and business to settle In
sewage by Fenton reaction for the reduction of the city, temporarily or permanently. This is creating a
chemical oxygen demand(COD) and biological
growing demand for urban infrastructure, especially for
oxygen demand(BOD).
water supply and sanitation.
Index Terms - Pollution, Fenton reaction, BOD,
COD • On account of economic feasibility our project is
sustainable.
I. INTRODUCTION • Efficient cleaning of sewage waste water for
About Khan River household use.

The river Khan or Kahn as it is now known is a The stretch from Krishnapura bridge to Khatipura
river flowing through Indore, the commercial capital of bridge the river is almost in septic condition throughout.
the Indian state of Madhya Pradesh. It doesn't contain The river is used as a ravine through which only
freshwater but instead has become polluted over the domestic and industrial wasteflows.
course of time carries sewage due to pollution. In concern to the environment, Despite large supplies
of fresh water and the natural ability of water to cleanse
Present Status of the Sewerage System
itself over time, populations had become so
The sewerage system of Indore has first conceived concentrated by 1850 that outbreaks of life-threatening
in the year 1936 by the erstwhile Holkars for a diseases were traced to bacteria in the polluted water.
population of 1.5 lakhs and may have covered about Since that time, the practice of wastewater collection
10% of the core city area of 134sq.km. Subsequently, and treatment has been developed and perfected, using
various governing agencies have laid sewers as the some of the most technically sound biological, physical,
development of the city progressed. chemical and mechanical techniques available. As a

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 829
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

result, public health and water quality are protected Most public wastewater treatment plants now
better today than ever before. provide a second stage of treatment known as
The modern sewer system is an engineering marvel. secondary treatment to remove more of the pollutants-
Homes, businesses, industries, and institutions -up to 85 or 90 percental together.
throughout the modern world are connected to a Secondary treatment is largely a biological process.
network of below-ground pipes which transport Air is supplied to stimulate the growth of bacteria and
wastewater to treatment plants before it is released to other organisms to consume most of the waste materials.
the environment. Wastewater is the flow of used water The wastewater is then separated from the organisms
from a community. As the name implies, it is mostly and solids, disinfected to kill any remaining harmful
water; a very small portion is waste material. bacteria, and released to a nearby lake, river, or stream.
At a typical wastewater plant, several million gallons EMERGING TECHNOLOGIES IN WASTE
of wastewater flow through each day -- 50 to 100 WATER TREATMENT
gallons for every person using the system. The amount
of wastewater handled by the treatment plant varies • DUCKWEED - POND TECHNOLOGY - The
with the time of day and with the season of the year. In duckweed based waste water treatment system in
some areas, particularly communities without separate conjuction with pisco culture is one such technology
that has the potential of offering effective waste water
sewer systems for wastewater and runoff from rainfall,
treatment beside providing economic returns as well
flow during particularly heavy rains or snowmelts can as generating employment opportunities in the ruler
be much higher than normal. areas. The duckweed is small free floating aquatic
What happens in a wastewater treatment plant is plant often seen growing in thick mats on nutrient
essentially the same as what occurs naturally in lake or rich fresh and brackish waters in tropical and
stream. The function of a wastewater treatment plant is semitropical climate all over the world.
to speed up the process by which water cleanses • VERMICULTURE TECHNOLOGY- this
(purifies) itself. technology is emerging as an environmentally
A treatment plant uses a series of treatment stages sustainable, economically viable and socially
acceptable technology all over the world. It may be
to clean up the water so that it may be safely released
of the from: Vermi-composting technology (To
into a lake, river, or stream. Treatment usually consists
manage most organic wastes); vermin-filtration
of two major steps, primary and secondary, along with technology (To treat municipal and several industrial
a process to dispose of solids (sludge) removed during waste water); Vermi-radiation technology (to treat
the two steps. and clean up contaminated lands).
Primary Treatment • CONSTRUCTED WETLANDS - They are
In primary treatment, sand, grit, and the larger solids engineered systems that use natural functions,
in the wastewater are separated from the liquid. vegetations, soil to treat waste water. Constructed
wetlands have been used to treat both centralized
Screens, settling tanks, and skimmering devices are
and on site wastewater.
most commonly used for the separation. Primary
treatment removes 45 to 50 percent of the pollutants. • SOLAR DRYING OF SEWAGE SLUDGE -using
heat to evaporate water from sludge. This method,
Secondary Treatment first developed by researchers in Germany, reduces
After primary treatment, wastewater still contains the mass and volume of dewatered solids resulting in
solid materials either floating on the surface, dissolved a product that can be used as a low-grade fertilizer.
in the water, or both. Under natural conditions, these Compared to established technologies, solar drying
can significantly reduce fuel requirements compared
substances would provide food for such organisms as
to conventional dryers. Its disadvantages are that it
fungi, algae, and bacteria that live in a stream or lake.

830 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

does have a large footprint and needs days with Unlike conventional technologies which use strongly
sufficient solar heating. (I've also provided an article oxidant species, under certain conditions AOPs can
from The Guardian about this technology) provides the complete mineralization of pollutants;
IMPACT OF WASTE WATER EFFLUENT ON Used for the destruction of refractory compounds
resistant to other treatments, such as biological
Color in effluent -
processes;
Color from municipal waste water can cause Allow the conversion of recalcitrant compounds
significant aesthetic problem.The reductive anaerobic and refractory contaminants submitted to bio-
process would cleave azo dyes while the aerobic degradation systems;
process would oxidize fragments.
It can be used in combination with other processes
Presence of heavy metals - for pre-or post- treatment;
The possible sources for some metals present in the Possess strong oxidizing power with high reaction
wastewater is the presence of trace metals in processing rates;
chemicals such as sodium hydroxide, sodium
The formation of by-products can be minimized if
carbonates, salt, etc. It is difficult to judge how current
optimized amounts of reactants are employed;
trace metal removal technologies could reduce
concentration to the prescribed standards. Source In many cases, AOPs consume less energy
reductions appear to be the only solution in achieving compared to thermal destruction processes
the trace metal level in the wastewater effluents. The (incineration) of liquid waste waters.
method of treating the khan river's water and reducing Fenton's Reaction
BOD value and COD value will be the Fenton's reaction.
H.J.H Fenton discovered in 1894 that several metals
Total suspended solids (TSS) have a special oxygen transfer properties which improve
It is a water quality parameter used to assess the the use of hydrogen peroxide. Actually, some metals
quality of a specimen of any type of water or water have a strong catalytic power to generate highly reactive
body after treatment in a wastewater plant. hydroxyl radicals (.OH). Since this discovery, the iron
catalyzed hydrogen peroxide has been called Fenton's
Total dissolved solids is another parameter acquired reaction. Nowadays, the Fenton's reaction is used to
through a separate analysis which is also used to treat a large variety of water pollution such as phenols,
determine water quality based on the total substances formaldehyde, BTEX, pesticides, rubber chemicals and
that are fully dissolved within the water. soon.
BRIEF ABOUT FENTON REACTION Applications of the Fenton's reaction:
Treatment methods vary with the wastewater This process may be use to wastewater,
characteristics. In economic point of view, the most contaminated soils and sludges with the following
economical and efficient methods are preferable actions:
compare to the other. Chemical methods, biological
methods and physical methods are the general treatment • Organic pollutant destruction
that are being used and further investigations by • Toxicity reduction
researchers proves that chemical methods are the most • Bio-degradability improvement
efficient and economical compare to the other two
• BOD/COD removal
methods. In general, the following are positive aspects
of Fenton: • Odor and color removal
• Destruction of resin in radioactive contaminated sludge

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 831
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2. METHODOLOGY Procedure
How does the Fenton's reaction work? Waste water sample (0.5ml, 1ml, 2ml) was taken in
the reflux flask and diluted with distill water up to 20
After addition of the iron and the hydrogen peroxide, ml. Small amount of HgSO4 powder was added. 10ml
they are going to react together to generate some of K2Cr2O7 was added, and then 30ml of sulphuric
hydroxyl radicals as it shows in the following equations: acid - silver sulphate reagent was added slowly with
Fe2+ +H2O2 > Fe3+ + .OH +OH- periodic stirring. The COD sample will then refluxed
Fe3+ +H2O2 > Fe2+ + .OOH + H+ for 2 hours at 150°C. The sample is then cooled and
titrated with FAS using ferrous indicator solution. The
The typical range for the iron dose is 1 part of Fe color change at the end point is blue green to wine red.
per 5-25 parts of H2O2.
BOD
After that the hydroxyl radicals are going to react
with the pollutants to oxidize. BOD is the measure amount of oxygen required for
biological oxidation of the organic matter under aerobic
Electrode Preparation condition at 20°C and for a period of 5 days and is
The Aluminium electrode plates were procured from directly related to the extent of pollution of wastewater,
the local suppliers and cut into the required shape, sewage and industrial effluent.
degreased manually. The Aluminium plates having
Procedure
dimensions 70mm*80mm*1.5mm (thick) were used.
1. 20 ml of water sample is taken in BOD bottle.
Parameters to be assessed
2. Add 1 ml of MnSO4 solution followed by 1 ml Alkali-
COD (Chemical Oxygen Demand) Iodide-Azide reagent.
BOD (Biological oxygen demand) 3. Now add 1 ml of Conc. Sulfuric Acid.
Hardness 4. Add 2-3 drops of starch as indicator.

pH 5. Titrate with 0.25 N Sodium thiosulphate till the blue


color disappears.
Total Dissolved Solid
6. Calculate the DO and keep this sample for 5 days.
Total suspended solid
7. Titrate the sample after 5 days and titrate it with starch
Chemical Oxygen Demand indicator and sodium thiosulphate solution and
calculate the DO.
This test was carried out to determine the
presence of oxidisable organic matter in the effluent. Calculation
The organic matter which is going to be finding out of BOD (mg/dm3) = DO2- DO1
two types:
Hardness
1. That which is biologically oxidized and is called
biologically active. Water hardness is the traditional method of the
2. That which cannot be oxidized biologically called capacity of water to precipitate soap. Hardness of
biologically inactive. water is not a specific constituent but is a variable and
complex mixture of cation and anion. It is caused by
3. COD gives the oxygen required for the complete of
both biodegradable and non biodegradable matter.
dissolved polyvalent metallic ions.
Procedure
1. Take 20 ml of a sample in a conical flask.

832 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2. Add 2 ml of Buffer solution so that pH can be 4. CONCLUSION


maintained.
The formation of the hydroxyl radicals by using the
3. Add 2 drops of EBT as indicator and titrate it with Fenton and photo-Fenton processes under application
EDTA solution. of Fe(II) or Fe(III) occurs according to the following
4. Note the burette when red colour changes to blue. reaction.
5. Repeat the same titration with unknown solution.

Fe2+ +H2O2 Fe++OH - +OH .
pH Reaction already known as the Fenton reaction,
Measurement of pH is one of the most important possesses a high oxidation potential, but its revival in
and frequently used tests as every phase of water and the application to wastewater treatment began only
waste water treatment and waste quality management recently. UV irradiation leads not only to the formation
is pH dependent. The pH of aqueous solutions can be of additional hydroxyl radicals but also to a recycling
taken as negative logarithm of hydrogen ion of the ferrous catalyst by reduction of Fe(III).
concentration. At given temperature, the intensity of the Illumination of the system by UV was suggested to
acidic or basic character of a solution is indicated by overcome the limitations of the Fenton system. For the
pH. development ofeffective wastewater treatment
methods,complete degradation of the contaminants to
Procedure harmless end products (CO2) and mineral salts is
The pH is determined by measurement of the important. By this the concentration of Fe(II) increases
electromotive force (EMF) of a cell comprising of an and therefore the reaction is accelerated. The reaction
indicator electrode responsive to hydrogen ions (in glass time needed for the photo-Fenton reaction is extremely
tube), immersed in the test solution and a reference low and depends on the operating pH value and the
electrode (usually calomel electrode). The EMF of this concentrations of H2O2 and iron added.
cell is measured by a pH meter. This is the high
impedance electrometer calibrated in terms of pH. 5. FUTURE SCOPE
In these years, due to the increasing presence of
Total Dissolved Solids Procedure
recalcitrant organics in wastewater, Conventional
1. Take 100 ml of a sample and evaporate it to dryness. biological methods cannot be used for the complete
2. Cool the sample in desicator and weighted to a treatment of the effluent therefore need to newer
constant weight. technologies to degrade these refractory molecules into
3. From this weight the suspended impurities can be smaller molecules became very imperative.
found out by subtracting the weight before drying. Advanced oxidation process (AOPs) constitute a
3. RESULTS AND DISCUSSION promising technology for a treatment of waste water.
Fenton's oxidation was one of the best non-metal
The following conclusions throw light on a result of
catalyzed oxidation reactions of water-miscible organic
application of an Fenton reaction which indicate that
compounds.
• The optimum irradiation time was 40 min. at pH 3,
the dose of 1 ml/l H2O2 and 0.75 g/l for Fe(II) and The photo- Fenton - process utilizing the
Fe(III). combinations Fe (II)/H2O2/UVA and Fe (III) oxalate/
H2O2/UVA was employed with success to degrade
• Under these conditions, 95.5% COD removal was
biorefractories organic pollutants.
obtained.
• Finally, it is recommended to apply the used technique Another possible development of this work would
(Fenton's oxidation process) as treatment of be to go on exploring the efficiency of different
wastewater containing organic compound. electrodes in photo- electro-Fenton process.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 833
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

6. REFERENCES 13. MirzaeiA,Chen Z, Haghighat F, YerushalmiL Removal of


pharmaceuticals from water by homo/heterogonous Fenton-type
1. Vrushali P., Gawande S., An overview of Fenton process for processes Chemosphere, Volume 174, 2017, Pages 665-688.
industrial waste water, Journal of Department- Environment
A.P.C.O.E.R., 2018 14. Trapido M, Tenno T, Goi A, Dulova N, Viisimaa M, Bio-
recalcitrant pollutants removal from wastewater with
2. Changotra R, Rajput H, Dhir A, Treatment of real pharmaceutical combination of the Fenton treatment and biological oxidation,
waste water using combined approach of fenton application and Journal of Water Process Engineering, Volume 16, 2017, Pages
aerobic biological treatment, Journal of Photochemistry and 277-282.
Photobiology A: Chemistry, Volume 376, 2019, Pags 175-184
15. Zhang M. H., Dong H, Zhao L, Wang D.X, Meng D, Fenton
3. Xiaohu Li, Si Chen, IriniAngelidaki, Yifeng Zhang, Bio-electro- processfor organic wastewater treatment based on optimization
fenton processes for waste water treatment, Chemical Engineering perspective, Science of The Total Environment, Volume 670,
Journal, Volume 354, 2018, Pages 492-506 2019, Pages 110-121.
4. Zhihong Ye, Juliana R. Steter, FrancescCentellas, Pere Lluís Cabot, 16. Verma M, Haritash A. K., Degradation of amoxicillin by Fenton
IgnasiSirés, photoelectron-fenton as post- treatment for and Fenton-integrated hybrid oxidation processes,Journal of
electrocoagulatet benzophenone-3 loded synthetic and urben Environmental Chemical Engineering, Volume 7, Issue 1, 2019,
wastewater, Journal of Cleaner Production, Volume 208, 2019, Gabriel Buftia, Emilio Rosales, Marta Pazos, Gabriel Lazar,
Pages 1393-1402 María Angeles SanrománElectro- Fenton process for
5. Alexander V,Vorontsov, Advancing fenton and photo- fenton water implementation of acid black liquor waste treatment,Science of
treatment through the catalyst design,Journal of Hazardous The Total Environment, Volume 635, 2018, Pages 397-404
Materials, In press, 2018 17. Vlyssides A.G , Loukakis H., Karlis P.K., Small sewage treatment
6. Stella G. Michael, Irene Michael-Kordatou, Vasiliki G. Beretsou, works using a fenton oxidation method Laboratory of Organic
Thomas Jäger, DespoFatta-Kassinos, Solar photo-fenton and Chemical Technology , National Technical University of
oxidation followed by absorption on activated carbon for the Athens, 9, 2008.
minimization of anti resistance determinants and toxicity present 18. Rajasulochana P., Preethy V, Comparison on efficiency of various
in urban waste water, Applied Catalysis B: Environmental, techniques in treatment of waste and sewage water - A
Volume 244, 2019, Pages 871-880 comprehensive review, 2016;
7. JuriBolobajev, EneliisKattel, MarikaViisimaa, Anna Goi,
NiinaDulova, Reuse of ferric sludge as an iron source for the
fenton based process in wastewater, Chemical Engineering
Journal, Volume 255, 2014, Pages 8-13
8. Lu Shen, Wei Wang, Tong Li, Yuezhong Cui, Shubo Deng,
Powdered activated coke for COD removal in the advanced
treatment of mixed chemical wastewaters and rgeeneration by
Fenton oxidation, Chemical Engineering Journal, In press, 2019.
9. XiangsongMeng, Sultan Ahmed Khoso, Jiangqiu Wu,
MengjieTian, Yuehua Hu, Efficient COD reduction from sulfide
minerals processing wastewater using Fenton process, Minerals
Engineering, Volume 132, 2019, Pages 110-112.
10. Mustapha Mohammed Bello, Abdul Aziz Abdul Raman,
AnamAsghar, A review on approaches for addressing the
limitations of Fenton oxidation for recalcitrant wastewater
treatment, Process Safety and Environmental Protection, In press
2019.
11. Ebrahiem E. Ebrahiem, Mohammednoor N. Al- Maghrabi, Ahmed
R. Mobarki,Removal of organic pollutants from industrial
wastewater by applying photo-Fenton oxidation technology,
Arabian Journal of Chemistry, Volume 10, issue 2, 2017, Pages
s1674- s1679.
12. Wang N,Zheng T, Zhang G, Wang P, A review on Fenton-like
processes for organic wastewater treatment,Journal of
Environmental Chemical Engineering, Volume 4, Issue 1, 2016,
Pages 762-787.

834 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Experimental Study of Sugarcane Bagasse Ash and


Quarry Dust in Partial Replacement of Brick Material
Parthiban P1, S Gunasekar2, Anju M J3
1,3
Department of Civil Engineering, Jyothi Engineering College, Thrissur, Kerala, India
2
Department of Civil Engineering, K.S. Rangasamy College of Technology Tiruchengode, India
Email: parthichevaux@gmail.com1, guna.skr87@gmail.com2, anjumj@jecc.ac.in3

Abstract-For Economic, Environmental, and to date show that such materials have a wide range of
technical reasons, the use of industrial and applications. But in India, just a handful materials have
agricultural waste products in industry has been been tested. Some industrial waste products have been
the subject of research. Sugarcane Bagasse, like investigated in a similar manner. Rural building
Ethanol vapor, is a fibrous waste product of the
construction uses cement and lime kiln dusts, quarry
sugar refining industry. This waste product is
already polluting the environment, necessitating
waste, slag, fly ash, construction & demolition wastes,
immediate waste management solutions. During rice husk ash, bagasse ash, etc.
the sawing and polishing operations, the quarry There are a number of wastes (such as cement and
industry creates a considerable quantity of waste, lime kiln dust) that are amassing throughout the world
mostly in the form of powder, which pollutes and and posing financial and environmental challenges in
harms the environment. disposing of them. Debris disposal is getting more
As a result, the goal of this article is to describe expensive, and as sustainable resource management
and assess the potential for utilising Bagasse Ash becomes more of a priority for many communities,
and Quarry Dust created by brick-making landfilling and incineration are becoming less accepted.
enterprises. Bagasse Ash and Quarry Dust were
used as partial replacements for brick material in Coordination and dedication are required from all
the ratios of 0 percent, 5 percent, 10 percent, 15 stakeholders engaged in dealing with the rising disposal
percent, and 20 percent for bricks of size 22cm problem of these materials, including government
10.5 cm7.5 cm. The bricks were fired at 900°C for agencies, corporations, the public, and specialists.
24 hours before being evaluated for water Recycling and using these resources in the construction
absorption and compressive strength. of buildings is one way to decrease the waste disposal
Keywords- Bricks, Quarry Dust, Bagasse Ash, problem.
Waste Management. A preliminary study was conducted in India to assess
the availability of viable waste materials and their
I. INTRODUCTION
appropriateness for use in building construction in the
A large quantity of garbage is generated in India from country's capital city. In some circumstances, building
industries, construction, agriculture, and other sectors. construction businesses may be allowed to charge for
It is possible that these waste items are harmful since the appropriate use of waste materials that would
they have not been disposed of properly. When carefully otherwise require costly treatment for disposal.
researched, a considerable amount of waste material
may be used in the building industry. Rural building in A. Quarry Dust
adjacent regions can benefit from the use of these waste Various noise, dust and aesthetic control measures
materials because it is both cost-effective and are required in a quarry. Quarries are formed when
environmentally benign. Researchers in India are large rocks are broken down into smaller pieces. This
examining the possibilities for using locally accessible substance is very similar to sand, however it is primarily
trash in construction projects at the moment. The results grey in colour.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 835
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fine particles from quarry washing, crushing, and This study describes the results of a nonconventional
screening, as well as wet silty clay from sand and gravel brick-making experiment utilising fly ash (FA), quarry
washing, make up quarry dust. Typically, these materials dust (QD), and slab scale (BS). Because the new
are put in ponds or stored in a wet condition. process does not use clay or shale, nor does it require
Dehydration and reclamation of these materials are high pressure on the mould or high temperature kiln
required before usage. For parking lots or low-volume burning, it has significant environmental and ecological
roadways, quarry dust fines can be used to create fill benefits. Billet scale and fly ash have an optimal ratio of
or borrow material, as a concrete and flowable fill filler, 1:1, and billet scale and quarry dust are optimal at 1:1.
for base or subbase stabilisation or as a cement stabilised The bricks created in this study can be utilised as an
subbase material. alternative to regular bricks, according to the results of
this research.
B. Bagasse Ash
Raut. S.P (2011) Development of Bricks from
Ash from bagasse production is used in agriculture.
Various Industrial and Agricultural Waste Material:
Bagasse is the solid waste material left behind after cane
sugar juice has been extracted. Sugarcane bagasse is An rise in environmental concerns has come from
the fibrous residue left over after all the sugar has been the accumulation of uncontrolled industrial or agricultural
extracted. It is utilised as fuel in boilers for heat generation solid waste, particularly in developing nations. It
in the same sector, leaving 8-10 percent of it as trash indicates that recycling such wastes as a sustainable
(SCBA). This ash is regarded to be a trash and is construction material is not only a realistic solution to
disposed of in an ecologically damaging way. the pollution problem, but also a cost-effective alternative
for designing green structures. Waste-Create Bricks
C. Objective were developed by adding different waste materials to
• To use non-conventional materials in the manufacture raw materials at varying degrees, with the goal of using
of bricks. industrial and agricultural waste products as construction
• To test the quality of brick with bagasse ash and materials (WCB). The evaluated strategy for the design
quarry sand. and development of WCB utilising industria is shown
in Figure 1..
• To protect the environment by using non-conventional
materials like bagasse ash and quarry dust which Aigbodion. V. S, S.B Hassan, T.Ause and G.B.
result in substantial depletion of virgin resources. Nyior(2010), Potential Utilization of Solid Waste
(Bagasse Ash):
II. LITERATURE REVIEW
This study describes the chemical and physical
Apurva Kulkarni, Samruddha Raje, Mamta
properties of bagasse ash in order to evaluate its
Rajgor(2013), Bagasse Ash As An Effective
potential for application in industry. For economic,
Replacement In Fly Ash Bricks:
environmental, and technological reasons, research has
After sugar cane has been crushed and juice focused on the use of industrial and agricultural waste
extracted, a fibrous residue called bagasse is left behind. products in the industry. Sugar-cane bagasse, coupled
Depending on the incinerating circumstances, sugarcane with ethanol vapour, is a fibrous waste product of the
bagasse ash (SCBA) may have significant amounts of sugar refinery industry.
SiO 2 and Al 2O3, making it suitable for use as
Mangesh V. Madurwar, Sachin A.
supplemental cementious material (SCM) in blended
Mandavgane,Rahul V. Ralegaonkar(2014 ), Use of
cement systems
Sugarcane Bagasse Ash as Brick Material:
Alaa A.Shakir, Sivakumar Naganathan, Kamal
An use of sugarcane bagasse ash (SBA), a biofuel
Nasharuddin Bin Mustapha(2013), Development of
by-product, as a major raw material for brick
Bricks from Waste Material:

836 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

manufacture was investigated in this article. Rather using


natural river sand, quarry dust (QD) was used as a
binder in the bricks. For new brick material, we used a
mixture of SBA and QD-L. 20 percent lime added to
SBA-QD bricks increased compressive strength to
6.59 MPa. The results revealed that agricultural solid
waste may be used to manufacture construction
materials.
III. MATERIAL AND METHODOLOGY
A. Red soil
Iron hydroxides are the cause of the red hue of red
soil, commonly known as Terra Rosa. Heavy rainfall
Fig. 2. Clay soil
dissolves carbon from calcium carbonate parent rock
and silicates are leached from the soil, resulting in iron As well as organic elements that do not provide
hydroxide deposits. Usually, they are limestone plasticity, clay deposits can contain inorganic minerals.
depressions or locations where the flora has been In terms of size and mineral composition, Clay is
relegated to the carport (low-lying scrub). distinguishable from other fine-grained soils by contrast.
While silts, which are fine-grained soils that do not
include clay, tend to have larger particle sizes than clay,
there is some overlap in terms of particle size and other
physical qualities, and there are numerous naturally
occurring deposits that contain both silt and clay.
C. Bagasse ash
Ash from sugarcane bagasse is a by-product of sugar
manufacturing. Once upon a time, this fibrous waste
was simply removed from the mill and burned on the
fields adjacent to it, causing environmental damage as
well as financial burdens on the firm. Sugarcane bagasse
Fig.1. Red soil
is composed of roughly 50% cellulose, 25%
B. Clay hemicelluloses, and 25% lignin, according to the USDA.
When sugarcane is processed into bagasse and residual
Naturally occurring aluminium silicate comprised
ash, roughly 26 percent of each tonne of sugarcane is
largely of fine-grained particles, clay is a natural product.
produced. Despite being a substance that is difficult to
When burned or dried, clay minerals harden and
degrade and containing few nutrients, agricultural ash
provide flexibility to clay deposits. They may also
is utilised as a fertiliser.
include a variable quantity of water that has been
trapped by polar attraction inside the mineral structure. D. Quarry dust
Building products such as aggregates, bricks, and
tiles have been manufactured using quarry dust.
Crushers generate crushed sand with a particle size
of less than 4.75 mm from hard quarry rock. A quarry's
extraction and processing produces quarry fines, which

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 837
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

are gathered from a nearby quarry. Depending on the


rock type, blasting and crushing methods employed,
the amount of crushed rock generated will vary.
E. Methodology

Fig .3. Drying of Bagasse ash

2) Sieving
In separating desirable components from unwanted
materials or characterising particles, sieves or sifters
are used. The bagasse ash and quarry dust which is
dried is of different sizes, so to maintain a uniform size
the particle is sieved in IS 2.36mm sieve for bagasse
ash and IS 1.00mm sieve for Quarry Dust. The particle
passing through the sieve is used in manufacturing. Using
sieving to separate particles of varying sizes is a simple
and convenient approach.
In a tiny sieve for sifting flour, the pores are so small
that only very fine flour particles may pass through.
When the sieve is rubbed against the screen windows,
the coarse particles that have been retained are broken
up. Sieves with varying sorts of holes are employed
depending on the types of particles to be sorted.
F. Preparation of Bagasse Ash and Quarry Dust
IV. TESTING OF MATERIALS
In preparation of bagasse ash and quarry Dust the
following process are involved A. Specific Gravity
1) Drying When using a pycnometer, make sure that it is clean
and dry. Cap it tightly and weigh it (W1). pycnometer
Drying is free from liquid or moisture, having or The cap is marked with a vertical line parallel to the
characterised by little or no rain and marked by the pycnometer's axis to guarantee the cap is screwed to
absence of natural or normal moisture. DRYING is a the same mark every time.
mass transfer process that involves the evaporation of
a solid, semi-solid, or liquid to remove water or moisture. Pycnometer is opened by unscrewing cap and adding
For this to happen, there must be a heat source and a 200g of oven-dried soil. When the cap is tightened, the
sink for the vapour that is generated by this process. weight is calculated (W2).
Water is usually always the solvent to be extracted from The pycnometer is entirely filled with water and dried
bio-products and medicines. The bagasse ash collected from the outside. The weight is taken as a percentage
is kept under sunlight for 2 to 3 days. Quarry Dust is of body weight (W3). Clean and dry the empty
brought in wet condition so that they do not fly with air pycnometer. Only water is used to fill the pycnometer's
as they are too fine particles. They are dried at normal chamber. As soon as the cap has been screwed on, it is
room temperature for 1-2 days. wiped dry. The weight is taken as a percentage of body
weight (W4).

838 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE 1. SPECIFIC GRAVITY OF RED SOIL The Liquid limit of Clay soil is 40%
S.No Weight of each item Weight(kg) The Plastic limit of clay soil is 8.69% and Plasticity
1 Weight of 0.66 index of clay soil is 31.30%
pycnometer(W1 )
2 Weight of pycnometer 0.94 C. Quarry Dust
+ soil(W2) The same specific gravity calculation has been carry
3 Weight of pycnometer 1.54 out for bagasse ash. The specific gravity of quarry dust
+ soil +water(W3 )
is found to be 2.09
4 Weight of water + 1.37
pycnometer(W4 ) D. Bagasse Ash
Specific Gravity = (w2 - w1) / [(w2 - w3) - (w1- w4)] The same specific gravity calculation has been carry
out for bagasse ash. The specific gravity of bagasse
= (0.94-0.66)/[(0.94-0.66)-(1.54-1.37)]
ash is found to be 2
= 2.54
The specific gravity of red soil is found to be 2.54

Fig. 5 . Liquid limit graph for clay - Red soil

The Liquid limit of mixture of Clay and Red Soil is


37%
The Plastic limit of clay- Red soil is 11.11% &
Plasticity index of clay & Red soil is 25.89%
Fig. 4. Liquid Limit Graph

The Liquid limit of Red soil is 39%


The Plastic limit of red soil is 13.6% and Plasticity
index of red soil is 25.4%
B. Clay
The specific gravity of red soil is found to be 2.72

Fig. 6. Liquid limit for Clay, Red soil and Bagasse ash

The Liquid limit of Clay, Red Soil & Bagasse Ash


combination is 33%
The Plastic limit of clay- Red soil-Bagasse Ash is
11.11% & Plasticity index of clay-Red soil- Bagasse
Fig. 5. Liquid limit graph for clay soil
Ash is 21.89%

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 839
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VI. CONCLUSIONS
• Bagasse ash and quarry dust is available in large
amount throughout the year. As the production of
bagasse ash and quarry dust is in large quantity, it
can be utilized for the manufacture of construction
material like brick etc.
• It is known from the graph that the compressive
strength of the brick which is partially replaced by
bagasse ash and quarry dust obtain an optimum value
at 20%, at a firing temperature of 9000C for
manufacturing of clay-bagasse quarry brick.
• If the quarry dust and bagasse ash are directly
disposed on land then the permeability of the soil
reduces due to the blockage of pores in soil, which
leads to stagnant of water and becomes the breeding
Fig. 7.s variations in Liquid Limit of various mixtures
place for the mosquitoes causing many diseases to
V. TESTING OF NON-CONVENTIONAL living beings.
BRICKS • Since the disposal of these wastes is costlier it can
After 24 hours of soaking in potable water, two be partially replaced in a brick and also the usage of
clay and red soil is considerably reduced.
bricks from each type are selected for compression
strength testing and water absorption testing. For clay- • The reduction in the weight of bagasse quarry clay
bagasse and quarry bricks, the technique provided in brick without compromising on strength could be
IS 3495-part 1:197(9) for evaluating standard size clay advantageously used for multi-storey construction to
bricks applies. With the use of a compression testing reduce the dead weight of the structure. This brick
machine, the compressive strength is determined. As a can be used to build compound wall and for low cost
construction buildings.
rough approximation, two specimens are tested for each
percentage, and the average of the two results is utilised. • Main conclusion is that the compressive strength of
Water-immersed specimens having a significant amount clay sludge brick is 20- 25% more when compared
of trash did not yield encouraging findings in terms of to conventional brick. This is achieved when clay and
compressive stress and water absorption. Due to the red soil are partially replaced by bagasse ash and
fact that the test specimens did not meet the required quarry dust by 20% each respectively.
dimensions stipulated in the IS code, we manufactured REFERENCES
and examined samples of commercial bricks of similar
[1] R.V. Raikar, V.V. Karjinniand, and V.D., Gundakalle, Study on
size. In order to compare the strength of the lab-scale strength parameters of steel fiber reinforced high strength concrete,
bricks to the strength of standard-size bricks, these data Journal of Applied Sciences and Engineering Research, 1(4)
were used. (2012).
[2] A.A. Al-Azzawi, A.S. Ali, and H.K. Risan, Behavior of ultra-
A. Reduction in weight of bricks high performance concrete structures, ARPN Journal of
Engineering and Applied Sciences, 6(5), (2011) 95-109.
Bagasse ash and quarry dust are used to decrease [3] Aigbodion, V.S, Hassan. S. B, Ause. T and Nyior. G. B, Potential
the bricks' weight. The weight of the brick decreases Utilization of Solid Waste (Bagasse Ash), Journal of Minerals &
Materials Characterization & Engineering, Vol. 9, No.1, pp.67-
as the percentage of trash added increases. In addition, 77, 2010.
the bagasse includes aluminium, a light weight material. [4] Alaa A. Shakir, Siva Kumar Nagana than, Kamal Nasharuddin
As a result of the increased sintering temperature, weight Mustapha, properties of bricks made using flyash,quarry dust
loss did not rise much. and bilet scale, construction and building materials 41(2013) 131-
138.

840 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[5] Faria. K. C. P, Gurgel. R. F, Holanda. J. N. F, Recycling of [10]Asok, G., & George, S. (2016). Investigation on hybrid concrete
sugarcane bagasse ash waste in the production of clay bricks, using steel and polypropylene fiber. International Journal of New
Journal of Environmental Management 101 (2012) 7-12. Technology and Research, 2(5).
[6] Lianyang Zhang, Production of bricks from waste materials - A [11]Parthiban, P. M. E., ME, M. R., MIE, D., & George, S.
review, Construction and Building Materials 47 (2013) 643-655. Comparative Study on Strength Enhancement of Concrete Using
Magnetic and Normal Water. International Journal of New
[7] J.H. Xie, Y.C. Guo, L.S. Liu, and Z.H. Xie, Compressive and
Technology and Research, 2(5).
flexural behaviours of a new steel-fibre-reinforced recycled
aggregate concrete with crumb rubber, Construction and Building [12]IS 3495-part 1:197(9) (Determination of Compressive Strength)
materials, 79, (2015) 263-272
[13]IS 3495-part 2:1992(Determination of water absorption in brick)
[8] T. Alagunatrayan, P. Mohanraj, S. Manishankar et al., Engineered
[14]Is 2720-part 5:1985(Method of test for soil-Determination of
cement composite enhanced reinforced concrete beams
liquid and plastic limit )
usingflexural response: An experimental study, Materials Today:
Proceedings,https://doi.org/10.1016/j.matpr.2021.07.130
[9] P. Parthiban, S. Kar, A. Kumar Mondal et al., Stress-strain
behaviour of (hpfrc) high-performance fibre reinforced concrete:
Anexperimental study, Materials Today: Proceedings,https://
doi.org/10.1016/j.matpr.2021.07.175

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 841
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

To Study the Behaviour of Nanoparticles in Concrete;


Nano-Concrete
S Sivasankari1, S Raja2
1
Department of Civil Engineering, Nanotechnology Division, Periyar Maniammai Institute of Science and Technology
2
Department of civil and Annamalai University
Email: sivasankarinanotech@gmail.com1, rajamestructure@gmail2

Abstract- Nanotechnology is one of most active In the middle of 2003, a chemical that could replace
research areas which have wide application in all micro silica was produced with improved properties at
construction fields. In this paper, a study is carried a lower cost while still meeting ISO14001
out about Nano materials used like nano silica, environmental regulations. Cuore Nano silica was
nanoTio2, and carbon nanotubes which are less
developed using physics, chemistry, and recent Nano
than 500 nano meter. Nano silica has heat transfer.
Nano Tio2 also has heat transfer and UV absorption
technology to create a breakthrough product with
character. By the addition of nano silica, durability superior advantages over micro silica. A barrel full of
and strength performance is increased than micro silica, extra cement, and super plasticizing
conventional concrete. admixtures was equal to a litre bottle of Nano silica. At
28 days, compressive strengths of 70 to 100 N/mm2
Keywords: Nano particles, Nano technology,
concrete, durability. have been recorded.
The addition of nanosilica to cement-based materials
I. INTRODUCTION
can also regulate the deterioration of concrete's
SILICON DIOXIDE NANOPARTICLES fundamental C-S-H (calcium-silicate hydrate) reaction
caused by calcium leaching in water, as well as block
Silicon dioxide nanoparticles, often known as silica
water penetration, resulting in improved durability. High
nanoparticles or nano silica, are found in quartz and
workability with low water/concrete ratios, such as 0.2.
sand in nature. It is the first Nano product to succeed
in replacing micro silica. Nano silica has proven to be TITANIUM DIOXIDE
much superior to the silica used in traditional concrete,
Titanium dioxide is a mineral that is found in
thanks to advances made possible by the analysis of
nature.Rutile and anatase are the two crystal types of
concrete at the nanoscale. For more than 80 years,
nano titanium dioxide. It has a high purity, a particle
micro silica has become one of the most commonly
size average of less than 100nm, excellent clarity, and
used additives in concrete around the world. Its
UV absorption. It is also thermally and chemically
properties allow high compressive strength, toughness,
stable. Photocatalysts are generated using the anatase
and impermeability, and it has been used in a number
crystal form. It can help break down hazardous gases
of significant concrete structures.
and organic pollutants through photo-catalysis when
Its primary drawbacks are its relatively high cost illuminated.
and pollution, all of which have negative consequences
In addition to decomposition of vehicle exhaust and
for the environment and the health of construction
sewage treatment, the anatase form may be used. The
workers. As a powder, micro silica is a thousandth of
rutile crystal form excels at UV absorption, and the
the thickness of cigarette smoke. As a result, operators
Nano titanium dioxide powder has a strong bactericidal
must take extra care to avoid inhaling micro silica, which
powder under the combined action of UV rays and
can lead to silicosis, a fatal lung disease.
oxygen. The rutile type provides a fine and smooth feel

842 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

ideal for sunscreens and cosmetics due to its smaller for cement in the M25 mix in amounts of 1%, 1.5%,
particle size and high specific surface area. It's a 2%, 3.5%, and 4%. The impact of nano-silica on the
common ingredient in cosmetics, sunscreen, and high- strength and durability of M25 concrete grades using
quality plastics. nano-silica as a cement substitute is summarised in this
report. The compressive strength of nano-concrete is
CARBON NANOTUBE reduced by more than 3.5 percent when cement is
A carbon nanotube is a tube-shaped substance made replaced with nano-silica. According to the findings of
of carbon with a diameter that is measured in the experiments, the permeability of concrete decreases
nanometers. One billionth of a metre, or 10,000 times as the percentage of nano-silica increases up to 3.5
smaller than a human hair, is a nanometer. CNTs are percent.
unusual in that the atoms' bonds are extremely tight, Due to the pore filling properties of nano materials,
allowing the tubes to have extreme aspect ratios. Vasanthi et al (2017) found that concrete containing
Carbon nanotubes are graphitic carbon tubes on a nano particles has increased strength, toughness, and
molecular scale with exceptional properties. They can reduced pores in the concrete. Nanomaterials are
be several millimetres long and have one "layer" or wall beneficial in extending the life of a structure. The use of
(single walled nanotube) or multiple walls (multiwalled a significant amount of cement results in an increase in
nanotube) (multi walled nanotube). CO2 emissions. Nano Silica creates concrete with a
Carbon nanotubes are a type of graphite that has high compressive strength. It also has a high workability
been updated. Many layers of carbon atoms are bonded while having a low water cement ratio.
in a hexagonal pattern in fiat sheets, with weak bonds Sakthivel and colleagues (2017) By replacing the
between the sheets and strong bonds between them, cement with various percentages of Nano-Silica and
to form graphite. A carbon nanotube (CNT) is made natural hybrid fibres, the effect of Nano-Silica on various
up of a sheet or sheets of graphite rolled into a tube properties of concrete can be determined. For M25
shape. CNT can be single walled nanotubes (SWNT), mix, nano-silica is used as a partial substitute for cement
which look like a single sheet rolled up, or multiwall in the percentages of 0.5 percent, 1 percent, 1.5
nanotubes (MWNT), which look like several sheets percent, 2 percent, and 2.5 percent, and hybrid fibre
rolled up. (coir fibre and human hair) in the percentages of 0.5
percent, 1 percent, 1.5 percent, 2 percent, and 2.5
POLYCARBOXYLATES
percent. Nano-Silica concrete is used to cast the
Polycarboxylates are a type of polymer.Super specimens. At the age of 28 days, laboratory
plasticizers, also known as high-range water reducers, experiments were performed to assess the strength of
are chemical admixtures that are used in applications Nano-Silica concrete. As cement is replaced with Nano-
that involve well-dispersed particle suspension. Poly- Silica, the resulting concrete has a higher strength and
carboxylate ether based super plasticizers are a new lower permeability than managed concrete. As cement
generation of these types of admixtures (PCEs). Due is replaced with Nano-Silica at a rate of more than 3%,
to their chemical structure, which allows for good the properties of Nano-Silica concrete are reduced.
particle dispersion, they allow a water reduction of up
Namdev BapuRajguru and others (2017) This paper
to 40% with a relatively low dosage (0.15-0.30 percent
demonstrates the partial replacement of cement with
by cement weight).
Nano silica at different weight percentages of 1 percent,
II. LITERATURE REVIEW 1.5 percent, and 2 percent to improve the strength
property of concrete, as well as a comparative analysis
Pranay Lanjewar and colleagues (2017)
between concrete without Nano silica and concrete with
Nanotechnology is one of the most active research
Nano silica. The application of Nano silica to concrete
areas, and Nano-Silica is used as a partial substitute

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 843
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

increases its compressive power, according to the concrete can be determined. In the M25 blend,
findings of this article. With respect to dosses, the NanoSilica is used as a partial substitute for cement in
average percentage rise in concrete strength after 3 the proportions of 2.5 percent, 3 percent, and 3.5
days, 7 days, and 28 days is 10.3 percent, 15%, and percent. Nano-Silica concrete is used to cast the
19.43 percent, respectively. specimens. At the ages of 7 and 28 days, laboratory
Rahini and her colleagues (2017) The use of titanium experiments were performed to assess the compressive
dioxide (TiO2) to improve the strength of concrete is strength, split tensile strength, and flexural strength of
the subject of this research. By replacing the cement Nano-Silica concrete. The concrete's compressive
with titanium dioxide (TiO2) of 0.5 percent, 1 percent, strength was increased by using Nano-Silica powder,
and 1.5 percent by water ratio, an experimental according to the findings.The compressive strength of
investigation was carried out. This test on it reveals a concrete initially increased up to 3% Nano-Silica
significant rise in early age compressive strength as well content, but as the Nano-Silica content increases, the
as an improvement in overall concrete compressive compressive strength of concrete decreases.
strength. With an increase in the percentage of nano Rajkumar et al. (2016) In this paper, an attempt is
silica, the intensity increased. made to improve the strength characteristics of concrete
Namdev Rajguru and his associates (2017) The by adding Nano-silica, which not only serves as a filter
partial replacement of cement by Nano silica powder to improve the microstructure but also as an activator
(1 percent, 1.5 percent, and 2 percent) by the weight to facilitate pozzolanic reaction, resulting in improved
of cement is demonstrated in this paper. Then, instead mechanical properties of the concrete mix. Nano silica
of doing a comparative study of compressive strength will substitute up to 1.5 percent of cement. According
of concrete with and without Nano silica, do a to the findings of the water absorption test, nS concrete
comparative study of compressive strength of concrete is more stable than standard concrete. For the M20
with and without Nano silica. Nano silica has the blend, the percentage increase in strength after 28 days
potential to minimise environmental pollution by lowering was found to be 35 MPa for compression and 45 MPa
CO2 emissions in the atmosphere. This paper also for tensile strength.
demonstrates an increase in concrete permeability. Umesh Pendharkar and colleagues (2016) This
Ramachandran and his colleagues (2017) The paper examines recent advancements and the current
behaviour of RC slab structures made of Natural hybrid state of nano alumina, nano titanium dioxide, nano zinc
Fibre (coir and hair) and Nano silica reinforced oxide, and nanosilica for the long-term growth of the
Concrete (NHFRC) was studied in this paper. In the concrete industry. Nano-materials were used to
experiments, different percentages of fibres ranging substitute cement in M20, M30, M40, and M50 grades
from 0.5 percent to 2.5 percent by weight of cement at different percentages (2 percent, 4 percent, 6
were used, as well as different percentages of Nano percent, 8 percent, 10 percent, 12 percent, 14 percent,
silica ranging from 0.2 percent to 4.5 percent by weight 16 percent, 18 percent, and 20 percent). The effect
of cement. The use of NHFRC with Nano silica was decreased by more than 3.5 percent when Nano
enhances slab loading efficiency under static loading, particles were replaced.
according to the test results. As compared to a control Arun Nishchal Guleria et al. (2016) investigated the
slab, the slab with 1.5 percent NHFRC and 3 percent impact of MS and NS on concrete properties at various
Nano silica exhibits a 73.33 percent increase in ultimate percentages in various concrete grades. Concrete
load and 56.97 percent increase in deflection. strength with varying percentage ratios of nano silica at
Balasundaram and colleagues (2016) By replacing 0, 1, 1.5, 2, and 2.5 percent ( percent ) with partial
the cement with various percentages of Nano-Silica, cement substitution. On the 7th and 28th days, the
the effect of Nano-Silica on various properties of maximum increase in compressive strength with nano

844 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

silica was 10%. The power was 38.7 MPa on the 7th clearly confirmed that the workability of nano concrete
day at 10% and 58.5 MPa on the 28th day. increased by more than 90% as compared to monitored
Mohamed and his colleagues (2016) The aim of this M40 Grade concrete. Under normal curing conditions,
study is to look at the bond efficiency of concrete with the compressive strength of nano concrete with nano-
a high volume of nano silica (up to 4.5 percent) that has SiO2 increased by more than 24% at 28 days and more
been exposed to corrosive conditions. In comparison than 18% at 90 days, whereas that of nano concrete
to the control mix (0%) before exposure to the corrosive with nano-TiO2 increased by more than 9% at 28 days
atmosphere, adding 4.5 percent nano silica to concrete and more than 6% at 90 days. When exposed to MgSO4
raised the residual bond strength to 79 percent instead and MgCl2, however, the regular concrete specimens
of just 27 percent. Based on the results of the research, had a higher crushing strength than the nano concretes.
we can infer that Nano silica is an effective pore Malek Mohammad Ranjbar et al. (2015) looked
blocker. into the hardened properties of HPC that included
Renu Tiwaret and others (2016) The study is nanoTiO2 (NT) and Fly Ash (FA). Low-calcium fly ash
primarily concerned with the use of nanomaterials in at a rate of 30% of the binder by weight and TiO2
concrete. Researchers are also working to enhance the nanoparticles at rates of 1, 2, and 3% were considered.
quality and sustainability of concrete, and have found Water absorption by capillarity, ultrasonic pulse velocity,
that integrating nanosilica into the mix has resulted in a chloride diffusion, and resistance to sulphuric acid attack
substantial increase in mechanical properties. The effect were used to evaluate the durability efficiency. The
of adding nanosilica to concrete's compressive strength properties of the samples improved significantly after
is summarised in this review article. 2 percentage points cement was replaced with a mixture of 1% TiO2
At 3 days and 7 days, NS decreases initial and final nanoparticles and 30% FA, according to the findings.
setting time while increasing compressive intensity by Haininet al. (2014) studied the use and efficiency of
22% and 18%, respectively. nano silica in porous concrete pavement, as well as
Mohammad Reza and his colleagues (2016) The previous laboratory studies on the material. Various
effect of combined nanosilica (nS) and microsilica (mS) additives have been studied as a part of the porous
on sulphate resistance of Portland cement (PC) mortars concrete mix to increase the strength of the porous
was compared to all cement control mortars and concrete, but the optimal condition for producing strong
mixtures with only one type of silica. Silica-containing porous concrete has yet to be determined. using a
mortars had a 6% cement substitution of either nS, mS, pneumatic press and a regular Proctor hammer (2.5
or a combination of the two. A 1.5-year cycle of kg) (70 kPa compaction effort).
complete submersion sulphate attack in a 5% sodium Arkadeep Mitra et al. (2014) contrasted the results
sulphate (Na2SO4) solution was used to test the mortars of ground and unground micro-silica with concrete in
in this analysis.it Provided that the combination mixtures' 5, 10, and 15% as a partial replacement for cement to
expansion efficiency was comparable to that of the 3 traditional concrete. In the lab, concrete specimens were
percent mS only mortars, the majority of the beneficial cast and tested for compressive and tensile strength.
contribution from the cement replacement with the
combination mixtures could be attributed to the mS III. CONCLUSIONS
proportion. From above literature study carried out, the following
Mainak Ghosal and his colleagues (2015) This paper points about nano concrete are observed:
looks at how adding nanomaterials (like nano-SiO2 and The above papers show partial replacement
nano-TiO2) to a normal M-40 Grade concrete in the Nanomaterials like nano silica which improves the
right proportions improves its fresh and hardened strength ofconcrete.The tests conducted on cubes,
properties (both short term & long term). The findings cylinders and prismWhich shows compressive, split

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 845
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

tensile and flexural strength increased.The effects of [4] Namdev Rajguru " Review Paper on Multifunctional use of Nano
Silica in Concrete" 2017 IJESC Volume 7 Issue No.4
different ratios of Nano-Silica to cement content were
well investigated, and the optimum ratio of 3 percent [5] P.Vasanthi, S.Senthilselvan, D.Benita Hexton,Mohamed Salman
Farooq, and P.Suresh "Durability Study on Nano Concrete"
was reported.Resistance to permeability was also higher International Journal of ChemTech Research CODEN (USA):
in concrete. Corrosion resistance property of the nS IJCRGG, Vol.10 No.3, page:693-698, 2017
added concrete is comparatively higher than ordinary [6] Patel Abhiyan, RathodHiren A, Neeraj Sharma D, ''Overview on
fly ash concrete.The mass of concrete mixtures including application of nano technology in construction industry'', vol 2,
Page No 6094-6098, November 2013.
fly ash is greater.loss as a result of a sulfuric acid assault
Concrete's workability deteriorates as the temperature [7] Pranay Lanjewar1, Anjali Jaiswal2, Ayushman Jain'' Experimental
Study on the Strength and Durability of Nano-Concrete''
rises.the amount of silica fume present.Nano concrete International Journal of Innovative and Emerging Research in
has a longer lifespan than traditional concrete.traditional Engineering Volume 4, Issue 3, 2017
concrete.Tension cracks appeared in the NHFRC [8] R.sakthivel, K.Rajkumar, R. Roja, Ramya Reji, M.Vigneshvaran
beams as a result of NS in the loaded zone.It's also "Investigation of natural hybrid fiber reinforced beam with
nanoconcrete under cyclic loading" 2017 IJRTI | Volume 2, Issue
possible to deduce that the permeability of concrete 5|
reduces as the percentage of concrete decreases.Nano-
[9] S. B. Gagare1, U. R. Kawade "Enhancing properties of concrete
Silica due to the action of Nano-Silica, up to by using Nano-Silica As A Partial Replacement Of Cement" Ijariie-
3%.Concrete cavities must be filled.The results of the ISSN(O)-2395-4396 Vol-2 Issue-5 2016
water absorption test indicate that ordinary concrete is [10]Sakshi Gupta, Application of Silica Fume and Nanosilica in
more durable than nS concrete concrete. Cement and Concrete - A Review, Journal on Today's Ideas -
Tomorrow's Technologies, Vol. 1, No. 2, December 2013 pp. 85-
The impact of varying Nano-Silica to cement ratios 98.
content was thoroughly examined, and the ideal ratio [11]Saloma, AmrinsyahNasution, Iswandiimran, ''Experimental
of The percentage was reported to be 3%.Nanosilica investigation on nano material concrete'', vol :13 No:03,Page no
Resistance is added to permeability.In concrete, it was 15-20, 2013.

also higher.The usage of a high amount of cement results [12]Yuvraj Shanmugasundaram, Dinesh Nagarajan, ''Behaviour
investigation on the use of nano silica as an additive inconcrete'',
in an increase in the amount of cement used.Emissions vol.3, no 1, Page no 6-12, October 2013.
of CO2.Based on the results of the testing, it has been
determined thatconcrete made with 20% fly ash and
3% nano silicaWhen compared to the individual
components, the combination has better qualities.
Concrete that has been carefully monitored. The nS
added concrete's corrosion resistance characteristic is
Compared to typical fly ash concrete, it has a higher
density.
REFERENCES
[1] Mohammad Reza Sohrabi, Mohammad Karbalaie, ''An
experimental study on compressive strength of concretecontaining
crumb rubber'', vol:11 No:03, Page No 23-27, June 2011.
[2] Morteza. H. Beigi, JavadBerenjian, Iman M Nikbin, ''An
experimental survey on combined effects of fibres and nano silica
on mechanical, rheological and durability properties of self-
compacting concrete'', vol.50, Page No 1019-1029, September
2013.
[3] Nader Ghafoori " Effect of Combined Nanosilica and Microsilica
on Resistance to Sulfate Attack" Fourth International Conference
on Sustainable Construction Materials and Technologies.

846 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Comparison of Buildings with Different Plan


Orientation Using SAP 2000 Software
Gandla Nanabala Sreekanth1, Kummari Srikanth2
1
Assistant Professor, 2PG Student
1,2
Department of Civil Engineering, Rajeev Gandhi Memorial College of Engineering and Technology,
Nandyal, Andhra Pradesh
Email: Sreekanthcivil100@gmail.com1, kummarisrikanth2320@gmail.com2

Abstract- Structures can have substantial harms four major layers like inner core, outer core, mantle
or breakdown in light of serious tremors. Past and crust. the formation of earthquake happens due to
examinations showed that underlying harm because collision between two blocks suddenly slip past another
of quake is the reason for enormous dislodging. this is the earthquake start for below the earth surface
As a construction is exposed to the tremor, it
is called hypocentre. during earthquakes generates
results vibrating. Here the fundamental aim of
investigation for the quake safe constructions is
seismic waves travel for along the surface of earth, the
that structures to have the option to oppose minor seismic waves categories mainly two types as body
seismic tremors without harm. So, all the four zones waves and surface waves, the intensity of earthquake
and three kinds of structures are square shape, in forces measured by instrument called seismographs and
addition to Plus shape and U-shape building have recording data is called seismogram.
been taken under thought. SAP 2000 V20
Now a day's earthquake zone areas are massively
(Extended Three-Dimensional Analysis of Building
System) is a product that is consolidated with all
damage to the structural elements like beams, column,
the significant investigation motors that are static, slab and walls, so construct any building to analysis for
dynamic, Linear and non-straight and particularly different structural analysis methods can be categories
this Software is utilized to investigate and plan the as following below.
structures. The current work is to contemplate the 1. Linear static analysis
conduct of a G+5 building exposed to tremor load
by embracing seismic coefficient technique. We 2. Nonlinear static analysis
broke down G + 5 story working for all conceivable 3. Linear dynamic analysis
burden blends [Dead, Live Seismic loads]. Seismic
burdens were taken according to IS 1893: 4. Nonlinear dynamic analysis
2016(part1). The final objective of this work is
The objective of this paper is analysis for seismic
analysis and design of rectangle, plus shape and
coefficient method by taking three different shape of
U-shape structures in all seismic zones of zone2,
zone3, zone4, zone5 for determining for buildings under taking for zone-2, zone-3, zone-4,
displacement values and then compare all the zone-5 considering the structure due to lateral loads
displacement values in various structure in all and structure loads will be sustain the all the forces and
zones then conclusion is which is the best shape deformation of buildings to adequate the durability and
structure to construction for seismic zone of India resistances of high seismic regions which is the best
Keywords: Displacement, Rectangle shape suitable structure of these structures.
building, plus shape building U-shape building

I. INTRODUCTION
Generally, earthquakes are occurring in below the
ground surface level, the surface of earth classify as

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 847
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

II. LITERATURE REVIEW


The author take different shape of buildings like
Rectangle ,L,C types building to conclude that rectangle
shape is best to remaining shapes[1] related this work
another article say L and T shape buildings due to
seismic to prefer regular buildings only[2] the
displacement is less when compare to rectangle , L , C
shape structures and regular buildings also less
Fig 1: plan for three buildings displacement then irregular buildings[3] the seismic
zones are taken for different region like zone-2,3,4,5
1.1 Load Considerations
and author say increasing storey height in seismic regions
The loads taken from the IS: 875(part1part2) and stiffness will be increase up to 6 th storey after
load combinations are taken IS: 1893:2016 (part1) for decrease[4] this article comment is high seismic zones
earthquakes code books are following below mention. are heavy damaged for high rise building to resistances
Unit weight of concrete = 25kN/m3 by using IS:1893:2016(part1) code book for all seismic
structures[5]
Unit weight of brick = 20 kN/m3
III. METHODOLGY
Dead load = 2kN/m2
Live load = 25 percentage of dead load 3.1 Seismic Coefficient Method
The easiest strategy for examination and requires
1.2 Buildings details
less computational exertion on the grounds that. The
Number of storeys = 6 powers rely upon the code based crucial time of designs
Plan size = 15m*20m with some observational modifier. figure the plan base
shear for entire construction and convey along stature
Beam size = 0.35m*0.3m of the structure's dependent on straightforward
Column size = 0.4m*0.4m equations to standard circulation of solidness and mass.
The accompanying advances are given underneath
Slab thickness = 0.15m
Floor height = 3m 3.1.2 Determination of base shear
Wall thickness = 0.15m[internal] The plan base shear controlled by following provision
7.6.1 of IS:1893(part1):2016
Wall thickness = 0.23m[external]
1.3 Reinforcement details
Ah = plan flat seismic coefficient for a construction
Grade of concrete = M30
W = seismic load of building
Grade of steel = FE415&Mild 250
Unit weight of concrete = 25kn/m3 Ah =( ) according to proviso 6.4.2
Unit weight of brick = 20kn/m3 Z=seismic zone calculated given table 3 for proviso
6.4.2
3 bars for column @ 20mm diameter
I= significance factor for take 1
3 bars for beam @ 20mm diameter
R= reaction decrease factor

848 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3.1.3 Determinationof fundamental natural The after analysis of structure then apply earth quakes
period forces in x-direction and y-direction as per IS:
Provision 7.6.2 of IS:1893(part1): 2016 as given 1893:2016(part1) code book in three buildings like
beneath rectangle, plus, U shape structures given the above fig

(for MRF building) IV. GRAPHS AND RESULTS

(for RC-steel composite MRF The after completion of analysis we get the
building) displacement values for all the zones and compare the
values in different zones to different shapes. The
(for steel MRF building) deformation values along the x-axis and y-axis to draw
the graphs by using excel sheet.
3.1.4 Vertical Base shear

plan parallel power at floor I


seismic load of floor I
height of floor I
n = no of stories Fig 4: zone-2 displacement

3.2 Modal analysis

Fig 5: zone-3 displacement


Fig 2: analysis for three building

The analysis of rectangle shape, plus shape and U-


shape building for G+5 structure by using SAP 2000 v
20 software in seismic coefficient method is used,
initially the structure not to analysis then applying forces
to structure to form above fig

Fig 6: zone-4 displacement

Fig 3: deformation for three buildings

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 849
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES
1. Mohammad Reza Sohrabi, Mohammad Karbalaie, ''An
experimental study on compressive strength of concretecontaining
crumb rubber'', vol:11 No:03, Page No 23-27, June 2011.
2. Anil, K. Chopra, "Dynamics of structures", Prentice-Hall of
India Private Limited New Delhi India, 2008.
3. Rajaram. P., Murugesan .A, "Experimental study on behaviour
interior RC Beam column joints subjected to cyclic loading"
International journal of applied engineering research, volume 1,
2010.
Fig 7: zone-5 displacement
4. Ruichong, " Modeling of seismic wave motion in high-rise
V. CONCLUSIONS buildings" Probabilistic Engineering Mechanics 26 (2011) 520-
527.
In this study of load calculation and structural analysis 5. Wakchaure M.R, Peed S.P.,"Earthquake Analysis of High Rise
of the G+5 building to design for earthquake resistances Building with and without In filled walls" International Journal
for different zones by applying earthquake codes for of Engineering and Innovative Technology(IJEIT) Vol.2, 2012.

resisting lateral forces of the structure in high seismic 6. Raju k .R,"Analysis and Design of RC Tall Building subjected to
wind and earthquake loads" National Conference on Emerging
zones of the India. Then my summary of work following Technologies in civil engineering, (2013).
points describes below clearly.
7. Sanjay Naik and Tushar S Shetty Comparison of Rectangular
1. In all the zones w.r.t to displacement along x-direction Shape, L Shape and C Shape Multistorey Structure Under the
plus shape will have less displacement when compare Effects of Earthquake" (2019).
to rectangle and U-shape buildings. 8. Mohammed Mohiuddin and Hashim Mohiuddin Dynamic
Analysis of RCC Multistorey Framed Structure with Different
2. In all the zones summery of displacement along y- Plan Configuration" (2017).
direction plus shape building less displacement to
9. Pushkar Rathod and Rahul Chandrashekar "Seismic analysis of
compare the rectangle and u- shape buildings multistoried building for different plans using ETABS 2015"
(2017).
3. Then compare rectangle shape and U-shape structure
in all seismiczonerectangle shape is less displacement 10. Abhay Guleria "Structural analysis of a multi-storeyed building
for U-shape building using ETABS for different plan configurations" (2014).
11. NilenduChakrabortty, AkshitLamba "Analysis and design of G+3
4. They are summary for rectangle structure will be safe building in different seismic zones using ETABS" (2020).
because of less displacement value of comparing U-
12. Anju sasi and Teena joy "Comparative study of static and
shape buildings dynamic seismic analysis of 44multi storeyed RCC building by
5. It`s concluded that plus shape building is safe when using ETABS for different configurations" (2020).
compare to rectangle and u-shape buildings in the
zone-2,3,4,5.

Future study
The future scope for above study is analysis for
different methods like responses spectrum method and
time history analysis for different shape of buildings in
seismic zones.

850 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Impact of Various Influencing Factors on NMT


Modechoice
U. Anand Anil
Assistant Professor, Department of Civil Engineering, SITAMS College, Chittoor
Email: anandpillai002@gmail.com

Abstract- In the current study we bring out the and social justice and equity (Plaut, 2005). But in India
impact of various social, economic, environmental, even low income residents are forced to depend on
and transportation system characteristics on walk motorized vehicle because of accessibility issue
and cycle mode choice, when they are used as a (Srinivasan and Rogers, 2005), thus reducing the social
main mode. The environmental factors include
equity. Bolstering the argument supporting the need for
density and land use. The impact is determined
using a logistic regression model, developed from high density urban centers, Badland and Schofield
the house hold survey data of Bangalore city, (2005), and Chen et al (2008) related this environment
collected for the year 2009. The results showed a factors with increased health and sustainability, among
reduced likeliness to walk and cycle, with an citizens.
increase in travel time using walk and cycle, and Our current study is an attempt to understand the
individual age. Individuals owning at least a private
extent of impact of characteristics: socio-economic,
motor vehicle had less probability of using walk
and cycle compared with individuals not owning any
transportation network, and environmental; on the walk
private motor vehicle. Females had a positive and cycle mode choice, when they are used as the main
attitude towards walking than male. Mixed Land- mode.
use and increased density had a positive impact on
II. LITERATURE REVIEW
walk and cycle mode use when compared with their
reference group. Many studies have been done with respect to the
Keywords: walk and cycle; mode choice; impact determination of different factors affecting
environmental factors walking and cycling mode choice. Ortuzar (2000) and
Parkin (2008) found a negative relationship between
I. INTRODUCTION increasing car ownership and bicycle mode choice.
Non motorized transport (NMT), which mainly Wardman et al (2007) determined a negative effect for
includes walk and bicycle, has got a number of age on cycling in Britain, while Plaut (2005) determined
advantages. Some of their advantage include less a positive influence for age on walking and cycling in
congestion; less health, accident and social cost; and United States. Noland and Kunreuther (1995) found a
reduced infrastructure costs. However, these positive likeliness for male in using walk and cycle; on
advantages have not , especially in India. Hook and the other hand Agrawal and Schimek (2007)
Replogle (1996) explained how Asian cities are facing determined a negative likeliness for male to walk. An
an environmental degradation because of the motor increase in the travel time using cycle was determined
vehicle boom, and how the Government policies having a reducing impact on the probability of choosing
controlling land-use and density which favor walking a cycle (Wardman et al, 1997).
and cycling, can form one of the solutions for this issue. Buys and Miller (2011) suggested that perceived
According to Plaut (2005) there are at least three transport convenience was modulated by journey
reasons why walking and cycling should be promoted destination and purpose, with subsequent impacts on
over motorized modes. Those are: reduction in car use; travel mode choice. Supporting this notion Ortuzar
planning of urban space by promotion of public transit; (2000) found a positive impact for school purpose for
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 851
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

bicycle mode. Other factors influencing NMT mode as the main mode. The model was estimated using the
choice mentioned in studies were the population density software biogeme (Bierlaire, 2003; Bierlaire, 2008).
and land-use. Badoe and Miller (2000) pointed out The estimation of model was done using the estimation
the mixed results elicited by various studies on the effect tool and sample aggregation was done using the
of land-use and density. Cervero (1996) and Cervero simulation tool in Biogeme. The various factors include
and Kockelman (1997) respectively found out a positive demographic characters of sex, level of education, age,
correlation between NMT use and mixed land-use, and household income, private vehicle ownership, whether
NMT use and high density. Rodriguez and Joo (2004) the purpose of trip is to school; transportation system
arrived at a inconsistent relationship between non- characteristic of time of travel by walk or cycle; and
motorized mode choice and increasing density. environmental characteristics of population density and
Rodriguez and Joo (2004) also pointed to the necessity land use. The land use here is expressed as a ratio of
to include certain factors correlated with the the employment and population in the origin zone of a
environment factors, like vehicle ownership, so that the trip. An arbitrary range of this ratio between 0.8 and
environmental factors are not over estimated. 1.1 is used to classify the land use as mixed. If this ratio
In India only few studies has been done for identifying is less than 0.8 we attribute population to be more than
the impact of different factors on walk and cycle usage. employment in that zone and deem it as a residential
One such study was done by Arasan et al (1996) in zone. Conversely if ratio is more than 1.1 we consider
which the trip characteristics of travelers without vehicles it as a zone were employment opportunities are more
was identified using a logit model. The authors in this than residing opportunities. Cervero (2002) used a land
study used a set of socio-economic variables and a use diversity variable with respect to the origin zones
travel related variable of trip distance in developing the trips. This was determined as retail employment and
logit model. Another was a segmentation analysis done population relative to countywide ratio. In our current
by Rastogi and Rao (2009) for different modes including study logistic regression is done for both walk and cycle
an NMT using socio-economic variables and travel separately. Captive riders are deleted from the trip data.
related variables. Jain et al (2010) evaluated the The travel time of walk and cycle modes when they are
influence of bicyclist comfort and safety perception not the chose mode are found out by dividing distance
using a route choice model. Other NMT studies mainly travelled with average speed of walk (0.0719
pertained to analyzing, walking distance, walking speed, Kilometer/Minute) and cycle (0.146 Kilometer/
and wand walking flow (Arasan et al, 1994; Rastogi et Minute), determined from the current data.
al, 2011; Rastogi and Rao, 2003; Laxman et al, 2010). Binary logistic regression is a technique which is
From the above literature review it is clear that there employed to determine the influence of continuous or
is a dearth of studies for understanding the impact of categorical variables on the probability of choosing an
various factors influencing NMT mode choice in India. option. In the current study we use categorical variables.
No studies are done in India which elicits the influence The option usually is ‘yes’ or ‘no’, in our study the
of environmental factors. Our study tries to put some option is whether NMT is chosen as the mode or not
light on this issue. We develop a logistic regression model for a particular trip.
using a set of socio-economic, transportation network,
and environmental variables; and try to bring out the
extent of their effect with respect to their variation, in
walk and cycle mode choice.
III. METHODOLOGY
A logistic regression is used in estimating the extent
of influence of variables when walk and cycle are used

852 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 1. Variable categories, their reference and mean medium gradient, and has a pleasant and equitable
Variable Categories Reference Mean climate throughout the year. It has got a population of 8
case Walk cycle
Travel time Over 20 20 minutes or 0.31 0.39 million (Comprehensive Traffic and Transportation Plan
minutes less for Bangalore, 2007). The area of Bangalore
Age 18-50 18 years or 0.75 0.86
less
metropolitan region is around 8000 sq km of which
Over 50 18 years or 0.10 0.12 2191sq km is in the urban districts.
less
Gender Male Female 0.77 0.80 Details collected in secondary data included
Education level literate illiterate 0.84 0.86
House hold 5000 Rupees- 5000 Rupees 0.57 0.87 personal characteristics of age, gender, occupation,
income 20000 Rupees or less education level, marital status etc; house hold
Above 20000 5000 Rupees 0.02 0.02
Rupees or less
characteristics of income, number of earners, type of
P rivate motor 1 or more none 0.34 0.37 residence etc; and trip characteristics like in vehicle
vehicle
ownership
travel time, mode used, purpose, travel distance etc.
School-purpose Yes No 0.24 0.01 The major trips were detailed along with their stages
Population 25000-50000 25000 or less 0.37 0.37
density
and modes used in those stages. For e.g. a work trip
(Population/Kilo Above 50000 25000 or less 0.17 0.18 using public transit from home was represented as an
meter2) access stage using walk and an in-vehicle stage using
Pr (yes) = 1/ (1+elogit ) (1) public transit. We obtained 11,822 house- holds from
the 63 zones. In the data 55% was males and 45%
Pr (No) = 1- Pr (yes) (2)
females. 22% had an age less than 18 years and 66%
Pr (yes) and Pr (No) represents the probability that an age, 18 to 50. 12% was having an age more than
a NMT mode is chosen or not chosen for a particular 50. The percentage of households in the income groups
trip elogit represents an exponential function of logit. The less than 5,000 Rupees, 5,000 Rupees-20,000 Rupees,
term ‘logit’ is a function which is a linear combination and greater than 20,000 Rupees were respectively 40,
of variables and parameters. The parameters are 57 and 3. After deletion of return trips and trips with
estimated through maximum log likelihood estimation. incomplete observation we got 9054 utility trips. Utility
The antilog of the parameter will give the odds ratio. In trips included trips for purpose work and school with a
case of a categorical variable odds ratio represents the percentage share of 83 and 17 respectively. In the total
percentage increase or decrease in the odds of one trips 39% were made by walk as main mode and 4%
category a variable over the other category of the same by cycle as main mode. Rest was made using motorized
variable. Table 1 defines the various categories of each modes.
variable along with their mean representation in the total
observations (number of observations in a category/ V. RESULTS AND DISCUSSION
total observations) and the reference category for each Table 2 and Table 3 gives the model results for walk
variable. and cycle respectively along with the odds ratio and
change in odds for each category of variables with
IV. DATA SOURCE AND DESCRIPTION
respect to reference variable. The parameter values of
House-hold travel data of the city of Bangalore for certain variables even after being insignificant were kept
the year 2009 obtained through secondary sources is as such because they were the best values available for
used in our study. Data from 63 zones are used for that variable. The logistic model had a predictive
model estimation. The primary data collection was done capability with an accuracy of 100% and 80.65% for
by household interview, in which the details of traveler walk mode and cycle mode respectively.
related variables, mode related variables, trip context
The likeliness to use walk and cycle reduced 68%
variables, and environmental variables were collected.
and 79% respectively when the travelling time became
Bangalore is a plateau with roads having gentle to
more than 20 minutes. This shows a decrease in affinity

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 853
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

towards walking and cycling with travel time increase. Table 2. Model results for walk

An increase in age decreased the likeliness towards Variable Categories coefficient t-statistics Odds Change
ratio in odds
walk and cycle mode. Old people (age greater than Constant _ 2.90 11.61 _ _
50) had 12% and 92% less chance of using walk and Travel time Over 20 -1.11 -12.53 0.32 -0.68
(minutes)
cycle respectively. Compared with women men had a Age 18-50 -0.118 -2.69 0.89 -0.11
reducing effect on probability to walk. But for cycle Over 50 -0.129 -2.60 0.88 -0.12
Gender Male -0.518 -4.27 0.60 -0.40
the inverse was true. Men had an increasing effect on Education literate -0.240 -1.82 0.79 -0.21
probability to cycle. Similar results were found on level
House hold 5000 - -0.0109 -1.12 0.99 -0.10
gender effect by Agrawal and Schimek (2007) for walk income 20000
mode and Ortuzar (2000) for cycle mode. Rise in (Rupees) Above -0.272 -0.85 0.79 -0.21
20000
education level had a negative correlation with walk Private motor 1 or more -1.27 -13.84 0.28 -0.72
mode and a positive correlation with cycle mode. vehicle
ownership
Increase in the income showed a negative effect on School- Yes 0.738 5.04 2.09 1.09
purpose
the probability to walk and cycle. There was a 79% Population 25000- 0.213 2.17 1.24 0.24
and 100% decrease in the likeliness to cycle when an density 2) 50000
Above 0.385 2.87 1.47 0.47
individual belonged to income groups 5,000 Rupees 50000
20,000 Rupees and above 20,000 Rupees respectively. Land-use 0.8-1.1 0.891 4.56
(employment/p
It points to the preference of private vehicle among high opulation)
income group. Ownership of private vehicles had a Null Log -2913.29
Likelihood
reducing impact on the chance of using walk or cycle. Final Log -1716.027
It indicate peoples tendency to use their own motor likelihood
Likelihood 2394.541
vehicles for their utility trips. ratio test
Rho square 0.411
The purpose school indicated a greater chance for Table 3. Model results for cycle
students to choose walk mode. In case of cycling the
purpose school had a negative impact. But the variable
was insignificant with a t-value approximately zero. One
reason for this insignificance may be the meager
presence of school purpose trips for cycle mode (1%).

The likeliness to walk increased with respect to the


reference group as the population density grew. There
was a positive change in odds of 24% when population
density was between 25,000 50,000, and 47%

854 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

percentage for density greater than 50,000. The density Low speed and excessive physical effort are two
showed a weak relationship with likelihood to cycle reasons why people prefer walk and cycle only for short
because of insignificant variables. The likeliness to cycle distances. Hence the policy makers should concentrate
increased 20% for population density between 25,000- mainly on short distance trips for NMT promotion.
50,000 and 8% for density greater than 50,000. A similar Individuals belonging to high income house hold had
trend was projected by Rietveld (2001), and Rietveld a less probability of using walk and cycle. Similarly
and Daniel (2004). In their study for Netherlands private vehicle owners also had a less affinity towards
Rietveld and Daniel (2004) showed that the bicycle walk and cycle. This, points to requirement of a policy
share at first increase and then decrease, with rising level intervention, restricting private vehicles, to promote
density. Even though they attributed this effect to the NMT among high income household and private vehicle
competition of public transit inside high density areas owners.
of CBD in Netherlands, in case of Bangalore lack of
infrastructural provision for cycle mode in form of cycle Trips with purpose school had a positive likelihood
paths may also be one factor. Lack of infrastructural compared with work on choosing walk mode. There is
provision for cycle at high density area will give rise to a huge scope for policy makers to target this section
an increased conflict with other modes. for walk promotion. But one issue which needs to be
addressed while focusing on this section is safety.
The ratio between employment and population in Improved foot ways (Abbas et al, 1996) with good
the origin zone of a trip, used as an indicator of land- connectivity (Randall and Baetz, 2001) can deal with
use, boosted the likelihood to both walk and cycle - this issue to a certain extent.
land-use variable was insignificant pointing to its weak
relation with mode choice. More studies are required Mixed land-use and increased density had a positive
to establish their significance. Short travel distance for impact on walk and cycle mode use when compared
accessing jobs and schools; because of an even mix of with the reference group, even though for cycle the
population and employment, is one reason why people probability of usage first increases and then decreases,
prefer walking when land-use is mixed. with increase in density. One reason for this decrease
at high density may be attributed to the lack of
VI. CONCLUSION infrastructural provision (Wardman et al, 1997) and thus
In the current study we determined the impact of safety (Hopkinson and Wardman, 1996) for bicycles.
various social, economic, environmental, and Age is an important factor which decides the choice
transportation system variables on walk and cycle mode of NMT for a trip. An increase in age is associated
choice. This impact determination was done using a with a decrease in walk and cycle preference.
logistic regression model in which the parameters were
estimated using maximum log likelihood. The model Our study elicits the effect of different variables on
predicted the data with an accuracy of 100% and walk and cycle mode choice in Indian conditions. In
80.65% for walk mode and cycle mode respectively. the current study we have used only limited
The parameters and their sign gave a significant insight environmental variables: density and land use. An
in to our understanding of walk and cycle mode choice. enhancement in our model can be done incorporating
Following are the important conclusions obtained. more environmental variables like slope of paths, safety
condition, walking/cycling index, land-use variable
Walk and cycle had a drastic reduction in the users incorporating neighborhood aspects other than
after 20 minutes. There was a likeliness reduction of employment (Cervero, 2002) etc. It can form a scope
68% for walk and a 79% for cycle. 20 minutes for future research.
corresponded to a distance of 1.5 kilometers and 3
kilometers respectively for walk and cycle mode. This
shows that people prefer walk and cycle for short trips.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 855
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

VII. ACKNOWLEDGEMENTS DESIGN. TRANSPORTATION RESEARCH PART D, 2, 199-


219.
Authors would like to thank UMTC (Urban Mass
Transit Company) for sharing the house hold travel
12. COMPREHENSIVE TRAFFIC AND TRANSPORTATION
survey data of Bangalore. The support of officials from PLAN FOR BANGALORE (2007). KARNATAKA URBAN
BMRDA and KUIDFC are highly appreciated. INFRASTRUCTURE DEVELOPMENT AND FINANCE
CORPORATION, GOVERNMENT OF KARNATAKA.
REFERENCES 13. HOOK, W., & RIPLOGLE, M. (1996). MOTORIZATION
1. ABBAS, K.A., MABROUK, I., & EL-ARABY, K.A. (1996). AND NON- MOTORIZED TRANSPORT IN ASIA. LAND
SCHOOL CHILDREN AS PEDESTRIANS IN CAIRO: USE POLICY, 13, 69-84. HOPKINSON, P., & WARDMAN,
PROXIES FOR IMPROVING ROAD SAFETY. JOURNAL M. (1996). EVALUATING THE DEMAND FOR NEW CYCLE
OF TRANSPORTATION ENGINEERING, 122, 291-299. FACILITIES. TRANSPORT POLICY, 3, 241-249.

2. AGRAWAL, A.W., & SCHIMEK, P. (2007). EXTENT AND 14. JAIN, H., TIWARI, G., & ZUIDGEEST, M. (2010).
CORRELATES OF WALKING IN THE USA. EVALUATING BICYCLISTS COMFORT AND SAFETY
TRANSPORTATION RESEARCH PART D, 12, 548 563. PERCEPTION. 12TH WORLD CONFERENCE ON
TRANSPORTATION RESEARCH, LISBON, PORTUGAL.
3. ARASAN, V.T., RENGARAJU, V.R., & RAO, K.V.K. (1994).
CHARACTERISTICS OF TRIPS BY FOOT AND BICYCLE 15. LAXMAN, K., K., RASTOGI, R., & CHANDRA, S. (2010).
MODES IN INDIAN CITY. JOURNAL OF PEDESTRIAN FLOW CHARACTERISTICS IN MIXED
TRANSPORTATION ENGINEERING 120, 283 -294. TRAFFIC CONDITIONS. JOURNAL OF URBAN
PLANNING AND DEVELOPMENT, 136, 23-33.
4. ARASAN, V.T., RENGARAJU, V.R., & RAO, K.V.K. (1996).
TRIP CHARACTERISTICS OF TRAVELERS WITHOUT 16. NOLAND, R.B, & KUNREUTHER, H. (1995). SHORT-RUN
VEHICLES. JOURNAL OF TRANSPORTATION AND LONG-RUN POLICIES FOR INCREASING BICYCLE
ENGINEERING, 122, 76-81. TRANSPORTATION FOR DAILY COMMUTER TRIPS.
TRANSPORT POLICY, 2, 67-79.
5. BADLAND, H., & SCOFIELD, G. (2005). TRANSPORT,
URBAN DESIGN, AND PHYSICAL ACTIVITY: AN 17. ORTUZAR, J.D., IACOBELLI, A., & VALEZE, C. (2000).
EVIDENCE-BASED UPDATE. TRANSPORTATION ESTIMATING DEMAND FOR A CYCLE-WAY NETWORK.
RESEARCH PART D, 10, 177 196. TRANSPORTATION RESEARCH PART A, 34, 353-373.
PLAUT, P.O. (2005). NON-MOTORIZED COMMUTING
6. BADOE, D.A, & MILLER, E.J. (2000). IN THE US. TRANSPORTATION RESEARCH PART D, 10,
TRANSPORTATION±LAND-USE INTERACTION: 347 356.
EMPIRICAL FINDINGS IN NORTH AMERICA, AND
THEIR IMPLICATIONS FOR MODELING. 18. PARKIN. R. (2008). ESTIMATION OF THE
TRANSPORTATION RESEARCH PART D, 5 , 235- 263. DETERMINANTS OF BICYCLE MODE SHARE FOR THE
JOURNEY TO WORK USING CENSUS DATA. FROM THE
7. BIERLAIRE, M. (2003). BIOGEME: A FREE PACKAGE FOR SELECTEDWORKS OF JOHN PARKIN, UNIVERSITY OF
THE ESTI-MATION OF DISCRETE CHOICE MODELS. BOLTON, ACCESIBLE AT:
PROCEEDINGS OF THE 3RD SWISSTRANSPORTATION
RESEARCH CONFERENCE, ASCONA, SWITZERLAND. 19. RANDALL, T.A., & BAETZ, B,W. (2001).
EVALUATINGPEDESTRIANCONNECTIVITY FOR
8. BIERLAIRE, M. (2008). ESTIMATION OF DISCRETE SUBURBANSUSTAINABILITY. JOURNAL OF URBAN
CHOICE MODELS WITH BIOGEME 1.8, BIOGEME.EP.CH PLANNING AND DEVELOPMENT, 127, 1-15.
9. BUYS, L., & MILLER, E. (2011). CONCEPTUALISING 20. RASTOGI, R., & RAO, K.V.K. (2003). TRAVEL
CONVENIENCE: TRANSPORTATION PRACTICES AND CHARACTERISTICS OF COMMUTERS ACCESSING
PERCEPTIONS OF INNER-URBAN HIGH DENSITY TRANSIT: A CASE STUDY. JOURNAL OF
RESIDENTS IN BRISBANE, AUSTRALIA. TRANSPORT TRANSPORTATION ENGINEERING, 129, 684-694.
POLICY, 18, 289 297.
21. RASTOGI, R., & RAO, K.V.K. (2009). SEGMENTATION
10. CERVERO, R. (1996). MIXED LAND-USES AND ANALYSIS OF COMMUTERS ACCESSING TRANSIT:
COMMUTING: EVIDENCE FROM THE AMERICAN MUMBAI STUDY. JOURNAL OF TRANSPORTATION
HOUSING SURVEY. TRANSPORTATION RESEARCH A, 30, ENGINEERING, 135, 506-515.
361-377.
22. RASTOGI, R., THANIARASU, I., & CHANDRA, S. (2011).
11. CERVERO, R. (2002). BUILT ENVIRONMENTS AND MODE DESIGN IMPLICATIONS OF WALKING SPEED FOR
CHOICE: TOWARD A NORMATIVE FRAMEWORK. PEDESTRIAN FACILITIES. JOURNAL OF
TRANSPORTATION RESEARCH PART D, 7, 265 284. TRANSPORTATION ENGINEERING, 137, 687-696.
CERVERO, R., & KOCKELMAN, K. (1997). TRAVEL
DEMAND AND THE 3DS: DENSITY, DIVERSITY, AND

856 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

23. RIETVELD, P. (2001). BIKING AND WALKING: THE 25. SRINIVASN, S., & ROGERS P. (2005). TRAVEL BEHAVIOR
POSITION OF NON-MOTORISED TRANSPORT MODES OF LOW-INCOME RESIDENTS: STUDYING TWO
IN TRANSPORT SYSTEMS. TINBERGEN INSTITUTE CONTRASTING LOCATIONS IN THE CITY OF CHENNAI,
DISCUSSION PAPER. ACCESSIBLE AT: HTTP:// INDIA. JOURNAL OF TRANSPORT GEOGRAPHY, 13, 265
DARE.UBVU.VU.NL/BITSTREAM/1871/9508/1/01111.PDF 274.
(LAST ACCESSED AT 5/3/2013)
26. WARDMAN, M., HATFIELD, R., & PAGE, M. (1997). THE
24. RIETVELD, P., & DANIEL, V. (2004). DETERMINANTS OF UK NATIONAL CYCLING STRATEGY: CAN IMPROVED
BICYCLE USE: DO MUNICIPAL POLICIES MATTER?. FACILITIES MEET THE TARGETS. TRANSPORT POLICY,
TRANSPORTATION RESEARCH PART A, 38, 531-550. 4, 123 133.
RODRIGUEZ, D.A., & JOO, J. (2004). THE RELATIONSHIP
27. WARDMAN, M., TIGHT, M., & PAGE, M. (2007). FACTORS
BETWEEN NON-MOTORIZED MODE CHOICE AND THE
INFLUENCING THE PROPENSITY TO CYCLE TO WORK.
LOCAL PHYSICAL ENVIRONMENT. TRANSPORTATION
TRANSPORTATION RESEARCH PART A, 41, 339 350.
RESEARCH PART D, 9, 151 173.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 857
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Laboratory Performance on Hot Mix Asphalt by Using


Reclaimed Asphalt Pavement Material (BC Roads)
Santosh Kumar1, Priyanka Patil2, Bharat Koner3
1,2,3
Civil Department, Navodaya Institute of Technology, Raichur, Karnataka,India
Email: santunmath2112@gmail.com1, priyanka.patil9980@gmail.com2, bharat.koner@navodaya.edu.in3

Abstract-Reclaimed Asphalt Pavement (RAP) 1. INTRODUCTION


is an innovating technique in India, and the use of
RAP is gradually increasing popularity. Using RAP Recycled asphalt pavement (RAP) is a removed and
does not only help in minimizing the budget of reprocessed pavement material containing asphalt
project but also ensures proper utilization of binder and aggregates. RAP is obtained either by milling
material. The objective of this study is to or by a full depth recovery method. Large quantities of
understand the vitality of using RAP for the Reclaimed asphalt pavement (RAP) materials are
construction of bituminous pavements. Reclaimed produced during highway maintenance and construction.
asphalt pavement (RAP) materials are resulted The properties of RAP materials can be improved by
from milling process. In this study samples of blending of aggregates and by addition of chemical
Reclaimed asphalt pavement (RAP) materials were stabilizers. In recent years there was a gradual increase
collected and analysed for suitability of their usage
in construction and demolition wastes. It has resulted
in flexible pavements. Their characteristics
including gradation, Aggregate Impact value,
in waste disposal problem due to shortage of available
Aggregate Crushing value, Specific gravity, landfills. Reuse of these materials after proper recycling
Flakiness & Elongation Index, Loss Angles can be the right solution for the same. There will be a
Abrasion value, and Water absorption were reduction in cost about 25 to 30% by reusing the
determined and compared to the MORTH recycled road aggregate generated at same site. The
specifications. Form the study it was found that the most used recycled materials are Reclaimed asphalt
RAP materials can be effectively used in the soil pavement (RAP) materials and recycled concrete
sub-grade, sub-base and base of the flexible aggregate (RCA). The generation of RAP and RCA
pavements resulting in reduction of the result in an aggregate of high quality and grading. Due
construction cost. The Marshall mix design to coating of asphalt on the aggregate of RAP it reduces
method was adopted in this study to determine the
the water absorption in aggregates.
optimum binder content (OBC) for the asphalt
mixes containing five aggregate combination with 1.1 RECLAIMED ASPHALT PAVEMENT
RAP contents of 0%, 10%, 20%, 30% & 40% was
found to be 5.63%, 5.8%, 5.6%, 5.6%, 5% Reclaimed asphalt pavement materials are removed
respectively. The volumetric properties of mixes and/or reprocessed pavement materials containing
at OBC satisfy design requirements. The addition asphalt-coated aggregates. These materials are
of 40% RAP may result in approximately 41% generated when asphalt pavement is removed for
saving quantity of binder. Results obtained from reconstruction, resurfacing, or to obtain access to buried
the Marshall Stability test in terms of stability and utilities. When properly crushed and screened, RAP
flow value is to satisfy the requirement of MORTH consists of high-quality, well-graded aggregates coated
specifications. with aged asphalt. Large quantities of Reclaimed asphalt
Key Words: Bituminous mixes; Marshall Mix pavement (RAP) materials are produced during highway
design; Reclaimed asphalt pavement; hot mix maintenance and construction.
asphalt.
Sources of RAP: The various possible sources of
RAP are as follows
858 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

1. Generation from milling of HMA layer 5. Compare the test results with the performance of
2. Full depth pavement removal the traditional control conventional asphalt mixes in
laboratory with addition of RAP material and without
3. Waste from HMA generated at plant addition of RAP material (conventional modified
Milling is the process of scraping and removing any mixes).
distressed upper layers of existing pavement to a
2. MATERIALS USED
specified depth.
The process includes grinding by machine and 2.1 Aggregates
loading of RAP into a truck for transportation. The amount of aggregate in asphalt concrete mixtures
is generally 90 to 95 per cent by weight and 75 to 85
per cent by volume. Aggregates are primarily responsible
for the load supporting capacity of a pavement.
Aggregate has been defined as any inert mineral material
used for mixing in graduated particles or fragments. It
includes sand, gravel, crushed stone, slag, screenings,
and mineral filler. Aggregates are collected from
MittiMalkapur stone crushing plant near Yaragera. Sizes
Fig - 1 Various Stockpiles of larger size RAP materials
of aggregates collected are 6mm, 10mm, 20mm, stone
dust from same quarry. Which are used for mix design
1.2 ADVANTAGES by performing varies tests to determine its strength of
1. Reuse and conservation of non-renewable energy aggregates.
sources.
2.2 Binder
2. Preservation of the environment and reduction in land
filling. Asphalt is a constituent of petroleum with most
3. Energy conservation and improved pavement crude petroleum containing some asphalt. Crude
smoothness. petroleum from oil wells is separated into its fractions
in a refinery by a process called distillation. Viscosity
1.3 SCOPE AND OBJECTIVES OF STUDY grade VG 30 bitumen sample was collected from
The overall objective of the present study was to bitumen plant situated near MittiMalkapur village
design and evaluate laboratory performance of Raichur. The VG-30 grade binder is generally used
bituminous mixes containing different percentages of for construction of flexible pavements in India.
RAP. Specifically, the objectives of the present study
2.3 Filler Material
were to:
1. Determine the Physical properties of Conventional
Lime is preferred as filler in asphalt mixes. In
aggregates and RAP aggregates and the constituent addition, lime works as an anti-stripping agent and
mixtures. enhances moisture damage potential of asphalt mixes.
Generally 2% of lime by weight of total aggregates is
2. Determine the optimum bitumen content for
bituminous mix samples.
used in preparation of a mix. The lime taken from BRITE
CEM lime which is product of Raghavendra enterprise
3. Bituminous concrete (BC) with different percentage Raichur.
of RAP (i.e., 0%, 10%, 20%, 30% and 40%) using
Marshall Mix design method. 2.4 Recycled Asphalt Pavement (RAP)
4. Examine the effects of using RAP in bituminous RAP is collected from road which is a link between
mixtures in terms of stability and flow value by using Raichur to Mantralayam. The top layer of the pavement
Marshall Mix design method.
was removed for the construction of existing new roads.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 859
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

By making some transportation arrangement, these Table No 01 Physical Characteristics of Aggregates- Test
Results
RAP material have been brought to the lab by using
S.No Aggregate Result Limits as per Test Method
some hand tools, we crushed that RAP materials into Test MoRTH
small pieces. Specifications
1 Aggregate 15.17% 24% IS:2386-part-4
impact value
2 Aggregate 19.07 % 30% IS:2386-part-4
crushing
value

3 Combined 37.56% 40% IS:2386-part-1


flakiness and
Elongation
index
4 Specific 2.643 2.5-2.8 IS:2386-part-1
gravity
5 Water 0.8754% 2 % max IS:2386-part-3
absorption

Table No 2 Bitumen Test Result

S.No Test Method Results Requirement


as per MoRTH
1 Penetration at 25 IS 1203 64 60-70
(mm)
2 Softening Point ( IS 1205 47 45-55
3 Ductility at 27 IS 1208 79 Min 70
4 Specific Gravity IS 1202 1.00 0.92-1.02

Fig No - 02 Materials Used 3.3 Aggregate Gradation


3. TESTS ON MATERIALS USED Aggregate gradation is one of the most basic
laboratory test done which aims to determine the
3.1 Aggregates Properties
percentages of different size of aggregates to be used
The aggregates were evaluated for various physical in the mix. After the basic tests, the aggregates are
properties in accordance with the Indian Standard further used in the determination of the proper blend to
specifications and The following Table No 01 presents give a good mix consisting of different size of aggregates.
the test results of physical characteristics of aggregates The gradation of different sizes of aggregates (20 mm,
used in the present work. 10 mm, stone dust, and lime as a filler) used in this
study are presented in the graph No 1 and graph No 2
3.2 Binder
shows the plot of gradations.
Bitumen grade (VG -30) was used as binder in the
mixture design of Bituminous Mix throughout the work.
The test results are tabulated in Table No 2.

860 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3.5 Sieve Analysis of RAP Aggregates

Graph No 1&2: Aggregate Gradation & Gradations of Lime


Filler and Stone Dust
Graph 03: Gradation Curve of RAP Aggregates

3.4 Asphalt Content in RAP The gradation of RAP aggregates in presented in


The asphalt content in collected RAP material was Table 4 and in graph 03 The RAP aggregates had
determined using two different methods: chemical approximately 4.3% and 67.8% passing from 0.075
extraction using centrifuge device and ignition oven. The mm and 4.75 mm sieves.
asphalt content in RAP determined from chemical Table No 04: Reclaimed Asphalt Pavement (RAP) Aggregates
Gradation
extraction using centrifuge device and ignition oven was
IS sieve size in mm Passing (%)
found to be 4.96% and 5.40%, respectively. The 45 100
reported results are the average of five samples. The 37.5 100
ignition oven predicted AC on higher side compared to 26.5 100
centrifuge extraction method. It might be because the 19 100
high temperature (i.e. 540°C) in ignition oven may burn 13.2 97.6
9.5 93.0
fine aggregates in RAP, resulting in high AC content. In
4.75 67.8
this study, average of both the methods, 5.2%, is 2.36 56.0
considered for design of mixes containing different 1.18 39.8
percentages of RAP. The AC content is RAP is relatively 0.6 27.8
high, indicating that the RAP is rich in asphalt content 0.3 20.1
0.15 12.8
and hence a significant cost saving can be expected.
0.075 4.3
The AC content in RAP helps to determine quantity of
neat binder to be added in the mix. Bitumen content in 3.6 Marshall Stability Test: Sample Preparation
RAP is shown in Table 3. First approximately 1200 gm of different sizes of
Table No 3 Asphalt Content in Rap aggregates and filler (lime) as per the blended design
Test Method Bitumen Standard Average gradation are taken, and heated at the temperature 170-
Content Deviation Bitumen 190oC. The bitumen was then heated at 150°C. A fixed
(%) (%) Content amount of bitumen quantity was then added in
Average of (%) aggregates. The aggregate and binder are mixed at
5 Samples
Centrifuge 4.96 0.11 5.2 mixing temperature ranging from 130°C-160°.
Extraction Thereafter, the mix is compacted by giving 75 blows
Ignition Oven 5.40 0.19 on either side at compaction temperature ranging from
170oC-190oC.A compacted specimen of thickness
63.5 ± 3 mm and diameter 100 mm are prepared. The
above procedure is repeated for other bitumen contents.
Test Matrix for Sample Preparation for Marshall Mix
Design for HMA shown in Table 05 and Figure 01.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 861
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table No 05: Total no of mould prepared for Marshall Stability Table 07 and graph 04. The design blended aggregate
Test conducted.
gradation for different percentages of RAP was within
Percentage No of No of No of No of
of bitumen moulds for moulds for moulds for moulds for the limit of specified BC grade -1 gradation. It can be
used 0% RAP 30% RAP 30% RAP 40% RAP seen that stone dust reduces significantly with addition
4% 1 1 1 1
4 .5% 1 1 1 1 of RAP content.
5% 1 1 1 1
5 .5% 1 1 1 1 Table No 06: Optimum Percentage of Materials used in BC-
6% 1 1 1 1 Grade-1 Mixes for Different Percentage of RAP
Total 5 5 5 5
Percentage of materials for BC-grade-1
Type of
Mixes Coarse Fine Stone Filler RAP Total
(20 mm) (10 mm) Dust (Lime)
BC-G1-0 38 20 40 2 0 100
BC-G1-10 35 20 33 2 10 100
BC-G1-20 34 16 28 2 20 100
BC-G1-30 34 14 20 2 30 100
BC-G1-40 34 18 06 2 40 100
Table No 07: Aggregate Gradation of BC-Grade-1 with
Different Percentage of RAP

Adopted Gradation (Percent Specified Limits


Passing) for BC-grade-1
Sieves
(MoRTH)
Size
0% 10% 20% 30% 40%
( mm) LL UL MV
RAP RAP RAP RAP RAP
26.5 100 100 100 100 100 100 100 100
19 96.3 96.6 96.7 96.7 96.7 90 100 95
13.2 74.5 76.2 76.7 76.4 76.2 59 79 69
9.5 57.7 59.9 61.4 61.3 59.4 52 72 62
4.75 42.8 42.9 44.5 43.5 37.4 35 55 45
2.36 34.3 34.5 36.1 35.5 30.7 28 44 36
1.18 25.8 25.8 26.8 26.3 22.6 20 34 27
0.6 19.3 19.2 19.8 19.3 16.6 15 27 21
0.3 14.2 14.2 14.7 14.4 12.6 10 20 15
0.15 9.3 9.4 9.8 9.6 8.6 5 13 9
0.075 4.7 4.6 4.7 4.5 4.1 2 8 5

Fig: 03 Marshall Stability Test

4.0 TEST RESULTS AND DISCUSSION


4.1 Design of Blended Aggregate Gradations
The bituminous concrete mixes of Grade I with four
different percentages of RAP (i.e. 10%, 20%, 30%,
and 40%) were designed in the laboratory. Prior to
prepare a mix, the blended aggregate gradation was
obtained to keep it within the limit of gradation of BC
Grade 1 as per MORTH guidelines. Several trials were
made while keeping percentages of RAP content fixed Graph 04: Gradation Curve for BC grade-1 with Different
Percentage of RAP
for a selected amount. Table 06 shows percentages of
different types of materials (i.e., 20 mm, 10 mm, stone 4.2 Mix Design of HMA-RAP Mixes
dust, filler, and RAP). The percentage of filler (lime)
The bitumen samples were prepared taking bitumen
was kept constant as 2% by weight of aggregates. The
content in range of 4.5% to 6.5% of an interval of 0.5%.
blended gradation for each combination is shown in

862 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The design blended aggregate gradation was used for Table 09 and Table 10 show the bitumen and
this purpose. The additional amount of neat binder was aggregate saving by addition of RAP, respectively.
estimated in case of RAP mixes. The Marshall moulds
were prepared at each of the bitumen content and their 5.0 SUMMARY AND CONCLUSION
volumetric properties were determined. The bitumen 5.1 Summary
content of a mix was found by taking the average of
The construction of highways with RAP materials is
bitumen content corresponding to maximum stability,
not as popular in India as it expected to be, due to lack
maximum unit weight and 4% air voids. The OBC of
of laboratory and field performance data. Furthermore,
0%, 10%, 20%, 30%, and 40% of RAP mixes was
agencies and contractors are not enough trained and
found to be 5.63%, 5.8%, 5.6%, 5.6%, 5%,
confident on quality of RAP materials and to design
respectively. The volumetric properties of mixes at OBC
mixes containing RAP. Generally it is thought that RAP
satisfy design requirements as shown in Table 08. The
is a poor grade material which may negatively impact
addition of RAP results in saving of significant amount
quality of pavements and consequently wastage of
of binder. For example, addition of 40% RAP may result
significant amount of money. Nonetheless, studies
in approximately 41% saving in quantity of binder. The
conducted over the years in different parts of the world
Marshall stability of a mix increases with addition of
showed that performance of bituminous mixes containing
RAP. Table 09 and Table 10 show the bitumen and
RAP can be equal and better than the performance of
aggregate saving by addition of RAP, respectively.
virgin bituminous mix.
Table no 08: Marshall Stability and Flow Value for HMA at
Optimum Bitumen Content The present study was undertaken to design and
% RAP 0 10 20 30 40 Limits evaluate performance of bituminous mixes containing
Bitumen
(%)
5.63 5.8 5.60 5.60 5.0 - different percentages of RAP. For this purpose, RAP
Vv (%) 4.74 4.29 3.59 3.81 3.47 3-5 was collected from Raichur to Mantralayam road near
Vb (%) 13.24 13.70 13.4 13.39 12.00 - yaragera. The preliminary laboratory tests on the
VMA ( %) 17.96 17.99 17.0 17.20 16.55 Min 17 collected RAP such as aggregate quality, gradation and
VFB (%) 73.7 75.1 74.9 73.8 74.6 65-75
Stability
bitumen content were conducted to ensure its quality.
15.09 17.38 17.26 17.36 19.70 Min 9
( kN) The bituminous concrete (BC) with different percentages
Flow
(mm)
3.44 3.97 3.85 3.91 3.67 2-4 of RAP (i.e., 0%, 10%, 20%, 30% and 40%) were
Table No 09: Saving of Binder by use of RAP design as per the standards and specifications provided
by Ministry of Road Surface and Transportation
RAP OBC Virgin Binder Binder
(%) (%) Binder (%) Saving (MoRTH).
(%) (%)
0 5.63 5.63 - - 5.2 Conclusion
10 5.06 5.06 0.52 9.0 The following conclusions can be drawn from the
20 4.59 4.59 1.04 18.6
results and discussion presented in this study.
30 4.07 4.07 1.56 27.7
40 2.92 2.92 2.08 41.6 1. The impact, crushing, and Los Angeles values of
Table No 10: Saving of Aggregate by use of RAP selected virgin aggregates in this study were found
to be within the limit (i.e., less than 30%), indicating
RAP Percentage Savings of Aggregate
(%)
the suitability the aggregates for construction of roads.
20 10 Stone Total
mm mm dust Saving 2. The penetration softening point, viscosity, and ductility
0 - - - - values of collected VG30 binder were found to be
10 0.25 4.2 5.6 10 within the limit as per IS codes, and hence found to
20 0.5 8.6 11.2 20 be appropriate to use for construction of pavements.
30 0.75 12.5 15.8 30
40 1 16.6 22.3 40

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 863
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3. The asphalt content in collected RAP was determined 6. JulideOner et.al (2015) " Utilization Of Reclaimed Asphalt
from chemical extraction using centrifuge device and Concrete With Warm Mix Asphalt And Cost-Benefit Analysis"
ignition oven was found to be 4.96% and 5.40%, 7. Arshad et.al, (2012) "Effect Of Reclaimed Asphalt Pavement On
respectively. The average of both the methods, 5.2%, The Properties Of Asphalt Binders".
was considered for design of mixes containing 8. Maulik Rao, Dr. N C Shah, Utilization of Reclaimed Asphalt
different percentages of RAP. Pavement Material Obtained By Milling Process: With Numerous
Options in Urban Area at Surat,Gujarat, ISSN : 2248-9622, (July
4. The Optimum bitumen content of 0%, 10%, 20%, 2014)
30%, and 40% of RAP mixes was found to be 5.63%, 9. IS:1202 Methods for Testing Tar & Bituminous Materials :
5.8%, 5.6%, 5.6%, 5%, respectively. The volumetric Determination of Specific Gravity Penetration, Bureau of Indian
properties of mixes at OBC satisfy design Standards, New Delhi.
requirements. The addition of 40% RAP may result 10. IS:1203 Methods for Testing Tar & Bituminous Materials :
in approximately 41% saving in quantity of binder. Determination of Penetration, Bureau of Indian Standards, New
The Marshall stability of a mix increases with addition Delhi.
of RAP. 11. IS:1205 Methods for Testing Tar & Bituminous Materials :
Determination of Softening Point, Bureau of Indian Standards,
REFERENCES New Delhi.

1. Brajesh Mishra. (2015)."A study on use of reclaimed asphalt 12. IS:2386 (Part 1) (Reaffirmed 2002), Methods of Test for
pavement (RAP) materials in flexible pavements", International Aggregates for Concrete Particle Size and Shape, Bureau of
Journal of Innovative Research in Science, Engineering and Indian Standards, New Delhi.
Technology Vol,4,Issue 12,December 2015 13. IS:2386 (Part 4) (Reaffirmed 2002), Methods of Test for
2. Mallick, B. R., lecture notes, A 3-day workshop on recycling and Aggregates for Concrete Mechanical Properties, Bureau of Indian
other pavement rehabilitation methods, IIT Kanpur, 8-10 th Standards, New Delhi.
February, 2005, pp.58-350. 14. MORTH, (2001), Specifications for Road and Bridges Works,
3. Wolters R. O., Bituminous hot mix recycling in Minnesota, Fourth Revision, Ministry of Road Transport and Highways,
Proceedings of the Association of Asphalt Paving Technologists, Indian Roads Congress, New Delhi.
Vol.48, 1979, pp.295-327. 15. Highway materials and pavement test book by S K Khanna - C
4. Satish R Patel et.al," Use of RAP Materials In Bituminous E G Justo - A. Veeraragavan.
Pavement" International Conference On Emerging Trends In
Engineering And Management Research,(March 2016).
5. T.Anil Pradyumna et.al,(2013) "Characterization Of Reclaimed
Asphalt Pavement (RAP) For Use In Bituminous Road
Construction"

864 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Marine Strains For Chintinase Production For Various


Applications - A Review
S. Krithika1, Dr. C. Chellaram2, Dr.M.Menaga3
1
Research Scholar, Sathyabama Institute of Science and Technology (Deemed to be University), Chennai
2
Applied Biotechnology Department, University of Technology and Applied Sciences,
Sur-Sultanate of Oman Sur-411, Oman
3
Chief Executive Officer, Bioneemtec Pvt Ltd ,Women's Biotech Park, Chennai
Email: mail2marine@gmail.com1, Chellaramc.sur@cas.edu.om2, magendran6@rediffmail.com3

Abstract - Chitin, a linear  -1, 4-linked that is primarily transformed by bacterial communities.
homopolymer of N-acetylglucosamine, is one of the Chitin is a polymer of unbranched chains of  (1->4)
three most abundant polysaccharides in nature linked 2-acetamido-2-deoxy-D-glucose (N-acetyl-D-
besides cellulose and starch. Chitinolytic enzymes glucosamine, GlcNAc). It may thus be regarded as a
are synthesized in a wide variety of organisms, with
derivative of cellulose. in which the C-2 hydroxyl group
fungi and bacteria being the most common.
Although the chitinolytic activity of some species
have been replaced by acetamido residues. Based on
has been reported in the literature, it remains the purity of chitin. it is differentiated into three states
unknown which group of microorganisms is the "native", decalcified chitin and chitin. Pure chitin, rarely
most effective at decomposing this polymer. This found in nature, normally occurs in combination with
paper briefly discusses the latest research findings protein and certain inorganic salts, especially of calcium
on the applications of microbial chitinases to salts. Chitin and chitosan are the only abundant basic
biological control. It was noticed that microo polysaccharides. The chitin is highly hydrophobic and
rganisms producing these enzymes will prevent the is insoluble in water, dilute acids, dilute and
growth of several fungal diseases which lead to concentrated alkalies, alcohols and other organic
serious threat to crop production. At present, solvents. The major sources of chitin are shell fish, krill,
attempts are being made to identify producers of
Clams, oyster, squid, fungi and insects
chitinolytic enzymes. Further, it was noticed that
there is huge potential that natural biofungicides Recently, biological control has been focused on
will replace chemical fungicides or will become microorganisms producing mycolytic enzymes,
alternate supplement for the presently used especially chitinases (CHIs), which are known to
fungicides, which will definitely reduce the negative hydrolyze chitin, a major component of fungal cell walls.
impact of chemicals on the environment and CHIs or chitinolytic microorganisms are currently being
support the sustainable development of agriculture
studied as an attractive alternative to synthetic chemicals
and forestry. Considering the potentials of marine
because of their perceived safety and lower
microorganisms for deriving industrially important
enzymes and the tremendous scope for environmental impact. Biological control strategies have
bioprocessing of chitinous shrimp wastes towards become an important approach for facilitating
economic utilisation employing solid state sustainable agriculture and also for human diseases
fermentation. [Zach et al., 2012; Kishore et al., 2005; Prapagddee
Index Terms - Marine; Enzyme; Antibacterial
et al., 2008; Sharma et al., 2011]. Chitin, a -(1,4)-
activity; Chitinases linked polymer of N-acetyl-D-glucosamine, is one of
the most abundant naturally occurring polysaccharides.
I. INTRODUCTION Chitin occurs in combination with other polymers, such
Chitin is the most abundant organic compound in as proteins. In nature, it is found in two crystalline forms.
nature and represents a rich carbon and nitrogen source The ?-form has antiparallel chitin microfibrils with strong
intermolecular hydrogen bonding and is the most
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 865
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

abundant chitin in nature, found in shrimps and crabs. Bean seeds, insects and microbes. Microbial chitinases
?-chitin has parallel chitin chains and occurs in squid are being qualified for use as biocides for the control of
pens [Zhang et al., 2000]. Chitin is widely distributed fungal pathogens and entomopathogens in agriculture.
in nature, particularly as a structural polysaccharide in The production of microbial chitinases has received
fungal cell walls, the exoskeletons of arthropods, the attention as one step in a bioconversion to treat shellfish
outer shells of crustaceans, and nematodes. waste chitin.
Approximately 75 % of the total weight of shellfish, CHIs are glycoside hydrolases that catalyze the
such as shrimp, crab, and krill, is considered waste. decomposition of chitin. They are produced by
Chitin comprises 20-58 % of the dry weight of this microorganisms, fungi, insects, plants, and animals and
waste [Wang and Wang, 1997]. Chitin has a broad are also found in human blood serum [Gohel et al.,
range of applications in the biochemical, food, and 2006]. They hydrolyze the b-1,4-glycosidic bonds
chemical industries and shows antimicrobial, between the N-acetyl-D-glucosamine residues that
anticholesterol, and antitumor activity [Patil et al., 2000; comprise a chitin chain [Henrissat, 1999]. Complete
Gooday, 1999]. Sturz and Robinson [Sturz and enzymatic hydrolysis of chitin to free N-
Robinson, 1985] observed that the degradation of chitin acetylglucosamine is performed by a chitinolytic system
occurs mainly in surface sediments, where aerobic consisting of a diverse group of enzymes that catalyze
bacteria dominate and play a decisive role in its the hydrolytic polymerization of chitin [Shaikh and
degradation. Although many studies concerned with Deshpande, 1993; Patil et al., 2000; Gohel et al., 2006;
chitinase gene cloning and expression were reported Felse and Panda, 2000]. Depending on the origin of
(Aunpad and Panbangred 2003; Liu et al. 2005; the CHI, its activity can be inhibited or stabilized by the
Morimoto et al. 1997; Robbins et al. 1998) and presence of various metal ions (Table 1).
chitinases were also found in marine bacteria such as
Alteromonas sp. strain O-7 (Tsujibo et al. 1993), Vibrio Decomposition of Shrimp Waste, the Main
anguillarum and V. parahaemolyticus (Hirono et al. Source of Chitin
1998), Salinivibrio costicola (Aunpad and Panbangred The decomposition of chitin, an important part of
2003), and Microbulbifer degradans (Howard et al. the global carbon and nitrogen cycles [Hoang et al.,
2003), few reports on chitinase from microorganisms 2011], relies mainly on microbiological processes. Chitin
associated with marine sponge were found. can be used by microbial populations as the sole source
Chitinolytic Enzymes of these two elements [McCreath and Gooday, 1992].
Considered common waste, shrimp waste (the main
Microbial enzymes have several advantages over source of chitin) is processed for animal feed and is
the enzymes derived from plants or animals by virtue of also used in agriculture as a cheap natural nitrogen
their great variety of catalytic activities. cheaper in cost. fertilizer. However, it is not uncommon for shrimp waste
regular abundant supplies at even quantity and relatively to travel from a drainage basin to stagnant waters, where
more stability. Despite the fact that the terrestrial it is decomposed by different microorganisms. Swiontek
environment Brzezinska et al. [2008] determined the decomposition
has contributed to the overwhelming growth of rate by evaluating oxygen consumption by the
enzyme industry. through providing potential microorganisms present in shrimp waste. Wang et al.
microorganisms. bacteria and fungi. as source for several [2009], Chang et al. [2010], and Wang and Chang
industrial enzymes in all these years. there are reports [1997] who investigated the chitinolytic activity of
on marine microorganisms which are potent producer bacteria in the Bacillus and Pseudomonas genera used
of DNase, lipase, alginase, proteases, chitinases and successfully shrimp and crab shell waste to produce
glutaminase. Chitinase, the subject of the present study, CHIs.
is found in a variety of living organisms such as snails,

866 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 1 Biochemical properties of various microbial CHIs (Maria Swiontek et al., 2014)

Microbiological CHIs in Biological Control Storage


fungi perform a very important role in the operation of
ecosystems. As saprophytic organisms they degrade
organic matter, leading to formation of humic
substances. Nonetheless, many of these fungi are
parasites and pathogens. Table 2 presents antifungal
activity of various microbial CHIs.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 867
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 2 Antifungal activity of typical microbial CHIs (Maria Swiontek et al., 2014)

SUMMARY licheniformis from the liquid waste of the food;


Chitinases or chitinolytic enzymes have different Streptomyces and Serratia from the residues of
applications in the field of medicine, agriculture, and crustaceans; and Bacillus amyloliquefaciens and
industry. Among the genera that are identified as Acinetobacter johnsonii from shrimp residues. In
chitinase producers from the marine ecosystem include biological control of fungal phytopathogens, application
Bacillus, Aeromonas, Serratia, Enterobacter, Erwinia, of agents containing various metabolites of
Chromobacterium, Flavobacterium, Arthrobacter, and microorganisms, including CHIs, appears to be the
Vibrio. Many other bacterial species that were more efficient, since they show stronger fungicidal
investigated for the production of chitinolytic enzymes activity than purified chitinolytic enzymes. The use of
are Streptococcus, Clostridium, and Eubacterium agents constituting a consortium of chitinolytic
genera that were isolated from whale wastes; Bacillus microorganisms appears to have better results in fighting

868 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

fungal phytopathogens. The possible research domains 13. Henrissat B (1999) Classification of chitinases modules. EXS
87(1):137-156
in this area include (i) the study of possibility of a chitin-
14. Gohel V, Singh A, Vimal M, Ashwini P, Chhatpar HS (2006)
degradation system available in Bacillus and the presence Bioprospecting and antifungal potential of chitinolytic
of multiple chitinases or truncated forms of the same microorganisms. Afr J Biotechnol 5(2):54-72
protein (ii) due to its high degradability feature, industrial 15. Felse PA, Panda T (2000) Production of microbial chitinases: a
applications for using this enzyme can be explored (iii) revisit. Bioprocess Eng 23:127-134
16. Hoang KC, Lai TH, Lin CS, Chen YT, Liau CY (2011) The
hyperchitinase mutants can be investigated for
chitinolytic activities of Streptomyces sp. TH-11. Int J Mol Sci
bioconversion of chitinous wastes at commercial level 12:56-65
(iv) biocontrol on pathogenic fungi can be employed 17. Chang WT, Chen M, Wang SL (2010) An antifungal chitinase
for disease control among commercially important crops produced by Bacillus subtilis using chitin waste as a carbon
source. World J Microbiol Biotechnol 26:945-950
thereby minimizing the use of pesticides and its negative
18. McCreath KJ, Gooday GW (1992) A rapid and sensitive
effects on crops and human health and (v) cancer and microassay for determination of chitinolytic activity. J Microbiol
tumour applications. Meth 14:229-237
19. Wang SL, Chao CH, Liang TW, Chen CC (2009) Purification and
REFERENCES characterization of protease and chitinase from Bacillus cereus
1. Maria Swiontek Brzezinska, Urszula Jankiewicz, Aleksandra TKU006 and conversion of marine wastes by these enzymes.
Burkowska, Maciej Walczak (2014), Chitinolytic Microorganisms Mar Biotechnol 11:334-344
and Their Possible Application in Environmental Protection, Curr 20. Wang SL, Chang WT (1997) Purification and characterization of
Microbiol, 68:71-81 two bifunctional chitinases/lysozymes extracellularly produced
2. Prapagdee B, Kuekulvong C, Mongkolsuk S (2008) Antifungal by Pseudomonas aeruginosa K-187 in shrimp and crab shell
potential of extracellular metabolites produced by Streptomyces powder medium. Appl Environ Microbiol 63:380-386
hygroscopicus against phytopathogenic fungi. Int J Biol Sci 4:330- 21. Swiontek Brzezinska M, Lalke-Porczyk E, Donderski W (2008)
337 Occurrence and activity of microorganisms in shrimp waste. Curr
3. Sharma N, Sharma KP, Gaur RK, Gupta VK (2011) Role of Microbiol 57:580-587
chitinase in plant defense. Asian J Biochem 6:29-37 22. Aunpad R, Panbangred W (2003) Cloning and characterization
4. Hartl L, Zach S, Seidl-Seiboth V (2012) Fungal chitinases: of the constitutively expressed chitinase C gene from a marine
diversity, mechanistic properties and biotechnological potential. bacterium, Salinivibrio costicola strain 5SM-1. J Biosci Bioeng
Appl Microbiol Biotechnol 93:533-543 96:529-536
5. Kishore GK, Pande S, Podile AR (2005) Biological control of 23. Liu LQ, Zhang WH, Liu ZL, Li YN, Yang WX, Liu DQ (2005)
late leaf spot of peanut (Arachis hypogaea) with chitinolytic Molecular detection, cloning and expression in Escherchia coli of
bacteria. Phytopathology 95:1157-1165 chitinase gene from antagonistic Streptomyces. Acta
6. Wang SL, Chang WT (1997) Purification and characterization of Phytopathologica 35:141-142
two bifunctional chitinases/lysozymes extracellularly produced 24. Morimoto K, Karita S, Kimura T, Sakka K, Ohmiya K (1997)
by Pseudomonas aeruginosa K-187 in shrimp and crab shell Cloning, sequencing and expression of the gene encoding
powder medium. Appl Environ Microbiol 63:380-386 Clostridium paraputrificum chitinase chiB and analysis of the
7. Patil RS, Ghormade V, Deshpande MV (2000) Chitinolytic functions of novel cadherin-like domains and a chitin-binding
enzymes: an exploration. Enzyme Microb Tech 26:473-483 domain. J Bacteriol 179:7306-7314
8. Gooday GW (1999) Aggressive and defensive roles of chitinases. 25. Robbins PW, Albright C, Benfield B (1998) Cloning and
EXS 87:157-169 expression of a Streptomyces plicatus chitinase (chitinase-63) in
Escherichia coli. J Biol Chem 263:443-447
9. Zhang M, Haga A, Sekigchi H, Hirano S (2000) Structure of
insect chitin isolated from beetle larva cuticle and silkworm 26. Tsujibo H, Orikoshi H, Tanno H, Fujimoto K, Miyamoto K,
(Bombyx mori) pupa exuvia. Int J Biol Macromol 27:99-105 Imada C, Okami Y, Inamori Y (1993) Cloning, sequence, and
expression of a chitinase gene from a marine bacterium,
10. Sturz H, Robinson J (1985) Anaerobic decomposition of chitin Alteromonas sp. Strain O-7. J Bacteriol 175:176-181
in freshwater sediments. In: Muzzarelli R, Jeuniaux C, Gooday
GW (eds) Chitin in nature and biotechnology. Plenum Press, 27. Hirono I, Yamashita M, Aoki T (1998) Molecular cloning of
New York, pp 531-538 chitinase genes from Vibrio anguillarum and V. parahaemolyticus.
J Appl Microbiol 84:1175-1178
11. Shaikh SA, Deshpande MV (1993) Chitinolytic enzymes: their
contribution to basic applied research. World J Microbiol 28. HowardMB, Ekborg NA, Taylor LE,Weiner RM, Hutcheson
Biotechnol 9:468-475 SW(2003) Genomic analysis and initial characterization of the
chitinolytic system of Microbulbifer degradans strain 2-40. J
12. Patil RS, Ghormade V, Deshpande MV (2000) Chitinolytic Bacteriol 185:3352-3360.
enzymes: an exploration. Enzyme Microb Tech 26:473-483

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 869
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

870 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Department of H&S

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 871


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

872 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Applications of Rough Sets in Graphs


R.Aruna Devi1, R.Nithya2, K.Anitha3
1,2,3
Department of Mathematics, SRM Institute of Science &Technology, Ramapuram, Chennai, India
Email: ar5452@srmist.edu.in1, nr8817@srmist.edu.in2, anithak1@srmist.edu.in3

Abstract: The Unification process of Rough Sets Liang M, Liang B, Wa L, Xux (2001) gives the
with Graph Theory was done by Tong He in 2006. definition for edge rough graph. The edge rough graph
Based on Equivalence and Similarity relation Rough basedon the concept of partition of edge set in graph.
Set categorize the objects. From the given The edge rough graph helps in computing the clique
information which is uncertain and imprecise, it
numbers of graph.
identifies the pattern between the elements. It is
defined by two approximated sets called Lower and Bibin Mathew, Sunil Jacob and Harish Garg extends
Upper approximation. This paper exhibits the concept of rough graph into vertex rough graph. The
construction of Rough graph along with its vertex rough graph is defined on the partition of edge
properties. and the vertex set of a graph. They also defined some
Keywords-Approximated Sets, Indiscernibility rough properties of rough graph such as the rough vertex
Relation, Vertex Rough Graph membership function, rough edge membership function,
vertex precision,edge precision and the rough similarity
INTRODUCTION
degree for vertex and edge. In this paper we proposed
Pawlak introduced the new theory known as Rough a new type of rough graph based on similarity relation.
Set theory which deals the information with uncertainty
and ambiguity in the year 1982.He defined Rough Sets II. DEFINITIONS
through the concept of indiscernibility relation (L). L is Definition 2.1:
an equivalence relation which satisfies reflexive,
symmetric and transitive. All indiscernibility relations are Let S= (U,A) be the information system which
classified into different equivalence classes.Pawlak consists of universe of discourse U and the set of
defined the Rough Sets through the pair of operators attributes A. The indiscernibility relation is defined
called the lower and upper approximations. Rough Set as
does not need any additional information from the given INDs (B)={( )?U2 |a ∈ B,a(x)=a(x’)}
information. The indiscernibility relation is divided into different
The concept of Rough graph is introduced byTong equivalence classes [x] B. The lower and upper
He in 2006. He defined rough graph when uncertainty approximation is defined as
occurs. The rough graph is defined for the attribute set
and these attribute set are divided into different
equivalence classes [x]R.
Tong He, Yong Chen and Kaiquan Shi extended X=
rough graph into weighted rough graph (2006) by using
the class weight of their edge equivalence class in rough The difference between the upper and the lower
graph and provided algorithms to find the class optimal approximation of X is said to be boundary region of X.
tree it is applied in relationship analysis. In the year 2012
The non-empty intersection of the pair ( (X), (X)) is
Tong He and Rui Yang exhibited the concepts of
different representative forms of Rough graphs. said to be Rough Set. This set has some of the following
assertions:

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 873


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

(i) Definition 2.2:


Graph U=(V,E) be a universe graph,
(ii) U= =
and
(iii) . Let be the
(iv) attributes set on U, the elements (edges) in the attribute
set be classified into different equivalence classes [e]R.
(v) X
Rough graph T=(W, X) be a graph. The upper andthe
(vi) X- Y lower approximation can be defined as

(vii) X)
The universe can be partitioned in to regions namely
positive, negative and boundary regions. The pair and is called L-Rough graph.
The boundary region is defined as

X
Rough Vertex Membership Function
X-
Bibin Mathew et al defined Rough Vertex
Rough Membership Function (RM- function) Membership function as is a function
Rough membership function is the more generalized as
form of Fuzzy Membership function and more
probabilistic than fuzzy membership function. It is
described through the function and
defined by Theorem:
1) Graph T= ( , ) is exact graph if and only
if
2) Graph T= ( , )is rough graph if and only if

RM- function measures the degree of attributes at


which degree it belongs to the set X. The diagrammatic SIMILARITY ROUGH GRAPH
representation of RM- function Imarn et al [7] introduced Rough graphs using
similarity relations. They are taking the concepts or
orbits and they have analyzed those partitions on
Indiscernibility relations induced by this orbit. In this
section we introduced the structure of Rough graphs
using Similarity Relation.
Definition 3.1:
Let U=(W,X) be a universe graph with
W={w 1 ,w 2 ,w 3 ,…..w n }be the vertex set and
X={x1,x2,x3……xn} be the edge set of U. For any
A={s1,s2,s3,….sn be the attribute set defined on U is
classified into different similarity classes [x]s. Let
H=(K,L) be a graph, where and graph

874 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

H is said to be A -definable graph or exact graph if L is CONCLUSION


the union of some , conversely it is said to be A This paper exhibits the properties of Rough sets in
rough graph. the domain of Graphs. Rough Graphs are applied in
Definition3.2 : almost all the field of engineering especially in
For any A- rough graph, two exact graphs Networking, Relational Data Mining. The extended
version of this work may be done in Roughgraph
and can be
inColouring, Labelling and Magic Labelling.
defined it as
REFERENCES
1. Pawlak,Z.,(1982),Rough Sets,International journal Computer
The graph and are called A- lower Information Sciences 11:341-356
approximation of H and A-upper approximation H. The
2. Bibin Mathew, Sunil Jacob John, Harish Garg(2019), Vertex Rough
pair of is called A- rough graph. Graph, Complex & Intelligent-Systems,https://doi.org/10.1007/
s40747-020-00133-8
The boundary region of A- rough graph is defined
3. HeTong,K.Shi(2006),Rough Graph and its structure , Journal of
as . Shandong University, 6:88-92
4. He Tong, Rough properties of rough graph, Applied Mechanics
and Materials,157-158:517-520
5. Liang M,Liang B, Wei L,Xu X(2011) Edge rough graph and its
application,Proc. of eighth International Conference on Fuzzy
Systems and Knowledge Discovery 335-338
6. He Tong, Chan Y, Shi K(2006) Weighted Rough graph and its
Applications,IEEE Sixth International Conference Intelligent
System Design and Applications 1:486-492
7. Imran Javaid, Shahroz Ali, Shahid Ur Rehman, Aqsa Shah(2021),
Rough Sets In Graphs Using Similarity Relations,arXiv.org >
math > arXiv:2104.08743
8. HeTong, XueP,Shi K(2008) Application of rough graph in
relationship mining,Journal System Engineering Electron 19:742-
747
9. Slowinski. R.,Vanderpooten,D. (1995),Similarity Relations As a
Basis for Rough Approximations, ICS Research Report 53/95,
Warsaw Univ.Technology.
} 10. Yao.Y and S.K.M. Wong (1995), Generalization of Rough Sets
Using Relationships Between Attribute Values, Proc. Second
} Ann. Joint Conf. Information Sciences, pp. 30-33.
11. Nieminen,J(1988),Rough Tolerance Equality Fundamenta
Informaticae, vol. 11,no. 3, pp. 289-296.
}
12. Slowinski.R.,Vanderpooten,D.,(2000), A Generalized Definition
of Rough Approximations Based on Similarity,IEEE Transactions
ion Knowledge and Data Engineering , Vol. 12,No.2.
13. He Tong, Rui Yang(2016), Different Kinds of Rough Graph and
Properties: Their Representation Forms, International Conference on
Mechanics Design, Manufacturing and Automation (MDM 2016)
ISBN: 978-1-60595-354-0.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 875


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Study of Guided or Unknown Game Theory in the


Banking Industry using the Brute Force Algorithm
Dr. Sridevi1, Dr.SM.Chithra2
1
Assistant Professor of Mathematics, Queens College of Arts and Science for Women, Punalkulam, Near Thanjavur
Pudukkottai(Dt)
2
Associate Professor of Mathematics, RMKCollegeofEngineeringandTechnology, Chennai.
Email: srihasini.anbu@gmail.com1, srilakshmivj@gmail.com2

1. Abstract: This paper mostly focused on transportable for drudgery and to avail homegrown rest
efficient study of set of rules to trace Brute Force stop. Comparing the result with heuristic algorithm for
in the interior a given directed or undirected game the problem that connect efficient set of player decision
theory in Banking Sector. In Theoretical game tree route, also conclude the best algorithm to
Mathematics, the one of the furthermost thought- adopt for this type of problem.
provoking area is directed or undirected game
theory. A specialized: concept of directed or 3. SET OF PLAYER DECISION GAME
undirected Game theory results the deal with TREE
locating and undirected Game theory is said to be
a Game theory models if it is associated with each Definition 3.1.1
other. To find a key presentation for the easy to
A directed (or) undirected Game in a group of node
get to investment for the customer to the bank
using directed or undirected Game theory.
is an alternating sequence of players and nodes
in which nodes ni is
Keywords: Game theory, Directed Game theory,
Undirected Game Theory, Nash equilibrium, Definition 3.1.2
Banking sectors, Wireless Sensor Networks
A game path is a player walk in which all nodes are
2. INTRODUCTION distinct.
In this work, we have extensively studied the set of Definition 3.1.3
player directed or undirected decision game trees
problem with set of player edge weights of game. The A closed game walk in which no player (except the
set of player directed or undirected decision game trees initial and the final player) appears more than once is
problem on a graph, whose edge weights are assumed called a game theory circuit.
as set of player decision player, and proposed the notion Definition 3.1.5
of set of player directed or undirected decision trees
are discussed. Also only we focus on the case when The goal line of the problematic is the principal
set of player directed or undirected decision game trees independent that enterprises the judgment game
weights have regular credibility distributions of game problematic.
tree. The goal lines have to be characteristic the
Set of player directed or undirected decision game problematic in big hand, and have a duty to be a little
trees have direct applications in the design of network, that tin can be give something the once-over by the
including transportation networks, banking sector book by the judgment game creators. For case in point,
etc…. We showed that the different set of player data in the example of employment a new bank member of
can be used in a unique network process, ease of use staff, different justification holder would have very not
of facts and equipment to reduce the want to the same goal line, which could steer their judgment
game problem to not the same outcomes. What is more,
876 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the goal line should be extraordinary. That is, the


judgment performer creators should not challenge to
placate multiple goal lines within one problematic (in
practice, these multiple goal lines would be cracked
into distinct criteria, as well-defined below). A case in
point of a goal line with affections to create financial
statement could be "responsible the reimbursements that =n

best make me look like proceeds", which is precise,


outstanding, and to some degree that can be single-
minded by the pronouncement player fabricator.
We are familiar with that the matrix equality in (1) is
Definition 3.1.6 valid for the reason that when we go through the matrix
The being without a job is the bewilderment that is proliferation, we see that we have an n × 1 matrix with
being contemplated in the judgment game. In the case entries:
in point of engagement a new wage earner, another
possibility would be the collection of character's player for row i of the
who yields to a presentation. manufactured goods matrix. As can be seen, the
denominators call off, and we are not here with npi for
Definition 3.1.7 row i. From this time, we can factor out the scalar n
The principles of a judgment game badly behaved and fast the product matrix as we have in equation 1.
are the aspects that are used to appraise the alternatives We can see that n is at that point an Eigen value for the
with respect to the goal. Each unconventional will be n × n part matrix (which we will call matrix A), and that
rule on based on these principles, to see how well they the n × 1 weightiness matrix (which we will call matrix
bump into the goal line of the problem. W) is an Eigenvector. We identify for of Theorem 2
that the summation of the Eigenvalues of matrix A is
Definition 3.1.8 just its trace. Since
A constant conditions is one in which for each
a d m i t t a n
th
crow and jth column),
e g i j ( t h e e n t r y i n t h e i
Tr (A) = =1+1+
gij = gkj/gki. ••• + 1
What this point toward in our backgrounds is that We familiar with that Tr (A) = n. Hence, we see that
for a constant matrix there is some fundamental the sum of the Eigenvalues of matrix A is equal to n.
customary scale. That is, each constituent has a set Since we have by this time shown n to be an Eigen
weightiness, which does not transformation when value of A, and since matrix A is of rank one, we know
paralleled to another constituent. Now that we have by Theorem 1 that n is the only nonzero Eigen value.
our ratio surrounding substance, notice that we can We now create the following demarcation.
construct an account of the following surrounding Definition 3.1.9
substance equation:
Linear Programming:
One corporate modus operandi for judgment making
under cert is called linear programming. In this way, a
wanted use (such as profit) can be communicated as a
mathematical function (the rate model or neutral
function) of some variables. The result is the set of ideals
for the free variables (result variables) that obliges to

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 877


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

exploit the value (or, in lots of problems, to curtail the Here, A < B means that every player of A is less
fee), substance to sure confines (limits). than every player of B, but the player within A are
incomparable. Either p1 or qk or both could be empty
Example: player. There are exactly n2 such partial order player
For case in point, consider a plant turn out two crops, where the p-and q-elements alternate, that is, where
product P and product Q. The problem is this: If you each set player Pi and Qi is a singleton, and k = n. As
can grasp $5 profit per unit of product P and $7 per in the previous theorem, any two set of players that
unit of product Q, what is the assembly level of p points obey different partial order player lie in different
of player P and q points of player Q that exploits the connected components of F-1(0). Thus, #F0 ≥ n2, and
profit G? That is, you seek to the theorem follows immediately.
Maximize G= 5p + 7q 4. ALGORITHEMS
THEOREM: 3.2.1 Example 4.1
Any linear cooperative and non-cooperative
decision game that computes the player Uniqueness
game has depth  (n log n).
Proof:
Let p = (p1, p2. . . pn) and q = (q1, q2 . . . qn) be
two set of players with distinct coordinates that are
sorted in two different player orders. In particular, for
some pair of indices i and j, we have pi<pjand qi>qj.
Any continuous path from p to q must contain a point g
such that gi = gj, by the intermediate value theorem, Figure 1.1
but then we have F(g) = 0. Thus, points with different
4.1. Brute Force Algorithm for game decision
permutations are in different cooperative and non-
cooperative connected players of F-1(1), so #F1 ≥ n!.
tree
The lower bound now follows immediately. Step1: List all possible set of player decision game
theory.
THEOREM: 3.2.2
Step 2: Find the points of each set of player decision
Any linear decision directed or undirected game that trees by adding the edge value is weights of game.
computes the Set Intersection function has depth (n
log n). Step 3: Select the set of player decision trees with
minimal total weight of game.
Proof: SL.NO SET OF PLAYER DECISION WEIGHTS
For this problem, the input is a point (p, q) = (p1, p2 GAME TREES
1 P1P 2P3P 4P5P 6 16
. . . pn; q1, q2. . . qn)∈ IR2n, where the p-and q- 2 P1P 6P3P 4P2P 5 22
coordinate players represent the two sets players P 3 P1P 2P5P 6P3P 4 20
and Q. If P and Q are disjoint players, then we can 4 P1P 5P3P 2P6P 4 26
5 P1P 5P3P 6P4P 2 25
partition P and Q into disjoint players is subsets of P1, 6 P1P 4P5P 6P2P 3 17
P2 . . . Pk and Q1, Q2 . . . Qk that satisfy the partial
players There are unique set of player directed or undirected
decision game tree on this game value. All other set of
P1< Q1< P2< Q2< · · · <Pk<Qk player decision game tree is the reverse of the listed
ones or start at a different vertex in set of player, but

878 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

result in the same weights of game value. From this we can be used in a unique network process, ease of use
can see that the first set of player directed or undirected of data and skill to ease the need to tourism for work
decision game tree, P1 P2 P3P4 P5 P6 P1, is the and to avail native services. Paralleling the cause with
optimal set of player decision game tree. heuristic algorithm for the problem that tie able set of
player directed or undirected decision game tree route,
Example 4.2 also conclude the best algorithm to adopt for this type
In a private bank, there are connected with many of problem.
services like, the Deposit Products, the Loan Products,
the Investments Products, Lockers, Foreign Currency REFERENCES
Buy/Sell, CMS Services, Tax Collection, Internet 1. A. H. Sayed, A. Tarighat, and N. Khajehnouri, "Network-based
wireless location," IEEE Signal Processing Magazine, vol. 22,
Banking, etc… We take the deposit products to plan pp. 24-40, July 2005.
and connect an efficient set of player route for raising
2. Dubey, Sonal, R. K. Pandey, and S. S. Gautam. "Literature Review
domestic revenue and to gear up through a dynamic on Fuzzy Expert System in Agriculture." International Journal
credit policy to ensure that the fund available for of Soft Computing and Engineering (IJSCE) ISSN (2013): 2231-
investments to the set of player, it reach to the all type 2307.

account once and return to the starting location (E.g.: 3. H. J. Zimmerman, Fuzzy set Theory and Applications, Kluwer
Nijhoff (1985
Deposit Accounts). Consider vertex such as P1-
Deposit Accounts, P2- Preferred/ Royale Accounts, 4. N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses,
and N. S. Correal, "Locating the odes,"IEEE Signal Processing
P3- Senior Citizens Accounts, P4-Women's Accounts, Magazine, vol. 22, pp. 54-68,July 2005.
P5-Youth Accounts, P6- Kids accounts. 5. W. Saad, Z. Han, M. Debbah, A. Hjorungnes, and T. Basar,
TABLE 6.1 "Coalitional game theory for communication networks," IEEE
Signal Processing Magazine, pp. 77-97, September 2009.
P1 P2 P3 P4 P5 P6
P1 0 6 1 7 4 7
P2 6 0 2 5 4 5
P3 1 2 0 5 8 3
P4 7 4 5 0 2 6
P5 4 4 8 2 0 1
P6 7 5 3 6 0 1

5. CONCLUSION
In this work, we have extensively studied the set of
player directed or undirected decision game trees
problem with set of player edge weights of game. The
set of player directed or undirecteddecision game trees
problem on a graph, whose edge weights are assumed
as set of player decision player, and proposed the notion
of set of player decision trees are discussed. Also only
we focus on the case when set of player directed or
undirected decision game trees weights have regular
credibility distributions of game tree.
Set of player directed or undirected decision game
trees have direct applications in the design of network,
including transportation networks, banking sector
etc…. We showed that the different set of player data

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 879


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Model of Flow Network as Linear Programming and its


Solution
K. Bharathi
Department of Mathematics, Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya,
Enathur, Kanchipuram, Tamil Nadu, India
Email: kbharathi@kanchiuniv.ac.in

Abstract- The flow network design is one of the maximum or minimum value for the objective function.
applications with complex network to be solve in The maximum or minimum value of the objective function
many real-life applications. Generally, the network is called an Optimum value. In this paper we have
flow is modeled as graph with it's the capacity of worked on maximal flow. The objective of the maximal
the edge and work place as nodes. The objective flow problem is to find the maximum flow that can be
of flow network design is to find the maximum flow
sent from specified node source(s) to specified node
value. This type of problems can be designed as a
graph and many novel models are applied to solve
sink(t) through the edges of the network. The maximum
this type of flow problems. In this a novel method flow asks for the largest amount of flow that can be
is applied to model the flow network as a linear transported from one vertex (source) to another (sink).
programming design. The designed linear Originally the maximal flow was invented by Fulkerson
programming of the flow network is solved using and Dantzig and solved by specializing the simplex
open software and the solutions were checked with method for the liner programming, and Ford and
the existing models of flow network. Fulkerson solved it by augmenting path algorithm.
Keywords- Flow Network, Linear Programming, The literature on network flow problem is extensive.
Start node, End node, Maximum flow and Objective. In the mid of 1950, Air force researchers T.E.Harris
I. INTRODUCTION and F.S. Ross published a report studying the rall
network that linked the Soviet Union to its satellite
Networking deals a great section of operation countries in eastern Europe. In 1955, Lester R.Ford
research. Many problems of our daily life can be and Delbert R.Fulkerson created the first known
represented by network model. There are four types algorithm. Over the past fifty years researchers have
of network model shortest path model, minimum improved several algorithms for solving maximal-flow
spanning tree model, maximal flow model, and minimum problems. In this paper we have introduced to find the
cost capacity network model. The linear programming maximum network flow and formulated as a linear
model is used in a many variety of complex situations in programming problem (LPP) and then solved it using
the real world application. The application of linear open-source software.
programming model is wide processed such as business
or economic situation where the existing resource is The augmenting path method is to gradually increase
limited. The problem there will be to make use of the the flow until the flow gets its maximum value. The
available resources in such a way that to maximize the increase in flow is done by increase f: s to v of an out
production or to minimize the expenditure. These data's edge from (s, v) or decrease f: v to s of an in edge from
can be formulated as linear programming models. The v to s, till the valid edges are used. This method develops
objective of the linear programming problem is to the feasibility approach to the terminating point t. With
maximize the profit and minimize the total cost. The this a way path through the edges from the start point s
LPP is to determine the values of the decision variables to the terminal point t is generally known as augmenting
such that all the constraints are satisfied and gives the path. The graph N = (V, E) represents a network with

880 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

a feasible path f: u to v and c (f: u to v) is the capacity of application of flow network model. The vital role of
residual. The capacity of residual is generally given as c assignment model is travelling salesman problem in the
(f: u to v) = c: u to v - f: u to v + f: v to u. The capacity complicity to find a feasible route in the design content.
of residual is an additional path of the network that Maximum value flow: The model of a network
travels from u to v inters nodes. with its direction represents the routes and the flow
The network flow model is a directed type graph through it is specified and to detrainment of the
structure G, with the edges represents flow value through maximum flow is the need application in the real-world
the path. The maximum capacity c: u to v exist for all situation.
edge u to v. The initial node without any input capacity The model of network flow is also applied in more
is known as source node and it's represented by s. The many fields such as shortest path problem, minimum
terminal node without any output capacity is known as cost flow problem, multi commodity flows, extraction
sink node and it's represented by t. Evaluating the of web communities, image segmentation, and
maximum flow capacity using feasible flow through telecommunication wireless and so on.
network flow is generally known as maximum flow
problem. III. DESIGN METHODOLOGY TO FIND
MAXIMUM FLOW IN NETWORK MODEL
II. GENERAL NETWORK FLOW MODEL
APPLICATION To find a feasible flow network with an optimal
solution, many algorithms are stated and applied to solve
The network flow models are generally applied in the maximum flow problem. In this work the basic
the real-world application such as road laying network, concepts of maximum flow problem and its designed is
railway network, commodity transport network, and discussed and the solution for it was made using open
many more fields. Let us now see the some of it. source software and compare with the existing
Project Selection: Considering the project of algorithms.
installing of fiber network to overcome the need of the Step 1: The graphical design of the maximum flow
companies of telecom to supply the high-speed network problem is considered.
service in accents of incoming revenue. This type of
project is designed as network flow model and there Step 2: The problem is designed as a linear
are many methods to solve this type of model but with programming model of the flow network
many complications and complicity. Step 3: By giving the input as linear programming in
Transportation problem: The model of the software the program is run.
transportation of products and all verity of commodity Step 4: The output of the flow network is displayed
from one or many points to other places play an in the description box of the software.
important place in the real-world commitments.
Generally, this type of design is down as optimization IV. DESIGN OF MAXIMUM FLOW
model, there exist many algorithms to solve the NETWORK MODELAS LINEAR
complicity in this application model. The model of flow PROGRAMMING MODE
network can be formulated and feasibility can be got Let us consider a project which contains 6 nodes
using many methods. connected with 10 edges with the flow capacity of the
Assignment problem: A design of assigning the network is given as the table value.
work is mostly stated as assignment problem, which is Flow Table is shown in Table 1.
applied in many of the production filed. This assignment
model is designed as network flow with corresponding
work units and the feasible path is obtained by this

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 881


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE I. FLOW TABLE

Begin Terminating Flow Capacity


node node
0 1 16
0 2 13
1 2 10
1 3 13 The network flow is now designed as a linear
2 1 4 programming model, which is as follows:
2 4 14
3 2 8 Maximize
3 5 20
4 3 7
4 5 4 Subject to
Network represantation of the flow network is as
followes in Figure 1.

The designed model of linear programming is given


as input values in open source software as follows:

Fig. 1. Network represantation of the flow network

The design of linear programming model of the flow


network is as
The objective function is as to find the maximum
flow of the network the objective is maximize, that is as
follows: Maximize

The first sets of constraint are derived from the flow


value of the network as follows:

The second set of constraint are derived from the


incoming and outgoing flow value of each node, the
start node and the terminal node are made idle the
constraints are as follows:

882 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The maximum flow value of the given network is as


23 units.
V. CONCLUSIONS
Solving maximum flow problem plays an important
role in many of the application fields. Finding an optical
flow was done using many algorithms and the feasibility
is reached. Here we have studied about the existing
algorithms and solved the problem using open source
software. Evaluation of the maximum flow network is
done using open source software and the results are
given. By using open source software, the time
The solution is represented in the output box as conception of evaluation is minimized.
follows:

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 883


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES [6] A. Fischer and C. Helmberg, "The symmetric quadratic travelling


salesman problem," Mathematical Programming A, vol. 142, no.
[1] Iraschko, R.R., Path Restorable Networks, Ph.D. Dissertation, 1-2, pp. 205-254, 2013.
University of Alberta, spring, 1997.
[7] A. Fischer, F. Fischer, G. J¨ager, J. Keilwagen, P. Molitor, and I.
[2] Iraschko, R.R., MacGregor, M. H., Grover, W. D., "Optimal Grosse, "Exact algorithms and heuristics for the quadratic
Capacity Placement for Path Restoration in Mesh Survivable travelling salesman problem with an application in bioinformatics,"
Networks", Proc. IEEE ICC '96, June 1996. Discrete Applied Mathematics, vol. 166, pp. 97-114, 2014.
[3] A. ´Custi´c, R. Zhang, and A. P. Punnen, "The quadratic minimum [8] Anderson, L. B., Atwell, R. J., Barnett, D. S., & Bovey, R. L.
spanning tree problem and its variations," Discrete Optimization, "Application of the maximum flow problem to sensor placement
vol. 27, no. 4, pp. 73-87, 2018. on urban road networks for homeland security", Homeland
[4] L. R. Ford, JR. and D.R. Fulkerson, "Maximal Flow Through a Security Affairs, 3(3), 1-15. Retrieved February 15, 2011.
Network". Rand Corporation, Santi Monica, California. [9] Ford LR Jr, Fulkerson DR. l957. A simple algorithm for finding
September 20, 1955. maximal network flow and application to the Hitchcock problem.
[5] A. Fischer and F. Fischer, "An extended approach for lifting Canadian Journal of Mathematics, 9: 210-218 Zhang WJ. 2012.
clique tree inequalities," Journal of Combinatorial Optimization, [10]U. Pferschy and R. Stanek, "Generating subtour elimination
vol. 30, no. 3, pp. 489-519, 2015. constraints for the TSP from pure integer solutions," Central
European Journal of Operations Research, vol. 25, no. 1, pp.
231-260, 2017.

884 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Wavelet Based Lifting Schemes for the Numerical


Solution of Generalized Burgers-Huxley Equation
L. M. Angadi
Department of Mathematics, Government First Grade College, Chikodi-591201, India
Email: angadi.lm@gmail.com

Abstract- The generalized Burgers-Huxley content and great potential for applications. However,
equations play important roles in different nonlinear wavelet analysis is a numerical concept which allows
physics mechanisms. In this paper, we presented one to represent a function in terms of a set of bases
numerical solution of generalized Burgers-Huxley functions, called wavelets, which are localized both in
equation by Lifting schemes using different wavelet
location and scale [7].
filter coefficients. The presented scheme gives
higher accuracy in terms of higher convergence in In recent times, some of the works on wavelet based
less CPU time, which has been illustrated through methods are the discrete wavelet transforms (DWT)
the test problem. and the full approximation scheme (FAS) were
Keywords- Lifting scheme; Wavelet filter introduced recently in [8 - 9]. The wavelet based full
coefficients; Burgers-Huxley equation. approximation scheme (WFAS) has exposed to be a
very efficient and favorable method for numerous
I. INTRODUCTION problems related to computational science and
We recall that KKP-Fisher equation can be utilized engineering fields [10]. These methods can be either
successfully in modeling the diffusion phenomena which used as an iterative solver or as a preconditioning
admits a travelling front solution involving the two technique, offering in many cases a better performance
steady-states [1]. Among possible generalizations of than some of the most innovative and existing FAS
the Fisher equation, the Burgers-Huxley (BH) equation algorithms. Due to the efficiency and potentiality of
is most important one. It is well-known that a large WFAS, researches further have been carried out for
class of physical phenomena such as the interaction its enrichment. In order to realize this task, work build
between convection effects, reaction mechanism, and that is orthogonal/biorthogonal discrete wavelet
diffusion transports can be described by the BH transform using lifting scheme [11]. Wavelet based lifting
equation [2]. However, with the advent of modern technique is introduced by Sweldens [12], which
computers and sophisticated software, we are now able permits some improvements on the properties of existing
to solve such kind of problems using approximate wavelet transforms. Wavelet based numerical solution
analytical or numerical methods [3]. Some of the iterative of elasto-hydrodynamic lubrication problems via lifting
methods are used for the numerical and analytical scheme was introduced by Shiralashetti et al. [13] .The
solutions of generalized Burgers-Huxley equations. For technique has some numerical benefits as a reduced
example, Spectral Collocation method [4], New exact number of operations which are fundamental in the
solutions [5], Haar wavelet method [6] etc. context of the iterative solvers. Evidently all attempts
to simplify the wavelet solutions for PDE are welcome.
"Wavelets" have been very popular topic of
In PDE, matrices arising from system are dense with
conversations in several scientific and engineering
non-smooth diagonal and smooth away from the
gatherings these days. Some of the researchers have
diagonal. This smoothness of the matrix transforms into
decided that, wavelets are new basis for representing
smallness using wavelet transform and it leads to design
continuous functions, as a technique for time-frequency
the effective wavelets based lifting scheme.
analysis, and as a new mathematical subject. Of course,
"wavelets" is a versatile tool with very rich mathematical

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 885


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Lifting scheme is a new approach to construct the T


T  1 1
coefficients b0 , b1 
 
 2
so-called second generation wavelets that are not , play an important
2 
necessarily translations and dilations of one function.
role in decomposition.
The latter we refer to as a first generation wavelets or
classical methods. The lifting scheme has some b) Daubechies wavelet filter coefficients
additional advantages in comparison with the classical
Daubechies introduced scaling functions having the
wavelets. This transform works for signals of an arbitrary
shortest possible support. The scaling function N has
size with correct treatment of boundaries. Another
feature of the lifting scheme is that all constructions are support 0 , N 1  , while the corresponding wavelet
derived in the spatial domain. This is in contrast to the  N N
traditional approach, which relies heavily on the  N has support in the interval 1  ,
 .
 2 2
frequency domain.
We have low pass filter coefficients
The lifting scheme starts with a set of well-known T
T1  3 3 3 3 3 1 3
filters, thereafter lifting steps are used an attempt to a0 , a1 , a2 , a3 
  4 , , , 
improve (lift) the properties of a corresponding wavelet  2 4 2 4 2  4 2
decomposition. This procedure has some mathematical and high pass filter coefficients
benefits as a reduced number of operations which are T
T 1  3 3 3 3 3 1 3
essential in the context of the iterative solvers. In addition b0 , b1 , b2 , b3 
   ,  , ,  
to this, the present paper illustrates that the application 4 2 4 2 4 2 4 2 
of the lifting scheme for the numerical solution of c) Biorthogonal (CDF (2,2)) wavelets
generalized Burgers-Huxley equation.
Let's consider the (5, 3) Biorthogonal spline wavelet
The present paper is organized as follows: In section filter pair, the low pass filter pair are
II, Preliminaries of wavelet filter coefficients and lifting
 1 1 1 
scheme. The method of solution describes in section ( a 1 , a 0 , a1 )   , ,  &
III. In section IV provides numerical results of the 2 2 2 2 2
illustrative problem and finally, in section V conclusion  1 1 3 1 1 
( a2 , a1 , a0 , a1 , a2 )   , , , , .
of the proposed work is given. 4 2 2 2 2 2 2 2 4 2
II. PRELIMINARIES OF WAVELET But, we have
k k
FILTER COEFFICIENTS AND LIFTING bk  ( 1) a1 k and bk  ( 1) a1 k , the high pass
SCHEME 1 1 1
filter pair are b0  , b1  , b2  &
The lifting scheme starts with a set of well-known 2 2 2 2 2
filters; thereafter lifting steps are used in attempt to 1 1 3 1 1
b1  , b0  , b1  , b2  , b3 
improve the properties of corresponding wavelet 4 2 2 2 2 2 2 2 4 2
decomposition.
Foundations of lifting scheme:
Now, we have discussed about different wavelet
Consider to numbers a, b as two neighboring
filters as follows:
samples of a sequence and then these have some
a) Haar wavelet filter coefficients correlation which we would like to take advantage [13].
The simple linear transform which replaces a and b by
We know that low pass filter coefficients
T average s and difference d i.e.
T  1 1
a0 , a1 
 
 2
, and high pass filter ab ab
2  s  & d 
2 2

886 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The idea is that if a and b are highly correlated, the Where  ,   0 are real constants, n is positive
expected absolute value of their difference d will be integer and   0 , 1 .
small and can be represented with fever bits. In case
that a = b, the difference is simply zero. We have not After discretizing the equation (3.1) through the finite
lost any information because we can always recover a difference method (FDM), we get system of algebraic
and b from the gives s and d as: equations. Through this system we can write the system
as
d d
a  s  & b  s  Au  b (3.2)
2 2
Finally, a wavelet transform built through lifting where A is N  N coefficient matrix, b is N  N

consists of three steps: split. Predict and update as given matrix and u is N  N matrix to be determined.
in the Figure 1 [14]. where N  2 J , N is the number of grid points
Split: Splitting the signal into two disjoint sets of and J is the level of resolution.
samples. Solve Eq. (3.2) through the iterative method, we
Predict: If the signal contains some structure, then get approximate solution. Approximate solution
we can expect correlation between a sample and its containing some error, therefore required solution
nearest neighbors. i. e. d j 1  odd j 1  P(even j 1 ) equals to sum of approximate solution and error. There
are many methods to minimize such error to get the
Update: Given an even entry, we have predicted accurate solution. Some of them are HWLS, DWLS
that the next odd entry has the same value, and stored BWLS etc. Now we are using the advanced technique
the difference. We then update our even entry to reflect based on different wavelets called as lifting scheme.
our knowledge of the signal. Recently, lifting schemes are useful in the signal analysis
i.e. s j 1  even j 1  U( d j 1 ) and image processing in the area of science and
engineering. But currently it extends to approximations
The detailed algorithm using different wavelets is in the numerical analysis [10]. Here, we are discussing
given in the next section. The general lifting stages for the algorithm of the lifting schemes as follows:
decomposition and reconstruction of a signal are given
in Figure 2. A. Haar wavelet Lifting scheme (HWLS)
Daubechies and Sweldens have shown that every
wavelet filter can be decomposed into lifting steps [11].
More details of the advantages as well as other
important structural advantages of the lifting technique
can be available in [12]. The representation of Haar
wavelet via lifting form presented as;

Fig. 1. Steps in lifting scheme Fig. 2. Lifting wavelet Decomposition:


algorithm
Consider approximate solution S  P j like as signal
The detailed algorithm using different wavelets is
and then apply the HWLS decomposition (finer to
given in the next section.
coarser) procedure as,
III. METHOD OF SOLUTION
1 1 1 1 
The generalized Burgers-Huxley equation is d  S 2 j  S 2 j 1 , s  S 2 j 1  d , 
2
investigated by Satsuma [15] as:  (3.3)
1 1 1 
S1  2s and D  d
n

ut  u xx  u u x  u 1  u
n
u n   , 0  x  1 & t  0 (3.1) 2 

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 887


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

In this stage finally, we get new approximation as, which is the required solution of the given equation.
S  [ S1 D ] (3.4) C. Biorthogonal wavelet Lifting scheme (BWLS)
Reconstruction: As discussed in the previous sections 3.1 and 3.2,
we follow the same procedure here we used another
Consider Eq. (3.2) and then apply the HWLS
wavelet i.e., Biorthogonal wavelet (CDF(2,2)). The
reconstruction (coarser to finer) procedure as,
BWLS procedure is as follows;
1 1 1  Decomposition:
d  2D , s  S1 , 
2
 1 
1 1 1  S 2 j 1  S 2 j  2  ,
1
S 2 j 1 
1 (3.5)
 S2 j 
S 2 j 1  s  d and S 2 j  d 

d
2  
2 
1 1  1 1  
 S 2 j 1   d
which is the required solution of the given equation. s
4
d
 j 1  , 

B. Daubechies wavelet Lifting scheme (DWLS) 1 1 
D  (3.9)
2
d ,

As discussed in the previous section 3.1, we follow 
the same procedure but we used different wavelet i.e., 1 
S1  2 s
Daubechies 4th order wavelet coefficient. The DWLS
procedure is as follows; In this stage finally, we get new signal as,
S  [ S1 D ] (3.10)
Decomposition:
1 1 3 1  32  j 1 
Reconstruction:
s  S 2 j 1  3 S2 j , d  S2 j  s   s1 ,
4  4   Consider Eqn. (3.10), then apply the DWLS
 2 1  j 1 3 1  2 
s  s  d1 , S1  s and  reconstruction (coarser to finer) procedure as
2  (3.6)
D 
3 1 1  1 1 
  
d
s S1 ,
2
 2

Here, we get new approximation as, 1 
d  2 D, 
1 
S  [ S1 D ] (3.7) S 2 j 1  s 
1d 1  d 1  
4
 j 1  (3.11)

Reconstruction: 1 
 d 
1
 S 2 j 1  S 2 j  2 ) ,
Consider Eq. (3.5), then apply the DWLS
S2 j
2   
reconstruction (coarser to finer) procedure as, which is the required solution of the given equation.
1 2  The coefficients s1 j  and d1 j  are the average and
d  D, 
3 1
 difference coefficients respectively of the approximate
 2 2  solution ua . The new approaches are tested through
s  S1 , 
3 1 some of the numerical problems and the results are

 j  2   j 1  shown in next section.
s1  s  d1 , 
 IV. NUMERICAL ILLUSTRATION
1 3  j 32  j 1 
S2 j  d  s1  s1 and (3.8)
4 4  In this section, we applied Lifting scheme for the
1  numerical solution of Cahn-Allen equations and also
S 2 j 1  s  3 S2 j
 show the capability and applicability of HWLS, DWLS


888 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and BWLS. The error is computed by Table 1. Comparison of numerical solutions with exact
solution of the test problem.
Ema x  max ue  x , t   u a  x , t  , where x t FDM HWLS DWLS B WLS EXACT
u e  x , t  and u a  x , t  are exact and approximate 0.2 0.735341 0.735341 0.735341 0.735341 0.737785
0.4 0.2 0.758032 0.758032 0.758032 0.758032 0.759708
solution respectively. 0.6 0.779505 0.779505 0.779505 0.779505 0.780587
0.8 0.799788 0.799788 0.799788 0.799788 0.800347
Test Problem: Consider the generalized Burgers- 0.2 0.742238 0.742238 0.742238 0.742238 0.745202
0.4 0.764466 0.764466 0.764466 0.764466 0.766788
Huxley equation 0.6
0.4
0.785675 0.785675 0.785675 0.785675 0.787301

 In Eq.  3.1   1 ,   3 , n  2 &   0 i.e.


2 0.8 0.805805 0.805805 0.805805 0.805805 0.806674
0.2 0.749341 0.749341 0.749341 0.749341 0.752512
 0.4
0.6
0.771136 0.771136 0.771136 0.771136 0.773748
0.6 0.791999 0.791999 0.791999 0.791999 0.793889
2 2 3

3
2
 
u t  u x x  u u x  u 1  u , 0  x  1 & t  0 (4.1)
0.8
0.2
0.811847
0.756414
0.811847
0.756414
0.811847
0.756414
0.811847
0.756414
0.812868
0.759708
0.4 0.777804 0.777804 0.777804 0.777804 0.780587
0.8
0.6 0.798306 0.798306 0.798306 0.798306 0.800346
subject to the 0.8 0.817822 0.817822 0.817822 0.817822 0.818929
1
1  x 2
 
1
I.C.:   tanh   (4.2)
u x,0
2  3  
0.9 0.9
 2 0.9 0.9

HW LS

DW LS

HW LS

DW LS
and B.C.s: 0.8 0.8
0.8 0.8

1  0.7 0.7
1  t  2

0.7 0.7
 
1 1 1
u 0 , t  2  tanh   1 1 1 1
 2  9   0.5 0.5 0.5 0.5 0.5 0.5
1
0.5 0.5
1
 0 0 0 0

  
1 t t 00 00
x x
1  2  (4.3) t x t x
 
1 1
u 1, t  2  tanh 3  t  
 2 9  
0.9 0.9 0.9 0.9
Which has the exact solution
BW LS

BW LS
Exact

Exac t
 
1 0.8 0.8 0.8 0.8
1  2
u x , t    tanh  3 x  t 
1 1
2  [16]. 0.7 0.7 0.7 0.7
 2 9  1 1 1 1
1 1 1 1
0.5 0.5 0.5 0.5
By applying the methods explained in the section 3, 0.5 0.5 0.5 0.5
0 0 0 0 00 00
we obtain the numerical solutions and compared with t x t x t x t x
exact solutions are presented in table 1 and figure 1. a) NN  88 b) N  N  16  16
The maximum absolute errors with CPU time of the Fig. 1. Comparison of numerical solutions with exact solution
methods are presented in table 2. of the test Problem for a) N  N  8  8 and

b) N  N  16  16 .

Table 2. Maximum error and CPU time (in seconds) of the


methods of the test problem.

NN Method Emax Setup time Running time Total time


FDM 3.2939e-03 2.9781 0.0019 2.9800
HWLS 3.2939e-03 0.0009 0.0028 0.0037
44 DWLS 3.2939e-03 0.0003 0.0096 0.0099
BWLS 3.2939e-03 0.0003 0.0042 0.0045
FDM 3.9987e-04 3.1827 0.0024 3.1851
HWLS 3.9987e-04 0.0009 0.0028 0.0037
16  16
DWLS 3.9987e-04 0.0003 0.0097 0.0100
BWLS 3.9987e-04 0.0003 0.0040 0.0043
FDM 6.4417e-05 7.3539 0.0041 7.3580
HWLS 6.4417e-05 0.0010 0.0028 0.0038
64  64
DWLS 6.4417e-05 0.0003 0.0097 0.0100
BWLS 6.4417e-05 0.0003 0.0042 0.0045

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 889


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

V. CONCLUSIONS [6] Celik I., "Haar wavelet method for solving generalized Burgers-
Huxley equation", Arab Journal of Mathematical Sciences, 18,
In this paper, we applied wavelets based Lifting pp. 25-37, 2012.
schemes for the numerical solution of generalized [7] Shiralashetti S. C., Angadi L. M. and Deshi A. B., "Numerical
Burgers-Huxley equation using different wavelet filters. solution of some class of nonlinear partial differential equations
using wavelet based full approximation scheme", International
From the above figure and table-1, we observe that Journal of Computational Methods, 17(6), 1950015 (23 pages),
the numerical solutions obtained by different Lifting 2020.
schemes are agrees with the exact solution. Also from [8] Bujurke N. M., Salimath C. S., Kudenatti R. B. and Shiralashetti
the table-2, the convergence of the presented schemes S. C., "A fast wavelet- multigrid method to solve elliptic partial
i.e. the error decreases when the level of resolution N differential equations", Applied Mathematics and Computation,
185(1), pp. 667-680, 2007.
increases. In addition, the calculations involved in Lifting
[9] Bujurke N. M., Salimath C. S., Kudenatti R. B. and Shiralashetti
schemes are simple, straight forward and low S. C., "Wavelet-multigrid analysis of squeeze film characteristics
computation cost compared to classical method i.e. of poroelastic bearings", Journal of Computational and Applied
FDM. Mathematics, 203, pp. 237-248, 2007.
[10]Pereira S. L., Verardi S. L. L. and Nabeta S. I., "A wavelet-based
Hence the presented Lifting schemes in particular algebraic multigrid preconditioner for sparse linear systems",
HWLS & BWLS are very effective for solving non- Applied Mathematics and Computation, 182, pp. 1098-1107,
linear partial differential equations. 2006.
[11]Daubechies I., Sweldens W., "Factoring wavelet transforms into
REFERENCES lifting steps", Journal of Fourier Analysis and Application, 4(3),
[1] Kyrychko Y. N. et al., "Persistence of Traveling Wave Solution pp. 247-269, 1998.
of a Fourth Order Diffusion System", Journal Computation and [12]Sweldens W., "The lifting scheme, A custom-design construction
Applied Mathematics, 176 (2), pp. 433-443, 2005. of Biorthogonal wavelets". Applied Computational Harmonic
[2] Hashemi M. S., Baleanu D. and Barghi H., "Singularly perturbed Analysis, 3(2), pp. 186-200, 1996.
Burgers-Huxley equation by a meshless method", Thermal [13]Shiralashetti S. C., Kantli M. H. and Deshi A. B., "Wavelet
Science, 21(6B) , pp. 2689-2698, 2017. Based Numerical Solution of Elasto-hydrodynamic Lubrication
[3] He J. H., "Homotopy perturbation method: a new nonlinear Problems via Lifting Scheme", American. Journal of Heat and
analytical technique", Applied Mathematics and Computation, Mass Transfer, 3(5), pp. 313-332, 2016.
135, pp. 73-79, 2003 [14]Jansen A., Cour-Harbo A, "Riples in Mathematics: The Discrete
[4] Darvishi M. T., Kheybari S. and Khani F., "Spectral Collocation Wavelet Transform", Springer-Verlag Berlin Heidelberg, 2001.
Method and Darvishi's Preconditionings to Solve the Generalized [15]Satsum J., "Topics in Soliton Theory and Exactly Solvable
Burgers-Huxley Equation", Communications in Nonlinear Science Nonlinear Equations", World Scientific, The Singapore City, 1987.
and Numerical Simulation, 13, pp. 2091- 2103, 2008.
[16]Sun L., Zhu C., "Cubic B-spline quasi-interpolation and an
[5] Gao H., Zhao R. X., "New Exact Solutions to the Generalized application to numerical solution of generalized Burgers-Huxley
Burgers-Huxley Equation", Applied Mathematics and equation", Advances in Mechanical Engineering, 12(11), pp. 1-
Computation, 217, pp. 1598-1603, 2010. 8, 2020.

890 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Finite -Difference Investigation of Laminar Natural


Convection Flow in an Odd-Shaped Enclosure
Veena Chandanam1, C. Venkata Lakshmi2, K. Venkatadri3
1,2
Department of Applied Mathematics, Sri Padmavathi MahilaVisvavidyalayam, Tirupati 517502, India.
3
Department of Mathematics, Sreenivasa Institute of Technology and Management Studies, Chittoor-517127, India.
Email: venkatadri.venki@gmail.com3

Abstract: In this article, flow fluid and heat [2] studied double-diffusive mixed convection in an
transfer in an odd shaped enclosure has been inclined cavity. Teamah and Shehata [3] used finite
examined numerically with the help of Finite- volume method to check the influences of magnetic field
Difference vorticity stream function approach was on double-diffusive in an enclosure. Nguyen et al. [4]
carried out by MATLAB software. Model thermal
applied the ISPH method to perform numerical
boundaries impacting onflow and temperature fields
were analyzed. The impacts of distinct parameters
simulations of natural/mixed convection over fixed and
Rayleigh number and Prandtl number on the flow moving rigid bodies in a cavity. Mukhopadhyay et al.
and temperature fields are studied. Results which [5] studied MHD mixed convection slip flow and heat
were calculated are splendid agreement with earlier transfer over a vertical porous plate. Sandeep et al. [6]
published work.Results of present research investigated dual solutions for unsteady mixed
appeared, the Nusselt number increased with convection flow of MHD micro polar fluid. Ellahi [7]
increase in Rayleigh number.Also,it is found that conducted a numerical study of the MHD flow of non-
velocity increases with enhance Rayleigh Newtonian nanofluid in a pipe. He observed that the
number.The numerical solutions for the present MHD parameter decreases the fluid motion and the
case of Pr = 0.025 (Mercury) are also validates with velocity profile is larger than that of temperature profile
earlier investigation showing a worthy agreement.
even in the presence of variable viscosities. Swati and
Key words: Odd shaped enclosure; Finite Iswar [8] investigated the effects of velocity slip and
difference Method; Natural convection; Heat thermal slip on MHD boundary layermixed convection
Transfer; Nusselt number; Unsteady. flow and heat transfer. The results of this study indicated
1. INTRODUCTION the decrease in heat transfer rate with the increasing
values of thermal slip. Sheremet et al. [9] investigated
Convection heat transfer inside enclosures has a wide numerically of the mixed convection flow and heat
variety of technological applications such as transfer for micropolar fluid inside triangular cavity using
thermalhydraulics of nuclear reactors, flow include finite element method, they assumed that the cavity is
crystal growth, combustion of atomized liquid fuels driven from the bottom wall with constant velocity and
industries etc. In recent years, mixed convection inside high-temperature wall, while the left and right walls are
L & odd shaped enclosures has attracted attention in considered at low temperature. Ismail et al. [10]
variety of engineering applications.Natural convection investigated numerically heat and mass transfer due to
is the main heat transfer mechanism used in numerous the steady, laminar, and incompressible MHD
applications. Heat transfer within enclosures has many micropolar fluid flow in a rectangular duct with the slip
engineering applications such as solar collectors, thermal flow and convective boundary conditions. Hamid et al.
storage systems, heat exchangers, electronic chips, and [11] investigated numerically for natural convection flow
green buildings and cooling of electrical and mechanical in a partially heated trapezoidal cavity containing non-
components. Teamah et al. [1] studied numerically the Newtonian Casson fluid. A non-Newtonian model of
impacts of uniform magnetic field on double-diffusive Casson fluid is used to develop the governing flow
convective flow in an inclined enclosure. Teamah et al.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 891


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

equations. Natural convective heat transfer analysis in  u u u  p   2u  2u 


enclosures has been widely performed by many  u v      2  2 
 t x y  x  x y 
(2)
researchers [12-14].
Our effort in this paper is dedicated to study the  v v v  p   2v  2v 
   u  v       2  2    g  T  Tc  (3)
heat and mass transfer inside an odd-shaped with in  t x y  y  x y 
motion from the top and bottom walls. In any real life
T T T   2T  2T 
engineering applications, the geometry is more u v   2  2 
t x y  x y 
(4)
complicated than an enclosure.
2. GOVERNING EQUATIONS The physical Boundary conditions are
u = v = 0 on solid walls
Consider the natural convection unsteady flow and
heat transfer in a two-dimensional odd shaped enclosure. T
On the wall CD and AB:  0 , On the wall
A schematic geometry of the problem under y
investigation is shown in Fig. 1. T
ED 0
x
On the wall BC: T = Th, On the wall EF and AF: T
= Tc (5)
by the introducing the following non-dimensional
variables:

t
,  X ,Y  
 x, y  ,U  uL ,V  vL , P  pL2 ,  T  Tm ,    ,    L2
L2 L    2 Th  Tm  
(6)

The stream function and vorticity are defined as


follows:
Fig. 1.Geometry of the problem   v u
u ,v   ,  
y x x y
(7)
L is length and height of enclosure. It is assumed
that AB, CD and DE are adiabatic walls of enclosure using the dimensionless parameters, the dimensional
while BC is hot wall of the enclosure and AF, FE are equations now become:
cold walls. It is assumed that the fluid flow within the
 2  2
enclosure is thermally equilibrium and the working fluid   0 (8)
is laminar incompressible. The thermophysicalproperties X 2 Y 2
of the working fluid are considered to be constantexcept      2  2  
U V  Pr  2  2   RaPr (9)
the density in the buoyancy term, which obeys the  X Y  X Y  X
Boussinesqapproximation.The radiative, chemical
    2  2
reaction, viscous dissipation and magnetic effects are U V   (10)
ignored.Under the discussed assumptions the equations  X Y X 2 Y 2
for conservative of mass, conservative of momentum The corresponding dimensionless boundary
and energy with Boussinesq approximationcan be conditions are
expressed as. U = V = 0 on all solid walls
u v 
 0  0 , On the wall
x y
(1)
On the wall CD and AB:
y

ED 0
x
892 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

On the wall BC:  = 1, On the wall EF and AF: successfully against the work of Tasnim and Mahmud
=1 (11) [28] for unsteady-state natural convection in odd shaped
Where adiabatic enclosures (seen in Fig. 2). The comparison
gives worthy agreements to continue the further
 g  L3 (Th  Tc ) computations.
Ra  is the thermal Rayleigh
 4. RESULTS AND DISCUSSION

number, Pr  is the Prandtalnumber.. Here, the natural convection flow fluid and heat

transfer in an odd shaped enclosure using Finite-
0 0.2 0.4 0.6 0.8 1
1

0.9
Difference technique-based vorticity stream function
0.8

0.7
approach has been discussed. Calculations are carried
0.6

0.5
out for pertinent parameterRayleigh number with fixed
0.4

0.3
Prandtl number Pr =0.025 (liquid metals as taken
0.2

0.1
working fluid). These results are presented in terms of
0
streamlines, isothermals and 2D-Plots on the flow,
a) b)
temperature and the rate of heat transfer fields.
Fig. 2. Comparison of streamlines and isotherms: (a) present
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1
computation and (b) Tasnim and Mahmud [28] 1 1

0.9 0.9

The values of vorticity on the boundary of the 0.8

0.7
0.8

0.7

enclosure can be obtained using the stream function 0.6 0.6

0.5
0.5

formulation. The local Nusselt number can be 0.4


0.4

0.3

expressed as: 0.3

0.2
0.2

0.1
0.1

 0

Nu  
0

(12)
X a. Ra=103 b. Ra=104
0 0.2 0.4 0.6 0.8 1
1 0 0.2 0.4 0.6 0.8 1

Where X is the direction normal to the odd enclosure 0.9


1

0.9

0.8 0.8

The average number is evaluated as 0.7

0.6
0.7

0.6

0.5 0.5

L 0.4 0.4

Nu   NudX
0.3 0.3

0.2
(13) 0.2
0.1
0.1
0 0
0

c. Ra=105d. Ra=106
3. METHOD THE SOLUTION
Fig. 3. Fluid flow patterns (Streamlines) variations with the
The partial differential equations (7) - (9) with influence of thermal Rayleigh number Ra for Pr = 0.025.
boundary conditions (10) were solved by using finite 0 0.2 0.4 0.6 0.8 1
1
0 0.2 0.4 0.6 0.8 1
1

0.9

difference method with second order difference 0.9

0.8

0.7
0.8

0.7

scheme. In this computation, we considered collocate 0.6

0.5
0.6

0.5

grid system and equally spaced grid arrangement. The 0.4

0.3

0.2
0.4

0.3

0.2

vorticity-stream function approach is an excellent 0.1

0
0.1

computation technique, which yields the successfully a. Ra=10 3


b. Ra=10 4

eliminate the pressure gradient. By using explicit time 0 0.2 0.4 0.6 0.8 1
1
0 0.2 0.4 0.6 0.8 1
1

integration scheme is adopted vorticity transported and 0.9

0.8
0.9

0.8

energy equation and stream function is obtained with


0.7 0.7

0.6 0.6

0.5 0.5

considering iterative method named as successive over 0.4

0.3
0.4

0.3

relaxation (SOR) method. The present model, in the 0.2

0.1
0.2

0.1

0 0

form of an in-house CFD code, has been validated c. Ra=105d. Ra=106

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 893


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 4. Temperature contours (isotherms) variations with the [3] M.A. Teamah, A.I. Shehata, Magnetohydrodynamic double
influence of thermal Rayleigh number Ra for Pr = 0.025. diffusive natural convection in trapezoidal cavities, Alexandr.
Ra=10 3 Ra=10 4
Eng. J. 55 (2016) 1037-1046.
1 1

0.8 0.8 [4] M.T. Nguyen, A.M. Aly, S.-W. Lee, A numerical study on
0.6 0.6 unsteady natural/mixed convection in a cavity with fixed and
moving rigid bodies using the ISPH method, Int. J. Num. Meth.
y

y
0.4 0.4

0.2 0.2
Heat Fluid Flow 28 (3) (2018) 684-703.
0
0 0.5 1 1.5 2
0
0 1 2 3 4 5 [5] S. Mukhopadhyay, I.C. Mandal, Magnetohydrodynamic (MHD)
Nu Nu
mixed convection slip flow and heat transfer over a vertical porous
Ra=10 5 Ra=10 6
1 1
plate, Eng. Sci.Technol. Int. J. 18 (2015) 98105.
0.8 0.8
[6] N. Sandeep, C. Sulochana, Dual solutions for unsteady mixed
0.6 0.6
convection flow of MHD micropolar fluid over a stretching/
y

0.4 0.4
shrinking sheet with non-uniform heat source/sink, Eng. Sci.
0.2 0.2
Technol. Int. J. 18 (2015) 738745.
0 0
0 2 4 6 8 0 5 10 15 20
Nu Nu [7] R. Ellahi, The effects of MHD and temperature dependent
viscosity on the flow of non-Newtonian nanofluid in a pipe:
Fig. 5. Local Nusselt number along the hot wall variations analytical solutions, Appl. Math. Model 37 (3) (2013) 1451-
with the influence of thermal Rayleigh number Ra for Pr = 1467.
0.025.
[8] S. Mukhopadhyay, I.C. Mandal, Magnetohydrodynamic (MHD)
5. CONCLUSIONS mixed convection slip flow and heat transfer over a vertical porous
plate, Eng. Sci. Technol. Int. J. 18 (2015) 98-105.
In this present theoretical examination, buoyancy
[9] Sheremet MA, Pop I, Ishak A (2017) Time-dependent natural
driven (no external force) flow in an odd shaped domain convection of micropolar fluid in a wavy triangular cavity. Int J
is investigated numerically using vorticity - stream Heat Mass Transf 105:610-622.
function technique with central difference finite difference [10] Ismail HNA, Abourabia AM, Hammad DA, Ahmed NA, El
scheme [XYZ]. The working fluid as consider Pr = Desouky AA (2019) On the MHD flow and heat transfer of a
micropolar fluid in a rectangular duct under the effects of the
0.025(liquid metals). The influence of buoyancy force induced magnetic field and slip boundary conditions. SN Appl
(i.e thermal Rayleigh number) on fluid flow and heat Sci 2:25.
transfer are studied in detailed through visualization of [11]Hamid M, Usman M, Khan Z, Haq R, Wang W (2019) Heat
contour plots of streamlines and isotherms. From the transfer and flow analysis of Casson fluid enclosed in a partially
numerical examination on natural convention, it can be heated trapezoidal cavity. Int Commun Heat Mass Transf
108:104284.
concluded that the thermal Rayleigh number can be a
control key parameter on heat and flow of liquid metals. [12] K.U. Rehman, M.S. Alqarni1, R. Mahmood, N. Kousar, M.Y.
Malik, A classical remark on the compatibility of inlet velocity
In addition, the heat transfer rate is intensified with and pressure singularities: Finite-element visualization. The
increasing of thermal Rayleigh number. Multiple fluid European Physical Journal Plus. 134(5) (2019) 230.
circulations and higher heat transfer rates are notice at [13] R. Mahmood, N. Kousar , K.U. Rehman, M. Mohasan, Lid
greater values of thermal Rayleigh number Ra. driven flow field statistics: A nonconforming finite element
Simulation. Physica A: Statistical Mechanics and its Applications.
REFERENCES 528 (2019) 121198.
[14] KU Rehman, R Mahmood, N Kousar, S Bilal, I. Zehra, On
[1] M.A. Teamah, A.F. Elsafty, M.Z. Elfeky, E.Z. El-Gazzar,
magnetized liquid stream statistics in grooved channel: A finite
Numerical simulation of double-diffusive natural convective flow
element visualization, Physica A: Statistical Mechanics and its
in an inclined rectangular enclosure in the presence of magnetic
Applications 535 (2019): 122463.
field and heat source, Part A: effect of Rayleigh number and
inclination angle, Alexandr. Eng. J. 50 (2011) 269-282.
[2] M.A. Teamah, M.M. Sorour, W.M. El-Maghlany, A. Afifi,
Numerical simulation of double diffusive laminar mixed
convection in shallow inclined cavities with moving lid, Alexandr.
Eng. J. 52 (2013) 227-239.

894 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

ISI Index of Hexagonal Chain


A. Dhanalakshmi
Assistant Professor of Mathematics, Sri Chandrasekharendra Sarswathi Viswa Mahavidyalaya,
Kanchipuram, Tamil Nadu, India.
Email: dhana_amaresan@yahoo.com

Abstract- In this paper I have obtained the ISI total surface area of octane isomers. Muhammad
index of Hexagonal chain. It is one of the degree Kamran Jamil et.al.,[6], investigated the exact formulae
based topological index. The ISI index is the ration of some chemical structure by using the line graph og
between the product of the degrees and sum of subdivision of these chemical graphs. A. Bharali et.al.,
the degrees with the adjacent vertices. A
[7], obtained some bounds of ISI index in terms of
hexagonal chain is a finite connected plane graph
with no cut-vertices in which every region with this known topological indices and they studied the ISI
is a hexagonal graph. energy and ISI Estrada index.
Keywords- Topological indices, ISI index, A hexagonal unit cell is a cell region bounded by a
Hexagonal Chain. regular hexagon of a side length.

I. INTRODUCTION A hexagonal system is a finite connected plane graph


with no cut-vertices in which every interior region is a
Graph theory has various applications in all the fields hexagonal unit cell.
such as physics, chemistry, biochemistry, geography,
computer science and information technology. A Inverse sum indeg index adjacency matrix :
molecular descriptor is the result of a logical and Let V(G)= {v1,v2,...,vn} be the vertex set of graph
mathematical procedures which transforms chemical G. For 1, 2, ...,n, let di be the degree of the vertex vi.
information encoded within a symbolic representation The ISI adjacency matrix PA is defined as
of a molecule into a useful number or the result of some
standardized experiment.  di d j
 , vi  v j
Topological indices [1], are structural invariants PA(G )   di  d j
based on modelling of chemical structures by molecular  0,
 otherwise
graphs. The most common use of mathematical
invariants, which are also known as graph theoretical If the graph G is regular of degree r, then
indices or topological indices, is as molecular r r2
PA(G)= A(G ) and PA2 (G)  A2 (G)
descriptors in QSPR & QSAR. 2 4

Spectral graph theory [2, 4] is a study of the PA(G) is denoted by the ISI adjacent matrix.
relationship between the topological properties of a The ISI Adjacency matrix and the ISI index of
graph with the spectral (algebraic) properties of the the hexagonal chain with one hexagon:
matrices associated with the graph. The most common
matrix that is studied within spectral graph theory is the
adjacency matrix. The eigenvalues are strongly
connected to almost all key invariants of a graph. They
hold a wealth of information about graphs.
J.Buragohain et.al., [5], proposed a generalization
of inverse sum index, which the proper predictor of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 895


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

0 1 0 0 0 1 The ISI Adjacency matrix and the ISI index of


1 0 1 0 0 0  the hexagonal chain with three hexagons:

0 1 0 1 0 0
PA(G )   
0 0 1 0 1 0
0 0 0 1 0 1
 
1 0 0 0 1 0 
The ISI index for the graph with one hexagon,
 2 2 
ISI  6  
 22  0 1 0 0 0 0 0 0 0 0 0 0 0 6 / 5
 
4  1 0 1 0 0 0 0 0 0 0 0 0 0 0 
 6   0

1 0 1 0 0 0 0 0 0 0 0 0 0 

4  0
 0
0 1 0 6/5 0 0 0 0 0 0 0 0 0 
0 0 6/5 0 6/5 0 0 0 0 0 0 0 3 / 2
6 
 0 0 0 0 6/5 0 6/5 0 0 0 0 0 0 0 

 
0 0 0 0 0 6/5 0 6/5 0 0 0 3/ 2 0 0 
The ISI Adjacency matrix and the ISI index of PA(G )  
 0 0 0 0 0 0 6/5 0 1 0 0 0 0 0 
 
the hexagonal chain with two hexagons:  0 0 0 0 0 0 0 1 0 1 0 0 0 0 
 0 0 0 0 0 0 0 0 1 0 1 0 0 0 
 
 0 0 0 0 0 0 0 0 0 1 0 6/5 0 0 
 
 0 0 0 0 0 0 3/ 2 0 0 0 6/5 0 6/5 0 
 0 0 0 0 0 0 0 0 0 0 0 6 / 5 0 6 / 5
 
6 / 5 0 0 0 3/ 2 0 0 0 0 0 0 0 6 / 5 0 

 2 2   23   3 3 
ISI  6    8   2 
 22  23  33

4 6 9


 6   8   2 
4 5 6
 0 1 0 0 0 6/5 0 0 0 0 
 1  48   18 
 0 1 0 0 0 0 0 0 0   6  
 0  5   6
1 0 1 0 0 0 0 0 0 
  48
 0 0 1 0 6/5 0 0 0 0 0   8
 0 15
0 0 6/5 0 3/ 2 0 0 0 6 / 5
PA(G )    40  48
6 / 5 0 0 0 3/ 2 0 6/5 0 0 0  
 0 5
0 0 0 0 6/5 0 1 0 0 
  88
 0 0 0 0 0 0 1 0 1 0  
  5
 0 0 0 0 0 0 0 1 0 1 
 0 0 0 0 6/5 0 0 0 1 0  The ISI Adjacency matrix and the ISI index of
the hexagonal chain with n hexagons:
 2 2   2  3   3 3 
ISI  6    4 2  3    3  3 
 2  2     
4 6 9
 6   4    
4 5 6
 24   3 
 6  
 5  2
60  48  15

10
123

10

896 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

0 1 0 . . . 0 0
0 REFERENCES
1 0 1 . . . 0 0 0 
 [1] Ivan Gutman, Oskar E. Polansky, Mathematical Concepts in
0 1 0 . . . 0 0 0 Organic Chemistry, Springer-Verlag, Berlin Heidelberg (1986).
 
. . . . . . . . . [2] I. Gutman, The energy of a graph, Ber. Math.Statist. Sekt. Forsch.
PA(G )   . . . . . . . . .
Graz 103 (1978) 1- 22.
  [3] I. Gutman, The Energy of a Graph: Old and New Results, Algebraic
. . . . . . . . .
0 Combinatorics and Applications, Springer Verlag, Berlin, 2001.
0 0 . . . 0 6 / 5 0
  [4] Michelle L. Rittenhouse, Properties and Recent Applications in
0 0 0 . . . 6 / 5 0 1 Spectral Graph Theory , VCU Scholars Compass, 2008.
 
0 0 0 . . . 0 1 0
[5] J.BuragohainB.DekaA.Bharali, A generalized ISI index of some
chemical structures, Journal of Molecular Structure,1208 (2020).
In General- ISI Index:
[6] Muhammad Kamran Jamil, Aisha Javed,Mohammad Reza
 2 2   23   3 3  Farahani, The Inverse Sum Indeg Index (ISI) of the Line Graphs
ISI  6    4(n  1)    (n  1)  
 22  23  33 of Subdivision Graph of TUC4C8[p;q] Structures, International
Journal of Chemical modeling, 9(2018).
6 9
 6(1)  4(n  1)    (n  1)   [7] A. Bharali, A. Mahanta, I.J. Gogoi & Amitav Doley, Inverse sum
 
5 6 Indeg index and ISI matrix of graphs, Journal of Discrete
24(n  1) 3 Mathematical Sciences and Cryptograph, 23(2020), Issue 6, pp
 6  (n  1)
5 2 1315-1333.
60  48n  48  15n  15

10
63n  3

10
3(21n  1)
ISI 
10

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 897


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Fuzzy Susceptible-Infected-Removed Model for the


Transmission of Covid-19
S. Sweatha1, Sindu Devi2
1,2
Mathematicsl Department, SRM Institute of Science and Technology, Ramapuram, Chennai, India
Email: ss0365@srmist.edu.in1, sindudes@srmist.edu.in2

Abstract-Corona is a threatening infectious equilibrium points[2]. Igor Nesteruk in his paper[3] has
disease that has affected a large number of calculated the final sizes and duration of epidemic
individuals everywhere on the world. The main aim outbreaks in the countries like Italy, Spain, Germany,
of the paper is to construct an SIR model by France, Austria and Moldova, the analytical solutions
considering transmission rate, additional death rate
are found by making use of SIR model.The basic SIR
and recovery rate as fuzzy numbers. Reproduction
(Susceptible-infected-recovered) model was first
number is obtained using next generation matrix
method which is followed by stability analysis. The introduced by Kermack and McKendrick in 1927[4].
fuzzy basic reproduction number is calculated using Zadeh introduced uncertainity in mathematical
Sugeno integral for different virus loads. We model[5].
concluded by analysing the control strategies.
II. PRELIMINARIES
Keywords-Equiliribum points, fuzzy
reproduction number, stability. 1. Fuzzy set:

I. INTRODUCTION Let X be a nonempty crisp set. A fuzzy subset S of


X is denoted by and is defined
COVID-19 is a deadly disease which has
dramatically altered everyday life of the people across = {(x ,
the globe. People who are infected by corona virus will
experience moderate respiratory illness. Older people where : X ⟶[0,1] is a membership function
with medical complications like cardiovascular disease, associated with a fuzzy set which describes the degree
diabetes, chronic respiratory disease and cancer are in of belongingness of x with X.
the risk zone as they are more likely to develop serious Here, we use the membership function (x) to
illness. The virus that causes COVID-19 is in the family indicate the fuzzy subset . Also,(x) is called fuzzy
of viruses called coronaviridae. People who became ill number if X is the set of real numbers.
with COVID-19 can also develop a bacterial infection
as a complication. [1]The virus starts spreading when 2. Fuzzy Measure and Fuzzy Expected Value:
an infected person comes in contact with the healthy Let  be a nonempty set and P() denote the set
person. The transmission of the virus may happen of all subsets of . Then,  : P()⟶[0,1] is a fuzzy
through the droplets of saliva or the discharge from the measure [22]if (i) () = 0 and () = 1
nose when the infected person coughs or sneezes
During the mid-week of June 2021, COVID-19 cases (ii) for A, B ∈ P(), (A) ≤ (B) if A ⊂ B
and number of deaths due to this infection has continued Let u: ⟶[0, 1] be an uncertain variable; i.e., u is a
to decline with over 2.6 million new cases and 72000 fuzzy subset and  a fuzzy measure on . Then, fuzzy
new deaths reported annually. Authors have discussed expected value (FEV) of u is the real number, defined
about the basic reproduction number for corona virus, by the Sugeno integral [22],
analysed the stability of the model and showed the
global stability at disease free equilibrium and endemic

898 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the virus when the virus load is . The amount of


FEV(u) = virus is limited by .
0 1

where, k(
0
III. FUZZY MODEL
The transmission of corona virus is shown using SIR
model with  as the virus load. The model is constructed Fig.1: Represents fuzzy membership function of

by considering the transmission rate, additional disease Let be the additional death rate. There
rate, influx of individuals and the natural death rate. We is no transmission of disease for the low virus load. The
consider the transmission rate, additional death rate and death rate increases with increase in virus load. Let (1-
the recovery rate as fuzzy parameters. ) be the maximum value of additional death, (
and 0 <0<1, is the lowest additional death rates.
= Additional death rate is an increasing function of .
The fuzzy membership function of is given as[6].
=

Where S+I+R = 1
TABLE 1: Description of parameters

Parameter Description
 Influx of individ uals
 Transmission rate
 Natural death rate

 Additional disease rate Fig: 2 Membership function of
 Recovery rate
 Virus load Let be the recovery rate. Longer time
is taken to recover if the amount of virus load is higher,
IV. ANALYSIS OF FUZZY SYSTEM where >0 is the lowest recovery rate. Recovery
Let be the chance of transmission. rate is a decreasingfunction of. The following equation
When an infected person come in contact with the gives the membership function of ,
susceptible person, there is more chance of transmission
of virus likely to happen. Equation () shows the fuzzy , if 0
membershipfunction of [6].

From the above equation we can understand that, Fig. 3: Represents the membership function of
when the virus-load is low, the transmission of virus is We assume that the amount of virus differs from
negligible. There is maximum chance of transmission of person to person can be viewed as linguistic variable.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 899


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The membership function of each classification is Basic reproduction number:


modelled by a fuzzy number and is given as[7] Basic reproduction number is defined as the average
number of secondary infectious caused by a single
infectious individual during the entire infectious lifetime.
The number is denoted by R0.

R0 =

Here is the central value, and is the dispersion The endemic equilibrium exists when R0 >1. The
of each one of fuzzy sets assumed by. For a fixed , equilibrium point E 0 is stable when
the classification of the linguistic variable is given . E 0 is saddle
as weak, medium and high. Each classification can be point if . E0 is
seen as fuzzy number, with triangular shape. unstable while E1 is asymptotically stable for
.
VI. FUZZY REPRODUCTION NUMBER
For the classical SIR model we found that R0 =

, that is the disease will not


Fig:4 represents graphically
be invaded if R0 < 1 and will be invaded if R0 > 1. Thus
V. STABILITY ANALYSIS R0 () is not a fuzzy set as it can be greater than one. In
Equilibrium points: this case we use fuzzy reproduction number which is
defined as [6]
In this section we discuss about the twoequilibrium
points.
R 0f = o
(]
1. Disease free equilibrium point
2. Endemic equilibrium point where [0 R0()] = sup {inf(, k())}, 0 ≤  ≤ 1
k() = µ(X) is a fuzzy measure.
1. Disease free equilibrium point:
We need to define µ to obtain FEV[0 R0()]. Thus,
To obtain the disease free equilibrium point, we the possibility measure is given by
consider, I = R = 0, thus disease free equilibrium point
is obtained as µ(X) = sup , for every ∈ X, X ⊂ R
It is clear that R0() is not decreasing with the virus
E0 = ( load , from FEV[0 R0()], X = [ , here ?
is the solution of the equation
2. Endemic equilibrium point:
To obtain the endemic equilibrium point, we consider
=
S I R thus the endemic equilibrium
point is obtained as Thus, k(
E1 = where k(0)= 1 and k(1)= (
The amount of virus is categorized into three cases,
namely weak, medium and strong virus loads.

900 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Case: 1 COUNTRY R0
Spain 2.22
Weak virus load: Italy 2.20
Brazil 1.33
When then ] = 0
<
f
R0 < 1, so we conclude that the disease will Percentage of the people in a country who need to
be extinct.
take vaccination =
Case: 2
Medium virus load: Spain:
Percentage of the people in a country who need to
and , then
take vaccination = 55%
Italy:
k() = Percentage of the people in a country who need to
take vaccination = 54%
Obviously when >0, k((()))is continuous and Brazil:
decreasing function and FEV[0 R0(] is considered
as fixed point of k. By calculation we arrive, R0 Percentage of the people in a country who need to
take vaccination = 25%
R 0f ≤ R 0 .
Since the R0 function is continuous and increasing, VII. CONCLUSION
according to intermediate value theorem, R0f = R0 We have discussed the basic reproduction number,
()>R0 . fuzzy basic reproduction number and analysed about
the stability. We have concluded by giving the control
Case: 3
strategy for the disease and illustrated with an example.
Strong virus:
REFERENCES
As in case (2) we conclude that R0 ≤ R 0f ≤ [1] World Health Organization.
R0 . [2] Stability behavior of mathematical model MERS Corona Virus
Thus R0f >1, the disease will be endemic. spread in population, published by Faculty of Sciences and
Mathematics, University of Serbia.
Control Strategy: [3] SIR- simulation of Corona pandemic dynamics in Europe, Igor
Nesteruk.
To control the disease, we need to follow some
[4] W. O. Kermack and A. G. McKendrick, "Contributions to the
control strategies. It can be either quarantine, mathematical theory of epidemics-I. 1927," Bulletin of
maintaining a proper social distance or taking up the Mathematical Biology, vol. 53, no. 1-2, pp. 33-55, 1991.
vaccination. [5] L. A. Zadeh, "Fuzzy sets," Information and Control, vol. 8, no.
3, pp. 338-353, 1965.
An example is given where the reproduction value
[6] R. Verma, S. P. Tiwari, and U. Ranjit, "Dynamical behaviour of
for the different countries is taken and we have evaluated
fuzzy SIR epidemic model," in Advances in Intelligent System
the percentage of people in that country who need to and Computing, vol. 643, pp. 482-492, Springer, Cham, 2018.
take a vaccination so that the disease will come under [7] L.C.Barros, R.C.Bassanezi, M.B.F Leite: The SI epidemiological
control. models with a fuzzy transmission parameter. Comput. Math.
Appl. 45, 1619-1628,(2003).
Example1: The following data is the R0 value as per
[8] http://web.stanford.edu/~chadj/Covid/Dashboard.html
09-oct-2020[8].

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 901


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Note On N Disconnectedness
Mrs.N.Raksha Ben1, Dr.G. Hari Siva Annam2
1,2
Research Scholar of Mathematics, PG and Research Department of Mathematics, Kamaraj College,
Thoothukudi-628003, Tamil Nadu, India
(Affiliated to Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli-627012, Tamil Nadu, India)
Email: rakshaarun218@gmail.com1, 2hsannam@yahooo.com

Abstract-In this article we are going to having the form ,


introduce a new concept in N Disconnectedness . Since our main purpose is to construct
and their types and various characters are to be the tools for developing Neutrosophic Set and
discussed in detail. Also, we define  N Neutrosophic topology, we must introduce the
Hyperconnected and its properties are also
neutrosophic sets 0N and 1N in X as follows:
contemplated.
Keywords-  N Disconnectedness, N
0N may be defined as follows
connected-ness, N hyperconnected.

I. INTRODUCTION 1N may be defined as follows


The idea of fuzzy set which plays a vital role in almost
all sectors of mathematics. Belatedly C.L Chang
brought out fuzzy topological space and after that Definition 2.5.[13] Let } be a NS
several notions in general topology were extended and on X , then the complement of the set A [ C(A) for
enhanced in fuzzy topological spaces. K.T Attansov short] may be defined
published his idea of intuitionistic set and some research ,
works came into the literature. The concept of
neutrosophy and neutrosophic sets were putforth by Definition 2.6.[13] Let X be a non-empty set and
Samarandache with his idea later on Salama and neutrosophic sets A and B in the form
Albowi introduced neutrosophic crisp sets. , and
Theconceptof resolvability and irresolvablility in ,
neutrosphic topology was brought out by Dhavaseelan
may be defined as:
et al.
( )⇔
II. NECESSITIES
Proposition 2.7. [13] For any neutrosophic set A,
Definition 2.1[13]: Let X be a non-empty fixed the following conditions holds:
set. A Neutrosophicset[NSforshort] A is an object
having the form ,
where and Definition 2.8. [13] Let X be a non-empty set
which represents the degree of membership function, and ,
the degree of indeterminacy and the degree of non- ,
membership function respectively of each element are NSs. Then may be defined as:
to the set A.
Remark 2.4.[13] Every intuitionistic fuzzy set A is may be defined as:
a non empty set in X is obviously on Neutrosophic sets

902 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Definition 2.9[12] A topology on a non - empty Example 3.2: Let X={a} define neutrosophic sets
set X is a family of neutrosophic subsets in X satisfying 0N={(0,11)},1={(0.3,0.3,0.5)},2 ={(0.1,0.2,0.3)},
the following axioms: |={(0.3,0.2,0.3)},  4 ={(0.3,0.6,0.2)}, 5=
{(0.3,0.8,0.5)}, 1N={(1,0,0)} and we define a N TS
 N ={0 N , 1 , 2 , 3 }. Here  1 ≠ 0 N, 2 ≠ 0 N
for any .  1V  2= { ( 0 . 3 , 0 . 2 , 0 . 3 ) } ≠ 1 Na n d
Hence (X, N ) is  N
Remark 2.10.[12] The elements of are Connected.
open sets and their complement is called closed Example3.3: Let X={a,b} define neutrosophic sets
sets. 0 N ={(0,1,1),(0,1,1)},  1 ={(1,0,0),(0,0,1)},
Definition 2.11.[12]The -Closure of A is the 2={(0,1,1),(1,1,0) }, 3={(1,0,0),(1,1,1)} and we
define a  N TS as .
intersection of all closed sets containing A.
H e r e , ,
Definition 2.12.[12]The -Interior of A is the  1V  2= { ( 1 , 0 , 0 ) , ( 1 , 0 , 0 ) } = 1 N,
union of all open sets contained in A. 1 ⋀ 2={(0,1,1),(0,1,1)}=0 N. Hence (X,N)is N
Definition 2.13.[11] A neutrosophic set A in NTS disconnected.
is called neutrosophic dense if there exists no Definition 3.4: Let (X,N) be a N Topological
neutrosophic closed sets B in (X,T) such that . spaces.If there exists N open sets A and B in X
Definition 2.14.[10] The neutrosophic topological satisfying the following properties,then N is said to be
spaces is said to be neutrosophicBaire's Space if N NCn disconnected.
(a)
where Gi's are neutrosophic nowhere
(b)
dense set in (X,T).
(c)
Theorem 2.15.[10]: Let(X, ) be a TS. Then
the following are equivalent. (d)

(i) (X, ) is Baire Space. N is said to be NCn connected (n=1,2,3,4) if N is


not NCn disconnected.
(ii) Int(A)=0 N, for all first category set in
(X, ). Remark 3.5: Clearly, we obtain the following
implications between the four types of NCn connected
(iii) Cl(A)=1N, Residual set in (X, ). (n=1,2,3,4).

III. -CONNECTEDNESS& - a) Every NC1 connected implies NC2 connected.


DISCONNECTEDNESS b) Every NC1 connected implies NC2 connected.
Definition 3.1:A Topological spaces (X, ) c) EveryNC3 connected implies NC4 connected.
is said to be disconnected if there exists open d) EveryNC2 connected implies NC4 connected.
sets in (X, ) such that and The following examples shows us that the converse
. implications need not be true
If (X, ) is not disconnected then it is Example 3.6: Let X={a,b},N={N,A,B,C}
Connected. whereA={(0.4,0.6,0.6)(0.1,0.9,0.9)},
B={(0.5,0.5,0.5)(0.3,0.9,0.7)},

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 903


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

C={(0.3,0.7,0.7)(0.1,0.9,0.9) }.Here, C is NC2 N irresolute mapping,


connected, NC3 connected, NC4 connected but NC1 which are N open
disconnected. sets in (X, N )and .
Example 3.7: Let X={a,b}, N={0N,P,Q,R,S} Also, which gives us
where P={(0.2,0.6,0.6)(0.8,0.2,0.2)}, and . Thus , is  N
Q={(0.8,0.2,0.2)(0.6,0.2,0.2)}, disconnected which is a contradiction to our hypothesis.
R={(0.8,0.2,0.2)(0.8,0.2,0.2)}, Hence is N Connected.
S={(0.1,0.9,0.9)(0.1,0.9,0.9)}. Here, S is NC 4 Theorem 3.13: A N Topological spaces (X,N) is
connected but NC3 disconnected. NC5 connected if and only if there exists no non-empty
Definition 3.8: AN Topological spaces (X,N) is N open sets U and V in (X,N) such that U=Vc.
said to be NC5 disconnected if there exists N subset Proof: Assume (X,N) is NC5 connected. Suppose
A in X which is both N closed and N open in (X,N) U and V are N open sets in (X,N ) such that U ≠ 0N,
such that . If X is not NC5 disconnected V ≠ 0N and U=Vc. Since U=Vc, Vc is N open in (X,N)
then it is said to be NC5 connected. which implies that V is N closed in (X,N ) and U ≠ 0N
Example 3.9: Let X={a,b}, N={0N,A1,A2} where implies V ≠ 1N. Hence , V is both N open and N closed
A 1= { ( 0 . 3 , 0 . 5 , 0 . 9 ) ( 0 . 6 , 0 . 5 , 0 . 4 ) } , in (X,N ) such that V ≠ 0N and V ≠ 1N that implies us
A 2 ={(0.9,0.5,0.3)(0.4,0.5,0.6)}. Here, that V is NC5 disconnected which is a contradiction
is both N closed and N open in to (X,N ) is NC5 connected.Hence there is no non
(X,N ).Thus (X,N) is NC5 disconnected. empty N open sets U and V in (X,N ) such that U=Vc.

Theorem 3.10: NC5 disconnectedness implies N Conversely, we assume that there is no non empty
connected. N open sets U and V in (X,N) such that U=Vc. Let V
be N closed in (X,N) and U be both N open and N
Proof: Suppose there exists a non-empty N open closed in (X,N) such that U ≠ 0N, U ≠ 1N. Now take
sets A and B such that and . Then Uc=V is a N open set and V ≠ 1N which implies us that
and U c =V ≠ 0 N . Hence we get V ≠ 1 N which is a
. In contradiction to our assumption. Hence (X,N ) is NC5
otherwords, Bc=A. Hence, A is N clopen which yields connected.
us that X is N connected.
Theorem 3.14: AN Topological spaces (X,N ) is
But the reversal statement of the above theorem need N connected space if and only if there exists no non-
not be true. empty N open sets U and V in(X,N) such that U=Vc.
Example 3.11: Let X={a,b}, N={0N,R1,R2} Proof: Assume (X,N) is N connected. Suppose
where R 1 ={(0.7,0.3,0.8)(0.5,0.8,0.9)}, U and V are N open sets in (X,N) such that
R 2= { ( 0 . 8 , 0 . 2 , 0 . 1 ) ( 0 . 7 , 0 . 2 , 0 . 4 ) } . H e r e , U ≠ 0N,V ≠ 0N and U=Vc. Since U=Vc, Vc is N open
R 1 ⋁ R 2 ={(0.8,0.2,0.1)(0.7,0.2,0.4)} ≠ 1 N and in (X,N) which implies that V is N closed in (X,N )
R1 ⋀ R2={(0.7,0.3,0.8)(0.5,0.8,0.9)} ≠ 0N. Hence, and U ≠ 0N implies Vc ≠ 1N.Hence, V is a proper N
(X,N) is N connected. subset which is both N open and N closed in (X,N)
Theorem 3.12: Let be a that implies us that X is N disconnected which is a
N irresolute surjection in (X,N ) then (Y,N) is N contradiction to (X,N ) is N connected.Hence there
Connected. is no non zero N open sets U and V in (X,N ) such
that U=Vc.
Proof: Assume that is not N connected then
there exists a non-empty N open sets M and N in Conversely, we assume that there is no non zero N
such that M ⋁ N=1N and M ⋀ N=0N. Since  is open sets U and V in (X,N ) such that U=Vc. Let V be

904 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

N closed in (X,N ) and U be both N open and N 5={(0.3,0.8,0.5)},1N={(1,0,0)} and we define a N


closed in (X,N ) such that U ≠ 0N, U ≠ 1N. Now take TS N={0N,1,2,3}. Here
Uc=V is a N open set and V ≠ 1N which implies us that are N dense sets in (X,N).Here every N open subset
Uc=V ≠ 0N. Hence we get that there is non-empty N of (X,N) is N dense in (XN).Thus , (X,N is N
open sets U and V such that U=Vc which is a hyperconnected.
contradiction to our assumption. Hence (X,N ) is N
Remark 4.3: Every N hyperconnected is N
connected.
connected. The contrary statement of the above theorm
Theorem 3.15: A NTopological spaces (X,N) is need not be true.
N connected space if and only if there exist no non-
Example 4.4: Let X={a} define neutrosophic sets
zero N subsets U and V in (X,N) such that U=Vc,
0 N ={(0,11)}, ={(0.7,0.8,0.9)},
V=(N Cl U)c and U=(NCl V)c. 1

2
={(0.3,0.4,0.6)}, 3
={(0.9,0.7,0.6)},
Proof: Let U and V be two N subsets in (X,N) 1N={(1,0,0)} and we define a N TS N={0N, 1, 3}.
such that U ≠ 0N,V ≠ 0N and U=Vc, V=(NCl U)c and Here , 1 and 3 are N open sets in (X,N) but they
U=(NClV)c. Since, (NCl U)c and (N Cl V)c are N are not Ndense in (X,N). Hence (X,N) is not N
open sets in X. U and V are N open sets in X. This hyperconnected. But (X,N ) is N connected.
implies X is not N connected which is a contradiction.
Theorem 4.5: (X,N ) is N hyperconnected if and
Therefore there exists no N open sets in X such that
only if every N subset of (X,N )is either N dense or
U=Vc, V=(NCl U)c and U=(N Cl V)c.
N nowhere dense there in.
Suffiency: Let U be both N open and N closed
Proof: Let (X,N) be a N hyperconnected space.
sets in X such that U ≠ 0N, U ≠ 1N. By taking V=Uc
Let A be any N subsets such that . Suppose A
which is a contradiction to our hypothesis.Hence, (X,N)
is not N nowhere dense. Then N Cl(X-NClA)=X-
is N connected.
N Int(N ClA) ≠ 1N. Since N Int(N ClA) ≠ 1N. By
Theorem 3.16: Let be a N our assumption we get A is N dense .
surjection and X be N connected. Then Y is also N
Conversely, let A be non-empty mN open in X.Now
connected.
for any non-empty m N open set we have
Proof: AssumeY is not N connected then there which implies that A is not mN
exists non-empty N open sets U and V in Y such that nowhere dense but by hypothesis we have A is mN
. Since f is  N surjection, dense. Hence the theorem.
, which are N open in
X and f which implies
. Also, that
yields that which is a contradiction to X is N
disconnected to our assumption. Hence, Y is also N
connected.
IV. HYPERCONNECTED
Definition 4.1: A N TS is said to be N hyper
connected if every non-emptyN open subset of (X,N)
is N dense in (X,N).
Example 4.2: Let X={a} define neutrosophic sets
0N={(0,1,1)},1={(0.3,0.3,0.5)},2={(0.1,0.2,0.3)},
 3 ={(0.3,0.2,0.3)},  4 ={(0.3,0.6,0.2)},

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 905


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

BIBILIOGRAPHY [8] FloretinSmarandache, A Unifying Field in Logic: Neutrosophic


Logic. Neutrosophy, Neutrosophic set, Neutrosophic
[1] Atanassov.K. T, Intuitionistic fuzzy sets, Fuzzy Sets and Probability.Ameican Research Press, Rehoboth, NM,1999.
Systems, 20(1986), 87-96.
[9] Iswarya .P,Dr.K.Bageerathi,A Study on neutrosophic Frontier
[2] Chang.C. L, Fuzzy topological spaces, Journal of Mathematical and neutrosophic semi frontier in Neutrosophic topological
Analysis and Application, 24(1968), 183-190. spaces.Neutrosophic sets and systems, vol . 16,2017.
[3] Al-Omeri, W.; Smarandache, F. New Neutrosophic Sets via [10] Raksha Ben. N, Hari Siva Annam.G,Generalized Topological
Neutrosophic Topological Spaces. In Neutrosophic Operational Spaces via Neutrosophic Sets,J.Math.Comput.Sci.,11(2021),
Research; Smarandache, F., Pramanik, S., Eds.; Pons Editions:
Brussels, Belgium, 2017; Volume I, pp. 189-209 [11] Salama A.A and Alblowi S.A, Neutrosophic set and Neutrosophic
topological space,ISOR J. Mathematics, 3(4)(2012), 31-35.
[4] Dhavaseelan.R and Jafari, Generalized Neutrosophic closed
sets,New trends in Neutrosophic theory and applications, [12]Salama.A.A and Alblowi.S.A, Generalized Neutrosophic Set and
2(2018), 261-273. Generalized Neutrosophic Topological Spaces, Journal computer
Sci. Engineering, 2(7)(2012), 12-23.
[5] Dogan Coker, An introduction to intuitionstic fuzzy topological
spaces, Fuzzy Sets and Systems, 88(1997), 81-89 [13]SalamaA.A, FlorentinSmarandache and Valeri Kroumov,
Neutrosophic Closed set and Neutrosophic Continuous Function,
[6] FloretinSmarandache, Neutrosophy and Neutrosophic Logic, Neutrosophic Sets and Systems,4(2014), 4-8.
First International Conference on Neutrosophy, Neutrosophic
Logic, Set, Probability, and Statistics University of New Mexico, [14]Wadel Faris Al-omeri and FlorentinSmarandache, New
Gallup, NM 87301, USA, 2002. Neutrosophic Sets via Neutrosophic

[7] FloretinSmarandache, NeutrosophicSet: - A Generalization of


Intuitionistic Fuzzy set, Journal of DefenseResourses
Management, 1(2010),107-116.

906 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Application of Intuitionistic Fuzzy Soft Matrices in the


Field of Medical Diagnosis for Covid-19 Patients
Dr.J.Sengamalaselvi
Assistant Professor of Mathematics, Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya
Enathur, Kanchipuram, Tamilnadu

Abstract: Fuzzy set theory plays a dynamic role Ejegwaet.al, proposed on some selected models of
in medicinal fields. There are varieties of Intuitionistic fuzzy soft sets in real lifesituations such as
simulationsinvolving fuzzy matrices to deal with in diagnostic medicine, career determination, and pattern
different complicated aspects of medical recognition using. Borahetal,extended fuzzy soft
diagnosis.Today may be a world of uncertainty with
matrixtheory andits application. Chetia et al [2]
its associated problems, which may be well handled
proposedIntuitionistic fuzzy soft matrix theory.
byfuzzy soft set theory. Sanchez formulated the
diagnostic models including intuitionistic fuzzy Rajarajeswari et al proposed new definitions for
matrices representing the medical knowledge Intuitionistic fuzzy soft matrices andits types.Sarala et.al,
between the symptoms anddiseases.Inthis paper,an proposed the theory ofintuitionistic fuzzy soft matrices
algorithmis developed anda fewexamples in the field of medical diagnosis with two different types
areproposed toconstructthedecision method ofT-productofintuitionisticfuzzysoft matrices.
forDiagnosis.
In real world most of the prevailing mathematical
Keywords: Algorithm, CaseStudy, Fuzzy soft tools for formal modelling, reasoning andcomputing are
Matrix, Decision Making Problem, Intuitionistic crisp, deterministic and precise in nature. The classical
fuzzy softs et . crisp mathematicaltools are not capable of handling with
Mathematics subject classification: 03B52, 92C50, problems in uncertainty and imprecision. There are many
91B06 mathematical tools available for modelling complex
systems such as probability theory, fuzzyset theory,
1. INTRODUCTION interval mathematics etc. Probability theory is applicable
In 1965, Fuzzy set was introduced by Lotion. only for a scholastically stable system. Setting the value
A.Zadeh. An intuitionistic fuzzy was introduced in 1983 of membership function is usually being a problem in
by K.Atanassov [1] as an extension of Zadeh's fuzzy fuzzy set theory. Intuitionistic Fuzzy Soft Set theory
set. The concept ofintuitionistic fuzzy matrices (IFMs) (IFSS) maybe more applicable inuncertainty and
as a generalization of fuzzy matrix was studied and imprecision. The parameter colonization fuzzy theory
developed by Madhumangal Palet.Al. Regularity of develops the flexibility of its applications. Intuitionistic
block fuzzymatrices and therefore the consistency of a Fuzzy Soft Matrix applications inmedical diagnosis and
fuzzy relational equation with coefficient matrix was various techniques are applied in [15].
block fuzzy matrix were discussed in[7,8]. In the year In this paper, some examples are proposed to
1999, Russian researcher Molodtov was initiated Soft construct the decision method for Medical Diagnosis.
set theory and he proposed soft set a totally generic An algorithm is developed in intuitionistic fuzzy soft
mathematical tool for modeling uncertainties. Maji et matrix and Solution is obtained by using Relativity
al. [5,6] applied this theory many directions for handling function. Moreover, apply Intuitionistic fuzzy soft set
the issues in uncertainty and imprecision. Yangeta theory to develop a technique through Sanchez's
initialized matrix representation of a fuzzy softset and method [13] to diagnose which patient is affected by
applied it in decision making problems. what disease.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 907


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2. PRELIMINARIES A-B={min[A(aij),B(bij)],max[A(aij),B(bij)]}∀ i,j


In this section, some basic definitions and notations Definition 2.6
of fuzzy soft set theory and fuzzy softmatricesaregiven.
IfA=[aij] ∈ I FSMmxn, B=[bjk] ∈ IFSMnxp, then the
Definition 2.1 product of intuitionistic fuzzysoft matrix relation of A
Suppose that U is an initial Universe of discourse and B is defined as
and E is a set of parameters, let P (U) denotes the power A*B=[cik]mxp,
set of U. A pair (F, E) is called a soft set over U, where
F is a mapping given by F: E ⟶ P (U). Clearly, a soft = { M a x { M i n [ µ A( a ij) , µ B( b jk
)]},
set is a mapping from parameters to P (U), and it is Min{Max[A(aij),B(bjk)]}}
notaset, but a parameterized family of sub sets of the Definition2.7[15]
Universe.
IfA=[aij] ∈ IF SMmxn,where[aij]=(j(ci),j(ci)),∀ i,j.
Definition 2.2 Then Ac is called a Intuitionistic Fuzzy Soft Complement
Let U be an initial Universe of discourse and E be matrix if Ac=[dij]mxn,where[dij]=(j(ci),j(ci)), ∀ i,j.
the set of parameters. Let A E. A pair (F,A) is called
fuzzy softset over U, where F is a mapping given by Definition2.8[16]
F:A ⟶ IU, where IU denotes the collection of all fuzzy Let x and y be variables defined on a universal set
subsets of U. X. The relativity function is defined by
Definition 2.3
= , where y(x) is
Let U be an initial universe set and E be the set of
parameters. Let IF U denote the collectionof all the membership function of x with respect to y.
Intuitionistic fuzzy subsets ofU. Let A E. A pair(F,A) is
Definition 2.9[16]
called an Intuitionistic fuzzysoft set overU, where F is a
mapping given by F:A⟶IFU. LetA={x1,x2,….,xi,….,xn}be a set of n-variables
defined on a universal set Form a matrix of
Definition2.4[12]
Let U={c1,c2,c3,..,cm} be the Universal set and E
Relativity values f , wherexi's are n variables
be the set of parameters given by E={e1, e2, e3....,en}.
LetA E and (F,A) be a Intuitionistic fuzzysoftset in the defined on an universe The matrix R=(rij)is a square
fuzzysoft class (U,E). The nIntuitionistic fuzzysoftset matrix of order 'n' is called the comparison matrix with
(F,A) in a matrix form as Am×n=[aij]m×norA=[aij],
i=1,2, . . . , m, j =1, 2,..., n, f = µ xj(xi)

Intuitionistic Fuzzy Soft Matrices (IFSM) in


aij=
Medical Diagnosis
µ j(ci) represents the membership of ci in the In this section, an novel approach involving
Intuitionistic fuzzyset F(ej)and j(ci) represents the non- membership and non-membership parts of IFSM form
membership of ci in the Intuitionistic fuzzyset F(ej). medical diagnosis is proposed and solution is obtained.
Definition 2.5[12] Definition 3.1:
IfA=[aij] ∈ IFSMmxn, B=[bij] ∈ IFSMmxn, then the
Let x and y be variables defined on a universal set
addition and subtraction of Intuitionistic FuzzySoft
Matrices(IFSM)ofAand Bisdefinedas X. There relativity function is defined by f =
A+B={max[A(aij),B(bij)],min[A(aij),B(bij)]}∀ i,j

908 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table3.2
,
B COVID-19 Pneumonia Flu
where y(x) is the membership function of x with respect Temperature <0.2,0.4> <0.3,0.6> <0.7,0.1>
to y and y(x) is the non-membership function of with Cough <0.5,0.3> <0.7,0.1> <0.2,0.6>
Shortnessof <0.1,0.4> <0.5,0.1> <0.8,0.1>
respect to y.
Breath
Algorithm: Step4: Compute C=AoB and D=AcoBc
Step1:Choosethesetofparameters Table3.3

Step 2: Construct a patient-symptom intuitionistic C COVID-19 Pneumonia Flu


Suresh <0.5,0.3> <0.7,0.1> <0.6,0.2>
fuzzy soft matrix A= <A(aij) , A(aij) >Step 3: Ramesh <0.5,0.3> <0.7,0.1> <0.4,0.6>
Construct a symptom - disease intuitionistic fuzzy soft Ravi <0.5,0.3> <0.7,0.2> <0.5,0.1>
matrix B= <B(bjk), B(bjk)> Step4: Compute C=Ao Table3.4
B and D=AcoBc, where 'o' denotes max-min and min- C
A Temperature Cough Shortness of breath
max composition Suresh <0.2,0.6> <0.1,0.7> <0.2, 0.3>
Ramesh <0.7,0.2> <0.1, 0.9> <0.6, 0.4>
Step5:ComputeM =C-D, using min and max Ravi <0.1, 0.5> <0.2, 0.8> <0.7, 0.1>
operator Table3.5
C
B COVID-19 Pneumonia Flu
Step6: Form a matrix of relativity values f =R= Temperature <0.4, 0.2> <0.6, 0.3> <0.1, 0.7>
Cough <0.3, 0.5> <0.1, 0.7> <0.6, 0.2>
(rij)mxn. Then maximum value of membership part and
Shortnessof <0.4, 0.1> <0.1, 0.5> <0.1, 0.8>
minimum value of non-membership par-tineacow Breath
catchers of the R-matrix will have the maximum Table3.6
possibility for ranking purpose. This provides solution
D COVID-19 Pneumonia Flu
to the specified problem. Suresh <0.2,0.3> <0.2,0.5> <0.1,0.7>
CaseStudy Ramesh <0.4,0.2> <0.6,0.3> <0.1,0.7>
Ravi <0.4,0.1> <0.1,0.5> <0.2,0.7>
Step1:Let therebethreepatients Suresh, Ramesh and
Step 5:Compute M=C-D
Raviin ahospital. That is, P={p1,p2,p3} ={Suresh,
Table3.7
Ramesh, Ravi}.The set of symptoms considered is,
S={s1,s2,s3} = {temperature, cough, Shortness of M COVID-19 Pneumonia Flu
Suresh <0.2,0.3> <0.2,0.5> <0.1,0.7>
breath}. Let these to f diagnose D={d 1,d 2,d3}=
Ramesh <0.4,0.3> <0.6,0.3> <0.1,0.7>
{COVID-19, Pneumonia, Flu}. Ravi <0.4,0.3> <0.1,0.5> <0.2,0.7>
Step2:Construct apatient-symptom intuitionistic Step6: Forma comparison matrix R
fuzzy soft matrix A. Table3.8
Table3.1
M COVID-19 Pneumonia Flu
A Temperature Cough Shortness Suresh <0,0> <-0.5,0.67> <-0.75,1.33>
ofbreath Ramesh <0.5,-0.67> <0,0> <0,0.4>
Suresh <0.6,0.2> <0.7,0.1> <0.3,0.2> Ravi <0.75, -1.33> <0,-0.4> <0,0>
Ramesh <0.2,0.7> <0.9,0.1> <0.4,0.6> The results are given in Table 3.8, conclude that for
Ravi <0.5,0.1> <0.8,0.2> <0.1,0.7> every patient Pi from possible diagnosisD points out a
Step 3:Construct a symptom-disease intuitionistic solution. It is clear from the above Table 3.8, Suresh,
fuzzy soft matrix B Ramesh and Ravi suffers from COVID-19 .

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 909


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

3. CONCLUSION 3. Ejegwa.P.A, A.M.Onoja and I.T.Emmanuel, ANote On Some


Models of Intuitionistic Fuzzy Sets In Real Life Situations,
Medical one among the-sector during which the Journal of Global Research in Mathematical Archives,Volume2,
applicability of fuzzy set theory was recognized quite No. 5, 2014.

early. The doctors generally gather knowledge about 4. Meenakshi.A.R,T.Gandhimathi, Intuitionistic fuzzy relational
equations, Advances in Fuzzy Mathematics, 2(5), 2010, 239-
the patient from thepast history, laboratory test result 244.
and other investigative procedures such as x-rays and
5. Meenakshi. A.R,T.Gandhimathi, System of Intuitionistic Fuzzy
ultra-sonic rays etc. The knowledge provided by each Relational Equations, Global Journal of Mathematical Sciences:
of those sources carries with it varying degrees of Theory and Practical. ISSN0974-3200, Volume4, Number1
uncertainty. Thus the simplest and most useful ,(2012), pp. 35-41

descriptions of disease entities often use linguistic terms 6. M.Pal,S.Khan and A.K.Shyamal, Intuitionistic fuzzy matrices,
Notes on Intuitionistic fuzzy sets 8(2), (2002), 51-62.
that are vague. Hence during this paper, a new approach
involvingmembership and non-membership parts of 7. Rajarajeswari.P, P.Dhanalakshmi, Intuitionistic fuzzy soft matrix
theory and its application in medical diagnosis, Annals of Fuzzy
IFSM for medical diagnosis is proposed and an Mathematics and Informatics, vol.2, pp. 1-11, 2013
algorithm in intuitionistic fuzzy soft matrixis developed. 8. Sanchez. E, Inverse of fuzzy relations, application to possibility
Solution is obtained by usingrelativity function. From distributions andmedicaldiagnosis, Fuzzysets and Systems,
the above analysis it is obvious that, the patient p1, p2 vol.2,pp. 2(1), (1979).75-86.
andp3 suffers from COVID-19. 9. Shanmugasundaram.P, C.V.Seshaiah, "An Application of
Intuitionistic Fuzzy Technique in Medical Diagnosis", Australian
REFERENCES Journal of Basic and Applied Sciences, vol.8(9),(2014), pp. 392-
395.
1. Atanassov.K.T,Intuitionistic fuzzy set,Fuzzy setsandsystems,
Vol.20(1),1986,pp:86-87. 10. Thangaraj Beaula, Mallika, "Application of Fuzzy Matrice sin
Medical Diagnosis", International Journal of Fuzzy Mathematical
2. Chetia. B, P.K.Das, Some results of Intuitionistic Fuzzy soft Archive, 14(1), 2017.
matrix theory, AdvancesinApplied ScienceResearch, 3
(2012),412-413.

910 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Mass and Heat Transfer Effect on MHD Flow of a


Visco-Elastic Fluid through Porous Nedium with
Oscillatory Suction and Heat Source
Rama Mohan Reddy.L1, Veera Sanjeeva Kumar.P2
1
Department of Mathematics, Rajiv Gandhi University of Knowledge Technologies, IIIT-Ongole, A.P, INDIA
2
Department of Mechanical Engineering, Annamacharya Institute of Technology and Sciences, Rajampet, A.P, INDIA
Email: duggireddy.lingari@gmail.com1, sanjeevpalagiri@gmail.com2

Abstract-Thiselec The slip flow effects on two interrelated aspects of a single entity, namely the
unsteady hydromagnetic flow over a stretching electromagnetic tensor. Depending on the relative
surface with thermal radiation are studied in the velocity of the charge and the observer, the division of
presence of heat generation and porous media. The the tensor into electric and magnetic fields. In quantum
governing partial differential equations are reduced
mechanics, the electromagnetic field is quantized and
to a system of self-similar equations, using
transformations of similarity. The resulting electromagnetic interactions arise from the exchange
equations are then numerically solved using the of photons. Raja Shekar and Karunakar Reddy [1]
fourth-order technique of Runge-Kutta and the examined heat and mass transfer past a continuously
shooting method. The effects on velocity and moving porous boundary in the presence of a magnetic
temperature of regulating physical parameters are field. Sun et al.[2] studied heavy segregation and self-
measured and described in graphical and tabular assembly induced by strong magnetic fields of
ways, as well as the coefficient of skin friction and micrometer-sized non-magnetic particles. Raja Shekar
Nusselt number. and Karunakar Reddy[3] explored heat and mass
Numerical computations have been carried out transfer past a continuously moving porous boundary
for different parameter values, such as the magnetic in the presence of a magnetic field. The effects of
interaction parameter. (M2),, in order to evaluate radiation and variable viscosity on a free MHD
the results Permeability of porous medium convection flow past a semi-infinite flat plate with an
parameter (K), Heat generation parameter (Q), aligned magnetic field were studied by Seddeek[4] in
Unsteadiness parameter (A),Radiation parameter the case of unsteady flow.
(R), Velocity slip parameter ( h1 ), Thermal jump
A chemical reaction is a procedure that results in
parameter ( h2 ) and Prandtl number (Pr). With the
one category of chemical substances being converted
help of figures and graphs, the results and
to another. Chemical reactions generally include changes
numerical values are clarified. Also derived and
discussed are the Skin Friction and Nusselt
that include only electron positions in the formation and
Number expressions. breakdown of chemical bonds between atoms, without
nucleus modification, and can usually be represented
Keywords-A chemically reacting, radiative and by a chemical equation. Chemical science can be a sub-
dissipative fluid heat and mass flux, aligned
discipline of chemistry involving the chemical reactions
magnetic field, MHD normal convection flow
of elements in which electronic and nuclear modifications
I. INTRODUCTION may take place that are unstable and radioactive.
Krishna et al. [5] considered the effects of chemical
This induces magnetic fields by changing electrical
reaction and radiation on MHD convective flow over a
charges and intrinsic magnetic moments of elementary
permeable stretching surface with suction and heat
particles related to their fundamental quantum property,
generation. In the presence of the heat source/sink for
their spin. In relativity, electric and magnetic fields are

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 911


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

qr  e 
 4  T *  T   K  b   d   4 I * T *  T  (1)
Soret and Dufour effects on free convective heat and 

mass transfer with thermophoresis and chemical reaction y 0


 T  W
over a porous stretching surface, .Kandasamy et al.[6] Where the radiation absorption coefficient is on the
acquired group theory transformation. Ravikumar et wall and where the feature of the plank is. As the plate
al.[7] Joneidi et al.[8] investigated MHD double is infinite in scope, all the flow variables are independent
diffusive and chemically reactive flow through porous of x* and so their derivatives disappear with regard to
medium bounded by two vertical plates.[8] developed x*. Only the non-zero velocity part is in the x*- direction.
MHD free convective flow analytical treatment and mass The portion and temperature of non-zero velocity are
transfer over a stretching board of chemical reactions. functions of y* and t* only. In the x*- direction, in
The effect of a chemical reaction on transient MHD contrast to the y*- direction, the radiative heat flux is
free convection flow over a vertical plate was acquired considered negligible. Hence, the continuity equation is
by Sahin[9] in slip-flow mode. Chamkha et al.[10] solved immediately. The following equations govern the
explored Unsteady MHD natural convection from a unstable flow and temperature fields within the context
heated vertical porous plate in a micro-polar fluid with of the above assumptions.
chemical reaction, heating effects of Joule, and radiation.
u* 2u*  
 *  *2 gT* Tg*C* C * B02 sin2u*
Mohamed et al.[11] have recorded unstable MHD
double-diffusive convection boundary-layer flow past t y K 
(2)

a radiating hot vertical surface in porous media in the 2


T *  2T *  u * 
C p    
 k *2    *   Q* T *  T  4 I T *  T   B02u *
2

presence of chemical reaction and heat sink. The release t *


y  y 
(3)
or transmission of radiation across space or through a
C *  2C *
tissue medium in the form of waves or particles is
radiation in physics. This includes electro-magnetic t *
 Dm
y *2
 Kr * C *  C   (4)

radiation such as radio waves, actinic rays, and x-rays, Where ¤ is the density, t* is the time, u* is the velocity
particle radiation such as alpha,  and neutron radiation, variable in the x* direction, is the viscosity, g is the
and acoustic radiation such as vibration, ultrasound, and gravity acceleration,  is the coefficient of thermal
seismic waves. Radiation may also apply to the expansion, T* is the fluid temperature in the boundary
electricity, waves, or particles being radiated. Rajput layer, T is the fluid temperature far from the plate,  is
and Kumar[12] investigated radiation effects on MHD the electrical conductivity, B0 is the strength of the
flow past a vertical plate with impulsively initiated magnetic field,  is the kinematic viscosity,
variable heat and mass transfer.
The initial and boundary conditions are:
II. FORMULATION OF THE PROBLEM
For t *  0 , u *  0 , T *  T , C *  C for all y *
First, the presence of the joule effect and heat source,
Unsteady MHD free convective flow of an electrically For t *  0 , at
conducting incompressible and viscous fluid in an T * q C * q
y*  0; u *  U (1   ei t ),   , *   w ; (5) at
* *

optically thin setting past an infinite vertical plate put in y *


 y 
a porous medium is considered. The - axis is taken
parallel to the infinite vertical plate and the - axis is y *   : u *  0, T *  T , C *  C
perpendicular to the plate. In the presence of thermal Where U is the mean velocity of plate and   1 .
radiation, a distributed magnetic field is applied.
Therefore, following the equilibrium model of Cogley III. METHOD OF SOLUTION
et al. (1968), the expression of the radiative heat flux is Introducing the following non-dimensional quantities
taken as given below.

912 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

y
Uy *

u*
, f  ,t 
U
U 2t *

 *
,   2 , 
U q

U T *  T 
, Gr 
g  2 q
U 4
,K 
K *U 2
2
, Ha 
 B02
U 2
,  0  Pr  R  Q  0   Pr Ecf 02  Pr EcH a f 02 (14)
C p 
U C *  C ,
0  Kr.Sc.0  0
g  q
* 2
4I *
U 3
Q*
Gc  , Pr  ,R  , Ec  ,Q  ,  (15)
U 4   C pU 2 C p q  C pU 2 qw

 Kr * First order equations


Sc  , Kr  .
 
(6)
Dm U2 1
f1  H a sin 2    i  f1  Gr1  Gc1 (16)
Into the equations (2), (3) and (4), we get  K 
1 Pr  R  Q  i 1  2 Pr Ecf 0 f1 2 Pr EcH a f 0 f1 (5.16)
f  2 f  1
 2  Gr.  Gc.   H a sin 2    f (7) 1  Kr  i  Sc.1  0
t y  K (17)

2 Here, prime denotes the differentiation with respect


 1  2  f 
   R  Q    Ec    EcH a f 2 (8) to y. Now, the corresponding boundary conditions are
t Pr y 2
 y  reduced to y= 0: f0  1, f1  1,0  1,1  0, 0  1, 1  0
 1   2
y :
  Kr. (9)
t Sc y 2
f 0  0, f1  0,  0  0, 1  0, 0  0, 1  0 (18)
Where u is the non-dimensional velocity along the
Equations (12) to (17) are also coupled with
x-axis, ?? is the non-dimensional temperature, t is the
ordinary differential equations of the second order.
time, Gr is the number of Grashof heat transfer, Gc is
Therefore, since the Eckert number Ec is very small for
the number of Grashof changed, Ha is the number of
incompressible fluid flows and can be extended in the
Hartmann, K is the permeability parameter, Ec is the
Ec powers as shown below.
number of Eckert, Pr is the number of Prandtl, R is the
radiation parameter, Q is the heat source parameter, 
F  y   F0  y   EcF1  y   0 Ec 2  ....  (19)
Sc is the number of Schmidt. The corresponding
Where F stands for any f0, f1,  and .
boundary conditions are reduced to For
Substituting (19) into the equations (12) to (17),
f  0,   0,   0 for all y
equating the coefficients of like powers of Ec and
  neglecting terms of O (Ec2), we get Zeroth order
For t  0, at y  0 : f  1   eit ,  1,  1 (11)
y y
equations
At y   : f  0,   0,   0.
f 00  K1 f 00  Gr 00  Gc00 (20)
In view of boundary conditions, the velocity and
f10  K 2 f10  Gr10  Gc10 (21)
temperature distributions are separated into steady and
unsteady parts as given below  00  1 00  0 (22)

f  y, t   f 0 ( y )   eit f1 ( y ) 10   210  0 (23)

 ( y , t )   0 ( y )   eit1 ( y ) (12) 00  K 300  0 (24)

10  K 410  0
 ( y , t )  0 ( y )   eit1 ( y )
(25)

First order equations


The equations (7), (8) and (9) are replaced by (11)
and the harmonic and non-harmonic terms are equated. f 01  K1 f 01  Gr 01  Gc01 (26)

Equations of the zeroth order f11  K 2 f11  Gr11  Gc11 (27)

 1  01  1 01   Pr  f 00   Pr H a  f 00 


2 2
f 0  H a sin 2    f 0  Gr 0  Gc0
(28)
(13)
 K
11   211  2 Pr f 00 f10  2 Pr H a f 00 f10 (29)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 913


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

01  K 301  0 (30)


t=1 and =2. From figures 1 to 11, noted that fluid
velocity increases by increasing the Grashof number
11  K 411  0 (31) (Gr) for heat transfer, Modified Grashof number (Gc),
the Eckert number (Ec), the heat source parameter (Q)
Where K1, K2, K3, K4,  and  are constants
or the permeability parameter (K) while it decreases
presented in Appendix - A
by increasing the radiation parameter (R), the Hartmann
Now, the corresponding boundary conditions are number ( H a ), the angle of inclination of magnetic field
reduced to y= 0 (), Chemical reaction parameter (Kr), Schmidt
f 00  1, f 01  0, f10  1, f11  0,  00  1, 01  0,10  0,11  0, number (Sc) or the Prandtl number (Pr). The effects
of the Eckert number (Ec), the heat source parameter
00  1, 01  0, 10  0, 11  0 (32)
(Q) and the Hartmann number ( H a ) on temperature
y : field are shown through figure 12 to 14 Shown that
f 00  0, f 01  0, f10  0, f11  0, 00  0, 01  0,10  0,11  0, with the growth of these physical parameters, fluid
temperature increases. In addition, the results of the
00  0, 01  0, 10  0, 11  0
radiation parameter (R), the Prandtl number (Pr), the
Equations (20) to (31) are now common differential Schmidt number (Sc) and the parameter for the
equations that are coupled in the second order and chemical reaction are shown in Figures 15 to 18. (Kr).
resolved under boundary conditions (32). Thus, by It is observed that the fluid temperature decreases with
straight forward calculations, the expressions for the increase of these physical parameters. Figures 19
velocity, temperature and concentration distribution are and 20 show the outcomes of the chemical reaction
known and given. parameter (Kr) of the Schmidt number (Sc). It is
f  y, t   A16 e  y K1
 A3e  y 1
 A4e
 y K3
 Ec( A37 e  y K1
 A30e  y 1
 A31e 2 y K1
 A32e 2 y 1
 A33e
2 y K3
 observed that the concentration of fluid decreases as
2 (5.33)
A34 e  y6  A35e  y7  A36e  y8 )   eit [e  y  Ec( A42e  y  A38e  y  A39e  y3  A40e  y 4  A41e  y5 )]
K2 K2
these physical parameters increase.
  y, t   A2 e
 y 1

 Ec A29 e
 y 1
 A23e
2 y K1
 A24 e
2 y 1
 A25e
2 y K3
 A26e  y6  A27 e  y7  A28e  y8 
 e it

 Ec A e  y 2
 A12 e  y 3
 A13e  y 4
 A14e  y 5
 (34) Graphs
 15

  y , t   A1e
 y K3 7

. (35)
6 Pr=0.71
R=1

where A1 to A42 ; K1, to K4;  to  are constants


Q=0.2
Gr = 5, 10, 15 K=1
5 Gc=15
Ec=0.01

presented in Appendix - A 4
Kr=10
Sc=0.16
Ha=2

f

Nusselt number, Sherwood number and skin 2

friction: 1

   0

Nusselt number (Nu) =   y   1


0 1 2 3 4 5 6 7 8 9 10
y

  y 0
Fig.1 Distribution of velocity for various Gr values
  
Sherwood number (Sh)   y   1
7

  y 0 6 Pr=0.71
R=1
Q=0.2
K=1
5 Gc = 5, 10, 15 Gr=15
Ec=0.01
The coefficient of skin-friction at the plate is given 4
Kr=10
Sc=0.16
Ha=2

by
f

IV. RESULTS AND DISCUSSIONS 2

The effects of the various physical parameters on 0


0 1 2 3 4 5 6 7 8 9 10

the fluid velocity, fluid temperature and fluid y

Fig 2Distribution of velocity for various Gc values


concentration are shown through graphs when ∈ = 0.01,

914 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

18 9

8
16 Pr=0.71 Pr=0.71
R=1
R=1 7 Ha = 0.5, 1.0, 2.0 Q=0.2
K=1 K=1
14 Gr=15 Gr=15
Q = 0.2, 0.4, 0.6 6
Gc=15 Gc=15
Ec=0.01
12 Ec=0.01 5 Kr=10
Kr=10 Sc=0.16
 

f
Sc=0.16
Ha=2 4
10

f

3
8
2

6 1

0
4
0 1 2 3 4 5 6 7 8 9 10
y
2

0
Fig.7.Distribution of velocity for various values
0 1 2 3 4 5 6 7 8 9 10
y
10

Fig.3.Distribution of velocity for various Q values 9

Pr=0.71
8 R=1
 Q=0.2
16
7 K=1
Gr=15
Gc=15
14 6 Ec=0.01
Pr=0.71
R=1 Kr=10
5 Sc=0.16

f
Q=0.2 Ha=2
12 K=1
Gr=15 4
Ec = 0.01, 0.03, 0.05
Gc=15
10 Kr=10 3
Sc=0.16
Ha=2
8  2
f

1
6
0
0 1 2 3 4 5 6 7 8 9 10
4 y

2 Fig.8.Distribution of velocity for various  values


0 10
0 1 2 3 4 5 6 7 8 9 10
y
9
Pr=0.71
R=1
Fig.4.Velocity distribution for different values of Ec 8
Kr = 5, 7, 10 Q=0.2
K=1
7 Gr=15
7 Gc=15
Ec=0.01
Pr=0.71 6 Sc=0.16;
6 R=1 Ha=2
Q=0.2
5 
Gr=15
f

K = 0.1, 0.5, 1.0


Gc=15
5
Ec=0.01
Kr=10 4
Sc=0.16
4 Ha=2
 3
f

3
2

2 1

1 0
0 1 2 3 4 5 6 7 8 9 10
y
0
0 1 2 3 4 5 6 7 8 9 10
y
Fig.9Distribution of velocity for various Kr values
Fig.5.Distribution of velocity for various K values
7

18
6

16 Pr=0.71
Pr=0.71 5 R=1
R = 0.6, 1.0, 1.6 Q=0.2 Sc = 0.16, 0.22, 0.68 Q=0.2
14 K=1 K=1
Gr=15 Gr=15
4
Gc=15 Gc=15
12 Ec=0.01
Ec=0.01
f

Kr=10 Kr=10
3 Ha=2
10 Sc=0.16 
Ha=2

f

8 2

6
1

4
0
0 1 2 3 4 5 6 7 8 9 10
2
y

0
0 1 2 3 4 5 6 7 8 9 10
Fig.10.Distribution of velocity for various Sc values
y

Fig.6.Distribution of velocity for various R values

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 915


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

7
4

6 R=1 3.5
Q=0.2
Pr=0.71
K=1
Pr = 0.16, 1.00, 11.40 Gr=15 Q=0.2
5 3 K=1
Gc=15 R = 0.6, 1.0, 1.6
Ec=0.01 Gr=15
Kr=10 Gc=15
4 Sc=0.16 2.5 Ec=0.01
Ha=2
 Kr=10
f

Sc=0.16
3 2 Ha=2




2 1.5

1 1

0 0.5
0 1 2 3 4 5 6 7 8 9 10
y
0
0 1 2 3 4 5 6 7
Fig.11.Distribution of velocity for various values Pr y

5 Fig.15.Distribution of temperature for similar R value values


4.5
Pr=0.71
R=1
2
4
Q=0.2
K=1 1.8
3.5 Gr=15 R=1
Ec = 0.01, 0.03, 0.06 Gc=15 Q=0.2
Kr=10 1.6 K=1
3
Sc=0.16 Gr=15
Ha=2 Gc=15
2.5  1.4

Ec=0.01
Pr = 0.71, 1, 11.4 Kr=10
2 1.2 Sc=0.16
Ha=2

1.5 1


1
0.8
0.5
0.6
0
0 1 2 3 4 5 6 7 0.4
y

0.2
Fig.12.Temperature distribution for different values of Ec
0
0 1 2 3 4 5 6 7
4 y

Pr=0.71
3.5 R=1
K=1
Fig.16.Distribution of temperature for similar Rvalue values
Gr=15
3 Gc=15
Ec=0.01 2
Q = 0.2, 0.4, 0.6 Kr=10
Sc=0.16
2.5 Ha=2 1.8
 Pr=0.71
R=1
1.6
Q=0.2
2

K=1
1.4 Gr=15
Gc=15
1.5 Sc = 0.16, 0.22, 0.68 Ec=0.01
1.2
Kr=10
Ha=2
1 

0.8
0.5
0.6

0 0.4
0 1 2 3 4 5 6 7
y 0.2

0
Fig.13.Distribution of temperature for similar Q value values 0 1 2 3 4 5 6 7
y

2 Fig.17.Distribution of temperature for similar value values Sc


1.8 Pr=0.71
R=1
Q=0.2
1.6 2.5
K=1
Gr=15
1.4 Gc=15
Ec=0.01 Pr=0.71
Ha = 0.5, 1, 2
Kr=10 R=1
1.2 Sc=0.16 2 Q=0.2
 K=1
1 Gr=15

Gc=15
0.8 Kr = 5, 7, 10 Ec=0.01
1.5 Sc=0.16
Ha=2
0.6 

0.4

1
0.2

0
0 1 2 3 4 5 6 7
y 0.5

Fig.14.Distribution of temperature for similar value values


Ha 0
0 1 2 3 4 5 6 7 8 9 10
y

Fig.18.Distribution of temperature for similar Kr value values

916 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

1.4 ii. i. In the case of the ramp temperature plate, the fluid
1.2
Pr=0.71
R=1
Q=0.2
velocity is slower than in the case of the isothermal
K=1
1 Gr=15
Gc=15
Ec=0.01
plate. In the case of the ramp temperature plate, the
0.8
Sc=0.16;
Ha=2
  fluid temperature is lower than in the case of the

0.6 Kr = 5, 7, 10
isothermal plate. In the case of a ramped temperature
0.4
plate, fluid concentration is lower than in the case of
0.2
an isothermal plate. On both ramped temperature and
0
0 1 2 3
y
4 5 6 7 isothermal plates, the magnetic field appears to
Fig.19.Distribution of concentration for various values of Kr
increase skin friction while the thermal buoyancy force
has a reverse effect on it.
0.8
iii. It. iii. For the ramped temperature plate and isothermal
0.7
Pr=0.71
R=1
plate, radiation helps to minimize skin friction.
0.6 Q=0.2
K=1
Gr=15
0.5 Gc=15
Ec=0.01
REFERENCES
Kr=10
Sc = 0.16, 0.22, 0.68 Ha=2
0.4

 [1] M. N. Raja Shekar, S. Karunakar Reddy, in the presence of a


0.3 magnetic field, Heat and Mass Transfer past a Constantly
0.2
Moving Porous Boundary, International Journal of Computer
Applications. (2012)13-16. 39(12)
0.1

0
[2] Z. Sun, M. Guo, J. Vleugels, O.van der Biest, B. Blanpain,
0 1 2 3
y
4 5 6 7 Separation and self-assembly of micrometer-sized non-magnetic
particles caused by strong magnetic field, Development In
Fig.20.Distribution of concentration for various values of Sc Electromagnetics Research B. 23(2010)199-214. 23(2010)

V. CONCLUSIONS [3] M. N. Raja Shekar, S. Karunakar Reddy, in the presence of a


magnetic field, Heat and Mass Transfer past a Constantly
The radiation effect on an unstable megneto Moving Porous Boundary, International Journal of Computer
hydrodynamic free convective heat and mass transfer Applications. (2012)13-16. 39(12)

flow past a moving vertical porous plate embedded in [4] M. A. Seddeek, International Journal of Heat and Mass Transfer,
Effects of radiation and variable viscosity on an MHD free
a porous medium is investigated in the presence of a convection flow past a semi-infinite flat plate with an aligned
chemical reaction. The governing partial differential magnetic field in the case of unsteady flow. 45(4) 931-935 (2002).
equations are reduced to a system of self-similar [5] P. M. Krishna, N. Sandeep, V. Sugunamma, Effects of radiation
equations, using transformations of similarity. The and chemical reaction on convective flow of MHD over a suction
resulting equations are then solved numerically using and heat producing permeable stretching surface, Walailak Journal
of Science and Technology. 11(12) (2014) 141-148, respectively.
the fourth order Runge-Kutta method, along with the
[6] R. Kandasamy, T. Hayat, S. Obaidat, Transformation of group
shooting technique. The effects of the governing physical theory for Soret and Dufour effects on free convective heat and
parameters on velocity, temperature and concentration mass transfer with thermophoresis and chemical reaction in the
as well as the skin-friction coefficient, Nusselt number presence of heat source/sink over a porous stretching surface,
Nucl. Eng., Eng. Des., (2011) 241(6) 2155-2161.
and Sherwood number are measured and presented in
graphical and tabular forms. Comparisons are made [7] V. Ravikumar, M.C. Raju, S.V.K. Varma, A.J. Chamkha, MHD,
International Journal of Energy & Technology, double diffusive
with previously published work and are found to be in and chemically reactive flow through porous medium bounded
excellent agreement with the conclusions. The following by two vertical plates.5 (4)(2013) 1-8.
conclusions are also given. [8] A.A. Joneidi, G. Domairry, M. Babaelahi, MHD free convective
flow and mass transfer analytical treatment over a chemical
i. The sum of mass diffusion and thermal diffusion reaction stretching layer, J. Taiwan's Inst. Chem. Chem. Eng.,
appears to increase the concentration of fluid for both Eng. 41(1)(2010) 35-43, respectively.
ramped and isothermal plates. As time passes, for
[9] Sahin, Emirates Journal for Engineering Science, Effect of chemical
both ramped and isothermal plates, there is a rise in reaction on transient MHD free convection flow over a vertical
fluid concentration. plate in the slip-flow regime. 15(1)(2010)25 to 34.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 917


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[10] A.J. Chamkha, R.A. Mohamed, S.E. Ahmed, Unsteady MHD [12] U. S. Rajput, S. Kumar, Variable heat and mass transfer radiation
natural convection with Joule heating, chemical reaction and effects on MHD flow past an impulsively started vertical plate,
radiation effects from a heated vertical porous plate in amicropolar Int. J. From Appl. Just math. Mech. And Mech. (2012) 8(1) 66-
fluid, Meccanica.46(2) (2011)390- 399. 85.
[11 R.A. Mohamed, A. N.A. Osman, S.M. Abo-Dahab, in the presence
of chemical reaction and heat sink, Meccanica, Unsteady MHD
double-diffusive convection boundary-layer flow past a radiated
hot vertical surface in porous media. 48(4)931-936 (2013).

918 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Sectional Survey on Solution of Transportation


Problem in Operations Research
M. Chaitanya Sreelakshmi
Associate Professor, Department of H&S , Vemu Institute of Technology, P. Kothakota, Chittoor (Dist), A.P, India-517112
Corresponding AuthorEmail: lakshmi.chaithanya1@gmail.com

Abstract: The Transportation Problem in destinations (jobs). The distinct feature of transportation
Operational Research is concerned with finding the problems is that sources and jobs must be expressed
minimum cost of transporting a single commodity in terms of only one kind of unit.
from a given number of sources to a given number
of destinations. This paper represents a sectional Suppose that there are m sources and n destinations.
review on various solutions of Transportation Consider a_i be the number of supply units available at
Problem with its formulation of models. source i (i=1,2,3,…,m) and bj be the number of demand
Keywords: Transportation Problem, units required at destination j (j=1,2,3,…,n).
Formulation, Solution, Basic Feasible Solution, Consider Cij represent the unit transportation cost
Optimality, Degeneracy, Variants in Transportation for transporting the units from source i to destination j
Problem. so that the transportation cost is minimum. In addition,
INTRODUCTION the supply limits at the sources and the demand
requirements at the destinations must be satisfied
The origin of transportation models dates back to exactly.
1941 when F.L.Hitchcock presented a study entitled
'The Distribution of a Product from Several Sources to If is the number of units (quantity)
Numerous Localities.' The presentation is regarded as shipped from source i to destination j, then the equivalent
the first important contribution to the solution of linear programming will be in order to:
transportation problems.
In 1947, T.C.Koopmans presented a study called The objective function is,
'Optimum Utilization of the Transportation System'.
These two contributions are mainly responsible for the Subject to the constraints,
development of transportation models which involve a
number of shipping sources and a number of
destinations.
The objective is to minimize the cost of
transportation. Transportation problems may also
involve movement of a product from plants to
warehouses, warehouses to wholesalers, wholesalers
to retailers and retailers to customers. Where

MATHEMATICALFORMULATION: The two sets of constraints will be consistent. The


transportation problem is said to be balanced if
Transportation models deal with problems
concerning as to what happens to the effectiveness
function when we associate each of a number of origins
(sources) with each of a possibly different number of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 919


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The general matrix form of Transportation Problem VARIANTS OF THE TRANSPORTATION


as follows: PROBLEMS:
Table 2.1 The following variations in the Transportation
Destinations problem are:
1 2 3 … j… N Supply
1 C11 C12 C13 … C1j … C1n a1 1. Unbalanced Transportation Problem
Sources 2 C21 C22 C23 … C2j … C2n a2
Or 3 C31 C32 C33 … C3j … C3n a3 2. Maximization Problem
Origins … ?… Ci1 Ci2 Ci3 … Cij … Cin … ai
m Cm1 Cm2 Cm3 … Cmj … Cmn am 3. Different Production Costs
Demand b1 b2 b3 … bj … bn
4. No allocation in a particular Cell/Cells
In Table 2.1, Cij, i=1,2,3,…,m; j=1,2,3,…,n is the
unit shipping cost from the ith source to jth destination, 5. Overtime Production
ai is the supply available at source i and bj is the demand REFERENCES:
at destination j.
1. D.Anuradha, A Literature Review of Transportation Problems,
International Journal Of Pharmacy & Technology, 2016.
SOLUTION OF THE TRANSPORTATION
MODEL: 2. Priyanka Swarnkar and Sanjay Kumar Bisen, Operations Research
Solve By Transportation Problem, International Journal of Recent
The solution involves making a transportation model, Scientific Research, 2017.
finding a feasible solution, performing optimality test and 3. A.K.Das, Some Aspects On Solving Transportation Problem,
iterating towards optimal solution if required. Yugoslav Journal of Operations Research, 2019.

Different methods to solve transportation problems


are as follows:
1. North - West Corner Method
2. Row Minima Method
3. Column Minima Method
4. Least - Cost Method
5. Vogel's Approximation Method
In Optimality Test, the following methods commonly
used as:
1. The Stepping - Stone Method
2. The Modified Distribution Method
In Degeneracy, the basic feasible solution may
become degenerate at the Initial stage or at some
intermediate stage of computation. In a transportation
problem with m origins and n destinations if a basic
feasible solution has less than m+n-1allocations, the
problem is said to be a "Degenerate Transportation
Problem".
Degeneracy can occur in the initial solution or during
some subsequent iteration.

920 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

MHD Forced Convective Laminar Boundary Layer


Flow from A Convectively Heated Moving Vertical Plate
With Soret and Dufour Effects
B. Nagabhushanam Reddy1, Kuppala R Sekhar2
1
Associate Professor, 2Assistant Professor
1,2
Department of H&S, Vemu Institute of Technology, P. Kothakota, Chittoor (Dist), A.P, India-517112
Corresponding AuthorEmail: nagabhushanambangalore@gmail.com1

Abstract: The two-dimensional steady MHD fluid, the relation between the fluxes and the driving
forced convective flow of a Newtonian fluid past a potentials are of intricate nature. It has been found that
convectively heated permeable vertically moving an energy flux can be generated not only by temperature
plate in the presence of a soret and dufour effects.
gradient but also by composition gradients as well. The
The plate moves either in assisting or opposing
energy flux caused by composition gradient is called
direction to the free stream. The governing system
of partial differential equations was transformed into the Dufour or diffusion-thermal effect. The diffusion-
ordinary differential equations before being solved thermo (Dufour) effect was found to be of considerable
numerically by a fourth order Runga-Kutta method magnitude such that it cannot be ignored, Eckert and
along with shooting technique. Numerical solutions Drake [5]. In view of the importance of this diffusion-
of the similarity equations are presented to show thermo effect, Jha and Singh [6] studied the free
the effects of the controlling parameters on the convection and mass transfer flow about an infinite
dimensionless velocity, temperature and vertical flat plate moving impulsively in its own plane,
concentration profiles as well as on the friction Ibrahim et al. [7] very recently reported computational
factor, rate of heat and mass transfer. solutions for transient reactive magnetohydrodynamic
Keywords: Newtonian fluid, Runga-Kutta heat transfer with heat source and wall mass flux effects.
method, Dufour effect, mass transfer. These studies did not consider transfer over an inclined
plate or Soret and Dufour effects, Chen [8] has studied
INTRODUCTION
magnetohydrodynamic free convection from an inclined
The magnetohydrodynamics continues to attract the surface with suction effects. The Soret effect refers to
interest of engineering science and applied Mathematics mass flux produced by a temperature gradient and the
researchers owing to extensive applications of such Dufour effect refers to heat flux produced by a
flows in the context of aerodynamics, engineering, concentration gradient. Very recently, Alam and Rahmam
geophysics and aeronautics. The [9] studied the Dufour and Soret effects on study MHD
magnetohydrodynamic flow of a viscous incompressible free convective heat and mass transfer flow past a semi-
fluid past an impulsively started infinite horizontal plate infinite vertical porous plate embedded in a porous
was studied by Stokes [1], and because of it's practical medium.
importance. In view of the above applications many
researchers [2], [3] & [4] studied the effects of mass Mathematical Formulation
transfers on magneto hydrodynamic free convection Consider a two dimensional MHD forced convective
flows. flow along a moving permeable radiating convectively
In the above stated papers, the diffusion-thermo and heated vertical flat plate. It is assumed that an electrically
thermal-diffusion term were neglected from the energy c o n d u c t i n g c o l d f 
l u i d h a v i n g a n e l e c t r i c c o n d u c t i v i t y

and concentration equations respectively. But when heat in the presence of a magnetic field of variable strength
and mass transfer occurs simultaneously in a moving B ( x ) is flowing along the flat plate. It is considered

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 921


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

that the plate is stretched with a power law velocity • The velocity decreases with increasing values of the
and the magnetic field is normal to the plate. Further, magnetic field parameter.
the left surface of the plate is assumed to be heated by • Thermal radiation leads to increase temperature.
convection from a hot fluid of temperature T f and this
• The temperature, concentration decrease with the
generates a variable heat transfer coefficient h f . The magnetic field.
temperature and concentration at the wall are Tw and
• The rate of heat transfer increases with an increasing
Cw. Ambient temperature and concentration are T and the Dufour number.
C . Fluid properties are assumed to be invariant. The
The concentration increases and rate of mass transfer
particle coagulation, magnetic Reynolds number, electric
decreases with an increasing the Soret number.
field due to polarization of charges and Hall effects are

0 .
.
2 1 .
assumed to be negligible.

8 6 .
M=0

1 1 .
M=0.5
SOLUTION OF THE PROBLEM

4 2 .
V=2
The set of coupled non-linear governing boundary

1 1 .
layer equations together with the boundary conditions

0 8 .
V=1
are solved numerically by using Runge-Kutta fourth f'

0 0 .
order technique along with shooting method. First of
all, higher order non-linear differential equations are 6 4 . V=0
0 0 .

converted into simultaneous linear differential equations


2 0

of first order and they are further transformed into initial m=Du=Sr=0.1, R=Pr=Sc=Fw=1
0
0

4
value problem by applying the shooting technique . The
resultant initial value problem is solved by employing 
Runge-Kutta fourth order technique. The step size Fig.1 Velocity for different values of V and M
2
.
0

 =0.05 is used to obtain the numerical solution with


five decimal place accuracy as the criterion of M=0.5, V=2, Du=Sr=0.1, R=Pr=Sc=1
.
8
1

convergence. From the process of numerical m=0


------ m=0.5
computation, the skin-friction coefficient, the Nusselt
.
6
1

number and the Sherwood number, which are


.
4

respectively proportional to f ''(0),  '(0) and


1

f'

 '(0) , are also sorted out and their numerical values


.
2
1

are presented in a tabular form.


.
0
1

CONCLUSIONS Fw=-1, 0, 1
0

The present study investigates a two-dimensional


steady forced convective flow of a MHD Newtonian 

fluid past a convectively heated radiative permeable Fig.2 velocity for different values of Fw and M
vertically moving plate in the presence of a Soret and
Dufour effects. The governing equations are
approximated to a system of non-linear ordinary
differential equations by similarity transformation.
Numerical calculations are carried out for various values
of the dimensionless parameters of the problem. It has
been found that

922 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1
.
0 4. Megahead A.A., Komy S.R. and Afify A.A. (2003). Similarity
m=0.1, M=0.5, V=2, Du=Sr=0.1, Pr=Sc=1
Analysis in MHD effects on free convection flow and mass
.
8
0

R=0 transfer past a semi-infinite vertical plate, International Journal


------ R=5
Non-linear media, Vol. 38, Pp. 513-520.
.
6
0

5. Eckert, E.R.G., and Drake, R.M. (1972). Analysis of Heat and


Mass Transfer, Mc. Graw-.Hill, New York, 1972.

.
4
0

6. Jha, B.K. and Singh, A.K. (1990). Soret Effect on free convection
and mass transfer flow in the stokes problem for an infinite
vertical plate, Astrophysics and Space Science, Vol. 173, Pp.
.
2
0

251-255.
7. Ibrahim F.S, Elaiw A.M, and Bakr A.A. (2008). Effects of the
.
0

Fw=-1, 0, 1
0
0

4
chemical reactions and radiations absorption on the unsteady
MHD free convection flow past a semi-infinite vertical permeable

moving plate with heat source and suction, Cambridge Journal
Fig.3 Temperature for different values of Fw and R Physics, Vol.78, Pp. 255-270.
8. Chen C.H. (2004). Heat and Mass transfer in MHD flow by
REFERENCES natural convection from a permeable, inclined surface with
1. Stokes G.G., (1856) On the effects of internal friction of fluids variable wall temperature and convection, Acta Mechanica, Vol.
on the motion of pendulum, Thammasat International Journal of 22, Pp. 219-235.
Science and Technology, Vol. 9, Pp. 8-106. 9. Alam M.S and Rahman M.M. (2005) Dufour and Soret effects
2. Aboeldahab E.M and Elbarbary E.M. (2001) Hall Current Effect on MHD free convective heat and mass transfer flow past a
on Magnetohydrodynamic free convection flow past a semi vertical flat plate embedded in porous medium, Journal Naval
infinite vertical plate with mass transfer, International Journal Architecture and Marine Engineering, Vol. 2(1), Pp.55-65.
Engineering Sciences, Vol. 39, Pp. 1641-1652.
3. Raptis A. and Kafousias N.G. (1982). MHD free convection
flow and mass transfer through porous medium bounded by an
infinite vertical porous plate with constant heat flux, Cambridge
Journal Physics, Vol. 60, Pp. 1725-1729.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 923


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Heat and Mass Transfer in MHD Tangent Hyperbolic


Fluid Over Chemically Reacting Exponentially
Shrinking Surface
Kuppala R Sekhar
Assistant Professor, Department of H&S, Vemu Institute of Technology, P. Kothakota, Chittoor (Dist), A.P, India-517112
Email: ksekhar.maths@gmail.com

Abstract - Numerical analysis has been carried numerical solution of MHD flow of tangent hyperbolic
out a steady MHD heat and mass transfer boundary fluid model over a stretching cylinder. They concluded
layer flow of tangent hyperbolic fluid over an that the values of skin-friction coefficient are tabulated
exponential shrinking surface due to chemical and plotted in order to understand the flow behavior
reaction is considered in this paper. The governing
near the surface of the cylinder. Hussain et al. [3]
partial differential equations were transformed into
investigated the thermo-physical aspects of MHD
a system of ordinary differential equations with the
help of selected exponential type of similarity tangent hyperbolic fluid flow towards a non-linear
variables. They are then solved numerically using stretching sheet with dissipation effect and convective
well-known shooting approximation along with boundary conditions. They found that fluid temperature
Runge-Kutta-Fehlberg method. The roles of significantly enhances for Biot number and Eckert
physical parameters are focused in the velocity, number while reverse behavior has been recorded
temperature and concentration profiles as well as against power law index and Prandtl number.
the local skin-friction coefficient and heat and mass Salahuddin et al. [4] demonstrated analysis of tangent
transfer rates are depicted graphically and/or in hyperbolic nanofluid over a stretching cylinder near
tabular form. theoverlaps with the horizontal y  0 .The fluid flow is
Keywords - Tangent hyperbolic fluid; narrowed to y  0 . We applied an inconstant magnetic
Magnetohydrodynamic; Chemical reaction;
field and there is no applied power, which indicates the
viscous dissipation; Porosity.
absence of an electrical field. Also it is considered that
1. INTRODUCTION the induced magnetic field is lesser compared to the
stagnation point. Ibrahim [5] investigated radiation
The dynamics of the non-Newtonian fluids has
effect on MHD flow of a tangent hyperbolic fluid with
obtained a considerable interest in the last few years
nanoparticles past an enlarging sheet with second order
due to its many applications in several fields of science
slip and convective boundary condition. Khan et al.
and technology. The tangent hyperbolic is a four constant
[6] discussed the effect of homogeneous-heterogeneous
pseudo plastic fluid model adept of relating the shear
reactions on 2-D flow of Prandtl fluid due to stretching
thinning phenomena. It is a fluid that measures the fluid's
sheet and calculated the computational scheme via
resistance when flow decreases with an increasing rate
shooting method. They predicted skin-friction coefficient
of shear stress. Examples of such fluids include shampoo,
enhances with higher in Hartmann number and fluid
grease, cosmetic products, honey, paints, blood, gels,
parameter. Ullah and Zaman [7] deliberated lie group
nail polish, and lubricant containing polymer additives.
analysis of convective tangent hyperbolic fluid flow over
Akbar et al. [1] studied numerical investigation of MHD
a stretching sheet with slip conditions. Then, later few
flow of tangent hyperbolic fluid towards a stretching
researchers [8-11] tangent hyperbolic fluid over a
sheet. They analyzed that the skin-friction intensifies by
shrinking surface to illustrate heat and mass transfer
increasing power law index, magnetic field and
mechanisms.
weissenberg number. Malik et al. [2] discussed that a

924 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Motivated by these analyses, this paper investigated u v


 0
a numerical study on a steady MHD heat and mass x y
(5)

transfer boundary layer flow of tangent hyperbolic fluid u u  1  2u  u    2u   B02 


u v   1   (1  n) 2  2 n    2   u  g T (T  T )  g  C (C  C )  u
over an exponential shrinking surface due to chemical x y   y  y   y   K0
(6)
reaction. The transformed boundary layer equations
2 2
which represent the flow, temperature and concentration T T k  2T 1 qr   u   n  u  u 
u v    (1  n)       (7)
x y  C p y 2  C p y C p  y  C p 2  y  y 
are solved numerically using Runge-Kutta-Fehlberg
method. The physical parameters of interest are C C  2C
analyzed and discussed in detail with help of plotted u v  Dm 2  Kl (C  C ) (8)
x y y
graphs.
Subject to the boundary conditions;
2. MATHEMATICAL FORMULATION
u  U , v  V ( x), T  Tw , C  Cw at ; y  0 (9)
We deliberate the steady, incompressible, Magneto
hydrodynamic tangent fluid over a nonlinearly u  0, T  T , C  C as; y  
exponentially stretching sheet which exterior magnetic Where u and v the velocity components in the x and
field. This indicates that a trivial Reynolds number y, and U are is the constant velocity,  is the kinematic
exoduses in this study. Along with this we deliberated viscosity,  is the fluid density, g is the acceleration
heat source and chemical reaction to the flow. Two due to gravity, T is the fluid temperature,  is electric
equivalent and opposite forces are applied along the x Nx
axis, so that the wall is stressed keeping the origin fixed. conductivity, B  B0e 2L is the variable magnetic field,
The rheological expression of state for an extra stress k is the thermal conductivity of the fluid,  C p is the
tensor S of tangent hyperbolic fluid is as follows. heat capacitance of fluid, T is the thermal expansion
S     0    tanh( ) n  A (1)
coefficient, C is the concentration expansion
coefficient, qr the radiative heat flux, Dm is the coefficient
Where 0 the infinite shear rate viscosity,, 0 zero of the mass diffusivity, C is the concentration of the
shear rate viscosity, is the time dependent constant, Nx
fluid, Kl  k0 e L is the chemical reaction parameter,,
n power law of index and  is given by,, Nx
N is the exponential parameter and V ( x)  v0e 2L is
  1 2tr ( A ) 1
2
(2)
the suction/injection parameter.
Assuming that   0 is assimilated in equation (1), By using Rosseland approximation, the radiative heat
also as tangent hyperbolic fluid designates the shear flux qr is expressed as
thinning spectacles, thus   1 . After using these
4   T 4
above-mentioned hypotheses in equation (1); it takes qr  (10)
the form as follows. 3K  y
Where   is the Stefan-Boltzmann constant and K 
S  0  ( ) n  A1 (3)
is the mean absorption coefficient, the above radiative
After universalization the above equation convert to: heat flux qr is effective at a point away from boundary
layer surface in an intensive absorption flow. Considering
S  0 1  n(  1) n  A1 (4)
that the temperature difference within the flow is
The leading equations in components form after sufficiently small then T 4 may be expressed as a linear
inferring boundary layer the basic continuity, momentum function of temperature T. Expanding T 4 by Taylor's
and energy equations are given by. series about temperature T and which after neglecting
higher order terms takes the forms,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 925


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

T 4  4T3T  3T4 (11) 1  1


Cf Re 2
 1   f (0),
Using equation (10) and (11) in equation (7) is  
reduced to: 1
Nu Re 2
  (0), (18)
2 2
T T k  T 16  T  T 
2 * 3 2
 u   n  u  u 
v    (1  n)   
 1
   (12)
  (0)
u 2
x y  C p y 2 3 C p K y 2 C p *
 y  C p 2  y  y  Sh Re
To find consistent set of nonlinear ordinary Where Re  Ux  f is the local Reynolds number..
differential equations, use the below defined similarity
transformations; 3. RESULTS AND DISCUSSION
  U 0 2 Le Nx 2 L y , v   U 0 2 Le Zx 2 L N  f ( )   f ' ( )(13) 0

u  U 0 e Nx 2 L f ' ( ), T  T  T0 e 2 Nx L , C  C  C0 e 2 Nx L -0.05

-0.1
Where T is the ambient fluid temperature, C is
-0.15
the ambient fluid concentration, L is the characteristic Green line: s=0

f ()
Red line : s=-0.5

I
length, U0 is the fluid velocity. -0.2

-0.25
In view of Equations (9) to (13) in equations (6), M=1,2,3

(8) and (12) reduced to: -0.3

 1 -0.35
(1  n) 1   f   N  ff ''  2( f ) 2   nWef f   2Gr  2Gc  ( M  K ) f   0 (14) 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5

  

1 4  nWeEc Fig.1 Influence of M on velocity profile


 R  1    N 4 f   f    (1  n) Ec ( f )  ( f )3  0 (15)
2

Pr  3  2

   NSc 4 f   f    ScK l  0
0

(16)
-0.05

The transformed boundary conditions are: -0.1

f ( )  S , f ( )  1,  ( )  1,  ( )  1at ;   1 (17) -0.15


Green line: s=0
fI()

Red line : s=-0.5

f ( )  0,  ( )  0,  ( )  0at ;   
-0.2

-0.25 =1,2,3
Where primes denote differentiation with respect to
-0.3

the similarity variable  , S  v0 U 0 v 2 L S is the suction


-0.35
for S  0 and S  0 for injection, 0 0.5 1 1.5 2 2.5

3 3.5 4 4.5 5

3
We    L (U 0e Nx L ) 2 Weissenberg number,, Fig.2 Influence of Casson parameter on velocity profile

Pr    is the Prandtl number, M  2  B02 L U 0 is 0

the magnetic field parameter, R  4 *T3 k *k is the -0.05

radiation parameter, Ec  U 02 T0 is the Eckert number,, -0.1

Sc   Dm is the Schmidt number, K l  k0 L C0U 0 is -0.15

the chemical reaction parameter, Gr  g  LT0 U 02 is Green line: s=0


f ()

Red line : s=-0.5


I

-0.2

the thermal Grashof number, Gc  g  LC0 U 02 is the -0.25 We=0.2,0.4,0.6


concentration Grashof number.
-0.3

The quantities of practical interest in this study are


-0.35
the skin friction coefficient (Cf ) , local Nusselt number 0 0.5 1 1.5 2 2.5

3 3.5 4 4.5 5

( Nu ) and Sherwood number ( Sh) which are defined


Fig.3(a) Influence of We on velocity profile
as

926 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

0
0
-0.05 Ec=1,2,3
-0.1
We=0.2,0.4,0.6
-0.1
-0.2
-0.15
-0.3
Green line: s=0
-0.2
-0.4 Red line : s=-0.5

()
Green line: s=0
()

Red line : s=-0.5 -0.25


-0.5

-0.3
-0.6

-0.7
-0.35

-0.8 -0.4

-0.9 -0.45
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
 

Fig. 5 Influence of Ec on temperature profile


Fig.3(b) Influence of We on temperature profile
0

1
-0.05
0.9
Green line: s=0
Red line : s=-0.5
0.8 -0.1

0.7
-0.15 Green line: s=0
0.6 Red line : s=-0.5

fI()
 ()

0.5
-0.2
0.4

0.3
-0.25
K=1,2,3
0.2
-0.3
We=0.2,0.4,0.6
0.1

0 -0.35
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
 

Fig.3(c) Influence of We on Concentration profile Fig. 6(a) Influence of K on velocity profile

1
0
0.9
-0.05 Green line: s=0
R=1,2,3 Red line : s=-0.5
0.8
-0.1
0.7
-0.15
0.6
Green line: s=0
-0.2
Red line : s=-0.5
 ()

0.5
()

-0.25
0.4
-0.3
0.3
-0.35
0.2
-0.4
0.1
K=1,2,3
-0.45
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5

Fig. 4(a) Influence of R on temperature profile Fig. 6(b) Influence of K on concentration profile

1 The values of skin-friction coefficient, Nusselt


0.9
Green line: s=0 number and the Sherwood number for various values
Red line : s=-0.5
0.8
of the involved pertinent parameters are respectively in
0.7

0.6
Table 1 and 2. It can be noted that the skin-friction
coefficient decreases with the increase in the values of
 ()

0.5

0.4 Casson fluid parameter, Weissenberg number, radiation


0.3 parameter, Eckert number, exponential parameter and
0.2
chemical reaction parameter. Whereas the reverse
0.1

0
R=1,2,3 behavior is observed in Nusselt number and Sherwood
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
 numbers respectively for both the cases of Table 1
Fig. 4(b) Influence of R on Concentration profile (S=0) and Table 2 (S=-0.5).

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 927


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table1- Numerical results of local skin-friction, Nusslet and Sherwood number coefficients against different parameters for
S=0:

M  We R Ec N Skin-friction Coefficient Nusselt number Sherwood number


1.0 -0.274859 -0.098829 0.918406
2.0 -0.285426 -0.069947 1.292949
3.0 -0.283335 -0.058993 1.575770
1.0 -0.274859 -0.098829 0.918406
2.0 -0.285426 -0.069947 1.292949
3.0 -0.283335 -0.058993 1.575770
0.2 -0.196739 -0.195561 0.420451
0.4 -0.234583 -0.153430 0.581723
0.6 -0.255225 -0.127873 0.711483
1.0 -0.274859 -0.098829 0.918406
2.0 -0.285426 -0.069947 1.292949
3.0 -0.283335 -0.058993 1.575770
1.0 -0.274859 -0.098829 0.918406
2.0 -0.285426 -0.069947 1.292949
3.0 -0.283335 -0.058993 1.575770
1.0 -0.274859 -0.098829 0.918406
2.0 -0.285426 -0.069947 1.292949
3.0 -0.283335 -0.058993 1.575770
Table2- Numerical results of local skin-friction, Nusslet and Sherwood number coefficients against different parameters for
S=0.5:

M  We R Ec N Skin-friction Co efficient Nusselt number Sherwood number


1.0 -0.209949 -0 .077886 1.032026
2.0 -0.216122 -0 .047914 1.549689
3.0 -0.210948 -0 .037025 1.980469
1.0 -0.209949 -0 .077886 1.032026
2.0 -0.216122 -0 .047914 1.549689
3.0 -0.210948 -0 .037025 1.980469
0.2 -0.128356 -0 .180073 0.431106
0.4 -0.168935 -0 .136089 0.614641
0.6 -0.190717 -0 .108861 0.770195
1.0 -0.209949 -0 .077886 1.032026
2.0 -0.216122 -0 .047914 1.549689
3.0 -0.210948 -0 .037025 1.980469
1.0 -0.209949 -0 .077886 1.032026
2.0 -0.216122 -0 .047914 1.549689
3.0 -0.210948 -0 .037025 1.980469
1.0 -0.209949 -0 .077886 1.032026
2.0 -0.216122 -0 .047914 1.549689
3.0 -0.210948 -0 .037025 1.980469

4. CONCLUSIONS 1. Magnetic field retards the motion of the fluid.


In this paper we have studied a steady MHD heat 2. The concentration profile decreases as an increase
and mass transfer boundary layer flow of tangent in exponential and chemical reaction parameters
hyperbolic fluid over an exponential shrinking surface respectively for S=0 and S=-0.5.
due to chemical reaction. From the present numerical 3. In light of the investigation, it is found that the
study the following conclusions can be drawn: thickness of momentum boundary layer discern with
an increasing the Casson fluid parameter.

928 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4. Heat and mass transfer execution of S=0 is high when [6]. I. Khan, M. Y. Malik, A. Hussain and T. Salahuddin, Effect of
compared with S=-0.5. homogenous-heterogeneous reactions on MHD Prandtl fluid flow
over a stretching sheet, Results Phys. 7 (2017) 4226-4231.
5. Viscous dissipation produces heat due to drag between [7]. Z. Ullah and G. Zaman, Lie group analysis of
the fluid particles, which causes an increase in fluid magnetohydrodynamic tangent hyperbolic fluid flow towards a
temperature. stretching sheet with slip conditions, Heliyon. 3 (2017) e00443.
[8]. M. Khan, A. Hussain, M. Y. Malik, T. Salahuddin and F. Khan,
REFERENCES Boundary layer flow of MHD tangent hyperbolic nanofluid over
[1]. N. S. Akbar, S. Nadeem, R.U. Haq and Z. H. Khan, Numerical a stretching sheet: A numerical investigation. Results Phys
solutions of Magneto- hydrodynamic boundary layer flow of 2017;7:2837-44.
tangent hyperbolic fluid towards a stretching sheet, Indian J. [9]. A. Hussain, M. Y. Malik, T. Salahuddin and A. Rubab, Effects of
Phys. 87 (2013) 1121-1124. viscous dissipation on MHD tangent hyperbolic fluid over a
[2]. M. Y. Malik, T. Salahuddin, A. Hussain and S. Bilal, MHD flow nonlinear stretching sheet with convective boundary conditions.
of tangent hyperbolic fluid over a stretching cylinder: Using Keller Result Phys. 2017;7:3502-9. doi.org/10.1016/j.rinp.2017.08.026.
box method, J. Magn. Magn. Mater. 395 (2015) 271-276. [10].N. G. Rudraswamy and B. J. Gireesha, Influence of chemical
[3]. A. Hussain, M. Y. Malik, T. Salahuddin, A. Rubab and M. Khan, reaction and thermal radiation on MHD boundary layer flow and
Effects of viscous dissipation on MHD tangent hyperbolic fluid heat transfer of a nanofluid over an exponentially stretching sheet.
over a nonlinear stretching sheet with convective boundary J Appl Math Phys 2014;2(2). Article ID: 42204-9.
conditions, Results Phys. 7 (2017) 3502-3509. [11].D. R. Kuiry and S. Bahadur, Steady MHD flow of viscous fluid
[4]. T. Salahuddin, M. Y. Malik, A. Hussain, M. Awais, I. Khan and between two parallel porous plates with heat transfer in an
M. Khan, Analysis of tangent hyperbolic nanofluid impinging inclined magnetic field. J Sci Res 2015;7(3):21-31.
on a stretching cylinder near the stagnation point, Results Phys.
7 (2017) 426-34.
[5]. W. Ibrahim, Magnetohydrodynamics (MHD) flow of a tangent
hyperbolic fluid with nanoparticles past a stretching sheet with
second order slip and convective boundary condition, Results
Phys. 7 (2017) 3723-3731.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 929


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

930 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Impact of Oxidation Number on the Structural and


Optical Properties of Sn Doped ZnO Nanoparticles
Deepannita Chakraborty1, Ragavi2, Nishanthini3, Yamuna4, Chaitanya Kumar .K5, S.Kaleemulla6
1,2,3,4
Department of Physics, Dr.N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, India.
5
Department of H&S, Vemu Institute of Technology, Chittoor, Andhra Pradesh, India.
6
Thin Films Laboratory ,Centre for Functional Materials, Vellore Institute of Technology, Vellore-632014, Tamilnadu, India.
Email: monkaichakraborty@gmail.com1,2,3,4 , skaleemulla@gmail.com5, chaitukunapalli@gmail.com6

Abstract: Tin(II) doped zinc oxide nanoparticles electronic devices also increases. Hence a large number
(Sn:ZnO) were prepared using green synthesis of electronic devices are manufactured to fulfil the
method. Aloe Vera broth gel was used to extract demand. Zinc oxide can also be considered as
oxides for preparing Sn(II):ZnO nanoparticles.
replacement to ITO[7].The pure and doped ZnO are
After synthesizing the precursors, the oxides were
also finding their role as TCO[8-11] and they find
mixed in stoichiometry ratios to attain different
concentration of tin (x = 0.02, 0.04 & 0.06) in zinc applications in drug delivery agent [12,13], antibiotic
oxide host lattice. The XRD studies indicated the agent having antibacterial properties, electrode material,
formation of single-phase cubic structure and 39 touch screens, etc. [14-17]. The magnetic zinc oxide
nm to 25 nm of crystallite size for the prepared find applications in magneto-opto-electronic
nanoparticles. The doping of tin in ZnO applications [18-20]. In order to make wide band gap
nanoparticles influenced in the narrowing of band oxide semiconductor (TCO) into magnetic
gap from 3.18 eV to 3.07 eV.The room temperature semiconductor, different magnetic and transition metal
paramagnetic behaviour was observed for Sn ions were added into the TCO material to make into
doped ZnO nanoparticles. magnetic semiconductor
Keywords: Transparent conducing oxide; Zinc
Among the various synthesis methods, nanoparticles
oxide; Nanoparticles; Green synthesis
prepared by green synthesis are in recent trends of
1. INTRODUCTION research. The advantages of this method are non-
hazardous, low cost and biodegradable. The precursors
Generally, wide band gap oxide nanoparticles/
can be obtained from the leaves or biological products
nanostructured nanomaterials are given high importance
such as bacteria, fungi, etc. Thus, in the present article,
as they can find in many optoelectronic applications.
the precursors were extracted from Aloe Vera leaf.
In other way these are called as transparent conducting
Generally, plants are the home of many reducing agents
oxides (TCO). These TCO possess the peculiar
like flavonoids, terenoids, alkaloids, amino acids,
properties such as high transmittance and low electrical
chelating products, etc.. They are the phytochemicals
resistivity. These properties will be best suited for many
which will acts like stabilizing agents also during the
device applications such as electrodes for flat panel
synthesis of nanoparticles. So, this kind of synthesis of
displays and also for highly sensitive touch screens on
nanoparticles from leaves/fruits extract is termed as plant
mobile phones or laptops, research is going on in full
mediated synthesis. In plant mediated synthesis, extract
swing to discover new materials falling under this
from parts of the plant either leaves or flower is mixed
category [1,2]. Indium tin oxide (ITO) has been
with a solution of the metal to be extracted. The synthesis
considered as one of the best TCOmaterials [3-6]. But
conditions such as concentration of phytochemicals, the
the metal indium is high cost and find its scarcity. Hence
surrounding atmosphere, temperature and pH value of
search began for alternate TCO materials. As the
the solvent manipulates the size of the nanoparticles as
population is increasing continuously, the demand for
well as their properties. The green synthesis is much

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 931


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

cheaper and easier to prepare nanoparticles compared zinc oxide (ZnO) using agate mortar pestle for different
to physical and chemical route methods. The green concentrations of tin. Then the mixed powders were
synthesized nanoparticles were mostly preferred as anti- sintered in muffle furnace for 2hrs at 600 °C.
bacterial, anti-parasitic and anti-fungal agents, The synthesized pure and doped nanoparticles were
compared to the nanoparticles synthesized by physical- then characterized for structural properties using X-ray
chemical methods. In green synthesis, the biological diffractometer (Bruker D8, Advance PXRD). The
materials will be acting as the natural reducing agent to elemental characterization of the nanoparticles was done
form the nanoparticle as well as the capping agent to by energy dispersive X-ray (EDX) (JEOL,Japan). The
control the size of the nanoparticles. optical properties were done by UV-VIS-NIR diffuse
Hence both the dopant tin oxide and host zinc oxide reflectance spectrometer (JASCO V-670) and
are extracted in nanoparticles form from the aloe vera Fluorescence spectrophotometer (Horiba Jobin Yvon
extract. The dopant is chosen as Tin oxide (SnO) due Fluoromax-4). The magnetic studies were obtained by
to its high transparency and high conductivity. Also the vibrating sample magnetometer (VSM) (Lake Shore
host that is zinc oxide and dopant tin oxide are 7303).
paramagnetic in nature at room temperature. Several
reports stating the influence of Sn4+ ions doping in 3. RESULT AND DISCUSSION
Zn2+ ion position has been published earlier. But in 3.1 Structural Properties
this the influence of Sn in +2 oxidation state on the
properties of ZnO nanoparticles will be studied in
detail.The present work intends to check the change in
magnetic ordering when the host and dopant have same
oxidation number.
2. GREEN SYNTHESIS OF OXIDES
For green synthesis of Zinc oxide and tin oxide,
nitrates of zinc and chloride of tin along with deionized
water are required. The role of plant extract was done
by the leaves of Aloe Vera. The fresh leaves were
cleaned with deionized water and then chopped off in
small pieces. The gel was flushed out from the inner
Fig. 1 X-ray diffraction patterns of Zn 1-xSnxO nanoparticles at
layers of the Aloe leaves. The gel collected from the x = 0.00, 0.02, 0.04 and 0.06
leaves were weighed and 20 g of them was dissolved
in deionized water using magnetic stirrer to obtain the Fig. 1 shows the X-ray diffraction pattern for the
broth. The Zinc oxide nanoparticles were obtained by green synthesized pure and tin doped zinc oxide
adding 20 g of broth in drop wise manner in the 0.2 M nanoparticles. The diffraction peaks in the diffraction
of zinc nitrate solution. Then the solution was stirred in pattern were exactly coincided with hexagonal structure
magnetic stirrer for 2 hr to form precipitate of zinc oxide. of ZnO [JCPDS #80-0075]. Among the different
After the formation of precipitate, the solution was diffraction peaks, the (1 0 1) diffraction peak at a
centrifuged for 2 min at 400 rpm. Then the centrifuged diffraction angle of 36.5° was predominant. All these
sample was dried using hot plate to obtain the diffraction peaks are clear indication of hexagonal
nanoparticles of zinc oxide (ZnO). The same procedure structure of synthesized nanoparticles. The diffraction
is repeated for the extraction of tin oxide (SnO) using peaks related to any other impurities were not found in
the broth gel and tin chloride solution. After procuring XRD pattern which is a clear indication of absence of
the nanoparticle of oxides, tin oxide (SnO) is doped in unintentional impurities in the synthesized nanoparticles.
No noticeable change in diffraction peaks was observed

932 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

in XRD patterns with increase of Sn concentration. 3.2 Elemental Analysis


Probably it may be due to high miscibility limit of ZnO
host lattice.As the ionic radii of tin is greater than that
of zinc, the lattice parameter will get compressed on
substitution of Sn in place of Zn. Thus, the compression
of the lattice parameters leads to increase in the strain
and dislocation density of the host lattice. The average
crystallite size of the nanoparticles was calculated using
the Scherer's formula.
It is observed that the average crystallite size of pure
zinc oxide is 39 nm. While on doping 2% of tin oxide in Fig. 2 EDS spectra of Zn1-xSnO nanoparticles at x = 0.00, 0.02,
0.04 and 0.06
zinc oxide, there is a decrease in the average crystallite
size from 39 nm to 25 nm. But on further increase in Fig.2 shows the EDS spectra for tin doped zinc
the dopant concentration from 2% to 6%, there is an oxide nanoparticles. No unintentional elements were
increase in the average crystallite size to 32 nm and 33 found in EDS spectra except the elements such as Zn,
nm, respectively. Eventhough there is an increase in Sn and O. By considering the atomic weight percentage,
average crystallite size for 4% and 6% of Sn doped the stoichiometry was estimated and found that the
zinc oxide samples, it is less than pure zinc oxide. Hence, synthesized nanoparticles are almost in good
it is inferred that doping of tin on the positions of zinc in stoichiometric ratios.
zinc oxide lattice leads to inhibition of growth of the 3.3 Optical Properties
crystallites. On the other hand, the increase in the
crystallite size on increase in doping concentration infers
that the crystallite size is related to ionic radii. As increase
in doping concentration means increase in the presence
of tin ions in place of zinc ions and as tin has greater
ionic radii compared to zinc, it will increase the average
crystallite size.
Kumar et al,showed a linear decrease in the average
crystallite size of tin doped ZnO thin films because the
Sn was in +4 oxidation state. In this work, the
precursor obtained from the green extract is in +2
oxidation. So due to the decrease in the oxidation
number of the dopant, there is an increase in the average
crystallite size on increase in doping concentration.

Fig. 3 (a) Absorbance spectra of Zn 1-xSnxO nanoparticles at x =


0.00, 0.02, 0.04 and 0.06

Fig. 3(a) shows the absorbance spectra of tin doped


zinc oxide nanoparticles. It can be seen that the
absorbance was high in visible region. Using the
reflectance spectra of the tin doped zinc oxide
nanoparticles and using Kubelka-Munk equation, the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 933


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

fraction of reflectance was calculated for all the 4. CONCLUSIONS


nanoparticles. Then from Tauc's relation, the optical Solid state reaction method was used to
band gap of the nanoparticles was calculated. The synthesize Tin doped zinc oxide nanoparticles with the
optical band gap of the Sn:ZnO nanoparticles decreased precursors extracted from broth of Aloe Vera gel. The
from 3.18 eV to 3.07 eV. lattice structure of the synthesized nanoparticles in
3.4 Photoluminescence Properties hexagonal shape. The nanoparticles exhibited finer
average crystallite size with increase in doping of Tin
Fig. 4 shows the photoluminescence (PL) spectra which indicated the inhibiting nature of tin on the growth
of tin doped zinc oxide nanoparticles. The emission of crystallites. The formation of shallow trapping states
spectra have been obtained by exciting the samples with due to tin dopants was confirmed by the narrowing of
a light source of wavelength 365 nm. The spectra shows band gap. The PL emission spectra confirmed the
two broad emission peaks wavelengths of 409 nm and positioning of trapping states above the valence state.
434 nm. There was also a shoulder peak at 461 nm. Hence, it can be stated that 2% doping of tin oxide on
the zinc oxide lattice is the optimized concentration of
doping for tin in the position of zinc.
ACKNOWLEDGMENTS
The authors are thankful to DST-FIST Scheme of
Dr.N.G.P. Arts & Science College (Communication
number: DrNGPASC-2019-20-BAS061). The
authors are also thankful to Karunya Institute of
Technology, Coimbatore and SRM Institute of
Technology, Chennai for providing EDS and VSM
facility for nanoparticles
1. Philip, J., Punnoose, A., Kim, B.I., Reddy, K.M., Layne, S.,
Holmes, J.O., Satpati, B., LeClair, P.R., Santos, T.S., Moodera,
J.S.: Carrier-controlled ferromagnetism in transparent oxide
Fig. 4 Photoluminescence (PL) spectra of Zn 1-x Sn x O
semiconductors. Nat. Mater. 5(4), 298-304 (2006). doi:10.1038/
nanoparticles at x = 0.00, 0.02, 0.04 and 0.06 nmat1613
2. Colinge, J.P., Hashimoto, K., Kamins, T., Chiang, S.-Y., Liu, E.-
From the figure it can be seen that the emission peaks D., Peng, S., Rissman, P.: High-speed, low-power, implanted-
are in ultra-violet and blue region of the electromagnetic buried-oxide CMOS circuits. IEEE Electron Device Lett. 7(5),
spectrum. The peaks obtained in ultra-violet region is 279-281 (1986).
due to the near band edge emission. The peak obtained 3. Sato, K., Katayama-Yoshida, H.: First principles materials design
at blue region is due to vacancies or defects in the for semiconductor spintronics. Semicond Sci Technol 17(4), 367
(2002). doi:10.1088/0268-1242/17/4/309
lattice. As there is an increase in the intensity of the
4. Fallah, H.R., Ghasemi, M., Hassanzadeh, A., Steki, H.: The effect
emission peak with increase in the dopant concentration, of annealing on structural, electrical and optical properties of
it can be correlated to the positioning of trapping centre nanostructured ITO films prepared by e-beam evaporation.
just above the valence band of the host material. As the Mater. Res. Bull. 42(3), 487-496 (2007). doi:https://doi.org/
10.1016/j.materresbull.2006.06.024
trapping centre positioned above the valence band will
act as virtual valence band during fluorescence emission, 5. Choi, S.-I., Nam, K.M., Park, B.K., Seo, W.S., Park, J.T.:
Preparation and optical properties of colloidal, monodisperse,
there will be no delay in the excitation and recombination and highly crystalline ITO nanoparticles. Chem. Mater. 20(8),
rate of electron-hole pairs. This leads to the increase in 2609-2611 (2008).
the PL emission spectra. 6. Granqvist, C.G., Hultåker, A.: Transparent and conducting ITO
films: new developments and applications. Thin Solid Films
411(1), 1-5 (2002). doi:10.1016/S0040-6090(02)00163-3

934 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

7. Mamoru, F., Yudai, K., Takahiro, H., Chaoyang, L., Mutsumi, 15. Hariharan, R., Senthilkumar, S., Suganthi, A., Rajarajan, M.:
K., Shizuo, F., Takashi, H.: Positive Bias Instability of Bottom- Synthesis and characterization of doxorubicin modified ZnO/
Gate Zinc Oxide Thin-Film Transistors with a SiO x /SiN x - PEG nanomaterials and its photodynamic action. J Photochem
Stacked Gate Insulator. Jpn J Appl Phys 50(3), 03CB091- Photobiol B 116, 56-65 (2012). doi:10.1016/
003CB094 (2011). j.jphotobiol.2012.08.008
8. Manikandan, A., Manikandan, E., Meenatchi, B., Vadivel, S., 16. Hokuto, S., Satoshi, A., Toshihisa, W., Hiroshi, O., Toshikatsu,
Jaganathan, S.K., Ladchumananandasivam, R., Henini, M., S., Misao, K., Norifumi, E., Takahiro, H., Tokiyoshi, M., Mamoru,
Maaza, M., Aanand, J.S.: Rare earth element (REE) lanthanum F., Takashi, H.: A 128×96 Pixel Stack-Type Color Image Sensor:
doped zinc oxide (La: ZnO) nanomaterials: synthesis structural Stack of Individual Blue-, Green-, and Red-Sensitive Organic
optical and antibacterial studies. J. Alloys Compd. 723, 1155- Photoconductive Films Integrated with a ZnO Thin Film
1161 (2017). Transistor Readout Circuit. Jpn J Appl Phys 50(2), 0241031-
0241036 (2011).
9. Valentini, A., Quaranta, F., Penza, M., Rizzi, F.R.: The stability
of zinc oxide electrodes fabricated by dual ion beam sputtering. 17. Baek, Y.-W., An, Y.-J.: Microbial toxicity of metal oxide
J. Appl. Phys. 73(3), 1143-1145 (1993). doi:10.1063/1.354062 nanoparticles (CuO, NiO, ZnO, and Sb2O3) to Escherichia coli,
Bacillus subtilis, and Streptococcus aureus. Sci Total Environ.
10. Venkatesan, M., Fitzgerald, C.B., Lunney, J.G., Coey, J.M.D.:
409(8), 1603-1608 (2011). doi:http://dx.doi.org/10.1016/
Anisotropic Ferromagnetism in Substituted Zinc Oxide. Phys.
j.scitotenv.2011.01.014
Rev. Lett. 93(17), 177206-177206 (2004). doi:DOI: 10.1103/
PhysRevLett.93.177206 18. Jijoy, P.M., George, V., Jacob, M.: Effect of Annealing on the
Optical Properties of Transition Metal Doped ZnO Thin Films.
11. Wang, R., King, L.L.H., Sleight, A.W.: Highly conducting
IOP CONF. SER. MATER. SCI. ENG 73(1), 012065 (2015).
transparent thin films based on zinc oxide. Mater. Res. 11(7),
1659-1664 (2011). doi:10.1557/JMR.1996.0208 19. Jin, Z.C., Hamberg, I., Granqvist, C.G.: Optical properties of
transparent and heat reflecting ZnO:Al films made by reactive
12. Gangopadhyay, P., Gallet, S., Franz, E., Persoons, A., Verbiest,
sputtering. Appl Phys Lett 51(3), 149-151 (1987). doi:10.1063/
T.: Novel superparamagnetic Core(Shell) nanoparticles for
1.99008
magnetic targeted drug delivery and hyperthermia treatment. IEEE
Trans. 41(10), 4194-4196 (2005). doi:DOI : 10.1109/ 20. Kazunori Sato, Hiroshi Katayama, Y.: Stabilization of
TMAG.2005.854805 Ferromagnetic States by Electron Doping in Fe-, Co- or Ni-
Doped ZnO. Jpn J Appl Phys 40(4A), L334 (2001).
13. Neuberger, T., Schöpf, B., Hofmann, H., Hofmann, M., von
Rechenberg, B.: Superparamagnetic nanoparticles for biomedical 21. Kumar, S., Kim, Y.J., Koo, B.H., Gautam, S., Chae, K.H., Kumar,
applications: Possibilities and limitations of a new drug delivery R., Lee, C.G.: Room temperature ferromagnetism in chemically
system. J. Magn. Magn. Mater. 293(1), 483-496 (2005). synthesized ZnO rods. Mater. Lett. 63(2), 194-196 (2009).
doi:https://doi.org/10.1016/j.jmmm.2005.01.064 doi:http://dx.doi.org/10.1016/j.matlet.2008.09.057
14. Gunalan, S., Sivaraj, R., Rajendran, V.: Green synthesized ZnO 22. Kumar, S., Kim, Y.J., Koo, B.H., Sharma, S.K., Vargas, J.M.,
nanoparticles against bacterial and fungal pathogens. Pro Nat Knobel, M., Gautam, S., Chae, K.H., Kim, D.K., Kim, Y.K., Lee,
Sci-Mater 22(6), 693-700 (2012). C.G.: Structural and magnetic properties of chemically
synthesized Fe doped ZnO. J. Appl. Phys. 105(7), 07C520-
507C520 (2009). doi:10.1063/1.3073933.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 935


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Investigation on Physical, Structural and Luminescence


Characteristics of Dy3+ - Ions Doped Bismuth Borate
Glasses for Photonic Applications
B Munisudhakar1, N.Manohar Reddy2, G.Manjula3
1,2,3
S&H Department, SV College of Engineering, Tirupati, India
Email: bmunisudhakar@gmail.com1, manoharreddy123n@gmail.com2, manjulasvu2@gmrit.edu.in3

Abstract- Dy 3+ ions doped bismuth borate safe lasers, compact micro- chip lasers, Q-switching
glasses of chemical composition 5Bi 2O 3 -(65-x) of lasers, fibre amplifiers, fluorescent lamps, solar
B 2 O 3 -10ZnO-10Pb 3 O 4 -10AlF 3 -xDy 2 O 3 (where concentrators, glass scintillators, white LED's and
x=0.0, 0.1, 0.5, 1.0, 2.0 and 3.0mol %) were sensors etc [1-3].
prepared by the melt quenching technique and
investigated through X-ray diffraction, SEM, FTIR, Among the different oxide glass hosts such as
absorption, luminescence emission and decay silicate, germinate, phosphate and tellurite glasses, the
studies. From XRD, SEM and FTIR structural borate glasses are the most suitable ones for optical
characterization was accomplished. The devices due to their high transparency, low meting point,
luminescence properties were analyzed using high thermal stability, low refractive index and low
absorption, excitation, photoluminescence and dispersion, high solubility for rare earth (RE) ions and
decay studies. From absorption spectrum, the these glasses possess a high phonon energies
Judd-Ofelt intensity parameters (,  = 2, 4 and
(1300cm-1) due to stretching vibrations of network
6) were evaluated and are in turn used to determine
the radiative parameters such as branching ratios, forming oxides [4,5]. Recently, it has been observed
radiative transition probabilities (A R), effective that the phonon energies of these glass hosts can be
band width, stimulated emission cross-sections reduced by the addition of suitable heavy metal oxides
(e), for the excited 4F 9/2 level of Dy3+ ions. The (HMO) like PbO, Bi2O3, Al2O3,MoO3 and WO3 etc
non exponential nature of decay curves of the [6,7]. Consequently, increase in the quantum efficiency
excited 4F9/2 level of Dy3+ ions in all glasses were of luminescence from excited states of rare earth ions.
analyzed. From all the results, it is observed that 1
mol % dy 3+ in BBZPA glasses are suitable for
Among trivalent rare earth [RE3+] ions, the Dy3+ (4f9)
optoelectronic devices such as for lasers and white ion has been considered as promising candidates for
LEDs. analyzing the luminescence properties because its
4f-4f transitions exhibit higher quantum efficiency.
Keywords- Bismuth borate glasses,
The luminescence spectrum of Dy3+ ion, consists of
Dysprosium, Judd-Ofelt analysis,
photoluminescence, radiative parameter
4F9/2 → 6H j (j = 7/2, 9/2, 11/2, 13/2, and 15/2)
transitions, in the visible and infrared regions. In the
I. INTRODUCTION visible region, Dy3+ ion exhibits two predominant intense
In recent years, an extensive research is focused on emission bands at yellow (570-600 nm) and blue
the investigation of the rare earth (RE) ions doped (470-500 nm) corresponding to the 4F9/2 → 6H13/2 and
4
glasses due to their potential applications in the designing F9/2 → 6H15/2 transitions due to the electric dipole
of several optical devices such as optical memory transition and magnetic dipole transitions. Additionally,
devices, flat panel devices, magneto-optical devices, the intensity of 4F9/2 → 6H13/2 (yellow) transition of
wave-guide devices, display devices, solid state lasers, Dy3+ ions is hypersensitive and its intensity strongly
up conversion lasers, fibre lasers, medical lasers, eye depends on the nature of the host material, where as
the 4F9/2 →6H15/2 (blue) transition is less sensitive to the
936 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

host material [8,9]. The luminescence intensity ratio (Y/ Dy2O3 chemicals were mixed and crushed in agate
B) is the relative intensity of the 4F9/2 → 6H13/2 (yellow) mortar and this homogeneous mixture was taken into a
transition to the 4F9/2 → 6H15/2(blue) transition which alumina crucible and melted in an electric furnace at
measures the local symmetry in the environment of Dy3+ 1200oC for1 hour. After melting, glass melts were
ions. At suitable environment, yellow to blue (Y/B) poured into a preheated brass mould for quenching and
intensity ratio will change and Dy3+ ions will emit white annealed at 350oC for 15 hours to remove the thermal
light. strains and polished for physical, structural and
Thus, the Dy3+- doped luminescent materials are luminescence properties.
used to obtained two primary colours in glasses as well Table 1. Chemical Composition of the Dy 3+ -doped Bbzpa
Glas ses
as white light both in glasses and phosphors
[10].Recently, K.Siva Rama Krishna Reddy et al. [11] Glass code Glass composition (mol %)
BBZPA Dy0.0 65-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3
reported investigation on structural and luminescence
BBZPA Dy0.1 64.9-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -0.5Dy 2O3
of features of Dy3+ ions doped alkaline-earth boro
BBZPA Dy0.5 64.5-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -0.1 Dy2O3
tellurite glasses for optoelectronic devices. BBZPA Dy1.0 64-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -1.0 Dy2 O3
Spectroscopy and energy transfer in lead borate glasses BBZPADy2.0 63-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -2.0 Dy2 O3
doubly doped with Tm3+ and Dy3+ ions were studied BBZPADy3.0 62-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -3.0 Dy2 O3
by Agata Gorny et al. [12]. Physical and structural
studies on magnesium borate glasses doped with B. Characterization techniques
dysprosium ion were reported by A.Ichoja et al.[13]. The physical parameters such as refractive index
Spectroscopic investigations on Dy3+ ions doped zinc (1.652) of BBZPADy10 glass was measured ~ at 300C
lead alumina borate glasses for photonic device using an Abbe's refractometer ATAGO of sodium
application were studied by Nisha Deopa et al.[14] wavelength 589.3 nm of accuracy up to 0.0002 with
have made a systematic study on structural and mono bromomonapthalene (C10H7Br) as an adhesive
luminescence properties of Dy3+ - ions doped borate coating and density (4.52 g/cm3) was determined by
glasses. the Archimedes method using distilled water as an
In this present work, bismuth borate glass Dy3+ immersion liquid. The X-ray diffraction spectrum for
doped with various concentrations were prepared by the prepared BBZPADy1.0 glass was recorded by
melt quenching method and is to investigate the physical, using X-ray diffractometer (Seifert; Model 30003TT)
structural, optical absorption, luminescence and decay with Cu radiation Source. The SEM micrographs of
properties of the 4F9/2 → 6H13/2 transition level for lasers BBZPADy1.0 was recorded. Four transform infrared
and white LEDs. spectrum (FTIR) for BBZPADy1.0 glass was recorded
on the Perkin Elmer IR spectrometer in the region 400-
II. EXPERIMENTAL DETAILS 4000 cm-1.
A. Preparation of Glasses The absorption spectrum of BBZPADy1.0 was
3+
Dy doped bismuth borate (BBZPA) glasses were recorded in the wavelength 400 - 1000 nm using a
prepared by the traditional melt quenching method with JASCO V-770 UV-VIS-NIR spectrophotometer. The
a glass composition of 5Bi2O3-(65-x)-B2O3-10ZnO- PL spectra and decay profile measurements of the
10Pb3O4-10AlF3xDy2O3 where x = 0, 0.1, 0.5, 1.0 prepared glasses were measured using Edinburgh FLS-
2.0 and 3.0 (in mol %) and referred as BBZPADy00, 980 fluorescence spectrometer at room temperature.
BBZPADy01, BBZPADy05, BBZPADy10, III.RESULTS AND DISCUSSION
BBZPADy20, and BBZPADy30, respectively and are
presented in Table 1. A.Physical Properties
The glass composition of 15 g batches with high Physical properties of prepared BBZPADy1.0 glass
purity (99.99%) Bi2O3, B2O3 ,ZnO, Pb3O4, AlF3 and was calculated and presented in Table 2.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 937
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 2. Physical Properties of Bbzpady10 Glass FTIR spectrum


Physical properties BBZPADy1.0
Refractive index(n) 1.652 FTIR spectrum of BBZPADy10 glass was recorded
Density(g/ cm 3) 4.52
Molecular weight(M)g/mol 156.68 in the wave number region of 400-4000 cm-1 as shown
Dy 3+ ion concentration(mol/lit) 0.288
Dy 3+ ion concentration 1.73
in Fig.3 and the corresponding band assignments are
(10 20 ions/ cm3 ) tabulated in Table 3.The present glass shows
Molar volume( Vm)cm3 /mol 34.660
Molar refractivity(Rm)cm3 12.672 transmission bands in regions 2339,2114, 1874, 1201,
Molar electronic polarizability (αm) in
10 -24 cm 3 /mol
5.028 867 and 692 cm-1 [15-16]. It has been observed
Reflection losses® in% 5.76 that the bands observed in the region 2339-2114 cm-
Dielectric constant(ε) 2.729
Optical dielectric constant ( 1.729 1 are due to the OH bending mode of vibration. The
Metallization factor(M) 0.634 band around 1874 cm-1 is due to the crystal water
Numerical aperture (NA) 0.233
with H-O-H bending mode. The band around 1201
B. Structural analysis cm-1 is due to the Asymmetric stretching vibrations of
B-O bonds in BO3 and B2O- units. The band around
XRD and SEM analysis
867 cm-1 is due to the stretching vibration of BO4 in
Fig.1 shows the XRD spectrum of BBZPADy10 diborate group. The band around 692 cm-1 is due to
glass and indicates the absence of no sharp Bragg's the B-O-B linkage bending vibrations in borate
speaks, but only a broad diffuse hump around low angle network.
region which confirms the amorphous nature of the Table 3: Ftir Spectral Bands and their Assignments for
prepared glass. Bbzpady10 Glass

BBZPADy1.0 Assignments
2114-2339 OH bending mode of vibration
1784-1874 Crystal water with H−O−H bending
mode
1201 Asymmetric stretching vibrations of B-O
bonds in BO3 and B2 O- units
867 Stretching vibration of BO4 in diborate
group
689 B-O-B linkage bending vibrations in
borate network

Fig. 1:XRD spectrum of BBZPADy10 glass

Figure.2 shows the smooth surface without presence


of grains, which confirms the amorphous as well as the
homogeneous nature of the prepared glass sample.

Fig.3: FTIR spectrum of BBZPADy10 glass

C.Optical absorption spectrum and J-O analysis


Fig.4 shows the typical absorption spectrum along
with band assignment of BBZPADy10 glass recorded
in the 300 -1800 nm region. The absorption spectra
Fig. 2:SEM micrograph of BBZPADy10 glass
for the remaining Dy3+ doped BBZPA glasses are also
938 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

quite similar in the peak positions expect some variations where h is the Planck's constant, m and e are mass
in their peak intensities and hence not shown here. Each and charge of an electron, c is the speed of light, n is
absorption spectrum consists of eleven absorption bands refractive index of the medium,  is the wave
that are located at 362, 410, 425, 453, 472, 750, number, ( n2  2) 2 9 n is the Lorentz local field
800, 898, 1088, 1269 and 1673 nm which are assigned correction factor for the absorption band and (2J+1) is
to 6H15/2 → 6P5/2, 4I13/2, 4G11/2, 4I15/2, 4F9/2, 6F3/2, 6F5/2, the degeneracy of the ground state 2S+1LJ. The electric
6
F7/2, 6F9/2, 6F11/2 and 6H11/2 transitions respectively.
( S ed ) and magnetic ( S md ) dipole diople strengths are
The assignment of absorption transitions has been
given by
made according to the earlier studied Dy3+ ions doped
2
glasses [17].
Sed (J, J )  e2 
  2, 4, 6
 J U  J  (3)

e2h2 2
Smd(J,J) 2 2 2 J (L2S) J (4)
16 m c
where  (= 2,4,6) represents the J-O intensity
parameters and ||U|| are the doubly reduced matrix
elements '. A standard least square fitting approximation
is used to get good fit between the experimental (fexp)
and calculated (fcal) oscillator strengths as well to
determine the JO intensity parameters ( = 2, 4 and
Fig.4:Absorption spectrum of BBZPADy10 glass
6).The quality of fit between the fexp and fcal is expressed
Among all transitions of Dy3+ ions, the transition as the root mean square deviation (rms).
6
H15/2 → 6F11/2 transition located at 1269 nm shows
higher intensity compared to the other transitions and The experimental and calculated oscillator strengths
obey the selection rules , , =0 and hence they are for the BBZPADy10 glass are presented in Table 4.
known as hypersensitive transitions. The obtained value of root mean square deviation (rms)
of ±0.68×10-6, indicates the best fit between the
Using absorption spectrum, the experimental experimental and calculated oscillator strengths.
oscillator strengths (fexp) can be evaluated by measuring
Table.4 Observed Band Positions (Cm), Energies (Cm -1 ),
the integrated area under the absorption band using the Experimental (F exp ×10 -6 ), Calculated (F cal×10 -6 ) Oscillator
following equation [18]. Strengths and Root Mean Square Deviation (Rms ×10 -6) Of
Bbzpady10 Glass

f exp  4.32109   ( ) d (1) Transition


from ground
Wavelength
(nm)
Energ
y(cm-1 )
Oscillator
strengths
state 6H 15/2 f exp f exp
where is the molar absorptivity of a band at a 6H
11/2 1673 5977 0.63 1.29
6F 1269 7880 5.64 5.54
wavenumber (cm-1) . 6F
11/2
9/2 1088 9191 1.57 1.92
6F 898 1123 3.54 1.99
According to JO theory [19- 20], the theoretical 6F
7/2
5/2 800 1250 0.65 1.02
6F
oscillator strengths (f cal) for absorption bands 4F
3/2 750
472
1333
2118
0.06
0.08
0.19
0.15
9/2
corresponding to the electron dipole f-f transition from 4I
4G
15/2 453 2207 0.24 0.46
11/2 425 2352 0.10 0.31
the initial state to final state can be calculated by using 4I
13/2 410 2439 0.10 0.30
6P 362 2762 5.10 2.46
following equation. 5/2
rms = 0.68

 (n2 2)2
8π2mc  From the Table 5, it is observed that the JO intensity
fcal(J,J)  Sed(J,J)nSmd(J,J)
3h(2J1) 9n  (2) parameters were found to be  2 =7.45×10 -20 cm2,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 939


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

 4 = 6..99×10 -20
cm2 and  6 = 2.57×10 -20
cm2 and 663 nm which corresponds 4F9/2 → 6H15/2 (blue),
4
F9/2 → 6H13/2(yellow) and 4F9/2 → 6H11/2(red)
and follows the trend  2 >  4 >  6 and transitions respectively.The intensity of these emission
spectroscopic quality factor is 0.68. bands is similar except in small variations.
Table.5:Judd-oflet (Jo) Intensity Parameters ( X10 -20 Cm2 ) for
Bbzpady10 Glass with other Reported Glasses
JO Parameters
Glass code Trends of

BBZPADy10 7.45 6.99 2.57


[Present Work]
PKAZFDy [9] 14.11 3.07 1.95
AEBT[11] 4.04 1.86 0.82
Dy:LiLTB[23] 8.75 2.62 2.07
Dy:NaLTB[23] 9.25 2.87 2.29
Dy:KLTB[23] 9.86 3.39 2.41
Fig.6: NIR emission spectra of BBZPADy glasses

D.Luminescence Spectra And Radiative From the luminescence spectra, Peak positions (p),
Properties branching ratios, effective band width are determined
and also the radiative parameters such as transition
The exitation spectra of Dy3+- doped BBZPADy10
probabilities (AR), radiative lifetimes (R), and emission
glass were recorded by monitoring emission at 574 nm
cross-sections ( σ e) for the J  J  emission
wavelength in the spectral range from 300-550 nm is
transitions have been determined and are presented in
shown in Fig 5. The excitation spectrum constis of seven
Table 6.
bands obseved at 325,351,365,387,425,453, and 472
Table.6:Emission Peak Positions ( p, nm), Branching Ratios,
nm corresponding transtions from ground stte level Radiative Transition Probabilities (A R,S -1 ),Effective
6
H15/2 to the excited states 6P3/2, 6P7/2 , 6P5/2 , 4K17/2 , Bandwidth, Stimulated Emission Cross Sections ( σ e,×10 -21
4
G11/2,4I15/2 and 4F9/2 respectively[21]. Among these Cm2), Values for 4I13/2 → 4I15/2 Transition of The Bbzpady10
Glass.
excitation bands,the excitation band at 387nm
Transition Branching ratios AR
(6H15/2 → 4K17/2) has high intensity and is used to from 4 F9/2
p
(nm)
eff e

recored the emission spectra. 6H


15/2 480
exp cal
0.36
0.59 0.15 170 16.23
6H
13/2 574 5.29
0.45 0.69 1124 15.11
6H
11/2 663 1.23
0.01 0.07 142 14.10

In general, the branching ratio characterizes the


possibility of attaining stimulated emission from any
specific direction and also it is a critical parameter to
laser designer. In the present study, the values of
branching ratio and stimulated emission cross-section
( σ e ) transition are found to be largest for
4
F9/2 → 6H13/2 lasing transition.
Fig.5:Photoluminescence Excitation spectrum of BBZPADy10
glass upon emission at 574nm. . These results suggest that this transition of
Photo luminescence spectra of Dy - doped 3+ BBZPADy10 glass might be suitable for laser emission
BBZPADy10 glass were recorded in the spectral range in yellow region.
of 400-700 nm by monitoring excitation at 387 nm
E. Luminescence Decay Analysis
wavelength is shown in Fig 6. From the spectra, it is
obseved that the emission spectra shows two strong Fig.7 shows the luminescence decay profiles of the
4
luminescence bands and one weal band at 480,574 F9/2 → 6H13/2 transition of the Dy3+ doped BBZPA A
940 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

glasses are recorded with an emission wavelength of Based on the results, we observed that the BBZPAdy10
481 nm and monitored at 387 nm excitation. It is glass is aptly suitable for optoelectronic devices.
observed that the decay curves exhibit single exponential
nature at lower Dy3+ concentrations (<1.0 mol %) and REFERENCES
non exponential nature at higher Dy3+ concentrations 1. K.Annapoorani, Ch.Basavapoornima, N.Surya Murthy,
K.Marimuthu, Investigations on structural and behavior of Er3+
( 1.0 mol %).The experimental life time ( τexp= 259µs) doped Lithium Zinc borate glasses for lasers and optical amplifier
for 4F9/2 excited level of Dy3+ ion in BBZPADy10glass applications, J.Non-cryst. Solid. 447(2016)273-282.
was found to be lower than the radiative lifetime 2. P.P.Pawar, S.R.Munishwar, R.S.Gedam, Physical and optical
(τR = 462µs) obtained from JO analysis. properties of Dy3+/Pr3+ co-doped lithium borate glasses for W-
LED, Journal of Alloys and Compound 660(2016)347-355.
The quantum efficiency ( η ) of the excited level can
3. S.Farooq, Y.MunikrishnaReddy, R.Padmasuvarna, Venkata
be obtained using the formula Krishnaiah C.S.DwarakaViswanath, Sk.Mahamu Structure and
photoluminescence of dysprosium doped antimony-magnesium-
η %= τexp/τR ×100% (6) strontiuoxyfluoroborate glasses, Ceramics International, 2018.
4. I. Kashif, A. Abd El-Maboud, A. Ratep, Effect of Nd2O3 addition
on structure and characterization of lead bismuth borate glass,
Results in Physics 4 (214) 1-5.
5. G. Gupta, A.D. Sontakke, P. Karmakar, K. Biswas, S. Balaji, R.
Saha, R. Sen, K. Annapurna, Influence of bismuth on structural,
elastic and spectroscopic properties of Nd3+ doped zinc-boro-
bismuthate glasses, J. Lumin. 149 (2014) 163 - 169.
6. Sk. Mahamuda, K. Swapna, A. Srinivasa Rao, M. Jayasimhadri,
T. Sasikala,K. Pavani, L.Rama Moorthy, Spectroscopic
properties and luminescence behavior of a Nd3+ doped zinc
alumino bismuth borate glasses, J. Phys. Chem. Solids 74 (2013)
Fig.7: Fluorescence decay curves for 6H15/2 excited state of
BBZPAD glasses upon excitation 1308-1315.
7. S.Damodaraiah,V.ReddyPrasad, S.Babu, Y.C.Rathakaram,
For BBZPADy10 glass, the value of is found to Structural and luminescence properties of Dy3+ doped bismuth
be 56%. From the experimental results, it is suggested phosphate glasses for greenish yellow light applications,Optical
that the BBZPADy10 glass is more suitable for Materials 67(2017) 14-24.
optoelectronic applications. 8. P.Babu, Kyoung Hyuk Jang, Eun Sik Kim, Liang Shi,
Hyo Jin Seo, F. Rivera-Lopez, U.R. Rodriguez-
IV.CONCLUSIONS Mendoza,V.Lavin, R.Vijaya,C.K.Jayasankar, Spectral
investigations on Dy3+-doped transparent oxyfluoride glasses
In the present investigated Dy3+ ions doped BBZPA and nano-crystallineglass ceramics, Journal of Applied Physics
glasses were prepared by using melt quenching 105,013516(2009)
technique. The XRD spectrum and SEM micrographs 9. V.B.sreedhar, D.Ramachari, C.K.Jayasankar, Optical properties
of zincfluorophosphate glasses doped with Dy3+ ions, Physica
confirmed the amorphous nature of prepared B 408(2013) 158-163.
BBZPADy10 glass. The assignments of different
10. Xin-yuan Sun, Shi-ming Haung, Xiao-san Gong, Qing-chun Gao,
structural groups were identified by using FTIR Zi-piao Ye,Chun-Yan Cao, Spectroscopic properties and
spectrum. Judd-Oflet analysis was carried out to simulation of white -light in Dy3+-doped silicate glass, Journal
evaluate intensity parameters in the order 2>4>6 of Non-Crystalline Solids 356(2010) 98-101.
and in turn to predict radiative parameters. The non 11. K.Siva Rama Krishna Reddy,K.Swapna, Sk.Mahamuda,
M.Venkateswarlu,A.S.Rao, G.Vijya prakash, investigation on
exponential nature of decay curves of the excited 4F9/2
structural and luminescence features of Dy3+ ions doped alkaline-
level of Dy3+ ions in all glasses were analyzed. From earth boro telluride glasses for optoelectronic devices, Opt. Mat
the PL spectra, it is observed that the large stimulated 85(2018)200-210.
emission cross-sections of the 4F9/2 → 6H13/2 transition 12. Agata Gorny, Marta soltys, Joanna Pisarska, Wojciech A.Pisarski,
suggest that the present BBZPADy10 glass is most Spectroscopy and energy transfer in lead borate glasses doubly
doped with Tm3+ and Dy3+ ions,Spectrochimica Acta, Part A:
suitable for yellow lasers as well as optical amplifiers. Molecular,and Biomolecular Spectroscopy 192 (2018) 140-145.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 941


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

13. A.Ichoja,S.Hashim,S.K.Ghosal,I.H.Hashim, R.S.Omar, Physical 18. L.VijayaLakshmi, K.Naveenkumar, K.Srinivasa Rao, Pyung
and structural studies on magnesium borate glasses doped with Hwang, Bright up- conversion white light emission from Er3+
dysprosium ion, Journal of Rare earths 2018. doped lithium fluoro zinc borate glasses for photonic applications,
J.Molecular Structure, 1155(2018) 394-402.
14. Nsha Deopa, Shubham Saini, Sumandeep Kaur,Aman Prasad,
A.S.Rao, Spectroscopic investigations on Dy3+ ions doped zinc 19. Rungsan Ruamnikhom, Patarawagee Yasaka and Jakrapong
lead alumina borate glasses for photonic device application, Kaewkhao, Physical and optical properties of Dy3+ bismuth
Journal of Rare earths 2018. barium borate glasses, J.Thai interplinary Research, 12(2017)1-
4.
15. RajyasreeCh, Krishna Rao D, Spectroscopic investigations on
alkali earth bismuth borate glasses doped with CuO. J Non Cryst 20. A.S. Rao, Ahammed, Y.N., Reddy, R.R., and Rao, T.V.R.,
Solid 357, (2011) 836-41. Spectroscopic Studies of Nd 3+- doped alkali fluoro-boro-
phosphate glasses, Opt. Mater., 10 (1998) 245 - 252.
16. L.Balachander,G.Ramadevudu_,Md. Shareefuddin, R. Sayanna,
Y.C. Venudhar, IR analysis of borate glasses containing three 21. K.Liganna,Ch.SrinivasaRao,C.K.Jayasanka, Optical properties
alkali oxides, ScienceAsia 39 (2013): 278-283. and generation of white light in Dy3+- doped phosphate glasses,
J.Quantitative Spectrosopy & Radiative Transfer 118(2013)
17. Ritu Sharma ,A.S.Rao, Photoluminescence on Dy3+ ions doped
40-48.
zinc lead tungsten Tellrite glasses for optoelectronic devices,
J.Non-cryst. Solid. 495(2018)85-94.

942 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Influence of Plasticizer on (PEO+PVP) Based Blended


Solid Polymer Electrolyte Membraneces
U. Sasikala1, P. Naveen Kumar2
1
Associate Professor, Department of Physics, VEMU Institute of Technology, Chittoor, AP, India
2
Thin Film Laboratory, Department of Physics, S.V. University, Tirupati, AP, India
Email: sasi2483@gmail.com

Abstract- The influence of low molecular weight other environmentally friendly fuel cells, such as
plasticizer on the properties of Na+ ion conducting batteries, super capacitors and dye sensitized solar cells,
PEO/PVP blended solid polymer electrolyte (SPE) are strong candidates for this reason [1]. The
membranes, 95[35PEO:35PVP:30NaF] : 5x, where
conception of polymer electrolytes is a highly specialized
x = PEG200 , PEG400 , PEG600 were reported. SPE
and multidisciplinary field that covers the disciplines of
films were prepared using solution cast technique.
The solid polymer electrolyte film, electrochemistry, polymer science, organic and
(35PEO:35PVP:30NaF), also prepared and inorganic chemistry [2].
identified as the highest conducting composition Various approaches such as blending [3, 4], co-
at room temperature. Complexation of the polymerization [5], plasticization [6], addition of ceramic
prepared electrolytes was studied by X-ray
fillers [7] etc. have been made to enhance the ionic
diffraction (XRD) analysis. The optical behaviour
conductivity of polymer electrolytes [8]. The most
of the SPE films was studied from ultraviolet-visible
(UV-vis) spectroscopy, and the optical parameters important advances in increasing the ionic conductivity
viz. absorption edge, direct energy bandgap and of polymer electrolytes were brought into effect by the
indirect energy band gap were determined. incorporation of suitable amounts of plasticizers [9].
Frequency dependent conductivity ( σ ac) values Generally, low molecular weight, high dielectric constant
were obtained from complex impedance (cole-cole) polar organic solvents such as ethylene carbonate (EC)
plots. It was observed that the magnitude of [10, 11], propylene carbonate (PC) [12], polyethylene
conductivity increased with the decrease of glycol (PEG) [13], dimethylformamide (DMF) [5],
molecular weight of the plasticizer at room dimethylsulfoxide (DMSO) [14], dioctyl phthalate
temperature. The charge transport mechanism in (DOP) [15] and dibutyl phthalate (DBP) [16] have been
this SPE is mainly due to ions which were confirmed
used in polymer electrolytes to enhance their room
by the transference number experiment. Using this
temperature ionic conductivities. The conductivities of
electrolyte, cells were fabricated and their
discharge profiles were studied under constant these electrolytes critically depend on the physical
load. Several cell parameters associated with the properties of the plasticizer such as its viscosity and
cells were evaluated. dielectric constant. A plasticizer improves the electrical
conductivity of polymer electrolyte by (i) increasing the
Keywords: solid polymer electrolytes, XRD
amorphous content of polymer electrolytes; (ii)
analysis, Optical behaviour, frequency dependent
conductivity, transference numbers, discharge dissociating ion aggregates present in polymer
profiles. electrolytes; (iii) lowering the glass transition
temperature, Tg [17].
INTRODUCTION
The present work is concerned with PEG
Various sources of alternative energy are (Average MW=200, 400 and 600) used as a plasticizer
continuously evolving to reduce the long-term in (PEO+PVP+NaF) polymer electrolyte. Several
dependence on oil, nuclear and other fossil fuels. The experimental techniques such as XRD, Optical studies,

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 943


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

electrical, transference measurements and discharge 500


profiles were performed to characterize these plasticized
250 (d)
polymer blend electrolytes.
0

Intensity (arb. units)


500
I. EXPERIMENTAL
250 (c)
Polymer electrolyte films of PEO/PVP complexed 0
with NaF at different compositions were prepared by 500

solution cast technique using methanol (water-free) as 250


(b)
solvent. Film of (35PEO:35PVP:30NaF) composition 0

(120)
500
was identified as the highest conducting composition at

(112)
(a)
room temperature on the basis of PEO/PVP - NaF 250

salt concentration dependent conductivity which were 0


obtained from complex impedance plots. Na+ ion 10 20 30 40 50 60 70

conducting plasticized PEO/PVP blended solid polymer 2degrees)


electrolyte (SPE) membranes, 95[35PEO:35PVP: Figure 1: XRD patterns of 95[35PEO:35PVP:30NaF]:5x where
30NaF] : 5x where x = PEG200 , PEG400 , PEG600 were x = PEG200, PEG400, PEG600 SPE films

also prepared. The X-ray diffraction studies of these This indicated that the addition of plasticizer
films were performed by means of a SEIFERT X-ray caused a decrease in the degree of crystallinity of the
diffractometer system with Ni-filtered Cu k radiation. film. Among the three systems PEG200 doped film was
The optical behaviour of the SPE films was studied from less intense. This indicated that the addition of PEG200
ultraviolet-visible (UV-vis) spectroscopy, and the optical is more responsible to decrease the degree of
parameters viz. absorption edge, direct energy bandgap crystallinity of the film than that of PEG400 and PEG600
and indirect energy band gap were determined. doped samples. This may be due to a larger
Frequency dependent conductivity ( σ ac) values were concentration of free ions in systems added with PEG200
obtained from complex impedance (cole-cole) plots. than PEG400 and PEG600 [19]. The peaks exhibited a
The AC conductivity was measured using PSM 1700 decrease in intensity with broadening at PEG200
Impedance Analyzer in the frequency range 1 Hz - 1 compared with PEG400 and PEG600 doped polymer
MHz and in the temperature range 303-373 K. The electrolytes. This indicated a decrease in the crystalline
total ionic transport number (tion) was evaluated by phase and a dominant presence of the amorphous
means of Wagner's polarization technique [18]. phase. This amorphous nature resulted in greater ionic
Electrochemical cells were fabricated with the diffusivity with high ionic conductivity, as amorphous
configuration Na/(PEO+PVP+NaF+Plasticizer) / polymers have flexible backbone [20].
(I2+C+ electrolyte). The discharge characteristics were
monitored under a constant load of 100 k. 2. Optical absorption studies
To determine the nature and width of the band gap,
II. RESULTS AND DISCUSSION , (h ν )2, (h ν )1/2 were plotted as a function of
photon energy (hv) for 95[35PEO+35PVP+ 30NaF]
1. X-ray diffraction studies
: 5x polymer electrolytes where x = PEG200, PEG400 &
Fig. 1 shows the comparative profiles of the XRD PEG600.
patterns of 95[35PEO:35PVP:30NaF]:5x where x =
2 (a) Absorption spectra
PEG200, PEG400, PEG600 solid polymer electrolytes. The
diffraction peaks observed for 2 values at 19.1o and The optical absorption spectra of
23.3o were found to be less intense in PEG200 doped 95[35PEO+35PVP+30NaF] : 5x where x = PEG200,
films compared to PEG400 & PEG600 doped systems. PEG400 and PEG600 composite plasticized electrolytes
are shown Fig.2(a).
944 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

the curves to zero absorption [Fig. 2(c)]. It was


10
observed that the electrolyte plasticized with PEG200
has low direct band gap than PEG400 and PEG600
8
polymer electrolytes.
Absorbance

50
6
(a) (b) (c)

40
4

(c) 30

9
(b)

(h) X 10
2
(a)

2
20
200 300 400 500 600

Wavelength (nm)
10
Figure 2(a). Absorption spectra of
(a) 95[35PEO+35PVP+30NaF]:5PEG 200
(b) 95[35PEO+35PVP+30NaF]:5PEG 400 and 0
(c) 95[35PEO+35PVP+30NaF]:5PEG 600 polymer blend films 4.0 4.5 4.0 4.5 4.0 4.5
h (eV) h (eV) h (eV)
2 (b) Absorption edge
Figure 2 (c) (h ν )2 vs h ν plots of
The absorption edge values were obtained by (a) 95[35PEO+35PVP+30NaF]:5PEG 200
(b) 95[35PEO+35PVP+30NaF]:5PEG 400 and
extrapolating the linear portions of the  vs h ν plots (c) 95[35PEO+35PVP+30NaF]:5PEG 600 polymer films
[Fig. 2 (b).] to zero absorption value. It was observed
2 (d) Indirect band gap
that the electrolyte plasticized with PEG200 has low
absorption edge (4.30 eV) than PEG400 and PEG600 The indirect band gaps were obtained from the plots
polymer electrolytes. of (h ν )1/2 versus photon energy as shown in Fig 2(d).
50 It was observed that the electrolyte plasticized with
(a) (b) (c) PEG200 has low indirect band gap than PEG400 and
40 PEG600 polymer electrolytes.
15
(a) (b) (c)
30
3

12
X 10

20

9
1/2

10
(h

0
4.0 4.5 5.0 4.0 4.5 5.0 4.0 4.5 5.0
3
h (eV) h (eV) h (eV)

Figure 2(b). a vs h ν plots of


0
(a) 95[35PEO+35PVP+30NaF]:5PEG 200 4.0 4.5 4.0 4.5 4.0 4.5
(b) 95[35PEO+35PVP+30NaF]:5PEG 400 and
h(eV) h(eV) h(eV)
(c) 95[35PEO+35PVP+30NaF]:5PEG 600 polymer blend films
Figure 2(d) (ah ν )1/2 vs h ν plots of
2 (c) Direct band gap
(a) 95[35PEO+35PVP+30NaF]:5PEG 200
The optical band gaps were evaluated from (h ν )2 (b) 95[35PEO+35PVP+30NaF]:5PEG 400 and
vs h ν plots and the allowed direct transition energies (c) 95[35PEO+35PVP+30NaF]:5PEG 600 polymer films
were determined by extrapolating the linear portion of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 945


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 1. Absorption edge and band gaps of


95[35PEO+35PVP+30NaF] : 5PEGX plasticized polymer blend
electrolytes 700

600
O
30 C
O
40 C 95[35PEO+35PVP+30NaF]+5PEG200
150

70 C

80 C
O

120
O O
50 C 90 C
500
O O
95[35PEO+35PVP+30NaF] + 5PEG200
60 C 100 C
90
400

Z'' ()

Z'' ()
300

Band gap (eV)


60

- - Polymer Absorption 200

30
100

electrolyte edge (eV) 0 0

Direct Indirect 0 100 200 300


Z' ()
400 500 600 700 0 30 60
Z' ()
90 120 150

95[35PEO+35PVP
4.30 4.45 4.14
+30NaF]:5PEG200
1000
200

95[35PEO+35PVP O
30 C
O
95[35PEO+35PVP+30NaF]+5PEG400
O
70 C

4.39 4.48 4.23


40 C O 95[35PEO+35PVP+30NaF]+5PEG400
800 80 C
O
50 C 150 O

+30NaF]:5PEG400
90 C
O
60 C O
100 C
600

Z'' ()

Z'' ()
100

95[35PEO+35PVP 400

4.45 4.51 4.26 200


50

+30NaF]:5PEG600 0
0
0 200 400 600 800 1000
0 50 100 150 200
Z' () Z' ()

The values of absorption edge, direct band gap and


indirect band gap are shown in Table 1. It is clear from 1200

30 C
O
95[35PEO+35PVP+30NaF] + 5PEG600
250

70 C
O
95[35PEO+35PVP+30NaF] +5PEG600
O
1000 40 C O

the table that the band edge, direct band gap and indirect 200
80 C
O
50 C O
90 C
O
800 60 C O
100 C
150

Z'' ()
Z'' ()
band gap values showed an increasing trend with
600

100
400

50

increase in the molecular weight of the plasticizer. This


200

0 0
0 200 400 600 800 1000 1200 0 50 100 150 200 250
Z' () Z' ()

is because of the fact that low molecular weight


plasticizer (PEG200) has high conductivity. Figure 3: Impedance (Cole-Cole) plots of
95[35PEO+35PVP+30NaF] : 5PEG X polymer blend films at
3. Impedance plots different temperatures

Typical impedance plots (Z' vs Z") for 4. Conductivity studies


95[35PEO+35PVP+30NaF] : 5x where x = PEG200, Fig. 4 shows the variation of log conductivity with
PEG400 and PEG600 composite electrolytes at different inverse absolute temperature for
temperatures (303 - 373 K) are shown in Fig. 3, which 95[35PEO:35PVP:30NaF]:5x where x = PEG200,
showed a normal impedance behaviour such as a PEG400, PEG600 solid polymer electrolytes. From the
depressed semicircular portion followed by a spike plot, it has been observed that as temperature increases
(residual tail). the conductivity values also increase for all the
The ionic conductivity of compositions. The non-linearity in Arrhenius plots
95[35PEO+35PVP+30NaF] : 5x where x = PEG200, indicated that ion transport in polymer electrolytes is
PEG400 and PEG600 polymer electrolytes was calculated dependent on polymer segmental motion.
from the relation -3.0
PEG200
PEG400
σ = I/RbA PEG600

-3.5
where I, is the thickness of the film, A, the area of
log Scm 
-1

the film and Rb, the bulk resistance of the film material
which is obtained from the intercept on the real axis at -4.0

the high frequency end of the Nyquist plot of complex


impedance [21]. -4.5

2.7 2.8 2.9 3.0 3.1 3.2 3.3

-1
1000/T (K )

Figure 4: Temperature - dependent conductivity of


95[35PEO+35PVP+30NaF]:5PEGX composition polymer
electrolytes

The curvature behaviour of the plots suggests that


the data can be better described by the Vogel-Tamman-
946 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fulcher (VTF) relation [22], which described the Figure 5: Current versus time plots of SPE films

transport properties in a viscous matrix. It supports the 6. DISCHARGE PROFILES


idea that the ion moves through the plasticizer-rich
phase. The variation of conductivity as a function of The discharge profiles of SPE films at ambient
molecular weight for 5 wt% PEG added to the system temperature for constant load of 100 k? were presented
is shown in the inset of Fig. For systems plasticized in Fig. 6.
4
with PEG200 the conductivity value increases than that 85[35PEO+35PVP+30NaF]:15PEG200

of the systems plasticized with PEG400 and PEG600. 2

From the figure, the molecular weight is seen to have 0


4 0 50 100 150 200
an inverse effect, i.e., a decrease in the molecular weight

Voltage ( V )
90[35PEO+35PVP+30NaF]:10PEG200

of PEG added increases the conductivity of the polymer 2

complexes. This implies that the lower molecular weight 0


PEG is a better plasticizer for conductivity enhancement. 4 0 50 100 150
95[35PEO+35PVP+30NaF]+5PEG200
200

These results are in good agreement with the results 2


obtained by Srivastava and Chandra [19] who reported
0
that higher ionic conductivies were obtained for 0 50 100 150 200

poly(ethylene succinate) - NH4ClO4 plasticized with Time ( hrs )

PEG200, followed by those plasticized with PEG400, Figure 6: Discharge characteristics of (100-x)
[35PEO+35PVP+30NaF] : xPEG 200 electrochemical cells at a
PEG600 and PEG1500. The higher ionic conductivities constant load of 100 k
obtained from samples plasticized with PEG200 may be
The sharp initial decrease in voltage may be due to
due to a larger concentration of free ions in system
the polarization and/or the formation of thin layer sodium
added with PEG200 than PEG400 and PEG600 [23].
at electrode-electrolyte interface. The open circuit
5. Transference number voltage (OCV) and short circuit current (SCC) of SPE
In Wagner's polarization technique dc current was doped with PEG200 cell has been determined which
monitored as a function of time on application of fixed were 3.34 V and 1.53 mA respectively. The various
dc voltage across the (anode) Na/SPE/ (cathode) C. cell parameters are summarized below:
After polarization of the cell with 1.5 V dc, the current • Cell weight = 1.82 g
versus time plots were obtained and shown in Fig. 5. • Area of the cell = 1.33 cm2
For all the compositions of SPE system, the values of
• Discharge time = 156 h
ionic transference numbers are in the range 0.95 - 0.97.
This suggests that the charge transport in this polymer • Power density = 2.80 W/kg
electrolyte films are predominantly due to ions; only a • Energy density = 437 Wh/kg
negligible contribution comes from electrons [24].
This supports the practical application of the present
5.0 85[35PEO+35PVP+30NaF]:15PEG200
electrolyte in solid-state battery applications.
2.5

0.0 III.CONCLUSIONS
0 100 200 300 400
()

6 90[35PEO+35PVP+30NaF]:10 PEG200 A new plasticized Na+ ion conducting PEO - PVP


3
blended solid polymer electrolyte membranes:
Current

0
0 100 200 300 400
95[35PEO:35PVP: 30NaF] : 5x, where x = PEG200,
5.0 95[35PEO+35PVP+30NaF]:5 PEG200 PEG400, PEG600 has been synthesized. Complexation
2.5 of the polymer matrices has been ascertained by XRD
0.0
0 100 200 300 400
analysis. It is clear from absorption studies that the band
edge, direct band gap and indirect band gap values
Time (min)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 947


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

showed an increasing trend with increase in the electrolyte based on poly(vinylidene fluoride-co-
hexafluoropropane) and ethylene carbonate", Electrochim. Acta,
molecular weight of the plasticizer. This is because of 48, pp. 1339-1346, 2003.
the fact that low molecular weight plasticizer (PEG200) 11. S. Austin Suthanthiraraj, D. Joice Sheeba and B. Joseph Paul,
has high conductivity. The maximum ionic conductivity "Impact of ethylene carbonate on ion transport characteristics of
value has been obtained for PEG200 based electrolyte PvdF - AgCF3SO3 polymer electrolyte system", Materials
Research Bulletin, 44, pp. 1534 - 1539, 2009.
because of larger concentration of free ions in PEG200
12. S. H. Chung, P. Heitjans, R. Winter, W. Bzaucha, Z. Florjanczyk
system compared to PEG400 and PEG600 systems. From
and Y. Onada, "Enhancement of ionic-conductivity by the addition
conductivity data it can be seen that PEG200 plasticized of plasticizers in cationic monoconducting polymer electrolytes",
polymer electrolytes have higher conductivity than Solid State Ionics, 112, pp.153- 159, 1998.
PEG 400 and PEG 600. The transference number 13. N. Binesh and S. V. Bhat, "Effects of a plasticizer on protonic
measurements indicated that the newly synthesized SPE conductivity of polymer electrolyte (PEG)100NH4ClO4", Solid
State Ionics, 122, pp. 291-299, 1999.
is an ionic conductor and the charge transport is due to
14. A. M. Stephan, T. Prem Kumar, N. G. Renganathan, S.
ions. The electrolyte films doped with low molecular Pitchumani, R. Thirunakaran and N. Muniyandi, "Ionic
weight plasticizer exhibit better performance, which conductivity and FT-IR studies on plasticized PVC/PMMA blend
indicates that such electrolytes are more suitable for polymer electrolytes", J. Power Sources, 89, pp. 80 -87, 2000.
fabricating solid-state batteries. 15. M. S. Michael, M. M. E. Jacob, S. R. S. Prabaharan and S.
Radhakrishna, "Enhanced lithium ion transport in PEO-based
REFERENCES solid polymer electrolytes employing a novel class plasticizers"
Solid State Ionics, 98, pp. 167-174, 1997.
1. E.P. Chávez, R. Oviedo-Roa, G. Contreras-Pèrez, J.M. Martínez-
Magadán, F.L. Castillo-AlvaradobTheoretical studies of ionic 16. S. Rajendran and T. Uma, "Effect of ZrO2 on conductivity of
conductivity of crosslinked chitosan membranesInt. J. Hydrogen PVC-LiBF4-DBP polymer electrolytes", Materials Letters, 44,
Energy, 35 , pp. 12141-12146,2010. pp. 208-214, 2000.

2. Li+ ion conduction mechanism in poly (e-caprolactone)-based 17. A. M. Christie, S. J. Lilley, E. Staunton, Y. G. Antereev and P. G.
polymer electrolyte, Iran. Polym. J., 22, pp. 877-883,2013. Bruce, "Increasing the conductivity of crystalline polymer
electrolytes" Nature, 433, pp. 50-53, 2005.
3. S. Rajendran, R. Kannan and O. Mahendran, "An electrochemical
investigation on PMMA/PVdF blend-based polymer 18. J.B. Wagner and C. Wagner, "Electrical Conductivity
electrolytes", Mater Lett., 49, pp. 172-179, 2001. Measurements on Cuprous Halides", J. Chem. Phys., 26,
pp.1597-1601, 1957.
4. M. Sivakumar, R. Subadevi, S. Rajendran, H. -C. Wu and N. -L.
Wu, "Compositional effect of pvdF - PEMA blend gel polymer 19. N. Srivastava and S. Chandra, "Studies on a new proton
electrolytes for Lithium Polymer Batteries", European Polymer conducting polymer system: poly(ethylene succinate) +
Journal, 43, pp. 4466-4473, 2007. NH4ClO4", European Polymer Journal, 36, pp. 421-433, 2000.

5. T. Janaki Rami Reddy, V. B. S. Achari, A. K. Sharma and V. V. R. 20. A. A. Mohamad, N. S. Mohamad, M. Z. A. Yahya, R. Othman,
Narasimha Rao, "Effect of plasticizer on electrical conductivity S. Ramesh, Y. Alias and A. K. Aroof, "Ionic conductivity studies
and cell parameters of (PVC+KBrO3) polymer", Ionics, 13, pp. of poly(vinyl alcohol) alkaline solid polymer electrolyte and its
55-59, 2007. use in nickel-zinc cells", Solid State Ionics, 156, pp.171-177,
2003.
6. S Rajendran, M Sivakumar and R Subadevi, "Investigations on
the effect of various plasticizers in PVA-PMMA solid polymer 21. J.R. Macdonald in: "Impedance Spectroscopy", John Wiley &
blend Electrolytes" Materials Letters, 58, pp. 641 - 649, 2004. Sons, New York, 1987, p.23

7. M. Sundar and S. Selladurai, "Effect of Fillers on Magnesium- 22. S. Rajendran and M. Ramesh Prabhu, "Effect of different
Poly(Ethylene Oxide) Solid Polymer Electrolyte", Ionics, 12, plasticizer on structural and electrical properties of PEMA-based
pp. 281-286, 2006. polymer electrolytes", J Appl Electrochem, 40, pp. 327 - 332,
2010.
8. D. K. Pradhan, R. N. P. Choudhary and B. K. Samantaray, "Studies
of dielectric and electrical properties of plasticized polymer 23. R. H.Y. Subban, A. H. Ahmad, N. Kamarulzaman and A. M. M.
nanocomposite electrolytes", Materials Chemistry and Physics, Ali, . "Effects of plasticiser on the lithium ionic conductivity of
115, pp. 557- 561, 2009. polymer electrolyte PVC-LiCF3SO3", Ionics, 11, pp. 442-445,
2005.
9. H. W. Chen, T. P. Lin and F. C. Chang, "Ionic conductivity
enhancement of the plasticized PMMA/LiClO4 polymer", 24. K. Rama Mohan, V.B.S. Achari, V.V.R.N. Rao, and A.K. Sharma,
Polymer, 43, pp. 5281-5288, 2002. "Electrical and optical properties of (PEMA/PVC) polymer blend
electrolyte doped with NaClO4", Polymer testing, 30, pp. 881-
10. J. M. Song, H. R. Kang, S. W. Kim, W. M. Lee and H. T. Kim, 886, 2011.
"Electrochemical characteristics of phase-separated polymer

948 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Improved Adhesion and Enhanced Field Emission of


Multi-Walled Carbon Nanotubes Based Cold Cathode
by Copper Oxide Buffer Layer
Yawar Alamgeer1, Shambhu Kumar Yadav2
1
University Department of Physics Lalit Narayan Mithila University Darbhanga, Bihar, India
2
Department of PhysicsWomen's College SamastipurSamastipur, Bihar, India
Email: yawaralamgeer@gmail.com 1, drshambhukryadav@gmail.com2

Abstract- Cold cathodes based on carbon field emitter, nanosensor, fuel storage, nanoelectronics.
nanotubes (CNTs) are the most promising material Previous research investigations have shown that
for production of next generation enhanced Carbon Nanotubes have outstanding field emission
characteristics devices based on vacuum
properties [2] due to its very high aspect ratio and very
microelectronics and most promising flat panel
small and sharp tip radius. By virtue of this, Carbon
display. Adhesion of CNTs with the base substrate
and the contact resistance are the major concern Nanotubes based cold cathode are very efficient
to be rectify in CNTs based cold cathode devices. electron sources for various applications, including field-
In our work, a buffer layer of Copper Oxide is emission displays [3], x-ray tubes [4] and electron
deposited prior to the catalyst deposition and the microscopy [5]. However the current density obtained
Carbon Nanotubes growth was done by thermal from present Carbon Nanotubes based cold cathode
chemical vapor deposition method. There was is still low. The low current density of CNT based cold
significant improvement in various field emission cathode emitter is due to many factors, the crucial ones
parameters such as emission current density (J) being degradation of CNTs at high electric field [6] and
increases from 1.8 mA/cm2 to 23.67 mA/cm2, turn screening effect [7].
on field (ET) decreases from 3.4 V/µm to 2.2 V/
µm, field enhancement factor () increases from It has been predicted that electrostatic screening
1229 to 6399 and effective emitting area () effect becomes minimum when height of the CNTs is
increases from 7.54*10 -9 cm-2 to 2.62*10 -10 cm-2 about one half of the inter-nanotube distance [2].
by the use of Copper Oxide buffer layer. The Various schemes have been reported for the
enhanced field emission properties suggest that minimization of screening effect by growing CNTs
the adhesion between Carbon Nanotubes and the bundles with different dot structure and sizes [8-9]
substrate increased significantly. The higher rather than growing continuous films of CNTs. Different
current density signifies that the Copper Oxide
methods have been reported in the literature for
buffer layer lowered the contact resistance and thus
longer duration stability was achieved. controlling the growth density of CNTs, such as by the
capping catalyst particles by deposition of Ti layer [10]
Keywords- Carbon Nanotube, Field Emission, and by deposition of buffer layer to enhance the
Cold Cathode, Chemical Vapor Deposition, Buffer
adhesion of CNTs with substrate [11].
Layer, Adhesion.
In this experiment, we use Copper Oxide (CuO)
I. INTRODUCTION buffer layer for minimization of screening effect and
After their discovery Carbon Nanotubes (CNT's) improvement of adhesion of substrate and emitters
[1] have attracted great attention because of their results in increasing the current density. We have carried
excellent physical, mechanical, electrical properties and out our study on two types of samples of CNTs based
their potential applications in many diverse areas like cold cathode; the first sample without buffer layer

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 949


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

referred as reference sample while the second sample


having CuO as buffer layer. To evaluate the CuO buffer
layer effect on screening, field emission measurement
of the above cathodes were carried out in diode mode
configuration. Our results validate that the deposition
of CuO buffer layer is a major aspect in the
enhancement of the field emission parameters of CNT
based field emitters.
II. EXPERIMENTAL METHOD
Fig. 1: Schematic of thermal chemical vapor deposition set-up
N-type silicon (Si) <100> wafer of low resistivity
Vacuum system consist of various pumps such as scroll
was taken as a base material or substrate. A thin film of
pump, turbo molecular pump and ion pump through
thickness 2 nm of iron (Fe) as catalyst was developed
which very high vacuum level is achieved inside the
on Si substrate by RF sputtering followed by lift-off.
vacuum chamber. Here scroll pump is used as backing
This sample is termed as reference sample. Another
pump for turbo molecular pump and ion pump is used
sample having CuO buffer layer grown by RF sputtering
for ultra high vacuum. For vacuum measurement various
prior to Fe as catalyst Samples used for the study is
gauges are used such as pirani gauge, penning gauge
10µm dot with 10 µm spacing. The Growth of CNTs
and ion gauge.
on said samples was carried out by Thermal Chemical
Vapor Deposition (CVD) at atmospheric pressure.
Initially these patterned samples were heated to 850oC
in presence of H2. Thereafter the samples were pre-
treated in the presence of NH3 followed by the
introduction of C2H2 as the carbon feedstock to carry
out the growth of CNTs on both the samples. Schematic
for thermal chemical vapor deposition is shown in Fig. Fig. 2:Schematic of field emission measurement set-up
1. After that characterizations of these samples were
done using Scanning Electron Microscopy. III. RESULTS AND DISCUSSION
SEM images of representative samples with and without
Field emission studies on reference sample buffer layer based cathodes prepared by Chemical
without buffer layer and sample having CuO as buffer Vapor Deposition technique are shown in Figure 3 and
layer were carried out in diode configuration. In this 4 respectively. Desired growth of CNTs has been
arrangement CNTs were used as cathode and mounted obtained. The CNTs are found to be vertically aligned
on the stainless steel assembly. A stainless steel disk via self-supporting mechanism. Due to very high density,
mounted on the same fixture acted as the anode. A the heights of all the CNT samples are similar and are
screw at the top of the assembly allows us to control clearly visible from SEM images.
the electrode spacing very accurately. In our case the
typical electrode spacing was kept at 500 microns. The
entire assembly was kept inside a vacuum chamber and
evacuated to a vacuum better than 10-7 Torr. Schematic
for field emission measurement set-up is shown in Fig.
2. The emission current measurement was carried out
as a function of electric field, under very high vacuum
conditions for both the samples of CNTs based cold
cathode on silicon substrate.
Fig. 3: SEM image of reference sample.

950 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 4: SEM image of sample with Copper Oxide buffer layer


Fig. 6: JE plot of sample with CuO buffer layer.
The JE plots of the samples are shown in Figure 5
The corresponding Fowler-Nordheim plots for both
and 6 respectively. It is quite clear from the JE plots
the samples are shown in Figure 7 and 8. The two
that both the samples show the diode characteristics. It
regions i.e. higher field region and lower field region in
is also observed from the JE plots that the lowest current
the F-N curve for both the samples are clearly visible.
density viz 1.8 mA/cm2 was obtained in case of
However it must be noted that in case of the buffer
reference sample without any buffer layer shown in
layered sample the change in slope in two regimes is
Figure 5, and in case of sample with CuO buffer layer
very small while for reference sample the appearance
the current density obtained is 23.67 mA/cm2 shown in
of the knee is obvious. This can be ascribe to the fact
Figure 6. Considering samples, henceforth we observed
that in case of buffer layer structure there is an
that the current density for the sample with CuO as
exponential and stable increase of current even at high
buffer layer is more as compared to the reference
fields. However for the structures without buffer layer,
sample. Though the patterning of dots per unit area in
it is clear from the JE plot the increase in current density
each of samples is same, the current increases in
shows some deviation from expected exponential
structure having buffer layer. It is clear from Figure 5
behavior. This behavior might be due to the elimination
and 6, the turn on field decreases from 3.2 V/µm to 2.2
of emitting tips at high fields which result in the decrease
V/µm by using CuO as buffer layer, which clearly
of tip density during emission. However for the
confirms our argument that buffer layer is a very effective
structures with buffer layer, the decrease shielding due
way to enhance the current density and turn on field.
to tip elimination at high field does not play a dominant
role.

Fig. 5:JE plot of reference sample.


Fig. 7: FN plot of reference sample

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 951


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES
1. S. Iijima. Helical microtubules of graphitic carbon, Nature, 354
(1991), 56-58.
2. N. D. Jonge and J. M. Bonard, Carbon nanotube electron sources
and applications," Phil. Trans. R. Soc. A, 362 (2004), 2239-
2266.
3. Y. S. Choi, Y. S. Cho, J. H. Kang, Y. J. Kim, and I. H. Kim, S. H.
Park, H. W. Lee, S. Y. Hwang, S. J. Lee, C. G. Lee, T. S. Oh, J. S.
Choi, S. K. Kang, and J. M. Kim, A field-emission display with
a self-focus cathode electrode, Appl. Phys. Lett., 82 (2003) 3565.
4. J. Zhang, Y. Cheng, B. Gao, Q. Qiu, G. Yang, Y. Z. Lee, J. P. Lu
Fig. 8: FN plot of sample with CuO buffer layer
and O Zhou, Stationary scanning x-ray source based on carbon
In our work, There was significant improvement in nanotube field emitters, Appl. Phys. Lett., (2005) 184104-
184106.
other field emission parameters such as field
enhancement factor () increases from 1229 to 6399 5. N. D. Jonge, Y. Lamy, K. Schoots and T. H. Oosterkamp, High
brightness electron beam from a multi-walled carbon nanotube,
and effective emitting area () increases from 7.54* Nature, 420 (2002), 393-395.
10-9 cm-2 to 2.62*10-10 cm-2 by the use of CuO buffer
6. Preeti Verma, Seema Gautam, P. Kumar, P. Chaturvedi, J.S. Rawat,
layer. The emissions from cathodes show a very smooth S. Pal, R. Chaubey, Harsh, H.P.Vyas and P. K. Bhatnagar, CNT
curve which are almost close to the ideal JE behavior. Tip Melting with Vacuum breakdown in Cold Cathode, J. Vac.
Sci. Technol. B 25 (2007), 1584.
Results for our cathodes were repeatable for several
cycles and also achieved enhanced field emission 7. H. J. Jeong, S. C. Lim, K. S. Kim and Y. H. Lee, Edge effect on the
field emission properties from vertically aligned carbon nanotube
parameters at comparatively lower electric fields. arrays, Carbon, 42 (2004), 3036-3039.

IV. CONCLUSIONS 8. Harish M. Manohara and Risaku Toda and Robert H. Lin and
Anna Liao and Michael J. Bronikowski and Peter H. Siegel, Carbon
In this work we used CVD technique to deposit Nanotube Bundle Array Cold Cathodes for THz Vacuum Tube
CNTs film on Silicon (Si) substrates with and without Sources, J.Infrared Milli Terahz Waves 30, (2009), 1338-1350.

intermediate buffer layer. The first sample without buffer 9. Y.M. Wong, W. P. Kang, J. L. Davidson, B.K. Choi, W.
Hofmeister, and J. H. Huang, Array geometry, size and spacing
layer is called as reference sample and another with effects on field emission characteristics of aligned carbon
CuO buffer layer. In our work, There was significant nanotubes, Diamond Relat., Mater, 14 (2005) 2078-2083.
improvement in various field emission parameters such 10. S. Srividya, Seema Gautam, Pika Jha, Prashant Kumar, Anand
as emission current density (J), Turn-on field (ET), field Kumar, U.S. Ojha, J.S.B.S. Rawat, S. Pal, P.K. Chaudhary, Harsh
enhancement factor () and effective emitting area () and R.L. Lai, J.K.Shiu, Y.R. Chang, K.C. Lin, P.C. Chang, C.P.
Juan, H.C. Tai, and H.C. Cheng, Properties of Carbon Nanotubes
increases by the use of CuO buffer layer. The enhanced Via a Thin Ti Capping Layer on the Pretreated Catalyst, J.
field emission properties suggest that the adhesion Electrochem. Soc., 154 (2007), .J109-J115.
between CNTs and the substrate increased significantly. 11. R.K. Sinha, Titanium buffer layer for improved field emission of
The higher current density signifies that the CuO buffer CNT based cold cathode, Applied Surface Science 256 (2010),
3563-3566.
layer lowered the contact resistance and thus longer
duration stability. These facts are useful and might shed
new light on the field emission mechanism for CNTs.

952 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Effect of Annealing on Structural and Optical


Properties of Mn: ITO Thin Film
Deepannita Chakraborty1, Chaitanya Kumar .K2, S.Kaleemulla3
1
Department of Physics, Dr.N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, India.
2
Department of H&S, Vemu Institute of Technology, Chittoor, Andhra Pradesh, India.
3
Thin Films Laboratory ,Centre for Functional Materials, Vellore Institute of Technology, Vellore-632014, Tamilnadu, India.
Email: monkaichakraborty@gmail.com1, chaitukunapalli@gmail.com2,skaleemulla@gmail.com3

Abstract.Thin films of Mn (5 at.% ) doped ITO [14-20]. The influence of annealing on the properties
were coated on corning glass substrates using the of ITO has already been reported by many researchers
electron beam evaporation technique. The [21-24]. The crystallite size is affected by the annealing
substrates were maintained at a temperature of
temperature. Some of the researchers have shown that
350 °C. The deposited thin films were then air
there is an increase in the crystallite size as well as
annealed at 100 °C, 200 °C, 300 °C and 400 °C for 1
hr. The structural properties of as deposited and enhancement in the optical properties on increasing the
air annealed films were studied. The effect of annealing temperature [25-28]. This manuscript deals
annealing temperature on the structural, with the effect of annealing on the structural and optical
compositional and optical properties of the thin films properties of Mn doped ITO thin film.
was studied using X-ray diffractometer (XRD) and
UV-Vis-NIR Diffuse reflectance spectrophotometer 2. EXPERIMENTAL METHOD
(DRS). The precursor powders of In2O3, SnO2 and MnO2
Keywords: annealing, (Mn,Sn) codoped ITO, were taken in stoichiometry and milled for 16 hrs using
thin films planetary ball mill to form (In0.90Mn0.05Sn0.05)2O3
nanoparticles. After sintering the grinded
1. INTRODUCTION (In0.90Mn0.05Sn0.05)2O3 nanopowder at 950 °C for 8 hrs,
Different transparent conducting oxides (TCO) like it was taken as sample in the graphite crucible. The
ZnO, In2O3, TiO2, SnO, CdO were doped with varied deposition of (In0.90Mn0.05Sn0.05)2O3 on glass substrate
transition metals and studied the structural and optical was carried out using electron beam evaporation coating
properties of them [1-4]. The researchers are trying to method. The substrate temperature was maintained to
find a way to increase the properties of TCO by be at 350°C and the vacuum is maintained at 2*10-3
annealing them. Annealing is a type of heat treatment to mbar throughout the coating period. The deposited thin
enhance the crystallinity and decrease the dislocation films were then annealed at various temperatures such
of atoms. The annealing affects the macroscopic as 100 °C, 200 °C, 300 °C and 400 °C in presence of
characteristics of TCO in nanostructured state. This air for 1 hr in horizontal tubular furnace. The structural
leads to change in structural and optical property of and optical properties of as deposited and annealed
TCO on annealing. The TCOs find applications in LED, samples were studied using X-ray diffractometer
photodiodes, energy efficient windows, touch screens, (XRD) and Diffuse reflectance spectra (DRS). The
surface layers in electroluminescent applications, solar obtained results were compared and the influence of
cells etc. [5-13]. Among them, In2O3 is one of the best annealing on the properties was studied.
TCO material having high hardness, efficient chemical
3. RESULTS AND DISCUSSION
stability, high adhesion quality and photochemical
properties. It finds applications in photovoltaic devices, Fig.1(a). depicts the XRD profiles for as deposited
biocatalytic redox transformations and flat panel displays and annealed (In0.90Mn0.05Sn0.05)2O3 thin films at

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 953


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

different temperatures. The bottom layer depicts the the substitution of dopants in the host lattice. The lattice
XRD pattern for as deposited (In0.90Mn0.05Sn0.05)2O3 parameter was found to increase from 9.38 Ao to 10.37
thin film. The layers above the bottom layer depict the Ao on increasing the annealing temperature. The strain
XRD pattern of (In 0.90Mn0.05Sn0.05)2O3 thin films and dislocation density of thin films were found to
annealed at different temperatures. From the figure it decrease from 25 * 10-4 to 17 * 10-4 and 64 * 1014
was confirmed that the XRD patterns of all the samples to 24.8 * 1014 m-2, respectively. These behaviors of
match with the XRD profile of In2O3 [JCPDS card no. decreasing strain and dislocation density with increasing
06-0416]. So, it was reported that the thin films have annealing temperature confirms that annealing helps to
cubic structure. From the fig. absence of secondary enhance the crystallinity of the sample[29,30]. The
phase was reported. This suggests that the Mn and Sn increase in crystallite size also indicates that the tensile
replace the In ions in the host lattice. The absence of strain is dominant as suggested by Gupta et al. [32].
secondary phases or cluster of metals indicates the Similar behavior was obtained on annealing of transition
complete substitution of dopants in the host lattice metal doped ZnO by Mathew et al. [31].

Fig. 2(b): XRD pattern for Mn doped ITO thin films in the
range of 30 °-32 ° .

Fig.2 (a). depicts the decrease in absorption band


on increasing the annealing temperature. Fig. 2 (b).
depicts the increase in transmittance of Mn doped ITO
Fig. 1(a): XRD pattern for Mn doped ITO thin films (a) as
deposited and annealed at (b) 100 °C (c) 200 °C (d) 300 °C and thin films on increasing the annealing temperature after
(e) 400 °C. 100°C. The transmission value for as deposited
Fig. 1(b) shows the XRD pattern of as deposited (In0.90Mn0.05Sn0.05)2O3 thin film was found as 70 %. On
and air annealed (In0.90Mn0.05Sn0.05)2O3 thin films in the annealing to 100°C, the transmittance decreases to
range of 30°-32°. From the fig.1(b), it was observed 65%. On further increasing the annealing temperature
that there is increase in the intensity of the predominant from 200°C to 400°C, the transmittance increases from
peak (2 2 2) at 31° on increasing the annealing 65% to 88%. The increase in transmission on increasing
temperature. It has also been observed from fig.1(b) annealing indicates the enhanced diffusion of Mn and
that the predominant peak shifts to lower angle on Sn ions in the In2O3 lattice of thin films. The same kind
increasing the annealing temperature. The crystallite of behavior was observed for Titanium (Ti) and Gallium
size was found to increase from 17 nm to 21 nm on (Ga) codoped ZnO by Chen et al.[33].
increasing the annealing temperature. This suggests that
increase in the annealing temperature helps in the
enhancement of crystalline properties of thin films. The
slight shift in the peak position to lower angle confirms
954 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 2.(a): Absorption spectra of Mn doped ITO thin films both


as deposited and annealed at 100 ° C, 200 °C, 300 °C and 400 °C. Fig. 3: Tauc's plot for Mn doped ITO thin films both as
deposited and annealed at 100 °C , 200 ° C (inset), 300 °C and
400 ° C.

Fig.4. shows the refractive index of as deposited


and annealed thin films with respect to wavelength. From
the fig. it was observed that the refractive index
decreases on increasing the wavelength. The refractive
index was found to decrease on increasing the annealing
temperature. This is due to the increase in crystallinity
of the sample on increasing the annealing temperature.
The increase in crystallite size with decrease in optical
bandgap energy forms the background for decrease in
refractive index on increasing annealing temperature
Fig. 2.(b): Transmittance spectra of Mn doped ITO thin films [37]. Similar kind of behavior was observed by Sanjeev
both as deposited and annealed at 100 °C, 200 °C, 300 °C and et al.[38].
400 °C.

From Tauc's plot in Fig. 3, it was found that the


optical band gap decreases on increasing the annealing
temperature. This decrease in band gap energy is due
to the increase in defect states formation on increasing
the annealing temperature [34]. This is also due to the
degradement of quantum confinement effect as increase
in the size of crystallite on increasing the annealing
temperature. This type of behavior was observed for
indium tin oxide thin film on thermal annealing by Xu et
al [35]. Such behavior is termed as Burstein Moss shift Fig. 4: Refractive index plot for Mn doped ITO thin films both
[36]. as deposited and annealed at 100 ° C, 200 ° C (inset), 300°C and
400 ° C.

4. SUMMARY
Mn (5 at.%) doped ITO thin films were coated on
corning glass substrate at Ts = 350 C. The XRD pattern
confirms the absence of any kind of impurities or

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 955


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

formation of any secondary phases on increasing the 15. M. Masuda, K. Sakuma, E. Satoh, Y. Yamasaki, H. Miyasaka, J.
Takeuchi, in Proc. 6th Int. Electron. Manuf.
annealing temperature. The crystallite size was found Technol.Symp.(1989), p. 95
to increase on increasing the annealing temperature. The 16. E. Takeda, T. Kawaguchi, Y. Nanno, H. Tsutsu, T. Tamura,
optical band gap and refractive index was found to S.Ishihara, S. Nagata, in Proc. Int. Display Research Conf.
decrease on increasing the annealing temperature. Thus (1988),p. 155
the increase in annealing temperature increases the 17. P.P. Deimel, B.B. Heimhofer, G. Krotz, H.J. Lilienhof, J. Wind,
G. Muller, E. Voges, IEEE Photon Technol. Lett. 2, 449 (1990)
crystallite size and decreases the optical band gap of
18. M. Wirtz J. Kluczik, M. Rivera, J. Am. Chem. Soc. 2000, 122,
the thin film. 1047-1056.
19. C. A. Martinez, J. D. Stewart, Curr. Org. Chem. 2000, 4, 263-
ACKNOWLEDGEMENTS
268.
Authors are grateful to VIT-SIF for providing the 20. C. G. Granquist, Appl. A: Solids Surf. 1993, 57, 19-22.
XRD and DRS facility to carry out the studies related 21. The Effect of Annealing on Structural, Optical and Electrical
to the present work. Properties of Nanostructured Tin Doped Indium Oxide Thin
Films Mohammad Hossein Habibi* and Nasrin Talebian
REFERENCES 22. Role of annealing temperature on microstructural and electro-
optical properties of ITO films produced by sputtering M. Gulen
1. Bhat, S.V., Deepak, F.L.: Tuning the bandgap of ZnO by o G. Yildirim o S. Bal o A. Varilci o I. Belenli o M. Oz
substitution with Mn2+, Co2+ and Ni2+. Solid State
23. The effect of annealing on structural, electrical and optical
Communications 135,345-347 (2005)
properties of nanostructured ITO films prepared by e-beam
2. Manjula, N., Pugalenthi, M., Nagarethinam, V.S., Usharani, K., evaporation Hamid Reza Fallah a,*, Mohsen Ghasemi a, Ali
Balu, A.R.: Effect of doping concentration on the structural, Hassanzadeh b, Hadi Steki c
morphological, optical and electrical properties of Mn-doped 24. Effect of annealing on the structural, optical and electrical
CdO thin films. Materials Science-Poland, vol. 33, pp. 774 properties of ITO films by RF sputtering under low vacuum
(2015) level T.S. Sathiaraj
3. Viswanatha, R., Sapra, S., Sen Gupta, S., Satpati, B., Satyam, 25. Hammad, T.M.: Effect of annealing on electrical, structural, and
P.V., Dev, B.N., Sarma, D.D.: Synthesis and Characterization of optical properties of sol-gel ITO thin films. physica status solidi
Mn-Doped ZnO Nanocrystals. The Journal of Physical (a) 206,2128-2132 (2009)
Chemistry B 108,6303-6310 (2004)
26. Jijoy, P.M., George, V., Jacob, M.: Effect of Annealing on the
4. Alam, M.J., Cameron, D.C.: Investigation of annealing effects Optical Properties of Transition Metal Doped ZnO Thin Films.
on sol-gel deposited indium tin oxide thin films in different IOP Conference Series: Materials Science and Engineering
atmospheres. Thin Solid Films 420-421,76-82 (2002) 73,012065 (2015)
5. J. Touskova, J. Kovanda, L. Dobiasova, V. Parizek, P. Kielar, 27. Meng, L.-J., Placido, F.: Annealing effect on ITO thin films
Sol. Energ. Mat. Sol. C 37, 65 (1995) prepared by microwave-enhanced dc reactive magnetron
sputtering for telecommunication applications. Surface and
6. I. Hamberg, C.G. Granqvist, K.F. Berggren, B.E. Sernelius,L. Coatings Technology 166,44-50 (2003)
Engstrom, Vacuum 35, 9 (1985)
28. Saha, S., Gupta, V.: Al and Fe co-doped transparent conducting
7. A. Romeo, M. Terheggen, D. Abou-Ras, D.L. Batzner,F.J. Haung, ZnO thin film for mediator-less biosensing application. AIP
M. Kalin, D. Rudman, A.N. Tiwari, Prog. Photovolt.Res. Appl. Advances 1,042112 (2011)
12, 93 (2004) 29. Investigation of the Effect of Film Thickness and Heat Treatment
8. H.M. Zeyada, M.M. El-Nahass, I.K. El-Zawawi, E.M. El- on the Optical Properties of TeSeSn Thin Films A. Elwhab B.
Menyawy,Eur. Phys. J. Appl. Phys. 49, 10301 (2010) Alwany1, O. M. Samir1, Mohammed A. Algradee1, M. M.
Hafith2,M. A. Abdel-Rahim2
9. S.K. Poznyak, A.N. Golubev, A.I. Kulak, Surf. Sci. 454, 396
30. Annealing effects on the structural and optical properties of
(2000)
ZnO nanoparticles with PVA and CA as chelating agents A. N.
10. D.G. Parker, P.G. Say, Electron. Lett. 22, 7 (1986) MALLIKA*, A. Ramachandra REDDY, K. Venugopal REDDY
11. M.C. de Andrade, S. Moehlecke, Appl. Phys. A 58, 6 (1994) 31. Jijoy P Mathew et al 2015 IOP Conf. Ser.: Mater. Sci. Eng. 73
012065
12. K.L. Chopra, P.D. Paulson, V. Dutta, Prog. Photovolt. Res.
Appl.12, 69 (2004) 32. Xu, Z., Chen, P., Wu, Z., Xu, F., Yang, G., Liu, B., Tan, C.,
Zhang, L., Zhang, R., Zheng, Y.: Influence of thermal annealing
13. R.Tueta, M. Braguier, Thin Solid Films 80, 8 (1981) on electrical and optical properties of indium tin oxide thin films.
14. T.J. Coutts, X. Li, M.W. Wanlass, K.A. Emery, T.A. Cessert, Materials Science in Semiconductor Processing 26,588-592
IEEE Electron Device Lett. 26, 660 (1990) (2014)

956 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

33. http://dx.doi.org/10.1155/2013/502382 37. VARIATION OF OPTICAL CONSTANTS IN GE10SE60TE30


THIN FILM
34. 10.4236/wjcmp.2015.53023
38. Sandeep, S., Dhananjaya, K.: Effect of Annealing Temperature
35. Burstein, E.: Anomalous Optical Absorption Limit in InSb.
on the Structural and Optical Properties of Zinc Oxide (ZnO)
Physical Review 93,632-633 (1954)
Thin Films Prepared by Spin Coating Process. IOP Conference
36. Moss, T.S.: The Interpretation of the Properties of Indium Series: Materials Science and Engineering 73,012149 (2015)
Antimonide. Proceedings of the Physical Society. Section B
67,775 (1954)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 957


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Correlation of Nano Capacitance with Electrical


Properties of Advanced Materials
Dr. Alla Srivani1, Dr. Charugundla Nagarathnamaiah2, Dr. Raghavendra3, Syed Beeban Basha4,
Praveen kumar Namburu5, Dasari Sreedhar6
1,2,3,4,5,6
Vasireddy Venkatadri Institute of Technology, KITS Engineering College.

Abstract: Correlation of Nano capacitance with significance, techniques, and challenges of characterizing
Electrical properties of Advanced materials nano materials by chemistry technique. Nano scale
explains Batteries store energy through a action. materials have found broad application in industrial
Capacitors store electricity. This generates once
processes, client product, medicine, and nosology. In
electrical charges in an exceedingly material are
every application, the propulsion for nanoparticle use
out of balance. Static electricity makes garments
stay together in an exceedingly clothes dryer. If lies within the distinctive size-dependent chemical or
we have a tendency to bit a metal door handle on a physical properties, as well as chemical process,
hot, dry day, we have a tendency to might discharge chemistry, negatron transport, magnetic, optical, and
it. Capacitors are superior to batteries as a result natural philosophy behaviors.1 Magnetic nanomaterials
of they charge and discharge quicker, They ar a very important supply of labels for biosensing thanks
conjointly don't weigh the maximum amount, don't to their robust magnetic properties, that don't seem to
use harmful chemicals, and last longer. Until now, be found in biological systems. Modulation of the
their main disadvantage has been size. Where as composition, size, and magnetic properties of those
batteries are obtaining smaller, they need stayed materials permits their use in an exceedingly sort of
large for ages
instruments and formats for biosensing. 2, 3 New kinds
Keyword's: Nano capacitance, Electrical of transportable instrumentation ar promising for the
properties, advanced materials. employment of nanoscale magnetic
INTRODUCTION materials in point-of-care (POC) sensors in an
exceedingly sort of applications. Magnetic biosensors
Nano scale materials have larger surface areas than are beneath active development and will before long
similar lots of bulk materials. As expanse per mass of a rival established biological detection ways that use
cloth will increase, a larger quantity of the fabric comes surface-bond fluorescent tags
into contact with the encompassing materials, so
touching reactivity. The good thing about a larger METHODOLOGY
expanse and improved reactivity in nano structured
materials is that they assist to make higher catalysts and The quantum capacitance of a nanocapacitor
support the "functionalization" of nano scale material fashioned of dielectric-semiconductor (namely,
surfaces for applications starting from drug delivery to semiconductor oxide-silicon) layers, deposited
more cost-effective modes of manufacturing and storing alternately with their widths following a Cantor set
energy. chemistry ways provide one in all the most structure, was calculated numerically [5] and shown
effective approaches to such characterization, and that this configuration brings a couple of nano-hybrid
there's a growing would like for sensible exercises that electrical condenser that permits each classical and
illustrate fabrication and facilitate the chemistry analysis quantum behavior counting on the Cantor generation.
of nano materials and nano structured surfaces. Here, additionally, AN approximate equivalent circuit
we tend to describe the fundamental principles and illustration for the nano-hybrid electrical condenser was
projected.

958 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

MIM electricity capacitors made-up during a 3D RESULT'S & DISCUSSION


cylindrical nanotemplate of anodized AAO porous film Table-1:
have shown profound increase in device capacitance
Sl. Nano Distance Area Medium
over flattened structures. However, inherent asperities No Capacitance nm nm Permittivity
at the highest of the nanostructure example caused Nf ε 10 -10
domestically high field strengths and leaded to low 1 1 10 100 1.0
breakdown voltage. This severely limits the usable 2 2 20 200 2.0
3 3 30 300 3.0
voltage, the associated energy density and so the
4 4 40 400 4.0
operational charge-discharge window of the device. In 5 5 50 500 5.0
[6], it absolutely was delineate AN chemistry technique,
complementary to the self-assembled example pore Nano capacitance, distance, Area and Medium
formation method within the AAO film, that has Permittivity are Correlated. Nano capacitance increases
nanoengineered topographies with considerably from 1 Nf to 5 Nf with Distance and Area in Nano
reduced native field of force concentrations, whereas scale
reducing outpouring current densities by AN order of
magnitude. additionally, AAO example and nanopore
dimensions were optimized to extend the capacitance
per flattened unit space.
In some cases, the particular capacitance of
nanocapacitors is under expected from their pure
mathematics. some way to mitigate this negative result
was incontestable [7] by mistreatment hierarchal stuff
films rather than homogenised films. The enhancements
were obtained in theory by mistreatment perturbation
theory to resolve the governing equations with boundary
conditions during a model of plate capacitors. it
absolutely was shown that by grading each the
permittivity and also the elastic constant, one will get a
palpable sweetening in capacitance.
In [8], the nickel interdigital capacitors were made-
up on prime of semiconductor substrates. The
Graph-1:
capacitance of such electrical condenser was optimized
Table-2:
by coating the electrodes with a nanolayer of HfO2.
AN analytical resolution of the capacitance equation Sl. Nano Distance Area Medium
was compared with results of magnetic force simulations No Capacitance nm nm Permittivity
Nf ε 10 -10
and measurements. sensible agreement between theory
1 6 60 600 6.0
and experiments showed that such a modeling would 2 7 70 700 7.0
be effective within the style and electrical 3 8 80 800 8.0
characterization of nanocapacitors 4 9 90 900 9.0
5 10 100 1000 9.99

Nano capacitance, distance, Area and Medium


Permittivity are Correlated. Nano capacitance increases
from 6nf to 10 Nf with Distance and Area in Nano
scale

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 959


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Graph-3:
Table-4:

Sl. Nano Distance Area Medium


No Capacitance nm nm Permittivity
Nf ε 10 -09
Graph-2: 1 21 210 2100 2.10
Table-3: 2 22 220 2200 2.20

Sl. Nano Distance Area Medium 3 23 230 2300 2.30


No Capacitance nm nm Permittivity 4 24 240 2400 2.40
Nf ε 10 -09 5 25 250 2500 2.50

1 11 110 1100 1.10 Nano capacitance, distance, Area and Medium


Permittivity are Correlated. Nano capacitance increases
2 12 120 1200 1.20
with Distance and Area in Nano scale
3 13 130 1300 1.30

4 14 140 1400 1.40

5 15 150 1500 1.50

Nano capacitance, distance, Area and Medium


Permittivity are Correlated. Nano capacitance increases
from 11 Nf to 15 nf with Distance and Area in Nano
scale

Graph-4:

Nano capacitance, distance, Area and Medium


Permittivity are Correlated. Nano capacitance increases
from 21 Nf to 25Nf with Distance and Area in Nano
scale

960 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES
1. S.R. Ekanayake, M. Ford, and M. Cortie, "Metal-insulator- metal
(MIM) nanocapacitors and effects of material properties on their
operation," Mater. Forum, vol. 27, pp. 15-20, 2004.
2. N. Engheta, A. Salandrino, and A. Alu, "Circuit elements at optical
frequencies: Nanoinductors, nanocapacitors, and nanoresistors,"
Phys. Rev. Lett., vol. 95, pp. 095504, 2005.
3. J.I. Sohn, Y.-S. Kim, Ch. Nam, B.K. Cho, T.-Y. Seong, and S. Lee,
"Fabrication of high-density arrays of individually isolated
nanocapacitors using anodic aluminum oxide templates and
carbonnanotubes," Appl. Phys. Lett., vol. 87, pp. 123115, 2005.
4. S.K. Saha, M. Da Silva, Q. Hang, T. Sands, and D.B. Janes, "A
nanocapacitor with giant dielectric permittivity," Nanotechnol.,
vol. 17, pp. 2284-2288, 2006.
Graph-5:
5. R. Montelongo, D. González, R. Bustos, and G. González,
Nano capacitance, distance, Area and Medium "Nanocapacitor with a Cantor multi-layered structure," J. Mod.
Phys., vol. 3, pp. 1013-1017, 2012.
Permittivity are Correlated. Nano capacitance increases
with Distance and Area in Nano scale Nano 6. L.C. Haspert, S.B. Lee, and G.W. Rubloff, "Nanoengineering
strategies for metal-insulator-metal electrostatic nano-
capacitance, distance, Area and Medium Permittivity capacitors," ACS Nano, vol. 6, pp. 352836, 2012.
are Correlated. Nano capacitance increases with
7. Q. Li, Ch. Patel, and H. Ardebili, "Mitigating the dead-layer
Distance and Area in Nano scale effect in nanocapacitors using graded dielectric films,"Int. J. Smart
Table-6: & Nano Mater.,vol. 3, pp. 23-32. 2012.
8. G. González, E.S. Kolosovas-Machuca, E. López-Luna, H.
Hernández-Arriaga, and F.J. González, "Design and fabrication
of interdigital nanocapacitors coated with HfO2,"Sensors, vol.
15, pp. 1998-2005, 2015.
Nano capacitance, distance, Area and Medium
9. L. Wei, Q.-X. Liu, B. Zhu, W.-J. Liu, Sh.-J. Ding, H.-L. Lu, A.
Permittivity are Correlated. Nano capacitance increases Jiang, and D.W. Zhang, "Low-cost and high-productivity three-
from 26nF to 30 nFwith Distance and Area in Nano dimensional nanocapacitors based on stand-up ZnO nanowires
scale for energy storage," Nanoscale Res. Lett., vol. 11, pp. 213, 2016.
10. L. Chkhartishvili, "Nanoparticles near-surface electric field,"
Nano capacitance modifies with Distance and Area Nanoscale Res. Lett., vol. 11, pp. 48, 2016.
in Nano scale with Medium Permittivity
11. M. Stengel and N.A. Spaldin, "Origin of the dielectric dead layer
in nanoscale capacitors," Nature, vol. 443, pp. 679-682, 2006.
12. G. Shi, Y. Hanlumyuang, Zh. Liu, Y. Gong, W. Gao, B. Li, J.
Kono, J. Lou, R. Vajtai, P. Sharma, and P.M. Ajayan, "Boron
nitride-grapheme nanocapacitor and theorizing of anomalous size-
dependent increase of capacitance," Nano Lett., vol. 14, pp.
1739-1744, 2014.
13. L. Chkhartishvili, A. Gachechiladze, O. Tsagareishvili, and D.
Graph-6: Gabunia, "Capacitances built in nanostructures," in Proc.18th
Int. Metall. Mater. Cong., 2016 - in press.
CONCLUSION
Medium permittivity, Area in nm and Medium
Permittivity are correlated in Advanced material's for
Best Application to modern Technology.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 961


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Emerging Trend's in Pico Technology for Medical


Application's
Dr. A. Srivani1, Gurram Vasanth2
1
PhD, D.Sc, 1,2 East European University Goergia
Email: vaniraghava2751982@gmail.com1,2

Abstract: Pico innovation is a blend of pico meter The Pico Scope and PC Oscilloscopes2
and innovation, which is comparable the term nano
innovation. The market-driving Pico Scope The Pico Scope 2104 and 2105 PC Oscilloscopes
programming provided with the oscilloscopes are associated with and fueled altogether by the USB
empowers investigation of voltage waveforms, port of a PC or PC. The market-driving Pico Scope
incorporates programmed estimations like programming provided with the oscilloscopes
recurrence, obligation cycle and rise time, and has empowers examination of voltage waveforms,
an assortment of trigger settings. It enables incorporates programmed estimations like recurrence,
researchers to develop new cycles that can improve obligation cycle and rise time, and has an assortment of
organic frameworks, medication, imaging, trigger settings. It permits the Pico Scope 2104 and
registering, printing, substance catalysis, materials 2105 to be utilized as: Oscilloscopes, Spectrum
union, and numerous different fields. With Pico
analyzers, Voltmeters or every one of the three
innovation we will actually want to plunge into
structures on a pico-particle level. A strand of DNA, simultaneously. The unit has an underlying test for
one of the structure squares of human existence, accommodation, and the test tip can be handily
is just around 2 nanometers in breadth, the two of supplanted when required. Additionally fused is a test
which are a lot bigger than a picometer. Drawing tip light to enlighten the region being tried ideal for those
on the regular picoscale of science, numerous difficult to-see associations.
clinical scientists are chipping away at planning
instruments, medicines, and treatments that are Special feature of Pico technology3
more exact and customized than customary ones Most of organic cycles happen at the nuclear and
and that can be applied before throughout an subatomic level. In this way, since working at the
infection and lead to less antagonistic incidental Picoscale is at the nuclear and subatomic levels, it
effects.
enables researchers to build new cycles that can
Keywords: Pico scale, Medical Imaging, Nano improve organic frameworks, medication, imaging,
Innovation processing, printing, compound catalysis, materials
INTRODUCTION blend, and numerous different fields. Pico innovation
isn't just working at much more modest measurements;
Pico innovation is a mix of pico meter and innovation, fairly, working at the picoscale empowers researchers
which is comparative the term nanotechnology. This is to use the exceptional physical, substance, mechanical,
the eventual fate of nano innovation; the pico meter is and optical properties of materials that normally happen
the trillionths of a meter in alternate manner pico scale at that scale. At the point when molecule sizes of strong
(10?12). This size is 33% of nano meter and these matter in the apparent scale are contrasted with what
significant degrees less than in the field of science can be found in a customary optical magnifying lens,
changes and estimations. It is clarifying by thought at there is little distinction in the properties of the particles.
the nuclear level. A future imaginative advancement of Yet, when particles are the size of a picometer, which is
this innovation is femto innovation it would include a trillionth of a meter (regularly addressed as 1 x 10-12
working with issue at the subatomic level. meters or completely as 0.000,000,000,001 meters)
962 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

where the particles can be seen? just with amazing picoscale of science, numerous clinical specialists are
specific magnifying instruments, the materials' properties chipping away at planning apparatuses, medicines, and
change altogether from those at bigger scopes. This is treatments that are more exact and customized than
the size scale where alleged quantum impacts rule the customary ones and that can be applied before over
conduct and properties of particles. Properties of the span of an infection and lead to less unfavorable
materials are size - subordinate in this scale range. incidental effects. One clinical illustration of Pico
Subsequently, when molecule size is made to be innovation is the bio standardized tag test, a generally
picoscale, legitimate ties like softening point, minimal expense strategy for identifying illness - explicit
fluorescence, electrical conductivity, attractive biomarkers in the blood, in any event, when there are
penetrability, and synthetic reactivity change as an not many of them in an example. The essential
element of the size of the molecule. Picoscale gold interaction, which connects ?recognition? particles and
outlines the special properties that happen at the DNA ?amplifiers? to gold picoparticles, was initially
picoscale. exhibited at Northwestern University for a prostate
Picoscale4 gold particles are not the yellow tone malignancy biomarker following prostatectomy. The
with which we are recognizable; Picoscale gold can bio-standardized tag measure has demonstrated to be
seem red or purple. At the nanoscale, the movement of impressively more touchy than customary tests for a
the gold's electrons is bound. Since this development is similar objective biomarkers, and it tends to be adjusted
confined, gold nano particles respond contrastingly with to distinguish practically any sub-atomic objective.
light contrasted with bigger - scale gold particles. Their Developing comprehension of picoscale biomolecular
size and optical properties can be put to reasonable structures is affecting different fields than medication. A
use: picoscale gold particles specifically gather in tumors few researchers are seeing approaches to utilize
where they can empower both exact imaging and picoscale natural standards of atomic self get together,
designated laser obliteration of the tumor by mean s self association, and quantum mechanics to make novel
that try not to hurt solid cells. An interesting and amazing processing stages. Different analysts have found that in
aftereffect of the quantum impacts of the picoscale is photosynthesis, the energy that plants gather from
the idea of tunability? of properties. That is, by changing daylight is almost immediately moved to plant ?reaction
the size of the molecule, a researcher can in a real sense centers? by quantum mechanical cycles with almost
fine - tune a material property of interest (e.g., changing 100% productivity (little energy squandered as
fluorescence tone; thusly, the fluorescence shade of a warmth). They are researching photosynthesis as a
molecule can be utilized to distinguish the molecule, and model for ?green energy? picosystems for economical
different materials can be labeled? with fluorescent creation and capacity of nonpolluting sun oriented force.
markers for different purposes). Another powerful Picoscale materials have far bigger surface regions than
quantum impact of the picoscale is known as comparative masses of bigger scope materials. As
?tunneling,? which is a marvel that empowers the surface region per mass of a material builds, a more
examining burrowing magnifying instrument and blaze prominent measure of the material can come into
memory for figuring. Over centuries, nature has contact with encompassing materials, along these lines
culminated the specialty of science at the picoscale. A influencing reactivity.
large number of the inward operations of cells normally Picoparticles5 have high surface region. A basic
happen at the picoscale. For instance, hemoglobin, the psychological study at the nanoscale level (which is even
protein that brings oxygen through the body, is just 5.5 a lot bigger than the picoscale level and will show
nanometers in width. A strand of DNA, one of the considerably less surface region then picoparticles)
structure squares of human existence, is just around 2 shows why nanoparticle has amazingly high surface
nanometers in measurement, the two of which are a lot regions. A strong block of a material 1 cm on a side has
bigger than a picometer. Drawing on the normal 6 square centimeters of surface region, about equivalent

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 963


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

aside of a large portion of a stick of gum. Yet, in the The capacity to use materials on the nuclear level
event that that volume of 1 cubic centimeter were loaded and the utilization of the special wonders that happens
up with blocks 1 mm on a side, that would be 1,000 on that limited scale, give a tremendous measure of
millimeter-sized solid shapes (10 x 10 x 10), every last opportunities for pretty much every field. Pico
one of which has a surface space of 6 square millimeters, innovation is one of the key advances that will
for an absolute surface space of 60 square centimeters completely change ourselves later on. With Pico
about equivalent aside of two - thirds of a 3? x 5? note innovation we will actually want to jump into structures
card. At the point when the 1 cubic centimeter is loaded on a pico-atom level. Pico innovation is an innovation
up with micrometer-sized blocks a trillion (1012) of dependent on the control of single particles and
them, each with a surface space of 6 square micrometers particles, to construction and re-structure complex
the complete surface region adds up to 6 square meters, nuclear arrangements. The size of a pico atom identifies
or about the space of the fundamental restroom in a with a b-ball contrasted with the size of the earth. At
normal house. Furthermore, when that solitary cubic the point when particles that typically clamor about
centimeter of volume is loaded up with 1 - nanometer- disorderly in materials, these are organized such that
sized 3D shapes of them, each with a space of 6 square every iota stay where it ought to be, the
nanometers their absolute surface region comes to 6,000 incomprehensible becomes conceivable. Materials get
square meters. new powers when the particles are controlled and firmly
As such, a solitary cubic centimeter of cubic organized. Pico innovation controls atoms through
nanoparticle has an absolute surface region one - third current, attraction and science, with the goal that they
bigger than a football field! So in the event that you arrange themselves.
extrapolate this surface region at the picoscale, the Pico Technology10,11:
surface region increments significantly considerably
more then for nanoparticle. Delineation exhibiting the Most of organic cycles happen at the nuclear and
impact of the expanded surface region gave by subatomic level. In this way, since working at the
nanostructure materials one advantage of more Picoscale is at the nuclear and subatomic levels, it
noteworthy surface region and further developed enables researchers to build new cycles that can
reactivity in picostructured materials is that they have improve organic frameworks, medication, imaging,
made better impetuses. Therefore, catalysis by designed processing, printing, compound catalysis, materials
picostructured materials as of now impacts around one blend, and numerous different fields. Pico innovation
- third of the tremendous U.S. also, worldwide impetus isn't just working at much more modest measurements;
markets, influencing billions of dollars of income in the fairly, working at the picoscale empowers researchers
oil and synthetic businesses. A regular illustration of to use the exceptional physical, substance, mechanical,
catalysis is the exhaust system in a vehicle, which lessens and optical properties of materials that normally happen
the poisonousness of the motor's vapor. Pico designed at that scale. At the point when molecule sizes of strong
atteries, power devices, and impetuses can conceivably matter in the apparent scale are contrasted with what
utilize improved reactivity at the picoscale to deliver can be found in a customary optical magnifying lens,
cleaner, more secure, and more manage the cost of there is little distinction in the properties of the particles.
capable methods of creating and putting away energy. Yet, when particles are the size of a picometer, which is
Enormous surface region likewise makes picostructured a trillionth of a meter (regularly addressed as 1 x 10-12
films and materials ideal contender for water treatment meters or completely as 0.000,000,000,001 meters)
and desalination, among different employments. It where the particles can be
additionally helps support ?functionalization? of ?seen? just with amazing specific magnifying
picoscale material surfaces (adding particles for explicit instruments, the materials' properties change altogether
purposes), for applications going from drug conveyance from those at bigger scopes. This is the size scale where
to apparel protection.
964 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

alleged quantum impacts rule the conduct and properties the span of an infection and lead to less unfavorable
of particles. Properties of materials are size - incidental effects. One clinical illustration of Pico
subordinate in this scale range. Subsequently, when innovation is the bio standardized tag test, a generally
molecule size is made to be picoscale, legitimate ties minimal expense strategy for identifying illness - explicit
like softening point, fluorescence, electrical conductivity, biomarkers in the blood, in any event, when there are
attractive penetrability, and synthetic reactivity change not many of them in an example. The essential
as an element of the size of the molecule. Picoscale interaction, which connects ?recognition? particles and
gold outlines the special properties that happen at the DNA ?amplifiers? to gold picoparticles, was initially
picoscale. exhibited at Northwestern University for a prostate
Picoscale4 gold particles are not the yellow tone malignancy biomarker following prostatectomy. The
with which we are recognizable; Picoscale gold can bio-standardized tag measure has demonstrated to be
seem red or purple. At the nanoscale, the movement of impressively more touchy than customary tests for a
the gold's electrons is bound. Since this development is similar objective biomarkers, and it tends to be adjusted
confined, gold nano particles respond contrastingly with to distinguish practically any sub-atomic objective.
light contrasted with bigger - scale gold particles. Their Developing comprehension of picoscale biomolecular
size and optical properties can be put to reasonable structures is affecting different fields than medication. A
use: picoscale gold particles specifically gather in tumors few researchers are seeing approaches to utilize
where they can empower both exact imaging and picoscale natural standards of atomic self get together,
designated laser obliteration of the tumor by mean s self association, and quantum mechanics to make novel
that try not to hurt solid cells. An interesting and amazing processing stages. Different analysts have found that in
aftereffect of the quantum impacts of the picoscale is photosynthesis, the energy that plants gather from
the idea of ?tunability? of properties. That is, by changing daylight is almost immediately moved to plant ?reaction
the size of the molecule, a researcher can in a real sense centers? by quantum mechanical cycles with almost
fine - tune a material property of interest (e.g., changing 100% productivity (little energy squandered as
fluorescence tone; thusly, the fluorescence shade of a warmth). They are researching photosynthesis as a
molecule can be utilized to distinguish the molecule, and model for ?green energy? picosystems for economical
different materials can be ?labeled? with fluorescent creation and capacity of nonpolluting sun oriented force.
markers for differen purposes). Another powerful Picoscale materials have far bigger surface regions than
quantum impact of the picoscale is known as comparative masses of bigger scope materials. As
?tunneling,? which is a marvel that empowers the surface region per mass of a material builds, a more
examining burrowing magnifying instrument and blaze prominent measure of the material can come into
memory for figuring. Over centuries, nature has contact with encompassing materials, along these lines
culminated the specialty of science at the picoscale. A influencing reactivity.
large number of the inward operations of cells normally Picoparticles5 have high surface region. A basic
happen at the picoscale. For instance, hemoglobin, the psychological study at the nanoscale level (which is even
protein that brings oxygen through the body, is just 5.5 a lot bigger than the picoscale level and will show
nanometers in width. A strand of DNA, one of the considerably less surface region then picoparticles)
structure squares of human existence, is just around 2 shows why nanoparticle has amazingly high surface
nanometers in measurement, the two of which are a lot regions. A strong block of a material 1 cm on a side has
bigger than a picometer. Drawing on the normal 6 square centimeters of surface region, about equivalent
picoscale of science, numerous clinical specialists are aside of a large portion of a stick of gum. Yet, in the
chipping away at planning apparatuses, medicines, and event that that volume of 1 cubic centimeter were loaded
treatments that are more exact and customized than up with blocks 1 mm on a side, that would be 1,000
customary ones and that can be applied before over millimeter-sized solid shapes (10 x 10 x 10), every last

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 965


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

one of which has a surface space of 6 square millimeters, It is a speculative term utilized concerning organizing
for an absolute surface space of 60 square centimeters of issue on the size of a femto meter, which is 10?15 m.
about equivalent aside of two - thirds of a 3? x 5? note This is a more limited size in correlation with
card. At the point when the 1 cubic centimeter is loaded nanotechnology and Pico innovation which allude to
up with micrometer-sized blocks a trillion (1012) of 10-9 m and 10-12 m separately.
them, each with a surface space of 6 square micrometers
the complete surface region adds up to 6 square meters, CONCLUSION
or about the space of the fundamental restroom in a The capacity to use materials on the nuclear level
normal house. Furthermore, when that solitary cubic and the utilization of the special wonders that happens
centimeter of volume is loaded up with 1 - nanometer- on that limited scale, give a tremendous measure of
sized 3D shapes of them, each with a space of 6 square opportunities for pretty much every field. Pico
nanometers their absolute surface region comes to 6,000 innovation is one of the key advances that will
square meters. completely change ourselves later on. With Pico
As such, a solitary cubic centimeter of cubic innovation we will actually want to jump into structures
nanoparticle has an absolute surface region one - third on a pico-atom level. Pico innovation is an innovation
bigger than a football field! So in the event that you dependent on the control of single particles and
extrapolate this surface region at the picoscale, the particles, to construction and re-structure complex
surface region increments significantly considerably nuclear arrangements. The size of a pico atom identifies
more then for nanoparticle. Delineation exhibiting the with a b-ball contrasted with the size of the earth. At
impact of the expanded surface region gave by the point when particles that typically clamor about
nanostructure materials one advantage of more disorderly in materials, these are organized such that
noteworthy surface region and further developed every iota stay where it ought to be, the
reactivity in picostructured materials is that they have incomprehensible becomes conceivable. Materials get
made better impetuses. Therefore, catalysis by designed new powers when the particles are controlled and firmly
picostructured materials as of now impacts around one organized. Pico innovation controls atoms through
- third of the tremendous U.S. also, worldwide impetus current, attraction and science, with the goal that they
markets, influencing billions of dollars of income in the arrange themselves. Nature
oil and synthetic businesses. A regular illustration of REFERENCES
catalysis is the exhaust system in a vehicle, which lessens 1. Sharma1, Rakesh; Sharma, Avdhesh; Chen, Ching J. (14 November
the poisonousness of the motor's vapor. Pico designed 2011). "Emerging Trends of Nanotechnology towards Pico
atteries, power devices, and impetuses can conceivably technology: Energy and Biomolecules". Nature Precedings.
doi:10.1038/npre.2010.4525.1. Retrieved 4 November2012.
utilize improved reactivity at the picoscale to deliver
cleaner, more secure, and more manage the cost of 2. Shalmi, M., Kibble, J. D., Day, J. P., Christensen, P. &Atherton,
capable methods of creating and putting away energy. J. C. American Journal of Physiology 267, F695-701,1994.
Enormous surface region likewise makes picostructured 3. Nitkin PI, Gorshkov BG, Nitkin EP, Ksnevich TI. Sensors and
films and materials ideal contender for water treatment Actuators B: Chemical 111-112, 11; 500- 504,2005.
and desalination, among different employments. It 4. Skoog L. Eur J Biochem. 17:202-2-8, 1970.
additionally helps support functionalization? of picoscale 5. Thompson JW, Cummings M. Acupuncture in Medicine. 09
material surfaces (adding particles for explicit purposes), Mar, 2009.
for applications going from drug conveyance to apparel 6. Drake, F. D. "Life on a Neutron Star," Astronomy, p. 5,
protection. December1973.

966 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Characterization and Therapeutical Study for Leaf


Extract of Phyllanthus Niruri (Bhumi Amla),
Assessment of Silver Nanoparticles (AgNP) Synthesis
and Comparative in-Vitro Studies of Extract+AgNP
Debasish Sahoo1, Tanushree Chatterjee2, Navita Gupta3, Bhawna Pandey4,
Virendra Kumar Vaishnav5,Rajat Kumar Nayak6
1,5
PhD. Scholar, Dept. of Biotechnology Chhattishgarh Swami Vivekanand Technical University (CSVTU) Bhilai,
Chhattishgarh
2
Department of Biotechnology Raipur Institute of Technology, RITEE, Mandir Hasaund Raipur, Chhattishgarh.
3
Department of Life sciences Binod Bihari Mahato Koylanchal University (BBMKU) Dhanbad, Jharkhand
4
Dept. of Biotechnology Bhilai Mahila Mahavidyalaya Sector 9, Hospital sector Bhilai, Chhattishgarh
6
Research Associate Department of Life Science niTza Bioventure Bhubaneswar, Odisha
Email: sahoodebasish3125@gmail.com1, tanushree52004@yahoo.com2, navitagupta_bksc@yahoo.co.in3
bhawanapandey15@gmail.com4,virendravaishnav7@gmail.com5,nayak2014rajat@gmail.com6

Abstract- Phyllanthus niruri (Bhumi amla) has Phyllanthus were utilized as herbal formulations for
extensive medicinal properties and has long history centuries in many southeast Asian countries, Brazil,
in the health care system of tropical countries. The India and China [1]. The extracts of Phyllanthus amarus
plant is known in traditional health care systems.
(P. amarus) show good antioxidant activity, along with
P.niruri is commonly known as "Chancapedra" (or)
antibacterial potential, particularly in conditions including
"stone breaker". Little research has been carried
out regarding its pharmacological importance. diarrhoea, dysentery, dropsy, running nose, winter
Present study is based on the Qualitative analysis common colds, blennorrhagia, colic, indigestion,
of different phytochemical, Quantitative estimation alternating fevers, hepatitis, and malaria [2,3].
of Flavonoids, Phenolics and Tannin, In-vitro Phyllanthus niruri L. (P. niruri) has been extensively
analysis such as antimicrobial, antioxidant reported in traditional and folk medication systems to
properties and anti-inflammatory activity, green treat various diseases including asthma, joint pains, loss
synthesis of silver nanoparticles from the extracts of appetite, constipation, injuries, corneal opacity,
and characterization and study of antimicrobial conjunctivitis, diabetes mellitus, dropsy, gout, gonorrheal
activity for extract and nanoparticle. dieases of males and females, inflammatory diseases,
Keywords- Phyllanthus niruri (Bhumi amla), skin itching, hepatic disorders, kidney stones or failures,
Qualitative analysis, Quantitative estimation, leucorrhea, vaginitis, menorrhagia, irregularities in
Green synthesis, In-vitro analysis, AgNP. menstrual cycles in females, obesity, scabies, stomach
I. INTRODUCTION pains, tumors, typhoid fever, urinogenital disorders viral
infections and many more [4].
Phyllanthus is one of the largest genus in the family
Phyllanthaceae, with 11 sub-genus that comprise over II. MATERIALAND METHODOLOGY
700 well known species and are cosmopolitan in A. Sample collection
distribution, mainly in the tropics and subtropics [1].
Most important species traditionally used for treatment The plant sample of Phyllanthus niruri (Bhumi amla)
of various human ailments belonging to the sub-genuses was collected from the tribal areas such as Koraput
Cicca, Kirganelia nd Phyllanthus. Plants of the genus and Malkangiri region of Odisha state during the months

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 967


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

of October and November. The plant sample was G. Standard Calibration Curve
washed properly first with distilled water and then by
Total Flavonoids, Total Alkaloid, Total Phenolics,
saline solution (10% Sodium chloride) solution. Again
Total Tannin were estimated from Quercetin standard
the sample was washed with distill water and the leaves
calibration curve, Atropine standard calibration curve,
were collected by sterile handling.
Gallic acid standard calibration curve, Tannic acid
B.Extract preparation standard calibration curve respectively. The quantitative
estimation were expressed as µg/mg extract equivalent
Leaf sample of Phyllanthus niruri (Bhumi amla) was of Quercetin, µg/mg extract equivalent of Atropine, µg/
washed properly, dried in shade and was milled to mg extract equivalent of Gallic acid, µg/mg extract
reduce size. Hydro-alcoholic and acetone plant extract equivalent of Tannic acid respectively.
was prepared by using Water : Ethyl alcohol (60:40)
and 100% acetone respectively. After 48hours, the H. Invitro studies
mixture was filtered by Whatman No.1 filter paper. The (1) Anti-microbial Study- Well diffusion method
filtrate was collected as crude plant extract [5].
The antibacterial activity of the different extracts was
C.Endophytic fungus isolation determined in accordance with agar-well diffusion
Endophytic Fungus was isolated from young disease method [16-17].
free leaves by Water agar (16% Bacteriological grade (2) Anti-oxidant-DPPH Radical Scavenging Assay
Agar Agar) media and the metabolites were isolated The antioxidant activity was measured in terms of
by culturing the endophytic fungus in Potato dextrose radical scavenging (stable radical DPPH) ability of plant
broth (pH-5.9,30°C ,70 r.p.m. / min) and after leaf extracts. The DPPH radical scavenging ability of
incubation for about 10 days, the extract was extracted leaf extracts was carried out according to the method
out using ethyl acetate (organic top layer) [6-9]. described by Blois et al., 1958 with a slight modification
D.Dessication of extract and Reconstitution [18].
(3) Anti-oxidant-Phophomolybdate Assay
The extract was then dried using Vacumn evaporator
[10]. The hydro-alcoholic extract and acetone extract The total antioxidant capacity of leaf extracts was
leaf and esterified extract of endophytic fungus were determined by phosphomolybdate assay [19-20].
reconstituted to final concentration of 1mg/ml by (4) Anti-inflammatory assay- Albumin Denaturation assay
dissolving dried extract with Dimethyl Sulphoxide
(DMSO). In vitro anti-inflammatory activity of Phyllanthus niruri
(Bhumi amla) leaf extracts was determined by using
E. Qualitative screening of Phytochemicals inhibition of albumin denaturation assay was carried out
The presence of alkaloids, flavonoids, glycosides, according to the method described by Mizushima, M.,
carbohydrate, saponins, tannins and terpenoids can et al 1968 [21] and Sakat, S., et al 2010 [22] with
tested qualitatively using the standard procedures to some modifications.
identify the presence or absence of the phyto- I. FT-IR analysis
constituents. Every test is done in triplicates [11].
FTIR analysis was carried out to determine
F.Quantitative estimation of Phytochemicals functional groups of phyto-compounds present in the
(1) Quantitative analysis leaf extracts of the plant. FTIR analysis was measured
at room temperature using the Potassium Bromide
The quantitative analysis was carried out for Alkaloid (KBr) pellet technique in the range of 400-4000 cm-1
content [12], Flavonoid [13], Phenolic content [14], [23].
and Tannin content [15].

968 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

J. HPLC analysis-Qualitative Carbohydrates with respect to the hydro-alcoholic and


acetone extract.
The qualitative compound profiling was carried out
by Normal High Performance Chromatographic ii. The esterified extract of endophytic fungus isolated
(Normal HPLC) procedure to find out different from leaf contain Flavonoids, Phenols, Tannins,
Saponins, Steroids, Carbohydrates, Glycosides and
compounds resolute into constituent fraction having
Amino acids.
different retention time and peak area [24].
B. Quantitative Estimation of phytochemicals
K. Green Synthesis of Silver Nano Particles
i. Quantitative estimation for Alkaloid (µg Atropine A/
Aqueous solution of Silver nitrate solution was mg extract), Flavonoid (µg Quercetin QE/mg extract)
prepared. Aqueous leaf extract (1 part) mixed with of (Aluminum chloride method), Phenol (µg Gallic acid
1mM aqueous silver nitrate solution (9 part). The mixture GA/mg extract) (Folin-Ciocalteu method) and Tannin
was heated in hot water bath for 30minutes-45minutes (modified Folin-Ciocalteu method) was analysed by
at 70°C-80°C [25-27]. colorimetric method using standard calibration curve
(1) Analysis of Nanoparticle formation
of Atropine (A) Quercetin(QE), Gallic acid(GA) and
Tannic acid(TA) respectively.
Change in coloration of the mixture into yellowish
ii. The Total Alkaloid content for Hydroalcoholic,
brown or reddish brown confirms production of silver
Acetone leaf extract and Esterified extract from
nanoparticles [26-27]. endophytic fungus were 02.18±0.15 µgA/mg extract,
(2) Purification of Silver nanoparticle 01.12±0.28 µ gA/mg extract, 0.91±0.69µgA/mg
extract respectively.
The mixture was then centrifuged at 6000rpm for
1hour at 4°C. After centrifugation the supernatant was iii. The Total Flavonoid content for Hydroalcoholic,
discarded. The pellet was again washed with distilled Acetone leaf extract and Esterified extract from
water to remove any contaminants or plant material. endophytic fungus were 16.18±0.05 µ gQE/mg
extract, 12.36±0.08 µ gQE/mg extract,
Again it is centrifuged at 6000 rpm for 30 minutes. The
5.29±0.60µgQE/mg extract respectively
pellet was collected and the supernatant was discarded
[28-29]. iv. The Total Phenolic content for Hydroalcoholic,
Acetone leaf extract and Esterified extract from
(3) Confirmation of Silver nanoparticle formation by
endophytic fungus were 12.45±0.01 µ gGA/mg
Spectral analysis
extract, 06.49±0.01µ gGA/mg extract and
Absorbance Peaks were observed in the spectral 02.98±0.01µgGA/mg extract respectively.
analysis from 420nm-450nm that corresponds to the v. Total Tannin content for Hydroalcoholic, Acetone leaf
formation of Silver nanoparticles [30-31]. extract and Esterified extract from endophytic fungus
(4) In-vitro studies were 2.37±0.07µgTA/mg extract, 1.14±0.29µgTA/mg
extract and 0.58±0.37µgTA/mg extract respectively.
In-vitro studies (Hydro-alcoholic Extract + Ag-NP):
Antimicrobial activity study (well diffusion method) [16- C. FT-IR Spectral analysis- Identification of
17], Anti-oxidant activity study (DPPH assay [18], functional group
phosphomolybdate assay [19-20]), Anti-inflammatory
FTIR analysis of Hydro-alcoholic leaf extract of
activity (albumin denaturation assay) [21-22].
Phyllanthus niruri shows characteristic absorption bands
III. RESULTS at 3748 cm-1 for hydroxyl (-OH) group, 3447 cm-1
for an amine (-NH) group, the band at 2924 cm-1 is
A. Qualitative analysis due to C-H stretching. Absorption band at 1738 cm-1
(i) Qualitative analysis of phyto-constituents revealed confirms the presence of carbonyl group (C=O) as
presence of Alkaloids, Flavonoids, Phenols, Tannins, shown in Fig. 1 and Table 1.
Terpenoids, Saponins, Steroids, Glycosides,
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 969
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

ii. The synthesis of Silver Nano-particles is observed


by change in the color of the (Extract+Silver nitrate)
solution from transparent/pale yellow color to reddish
brown to brownish (Extract+AgNP) in color as
observed in Fig. 3.

Fig. 1. FT-IR spectrum


Table 1:Ft-ir Spectrum Functional Group Characterization.

Wave number (cm-1) Functional group


3784.50 -O-H group Fig. 3 Screening for green synthesis of Silver nanoparticles.
3447.91 -N-H group Hydro-alcoholic extract gave positive for potential to
2924.21 C-H stretching synthesize silver nano-particle
1738.90 C=O carbonyl group
1450.93 C-H bending F. Characterization of Silver nano-particles
1377.23 C-H bending
626.89 C-O stretching (AgNP) Production
449.43 C-O stretching
i. The Ag-NP was purified by continuous centrifugation,
D. HPLC Analysis-Qualitative study collecting and washing pellet that contained Ag-NP.

Normal phase HPLC for the extract was done with ii. The Absorbance Peaks were observed in the spectral
analysis between 420nm-450nm that corresponds to
isocratic mobile phase system where 24 different peaks
the formation of Silver nanoparticles.
at different Retention time (Rt) were determined from
the chromatogram as demonstrated in Fig. 2. G. Morphology study by Transmission Electron
Microscope
i. The Morphology of the Silver nano-particles are highly
variable.
ii. The assemblies were found to be aggregated of Silver
nano-particle (Ag-NP) in the range 25nm-70nm as
shown in Fig. 4.

Fig. 2. HPLC chromatogram

E. Green Synthesis of Silver Nano particles


i. The hydro-alcoholic plant extract had the capacity
for green synthesis of nontoxic silver nanoparticles
(Ag-NP) from Silver nitrate (toxic Ag+) which has
Fig. 4. Assemblies for aggregated of Synthesized Silver nano-
been through the catalytic effect of the metabolites particle (Ag-NP).
or enzymes present in the extract.

970 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

H. In-vitro assay: (4) Anti-inflammatory- Albumin denaturation assay:


i. Anti-inflammatory activity was studied using
(1) Antimicrobial assay:
Indomethacin as standard. The anti-inflammatory
i. The Hydro-alcoholic extract and acetone extract have
activity for standard was 78.34%±0.95%.
antimicrobial activity against pathogens such as E.
coli, Staphylococcus, Pseudomonas, Aspergillus niger, ii. The anti-inflammatory activity for hydro-alcoholic
Aspergillus flavus, Candida sp. extract and Acetone extract of Leaf sample and
esterified extract of endophytic fungus were found
ii. No significant antimicrobial activity was found in
to be 61.65%±0.20%, 42.85%±0.89%, and
esterified extract from endophytic fungus.
28.65±0.45% respectively.
iii. Studies for Hydroalcoholic Extract + Ag-NP also
iii. The anti-inflammatory property of purified Silver
revealed increase in antimicrobial activity (increase
nanoparticles was 18.63%±0.58% whereas for
in zone of inhibition) for E.coli, Pseudomonas,
Hydroalcoholic Extract + Ag-NP was found
Salmonella, Aspergillus niger and Aspergillus flavus
66.99%±0.75%.
and gain of antimicrobial activity against
Staphylococcus sp. and Candida albicans. iv. There is 8.5% (approx.) increase in activity of
Hydroalcoholic Extract + Ag-NP as compared to
(2) Anti-oxidant assay-DPPH assay:
Hydroalcoholic Extract alone.
i. The percentage of inhibition by DPPH assay for
standard ascorbic acid was 87.56±0.17%. IV. FUTURE STUDIES
ii. The percentage of inhibition for hydro-alcoholic i. Further studies will enable identification of
extract and Acetone extract of leaf sample and compounds from hydro-alcoholic extracts) by Mass
esterified extract of endophytic fungus found Spectroscopic method.
44.33%±0.18%, 57.49%±0.06% and 14.03±0.03%
respectively. ii. These identified compounds along with commercially
available API (standards) are to be studied and
iii. The antioxidant property of purified Silver determined for their anti-inflammatory activity
nanoparticles was 04.63%±0.58% whereas for (Docking studies) against molecular targets such as
Hydroalcoholic Extract + Ag-NP was found COX-2 (PDB ID: 4COX) and IL1? (PDBID: 1T4Q),
64.89%±0.26%. IL6 (PDBID: 19PM), TNF? (PDBID: 2AZ5), that
iv. There is 12.5% (approx.) increase in activity of plays the crucial role in inflammations whose 3D
Hydroalcoholic Extract + Ag-NP as compared to structures were retrieved from RCSB-PDB database
Hydroalcoholic Extract alone. [32].
(3) Anti-oxidant assay-Phosphomolybdate assay: iii. Ligand generation (Ligand sketch) will be carried out
i. The percentage of inhibition by Phosphomolybdate using some standalone software or online ligand
assay for standard ascorbic acid was 49.26%±0.85%. generation tools available.
ii. The percentage of inhibition for hydro-alcoholic iv. Flexible docking of ligands will be carried out by using
extract and Acetone extract of leaf sample and AutoDock Vina tool [33]. The comparative docking
esterified extract of endophytic fungus found interactions shall be studied using visualization
34.47%±0.20%, 23.06%±0.87%, and 00.00±0.00% software available.
(didn't determined) respectively.
V. CONCLUSION
iii. The antioxidant property of purified Silver
nanoparticles was 03.93%±0.33% whereas for Exploring new prospect in extraction, purification,
Hydroalcoholic Extract + AgNP was found analysis and down-stream process can give new insight
38.25%±0.23%. to new drug chemistry and pharmacological aspects.
iv. There is 11.0% (approx.) increase in activity of Phyllanthus niruri (Bhumi amla) can be potential drug
Hydroalcoholic Extract + AgNP as compared to against many pathogen that are Multi drug resistance,
Hydroalcoholic Extract alone. anti-inflammatory and anti-oxidant. The Leaf extract
has the potential for green synthesis of silver
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 971
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

nanoparticles. The silver nanoparticles had increased uniflora Linn. Pharmacognosy Res. 2017;9(3):253-260.
doi:10.4103/pr.pr_143_16.
the potential and efficiency of the pharmacological aspect
of the extract. 14. Amarowich, R., Weidner, S. (2009) Biological activity of
grapevine phenolic compounds. In: Roubelakis-Angelakis, K.
A. (ed.) Grapevine Molecular Physiology and Biotechnology.
REFERENCES Springer Science+Business Media B.V., pp. 389-405.
1. Mao, X.; Wu, L.F.; Guo, H.L.; Chen, W.J.; Cui, Y.P.; Qi, Q.; Li, 15. Polshettiwar SA, Ganjiwale RO, Wadhaer SJ, Yeole PG.
S.; Liang, W.Y.; Yang, G.H.; Shao, Y.Y. The genus Phyllanthus: Spectrophotometric estimation of total tannins in some ayurvedic
An ethnopharmacological, phytochemical, and pharmacological eye drops. Indian Journal of Pharmaceutical Sciences, 69.4, 2007,
review. Evid. Based Complement. Altern. 2016, 2016, 1-36. 574.
[CrossRef]
16. Balouiri M, Sadiki M, Ibnsouda SK. Methods for in vitro
2. Devi, S.; Kumar, D.; Kumar, M. In-Vitro antioxidant activities of evaluating antimicrobial activity: A review. J Pharm Anal. 2016 ;
methanolic extract of whole plant of Phyllanthus amarus 6(2) : 71-79. doi:10.1016/j.jpha.2015.11.005.
(Euphorbiaceae). Int. J. Bot. Stud. 2016, 1, 30-32.
17. Khond M, Bhosale JD, Arif T, Mandal TK, Padhi MM, Dabur
3. Devi, S.; Kumar, M. In vitro Antioxidant potential of methanolic R. Screening of some selected medicinal plants extracts for in-
extract of whole plant of Phyllanthus amarus Schum vitro antimicrobial activity. Middle-East J Sci Res 2009; 4(4):
(Euphorbiaceae). Int. J. Bot. Stud. 2017, 2, 100-102. 271-278.
4. Kaur, B.; Kaur, N.; Gautam, V. Evaluation of anti- elicobacter 18. Brand-Williams W, Cuvelier ME, Berset C: Use of free radical
pylori (DSMZ 10242) activity and qualitative analysis of method to evaluate antioxidant activity. Lebensmittel-
quercetin by HPLC in Phyllanthus niruri linn. World J. Pharm. Wissenschaft und-Technol 1995, 28:25-30.
Pharm. Sci. 2016, 5, 1691-1706.
19. Bursal E, Gulcin I: Polyphenol contents and in vitro antioxidant
5. B Harborne: A Guide to modern techniques of plant Analysis. activities of lyophilized aqueous extract of kiwifruit (Actinidia
USA: Kluwer Academic Publisher, 1998. deliciosa). Food Res Int 2011, 44:1482-1489.
6. K. Shrestha, G. A. Strobel, S. P. Shrivastava, and M. B. Gewali, 20. Kumaran A, Karunakaran R. Anti oxidant and free radical
"Evidence for paclitaxel from three new endophytic fungi of scavenging activity of an aqueous extracts of Coleus aromaticus.
Himalayan Yew of Nepal," Planta Medica, vol. 67, no. 4, pp. Food chemistry 2006; 97: 109-114.
374-376, 2001.
21. Mizushima Y, Kobayashi M. Interaction of anti-inflammatory
7. J. Crozier, S. E. Thomas, M. C. Aime, H. C. Evans, and K. A. drugs with serum proteins, especially with some biologically
Holmes, "Molecular characterization of fungal endophytic active proteins. J Pharm Pharmacol. 1968 Mar;20(3):169-73.
morphospecies isolated from stems and pods of Theobroma doi: 10.1111/j.2042-7158.1968.tb09718.x. PMID: 4385045.
cacao," Plant Pathology, vol. 55, no. 6, pp. 783-791, 2006.
22. Sakat S, Juvekar AR, Gambhire MN (2010). In vitro antioxidant
8. Y. Huang, J. Wang, G. Li, Z. Zheng, and W. Su, "Antitumor and and anti-inflammatory activity of methanol extract of Oxalis
antifungal activities in endophytic fungi isolated from corniculata Linn. I. J. Pharm. Pharm. Sci., 2(1): 146-155.
pharmaceutical plants Taxus mairei, Cephalataxus fortunei and
Torreya grandis," FEMS Immunology and Medical Microbiology, 23. Berthomieu, Catherine & Hienerwadel, Rainer. (2009). Fourier
vol. 31, no. 2, pp. 163-167, 2001. transform infrared (FTIR) spectroscopy. Photosynthesis
research. 101. 157-70. 10.1007/s11120-009-9439-x.
9. S. Phongpaichit, J. Nikom, N. Rungjindamai et al., "Biological
activities of extracts from endophytic fungi isolated from Garcinia 24. Malviya, Rishabha & Bansal, Vvipin & Pal, Om & Sharma,
plants," FEMS Immunology and Medical Microbiology, vol. 51, Pramod. (2010). High performance liquid chromatography: A
no. 3, pp. 517-525, 2007. short review. Journal of Global Pharma Technology. 2. 22-26.
10. D. Xevgenos, P. Michailidis, K. Dimopoulos, M. Krokida & M. 25. Veisi, H.; Azizi, S.; Mohammadi, P. Green synthesis of the silver
Loizidou (2015) Design of an innovativevacuum evaporator nanoparticles mediated by Thymbra spicata extract and its
system for brine concentration assisted by software tool application as a heterogeneous and recyclable nanocatalyst for
simulation, Desalination and Water Treatment,53:12, 3407-3417. catalytic reduction of a variety of dyes in water. J. Clean. Prod.
2018, 170, 1536-1543.
11. Kokate CK, Purohit AP, Gokhale SB (1995). Pharmacognosy,
3rd edition, Nirali Prakashan, Pune, India. 26. Saratale, R.G.; Saratale, G.D.; Shin, H.S.; Jacob, J.M.;
Pugazhendhi, A.; Bhaisare, M.; Kumar, G. New insights on the
12. Fazel Shamsa, Hamidreza Monsef, Rouhollah Ghamooshi and green synthesis of metallic nanoparticles using plant and waste
Mohammadreza Verdian-rizi Spectrophotometric determination biomaterials: Current knowledge, their agricultural and
of total alkaloids in some Iranian medicinal plants, Thai J.Pharm. environmental applications. Environ. Sci. Pollut. Res. 2018, 25,
Sci. 32 (2008) 17-20. 10164-10183.
13. Ramos RTM, Bezerra ICF, Ferreira MRA, Soares LAL. 27. Gnanadesigan, M.; Anand, M.; Ravikumar, S.; Maruthupandy,
Spectrophotometric Quantification of Flavonoids in Herbal M.; Vijayakumar, V.; Selvam, S.; Dhineshkumar, M.; Kumaraguru,
Material, Crude Extract, and Fractions from Leaves of Eugenia

972 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A. Biosynthesis of silver nanoparticles by using mangrove plant 31. Menges, N. The Role of Green Solvents and Catalysts at the
extract and their potential mosquito larvicidal property. Asian Future of Drug Design and of Synthesis. Green Chem. 2017.
Pac. J. Trop. Med. 2011, 4, 799-803.
32. Berman, Helen & Westbrook, John & Feng, Z & Gilliland, Gary
28. De Marco, B.A.; Rechelo, B.S.; Tótoli, E.G.; Kogawa, A.C.; & Bhat, Talapady & Weissig, Helge & Shindyalov, I.N. & Zhuang,
Salgado, H.R.N. Evolution of green chemistry and its Pelion. (2000). The Protein Data Bank. Nucleic acids research.
multidimensional impacts: A review. Saudi Pharm. J. 2019, 27, 1- 28. 235-42.
8. [PubMed]
33. Trott, Oleg and A. Olson. "AutoDock Vina: Improving the speed
29. Hurst, G.A. Systems thinking approaches for international green and accuracy of docking with a new scoring function, efficient
chemistry education. Curr. Opin. Green Sustain. Chem. 2020, optimization, and multithreading." Journal of Computational
21, 93-97. Chemistry 31 (2010): n. pag.
30. Falcone, P.M.; Hiete, M. Exploring green and sustainable
chemistry in the context of sustainability transition: The role of
visions and policy. Curr. Opin. Green Sustain. Chem. 2019, 19,
66-75.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 973


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Study of Municipal Sewage Water Treatment from


Khan River (Indore, MP) by using Fenton Process
Method
Aditya Narela
School of Sciences IGNOU, NEW DELHI
Email: arunroyas@gmail.com

Abstract - In this era the enemy of human various governing agencies have laid sewers as the
population is pollution and water pollution is one development of the city progressed.
of the most responsible for many hazards. As the
population of Indore is going so fast, Indore is also 1.2 Pollution And Environmental Concerns
dealing with this problem and the prime example
Khan has turned into a sewage dump yard, where
of this is Khan river. Large amount of waste water
is the major concern of this product. Fenton many industries and municipal sewage have been
Reaction applied to the treatment of municipal dumping solid as well as liquid wastes into it, since the
sewage water. The importance of water treatment rapid industrialization in the70s.
to the environment is discussed, followed by the As an additional load, the household drainage is also
benefits and limitations of treatment technique. dumped into the Kahn without any purification or
Chemical fundamentals are focused on the
cleaning.
generation of hydroxyl radicals. This method is
based on the use of radical generators like There have been several attempts to clean the river
hydrogen peroxide, Fenton's reagent. since 1985, but none of them have materialized till date.
The aim of study is to treat the water of municipal 1.3 Need of the Project
sewage by Fenton reaction for the reduction of
chemical oxygen demand(COD) and biological Indore city is expanding leaps and bound. It is one
oxygen demand(BOD). of the fastest growing metropolitan cities in India. It's
Index Terms - Pollution, Fenton reaction, developed industrial sector and the growing IT sector
BOD, COD draws a large group of people and business to settle In
the city, temporarily or permanently. This is creating a
1. INTRODUCTION growing demand for urban infrastructure, especially for
About Khan River water supply and sanitation.
• On account of economic feasibility our project is
The river Khan or Kahn as it is now known is a
sustainable.
river flowing through Indore, the commercial capital of
the Indian state of Madhya Pradesh. It doesn't contain • Efficient cleaning of sewage waste water for
freshwater but instead has become polluted over the household use.
course of time carries sewage due to pollution. The stretch from Krishnapura bridge to Khatipura
bridge the river is almost in septic condition throughout.
1.1 Present Status of the Sewerage System
The river is used as a ravine through which only
The sewerage system of Indore has first conceived domestic and industrial wasteflows.
in the year 1936 by the erstwhile Holkars for a
In concern to the environment. Despite large
population of 1.5 lakhs and may have covered about
supplies of fresh water and the natural ability of water
10% of the core city area of 134sq.km. Subsequently,

974 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

to cleanse itself over time, populations had become so 1.5 Secondary Treatment
concentrated by 1850 that outbreaks of life-threatening After primary treatment, wastewater still contains
diseases were traced to bacteria in the polluted water. solid materials either floating on the surface, dissolved
Since that time, the practice of wastewater collection in the water, or both. Under natural conditions, these
and treatment has been developed and perfected, using substances would provide food for such organisms as
some of the most technically sound biological, physical, fungi, algae, and bacteria that live in a stream or lake.
chemical, and mechanical techniques available. As a Most public wastewater treatment plants now
result, public health and water quality are protected provide a second stage of treatment known as
better today than ever before. secondary treatment to remove more of the pollutants-
The modern sewer system is an engineering marvel. -up to 85 or 90 percental together.
Homes, businesses, industries, and institutions Secondary treatment is largely a biological process.
throughout the modern world are connected to a Air is supplied to stimulate the growth of bacteria and
network of below-ground pipes which transport other organisms to consume most of the waste materials.
wastewater to treatment plants before it is released to The wastewater is then separated from the organisms
the environment. Wastewater is the flow of used water and solids, disinfected to kill any remaining harmful
from a community. As the name implies, it is mostly bacteria, and released to a nearby lake, river, or stream.
water; a very small portion is waste material.
1.6 Emerging Technologies in waste Water
At a typical wastewater plant, several million gallons
Treatment
of wastewater flow through each day -- 50 to 100
gallons for every person using the system. The amount • DUCKWEED-POND TECHNOLOGY- The
of wastewater handled by the treatment plant varies duckweed based waste water treatment system in
conjuction with pisco culture is one such technology
with the time of day and with the season of the year. In
that has the potential of offering effective waste water
some areas, particularly communities without separate treatment beside providing economic returns as well
sewer systems for wastewater and runoff from rainfall, as generating employment opportunities in the ruler
flow during particularly heavy rains or snowmelts can areas. The duckweed is small free floating aquatic
be much higher than normal. plant often seen growing in thick mats on nutrient
What happens in a wastewater treatment plant is rich fresh and brackish waters in tropical and
essentially the same as what occurs naturally in lake or semitropical climate all over the world.
stream. The function of a wastewater treatment plant is • VERMICULTURE TECHNOLOGY- this
to speed up the process by which water cleanses technology is emerging as an environmentally
(purifies) itself. sustainable, economically viable and socially
acceptable technology all over the world. It may be
A treatment plant uses a series of treatment stages of the from: Vermi-composting technology (To
to clean up the water so that it may be safely released manage most organic wastes); vermin-filtration
into a lake, river, or stream. Treatment usually consists technology (To treat municipal and several industrial
of two major steps, primary and secondary, along with waste water); Vermi-radiation technology (to treat
a process to dispose of solids (sludge) removed during and clean up contaminated lands)
the two steps. • CONSTRUCTED WETLANDS - They are
engineered systems that use natural functions,
1.4 Primary Treatment
vegetations, soil to treat waste water. Constructed
In primary treatment, sand, grit, and the larger solids wetlands have been used to treat both centralized
in the wastewater are separated from the liquid. and on site wastewater.
Screens, settling tanks, and skimmering devices are • SOLAR DRYING OF SEWAGE SLUDGE -using
most commonly used for the separation. Primary heat to evaporate water from sludge. This method,
treatment removes 45 to 50 percent of the pollutants.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 975
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

first developed by researchers in Germany, reduces Unlike conventional technologies which use strongly
the mass and volume of dewatered solids resulting in oxidant species, under certain conditions AOPs can
a product that can be used as a low-grade fertilizer. provides the complete mineralization of pollutants;
Compared to established technologies, solar drying
can significantly reduce fuel requirements compared Used for the destruction of refractory compounds
to conventional dryers. Its disadvantages are that it resistant to other treatments, such as biological
does have a large footprint and needs days with processes;
sufficient solar heating. (I've also provided an article
from The Guardian about this technology.) Allow the conversion of recalcitrant compounds and
refractory contaminants submitted to bio-degradation
1.7 Impact Of Waste Water Effluent On systems;
• Color in effluent- Color from municipal waste water
can cause significant aesthetic problem.The reductive It can be used in combination with other processes
anaerobic process would cleave azo dyes while the for pre-or post- treatment;
aerobic process would oxidize fragments.
Possess strong oxidizing power with high reaction
• Presence of heavy metals- The possible sources rates;
for some metals present in the wastewater is the
presence of trace metals in processing chemicals such The formation of by-products can be minimized if
as sodium hydroxide, sodium carbonates, salt,etc. It optimized amounts of reactants are employed;
is difficult to judge how current trace metal removal
technologies could reduce concentration to the In many cases, AOPs consume less energy
prescribed standards. Source reductions appears to compared to thermal destruction processes
be the only solution in achieving the trace metal level (incineration) of liquid waste waters.
in the wastewater effluents. The method of treating 1.8.1 Fenton's Reaction: H.J.H Fenton discovered in
the khan river's water and reducing BOD value and 1894 that several metals have a special oxygen
COD value will be the Fenton's reaction transfer properties which improve the use of hydrogen
• Total suspended solids (TSS) peroxide. Actually, some metals have a strong catalytic
• It is a water quality parameter used to assess the power to generate highly reactive hydroxyl radicals
quality of a specimen of any type of water or water (.OH). Since this discovery, the iron catalyzed
body after treatment in a wastewater plant. hydrogen peroxide has been called Fenton's reaction.
Nowadays, the Fenton's reaction is used to treat a
• Total dissolved solids is another parameter
large variety of water pollution such as phenols,
acquired through a separate analysis which is also
formaldehyde, BTEX, pesticides, rubber chemicals
used to determine water quality based on the total
and soon.
substances that are fully dissolved within the
water. 1.8.2 Applications of the Fenton's reaction: This
process may be use to wastewater, contaminated soils
1.8 Brief About Fenton Reaction and sludges with the following actions:
Treatment methods vary with the wastewater
• Organic pollutant destruction
characteristics. In economic point of view, the most
economical and efficient methods are preferable • Toxicity reduction
compare to the other. Chemical methods, biological
• Bio-degradability improvement
methods and physical methods are the general treatment
that are being used and further investigations by • BOD/COD removal
researchers proves that chemical methods are the most • Odor and color removal
efficient and economical compare to the other two
methods. In general, the following are positive aspects • Destruction of resin in radioactive contaminated
of Fenton: sludge

976 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

2. METHODOLOGY ml. Small amount of HgSO4 powder was added. 10ml


of K2Cr2O7 was added, and then 30ml of sulphuric
How does the Fenton's reaction work?
acid - silver sulphate reagent was added slowly with
After addition of the iron and the hydrogen peroxide, periodic stirring. The COD sample will then refluxed
they are going to react together to generate some for 2 hours at 150°C. The sample is then cooled and
hydroxyl radicals as it shows in the following equations: titrated with FAS using ferrous indicator solution. The
Fe2+ +H2O2 ----> Fe3+ + .OH +OH- color change at the end point is blue green to wine red.
Fe3+ +H2O2 ----> Fe2+ + .OOH + H+ BOD
The typical range for the iron dose is 1 part of Fe BOD is the measure amount of oxygen required for
per 5-25 parts of H2O2. biological oxidation of the organic matter under aerobic
After that the hydroxyl radicals are going to react condition at 20°C and for a period of 5 days and is
with the pollutants to oxidize. directly related to the extent of pollution of wastewater,
sewage and industrial effluent.
Electrode Preparation
Procedure
The Aluminium electrode plates were procured from
1. 20 ml of water sample is taken in BOD bottle.
the local suppliers and cut into the required shape,
degreased manually. The Aluminium plates having 2. Add 1 ml of MnSO4 solution followed by 1 ml Alkali-
dimensions 70mm*80mm*1.5mm (thick) were used. Iodide-Azide reagent.
3. Now add 1 ml of Conc. Sulfuric Acid.
Parameters to be assessed
4. Add 2-3 drops of starch as indicator.
COD (Chemical Oxygen Demand)
5. Titrate with 0.25 N Sodium thiosulphate till the blue
BOD (Biological oxygen demand) color disappears.
Hardness 6. Calculate the DO and keep this sample for 5 days.
pH 7. Titrate the sample after 5 days and titrate it with starch
Total Dissolved Solid indicator and sodium thiosulphate solution and
calculate the DO.
Total suspended solid
Calculation
Chemical Oxygen Demand
BOD (mg/dm3) = DO2- DO1
This test was carried out to determine the
presence of oxidisable organic matter in the effluent. Hardness
The organic matter which is going to be finding out of Water hardness is the traditional method of the
two types: capacity of water to precipitate soap. Hardness of
1. That which is biologically oxidized and is called water is not a specific constituent but is a variable and
biologically active. complex mixture of cation and anion. It is caused by
2. That which cannot be oxidized biologically called dissolved polyvalent metallic ions.
biologically inactive. Procedure
3. COD gives the oxygen required for the complete of 1. Take 20 ml of a sample in a conical flask.
both biodegradable and non biodegradable matter.
2. Add 2 ml of Buffer solution so that pH can be
Procedure maintained.
Waste water sample (0.5ml, 1ml, 2ml) was taken in 3. Add 2 drops of EBT as indicator and titrate it with
the reflux flask and diluted with distill water up to 20 EDTA solution.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 977


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

4. Note the burette when red colour changes to blue. 4. CONCLUSION


5. Repeat the same titration with unknown solution. The formation of the hydroxyl radicals by using the
Fenton and photo-Fenton processes under application
pH of Fe(II) or Fe(III) occurs according to the following
Measurement of pH is one of the most important reaction.
and frequently used tests as every phase of water and Fe2+ +H2O2→ Fe++OH-+OHo
waste water treatment and waste quality management
is pH dependent. The pH of aqueous solutions can be Reaction already known as the Fenton reaction,
taken as negative logarithm of hydrogen ion possesses a high oxidation potential, but its revival in
concentration. At given temperature, the intensity of the the application to wastewater treatment began only
acidic or basic character of a solution is indicated by recently. UV irradiation leads not only to the formation
pH. of additional hydroxyl radicals but also to a recycling
of the ferrous catalyst by reduction of Fe(III).
Procedure Illumination of the system by UV was suggested to
overcome the limitations of the Fenton system. For the
The pH is determined by measurement of the development ofeffective wastewater treatment
electromotive force (EMF) of a cell comprising of an methods,complete degradation of the contaminants to
indicator electrode responsive to hydrogen ions (in glass harmless end products (CO2) and mineral salts is
tube), immersed in the test solution and a reference important. By this the concentration of Fe(II) increases
electrode (usually calomel electrode). The EMF of this and therefore the reaction is accelerated. The reaction
cell is measured by a pH meter. This is the high time needed for the photo-Fenton reaction is extremely
impedance electrometer calibrated in terms of pH. low and depends on the operating pH value and the
Total Dissolved Solids concentrations of H2O2 and iron added.
5. FUTURE SCOPE
Procedure
In these years, due to the increasing presence of
1. Take 100 ml of a sample and evaporate it to dryness.
recalcitrant organics in wastewater, Conventional
2. Cool the sample in desicator and weighted to a biological methods cannot be used for the complete
constant weight. treatment of the effluent therefore need to newer
technologies to degrade these refractory molecules into
3. From this weight the suspended impurities can be
found out by subtracting the weight before drying. smaller molecules became very imperative.
Advanced oxidation process (AOPs) constitute a
3. RESULTS AND DISCUSSION promising technology for a treatment of waste water.
The following conclusions throw light on a result of Fenton's oxidation was one of the best non-metal
application of an Fenton reaction which indicate that catalyzed oxidation reactions of water-miscible organic
compounds.
• The optimum irradiation time was 40 min. at pH 3,
the dose of 1 ml/l H2O2 and 0.75 g/l for Fe(II) and The photo- Fenton - process utilizing the
Fe(III). combinations Fe (II)/H2O2/UVA and Fe (III) oxalate/
H2O2/UVA was employed with success to degrade
• Under these conditions, 95.5% COD removal was
biorefractories organic pollutants.
obtained.
Another possible development of this work would
• Finally, it is recommended to apply the used technique
be to go on exploring the efficiency of different
(Fenton's oxidation process) as treatment of
wastewater containing organic compound. electrodes in photo-electro-Fenton process.

978 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

6. REFERENCES 11. Ebrahiem E. Ebrahiem, Mohammednoor N. Al-Maghrabi, Ahmed


R. Mobarki,Removal of organic pollutants from industrial
1. Vrushali P., Gawande S., An overview of Fenton process for wastewater by applying photo-Fenton oxidation technology,
industrial waste water, Journal of Department- Environment Arabian Journal of Chemistry, Volume 10, issue 2, 2017, Pages
A.P.C.O.E.R., 2018 s1674-s1679.
2. Changotra R, Rajput H, Dhir A, Treatment of real pharmaceutical 12. Wang N,Zheng T, Zhang G, Wang P, A review on Fenton-like
waste water using combined approach of fenton application and processes for organic wastewater treatment,Journal of
aerobic biological treatment, Journal of Photochemistry and Environmental Chemical Engineering, Volume 4, Issue 1, 2016,
Photobiology A: Chemistry, Volume 376, 2019, Pags 175-184 Pages 762-787.
3. Xiaohu Li, Si Chen, IriniAngelidaki, Yifeng Zhang, Bio-electro- 13. MirzaeiA,Chen Z, Haghighat F, YerushalmiL Removal of
fenton processes for waste water treatment, Chemical Engineering pharmaceuticals from water by homo/heterogonous Fenton-type
Journal, Volume 354, 2018, Pages 492-506 processes Chemosphere, Volume 174, 2017, Pages 665-688.
4. Zhihong Ye, Juliana R. Steter, FrancescCentellas, Pere Lluís Cabot, 14. Trapido M, Tenno T, Goi A, Dulova N, Viisimaa M, Bio-
IgnasiSirés, photoelectron-fenton as post-treatment for recalcitrant pollutants removal from wastewater with
electrocoagulatet benzophenone-3 loded synthetic and urben combination of the Fenton treatment and biological oxidation,
wastewater, Journal of Cleaner Production, Volume 208, 2019, Journal of Water Process Engineering, Volume 16, 2017, Pages
Pages 1393-1402 277-282.
5. Alexander V,Vorontsov, Advancing fenton and photo-fenton 15. Zhang M. H., Dong H, Zhao L, Wang D.X, Meng D, Fenton
water treatment through the catalyst design,Journal of Hazardous process for organic wastewater treatment based on optimization
Materials, In press, 2018 perspective,Science of The Total Environment, Volume 670, 2019,
6. Stella G. Michael, Irene Michael-Kordatou, Vasiliki G. Beretsou, Pages 110-121.
Thomas Jäger, DespoFatta-Kassinos, Solar photo-fenton 16. Verma M, Haritash A. K., Degradation of amoxicillin by Fenton
oxidation followed by absorption on activated carbon for the and Fenton-integrated hybrid oxidation processes,Journal of
minimization of anti resistance determinants and toxicity present Environmental Chemical Engineering, Volume 7, Issue 1, 2019,
in urban waste water, Applied Catalysis B: Environmental, Gabriel Buftia, Emilio Rosales, Marta Pazos, Gabriel Lazar, María
Volume 244, 2019, Pages 871-880 Angeles SanrománElectro-Fenton process for implementation
7. JuriBolobajev, EneliisKattel, MarikaViisimaa, Anna Goi, of acid black liquor waste treatment,Science of The Total
NiinaDulova, Reuse of ferric sludge as an iron source for the Environment, Volume 635, 2018, Pages 397-404
fenton based process in wastewater, Chemical Engineering 17. Vlyssides A.G , Loukakis H., Karlis P.K., Small sewage treatment
Journal, Volume 255, 2014, Pages 8-13 works using a fenton oxidation method Laboratory of Organic
8. Lu Shen, Wei Wang, Tong Li, Yuezhong Cui, Shubo Deng, and Chemical Technology , National Technical University of
Powdered activated coke for COD removal in the advanced Athens , 9, 2008.
treatment of mixed chemical wastewaters and rgeeneration by 18. Rajasulochana P., Preethy V, Comparison on efficiency of various
Fenton oxidation, Chemical Engineering Journal, In press, 2019. techniques in treatment of waste and sewage water - A
9. XiangsongMeng, Sultan Ahmed Khoso, Jiangqiu Wu, comprehensive review, 2016;
MengjieTian, Yuehua Hu, Efficient COD reduction from sulfide
minerals processing wastewater using Fenton process, Minerals
Engineering, Volume 132, 2019, Pages 110-112.
10. Mustapha Mohammed Bello, Abdul Aziz Abdul Raman,
AnamAsghar, A review on approaches for addressing the
limitations of Fenton oxidation for recalcitrant wastewater
treatment, Process Safety and Environmental Protection, In press
2019.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 979


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Natural Synthesis of Nanoparticles and its


Applications by Green Synthesis Process
S.D.Mankar1, Anjali Arvind Dama2
1
Pharmaceutics Department Pravara Rural College of Pharmacy, Pravaranagar, India.
2
Pravara Rural College of Pharmacy, Pravaranagar, India .
Email: sdmankar655@gmail.com1, anjalidama13.ad@gmail.com2

Abstract: Green synthesis of nanoparticles was these materials. It represents all activities related to
made at room temperature using micro-organisms, development. On the other hand, as far as
plants, and fungi. Green synthesis offers an nanobiotechnology is concerned, this is the result of a
environmentally friendly, fast, economical and
combination of branches of biotechnology and
reproducible approach to quicker development of
nanotechnology with a common combined functioning
metal nanoparticles. Nanoparticles obtained by
green synthesis method are used in many fields of [1].
use, such as cancer treatment, drug delivery, the Microorganisms, plants and other biological
construction of biosensors. Microorganisms, structures are involved in the process of eliminating toxic
plants, and fungi can be used as a biodegradable and waste metals in the environment; accomplished by
agent material to develop a simple, rapid, and
oxidation, reduction or catalysis of metals with metallic
green nanoparticles synthesis method. When
synthesizing nanoparticles by introducing chemical
nanoparticles. Metallic nanoparticles developed using
and physical methods at high temperature and biological methods; are used in the biomedical field for
pressure, reducing and stabilizing agents; purposes such as protecting against harmful
synthesizing nanoparticles by biological methods; microorganisms, bio-imaging, drug delivery, cancer
involve room temperature and pressure, reducing treatment, medical diagnosis and sensor construction
and stabilizing agents. Green method of synthesis; due to their unique properties such as insulator, optics,
provides for faster development of metallic antimicrobial, antioxidant, anti-metastasis,
nanoparticles by providing an environmentally biocompatibility, stability and manipulability. Metallic
friendly, quick, economical and reproducible nanoparticles, which due to their catalytic activity can
approach. Biological methods play a major role in be used in the industrial sector, are nowadays of great
the synthesis of metallic nanoparticles, considering
importance. Nanomaterials, the keystone of
the wide range of applications made of metallic
nanoparticles.
nanotechnology that has served our lives for many years.
Nanomaterials are classified into two main groups
Keywords: Green synthesis, nanoparticles, according to their origin: natural nanomaterials found in
toxicity. nature, such as viruses, proteins, enzymes and minerals,
1. INTRODUCTION and artificial nanomaterials not found in nature and
requiring certain processes for their production.
Nano is a one billionth of a meter measure and covers Nanomaterials are studied under four sections according
10 atoms in width.The rapidly developing to their dimensions: -nano-sized nanocrystals-also
nanotechnology is the interdisciplinary field of biology, known as zero dimensions-which includes nanoparticles
chemistry, physics, food, medicine, electronics, from metal and semiconductors. Nanowires, nanobots,
aerospace, medicine, etc. researching the design, and nanotubes are one-dimensional nanomaterials.
manufacture, assembly, characterization of materials Nanomaterials of two dimensions, such as
smaller than 100 nanometres in scale; As well as the nanocomposites and nanoplates; -three-dimensional
application of functional miniature systems derived from nanomaterials, bulkers.Nanomaterials are studied under
980 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

four main groups according to their structural structures 3.GREEN SYNTHESIS METHOD
as metallic nanomaterials, carbon-based nanomaterials, In the last two decades, Supercritical Fluid (SCF)
dendrimers, and composites [ 4-6].Nanoparticles may technology has become an important tool for processing
exhibit various properties and functions compared to materials. Supercritical CO2 and H2O are used
normal bulk material. The most important factor for the extensively to make a wide variety of nanomaterials
creation of nanostructures of desired size, shape and [4]. Green method of synthesis; provides faster
properties and their use in different fields is the reduction development of metallic nanoparticles by offering an
of the effects of classical physics and the presence of environmentally friendly, simple, economical, and
quantum physics. Other explanations for the different reproducible approach [6].The biological synthesis of
behaviour of nanoparticles in physical, chemical, optical, nanoparticles using plants and plant extracts seems to
electrical, and magnetic activity include load carrier be an attractive alternative to traditional chemical
limitation, size-dependent electronic structures, synthesis and the more complicated techniques of
increased surface / volume ratio, and other factors cultivation and isolation required for many
caused by unique atomic properties [7]. microorganisms. In addition, combinations of molecules
2. NANOPARTICULATE SYNTHESIS present in plant extracts serve as both reducing and
METHODS stabilizing (capping) agents during synthesis of
Two basic approaches, which include different nanoparticles [28]. Using coriander extract as the
preparation methods and are known from early times, reducing agent, extracellular biological synthesis of gold
are used in the synthesis of nanoparticles, which can be nanoparticles was achieved through a simple biological
of natural or synthetic origin and exhibit unique procedure. The aqueous gold ions are reduced when
properties at the nanoscale.The first approach is the exposed to coriander leaf extract and have resulted in
"top-down" method which requires the application of the biosynthesis of gold nanoparticles ranging from 6.75-
external force to decompose solid materials into small 57.91 nm [ 29]. Rapid synthesis of silver nanoparticles
pieces. Several physical, chemical, and thermal using Acalyphaindica leaf extract has been tested against
techniques are used in this method to provide the waterborne bacterial pathogens. Characterization of
requisite energy for the creation of nanoparticles. The silver nanoparticles was reported from UV - Vis
second method, known as "bottom-up," is based on spectrum, scanning electron microscopy (SEM), X-ray
collecting and mixing atoms or molecules in gas or liquid. diffraction (XRD) and energy dispersive spectroscopy
The two methods have relative advantages and (EDS), resulting in the formation of nanoparticles 20-
disadvantages. Due to the cavities and roughness that 30 nm of particle size [25]. Euphorbia aqueous extract
can occur in nanoparticles, it is impossible to obtain (Euphorbia amygdaloides) has been used as reducing
perfect surfaces and edges in the up-down method, and stabilizing agents. They used Euphorbia (E.
which is more expensive to implement; while excellent amygdaloides) aqueous extract as a reduction and
results of nanoparticles synthesis can be obtained by stabilization agent [30]. The biological approach offers
bottom-up approach. Furthermore, with the bottom- an environmentally friendly way in which nanoparticles
up approach, no waste materials are formed that need are synthesised. This approach also requires no
to be removed, and nanoparticles of smaller size can expensive, harmful, and toxic chemicals. Thanks to the
be obtained thanks to better control of nanoparticles biological method that has been widely used in recent
sizes [ 8-10]. The mechanical abrasion method, listed years, metallic nanoparticles of different shapes, sizes,
under the top-down approach, uses different ball mills contents and physicochemical properties can be
to break down the material into particles and produce synthesised. Use biological organisms such as bacteria,
nanosized alloys, composites, and semi-crystalline actinobacteria, yeasts, moulds, algae and plants, or their
structures. Despite being inexpensive, efficient and products, synthesis can be achieved in one stage. In
simple, this method is susceptible to contamination plants and microorganisms, such as proteins, enzymes,
caused by balls [11].
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 981
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

phenolic compounds, amines, alkaloids and pigments, contamination and have catalytic activity [20].
molecules synthesize nanoparticles by reducing them [ Nanoparticles can be synthesized with enzymes as
7, 12-16]. In conventional chemical and physical extra-cellular or intra-cellular by using simple-cultured
methods; reducing agents involved in the reduction of and fast-breeding eukaryotic yeasts and moulds with a
metal ions, and stabilizing agents used to avoid convenient design for biomass. The incubation
undesirable agglomeration of the nanoparticles formed conditions and the solutions used for metallic ions affect
carry a risk of toxicity to the environment and the cell. the size of the formed nanoparticles. Being pathogenic
In addition, the contents of the nanoparticles produced to humans restricts the use of some moulds in the
are believed to be toxic in terms of form, size and surface production of nanoparticles [21]. Actinobacterial
chemistry. Such agents are naturally present in the nanoparticles biosynthesis is a safe, environmentally
biological organisms employed in the green synthesis friendly, and important aspect of green chemistry
process in which nanoparticles with biocompatibility are approach that interconnects microbial biotechnology
produced [17]. Due to rapid development, inexpensive and nanobiotechnology. Actinobacteria-generated
cost of cultivation, and simple control and manipulation antibiotics are common in almost all therapeutic steps,
of the growth environment, bacteria specifically target and it is known that these microbes are also helpful in
nanoparticles in production. At the same time, some the biosynthesis of nanoparticles with good surface and
species of bacteria are known to have special size characteristics. Actinobacterialnanoparticular
mechanisms for suppressing metal toxicity or heavy biosynthesis is a safe, environmentally friendly and
metals. Bacteria preferred for these properties may important aspect of the green chemistry approach that
execute in-situ and ex-situ nanoparticle synthesis. Metal interconnects microbial biotechnology and
ions can be reduced and precipitated for the nanobiotechnology [20]. Algae are eukaryotic aquatic
development of nanoparticles by using biochemical picture sites and, due to the pigments, proteins,
pathways and reducing agents such as proteins, carbohydrates, fat, nucleic acid and secondary
enzymes, etc. present in the bacteria [ 18, 19]. For metabolites they produce, they break down metal salts
example, a simple, non-toxic, water-based strategy for into nanoparticles. The algae extract that occurs in an
the manufacture of magnetic nanoparticles / hydrogel aqueous medium at a certain temperature is
nanocomposites in which highly crystalline Fe3O4 supplemented with metal solutions of the corresponding
nanooctaedra can be produced in situ within a negatively pH and concentration, and thus the synthesis of
charged matrix of hydrogel. The morphology of the nanoparticles that may have antimicrobial properties
Fe3O4 nanocrystals can be easily tuned by adjusting without creating any harmful by-products during
the crosslinking concentration of the hydrogel. In synthesis is achieved. The size of nanoparticles is
addition, the catalytic activity of the magnetic calculated by some factors such as the solution's
nanocomposites and the magnetic nanocomposite incubation time, the ambient temperature, the pH of
loaded with Fe3O4 nanooctaedra exhibited excellent the mixture used and the concentration of metal ions.
catalytic activity and produced a responsive response Algae also give an advantage to this type of synthesis
to detection of H2O2. [19] Actinobacteria developing by virtue of its easy availability and usefulness.
secondary metabolites such as antibiotics are aerobic, Therefore, successful biomolecules in the reaction
immobile, and mostly gram-positive filamentous medium are less extinguished by the nanoparticles
bacteria. Thanks to their detoxification properties, they produced in the use of bacteria and plant extracts [22,
are resistant to the most toxic heavy metals. Soluble 23]. Metallic nanoparticles which have different
toxic metal ions are detoxified by intracellular or morphological characteristics can be produced
extracellular degradation or precipitation. Thus, it is intracellularly and extracellularly. Synthesis process; is
possible to produce nanoparticles which are initiated in the aqueous solution of metal ions by adding
antibacterial, antifungal, anticancer, antioxidant, antibio- extracts obtained from plant parts such as leaves, roots,

982 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and fruit. The materials present in the plant extract, such nanoparticles are commonly used in Nano biomedicine
as sugar, flavonoid, protein, enzyme, polymer and [34]. Plants based green synthesis of Ag, Au, Cu, Fe,
organic acid, acting as a reduction agent, are responsible Pd, Ru, PbS, CdS, CuO, CeO2, Fe3O4, TiO2, and
for the bio-induction of metal ions into nanoparticles [ ZnO NPs [32].
8, 10, 13, 22, 24].
5. CONCLUSION
4. APPLICATIONS A number of microorganisms and plant extracts have
Nanomedicine is a growing research field with recently been used to synthesize metal nanoparticles
enormous potential for improving the diagnosis and for green synthesis in an effective manner. Therefore,
treatment of human diseases [26] Development of new green synthesis of nanoparticles is the most convenient,
nanoparticular-based cosmetics. Surface modification simple, environmentally friendly way and minimizes the
which improves the distribution of nanotechnology in side effects of chemical and physical methods by
the brain. Nanotechnology and powder technology at preventing the use of toxic chemicals and the creation
a combustion plant for pulverized coal [9]. Metal of harmful / hazardous by-products. Nanoparticles are
nanomaterials have revolutionized nanoscience in several commonly used for their superior properties, and have
applications. These include, among other things, been intensively researched in recent years. The physical
plasmonic, catalysis, sensing, computing, photonics, and clinical effects of green synthesis- obtained
information storage, medicine, energy conversion, antimicrobial, antioxidant and non-toxic nanoparticles
cosmetics [11]. While the field of biosynthesized are becoming increasingly important. Future studies
nanoparticles is relatively new, researchers have already should probably focus on obtaining at its maximum level
started exploring their use in applications such as nanoparticles with antimicrobial activity and at least
targeted drug delivery, cancer treatment, gene therapy toxicity. Because of this, the synthesis of metallic
and DNA analysis, antibacterial agents, biosensors, nanoparticles, -especially by non-toxic green synthesis
enhancing reaction rates, separation science, and MRI method-, which are used in many fields of application
[27]. Elucidation of an enzymatic pathway using fungi, such as cancer treatment, drug transport, is of great
opens up exciting possibility of developing a rational, importance today.
biosynthesis strategy for nanomaterials over a range of
chemical compositions which is currently not possible 6.REFERENCES
[30] To improve particle synthesis efficiency and [1] Pearce, J. M. (2012). Physics: Make nanotechnologyresearch
open-source. Nature, 491(7425), 519-521.
exploring their biomedical applications, it is hopeful that
the implementation of these approaches on a large scale [2] Schröfel, A., Kratošová, G., Šafa?ík, I., Šafa?íková, M., Raška, I.,
& Shor, L. M. (2014). Applications of biosynthesized metallic
and their commercial applications in medicine and health nanoparticles-a review. Acta biomaterial, 10(10), 4023-4042.
care will take place in the coming years. Euphorbia (E. [3] Singh, P., Kim, Y. J., Zhang, D., & Yang, D. C. (2016). Biological
amygdaloides) extract can be used efficiently in the synthesis of nanoparticles from plants and microorganisms.
production of potential antioxidant and anti-bacterial Trends in biotechnology, 34(7), 588-599.
[30]. Having numerous viewpoints to improve the [4] Byrappa, K., Ohara, S., &Adschiri, T. (2008). Nanoparticles
diagnosis and treatment of human sicknesses, nano synthesis using supercritical fluid technology-towards biomedical
applications. Advanced drug delivery reviews, 60(3), 299-327.
medicine is a growing field of study [33].As fluorescent
[5] Li, X., Xu, H., Chen, Z. S., & Chen, G. (2011). Biosynthesis of
biological labels gene and drug delivery factors and in nanoparticles by microorganisms and their applications. Journal
uses like bio detection of pathogens tissue engineering of Nanomaterials, 2011.
[35] tumour demolition through heating (hyperthermia) [6] NADAROGLU, H, ALAYLI GÜNGÖR, A, ?NCE, S. (2017).
MRI contrast enhancement phagokinetic investigations, Synthesis of Nanoparticles by Green Synthesis Method.
and magnetic NPs seem to be suitable for targeted drug International Journal of Innovative Research and Reviews, 1 (1),
6-9. Retrieved from https://dergipark.org.tr/en/pub/injirr/issue/
delivery and hyperthermia applications, discrete 51783/673126

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 983


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[7] Shah, M., Fawcett, D., Sharma, S., Tripathy, S. K., &Poinern, G. [22] Siddiqi KS, Husen A. Fabrication of Metal and Metal Oxide
E. J. (2015). Green synthesis of metallic nanoparticles via Nanoparticles by Algae and their Toxic Effects. Nanoscale
biological entities. Materials, 8(11), 7278-7308. Research Letters (2016) 11. doi:10.1186/s11671-016-1580-9.
[8] Iravani S. Green synthesis of metal nanoparticles using plants. [23] Karaduman I, Gungor AA, Nadaroglu H, Altundas A, Acar S.
Green Chemistry (2011) 13:2638-50. doi:10.1039/c1gc15386b Green synthesis of gamma-Fe2O3 nanoparticles for methane gas
sensing. Journal of Materials Science-Materials in Electronics
[9] Cerjak H. Book note: introductions to nanoparticles and
(2017) 28:16094-105. doi:10.1007/s10854-017-7510-5.
nanomaterials. Powder Metallurgy (2014)
[24] Park S, Sung HK, Kim Y. Green Synthesis of Metal Nanoparticles
[10] Makarov, V. V., Love, A. J., Sinitsyna, O. V., Makarova, S. S.,
Using Sprout Plants: Pros and Cons. Journal
Yaminsky, I. V., Taliansky, M. E., &Kalinina, N. O. (2014).
"Green" nanotechnologies: synthesis of metal nanoparticles using [25]Kavitha, K. S., Baker, S., Rakshith, D., Kavitha, H. U.,
plants. ActaNaturae (англоязычнаяверсия ), 6(1 (20)). Yashwantha Rao, H. C., Harini, B. P., & Satish, S. (2013). Plants
as green source towards synthesis of nanoparticles. Int Res J
[11] Geonmonond, R. S., SILVA, A. G. D., & Camargo, P. H. (2018).
BiolSci, 2(6), 66-76.
Controlled synthesis of noble metal nanomaterials:Motivation,
principles, and opportunities in nano catalysis. Anais da Academia [26] Fadeel, B., & Garcia-Bennett, A. E. (2010). Better safe than
Brasileira de Ciências, 90(1), 719-744. sorry: understanding the toxicological properties of inorganic
nanoparticles manufactured for biomedical applications. Advanced
[12] Nadaroglu, H., Onem, H., &Gungor, A. A. (2016). Green
drug delivery reviews, 62(3), 362-374.
synthesis of Ce2O3 NPs and determination of its antioxidant
activity. IET nanobiotechnology, 11(4), 411-419. [27] Zhang, X., Yan, S., Tyagi, R. D., &Surampalli, R. Y. (2011).
Synthesis of nanoparticles by microorganisms and their
[13] Dobrucka, R. (2019). Bio fabrication of platinum nanoparticles
application in enhancing microbiological reaction rates.
using Fumariaeherba extract and their catalytic properties. Saudi
Chemosphere, 82(4), 489-494.
journal of biological sciences, 26(1), 31-37
[28] Singh, A., Jain, D., Upadhyay, M. K., Khandelwal, N., &Verma,
[14] Cicek, S., Gungor, A. A., Adiguzel, A., &Nadaroglu, H. (2015).
H. N. (2010). Green synthesis of silver nanoparticles using
Biochemical evaluation and green synthesis of nano silver using
Argemonemexicana leaf extract and evaluation of their
peroxidase from Euphorbia (Euphorbia amygdaloides) and its
antimicrobial activities. Dig J Nanomater Bios, 5(2), 483-489.
antibacterial activity. Journal of Chemistry, 2015.
[29] Narayanan, K. B., &Sakthivel, N. (2008). Coriander leaf mediated
[15] Xia, Y., Xiong, Y., Lim, B., &Skrabalak, S. E. (2009).
biosynthesis of gold nanoparticles. Materials Letters, 62(30),
Shape?controlled synthesis of metal nanocrystals: simple
4588-4590.
chemistry meets complex physics? AngewandteChemie
International Edition, 48(1), 60-103. [30] Liu, M., Guo, Y., Lan, J., Zhou, Y., Dong, Q., &Guo, C. (2019).
Synthesis of Ce/SiO2 Composited Cross?Linked Chitosan
[16] Mukhopadhyay, N. K., & Yadav, T. P. (2011). Some aspects of
Flocculation Material and Its Application in Decolorization of
stability and nanophase formation in quasicrystals during
Tartrazine Dye. Chemistry Select, 4(45), 13156-13162.
mechanical milling. Israel Journal of Chemistry, 51(11?12), 1185-
1196 [31] Katz, E., &Willner, I. (2004). Integrated nanoparticle-biomolecule
hybrid systems: synthesis, properties, and applications.
[17] Hussain, I., Singh, N. B., Singh, A., Singh, H., & Singh, S. C.
AngewandteChemie International Edition, 43(45), 6042-6108.
(2016). Green synthesis of nanoparticles and its potential
application. Biotechnology letters, 38(4), 545-560. [32] Acharyulu, N. P. S., Dubey, R. S., Swaminadham, V., Kollu, P.,
Kalyani, R. L., &Pammi, S. V. N. (2014). Green Synthesis of
[18] Korbekandi, H., Iravani, S., &Abbasi, S. (2009). Production of
CuO Nanoparticles using PhyllanthusAmarus Leaf Extract and
nanoparticles using organisms. Critical reviews in biotechnology,
theirAntibacterial Activity Against MultidrugResistance Bacteria.
29(4), 279-306.
International Journal of Engineering Research & Technology, 3(4).
[19] Gao, Y., Wei, Z., Li, F., Yang, Z. M., Chen, Y. M., Zrinyi, M.,
[33] Tian, F., Tian, F., Prina-Mello, A., Estrada, G., Beyerle, A.,
&Osada, Y. (2014). Synthesis of a morphology controllable Fe 3
Möller, W., ... &Stoeger, T. (2008). A novel assay for the
O 4 nanoparticle/hydrogel magnetic nanocomposite inspired
quantification of internalized nanoparticles in macrophages.
bymagnetotactic bacteria and its application in H 2 O 2 detection.
Nanotoxicology, 2(4), 232-242.
Green Chemistry, 16(3), 1255-1261.
[34] Parak, W. J., Boudreau, R., Le Gros, M., Gerion, D., Zanchet,
[20] Manivasagan, P., Venkatesan, J., Sivakumar, K., & Kim, S. K.
D., Micheel, C. M., ... &Larabell, C. (2002). Cell motility and
(2016). Actinobacteria mediated synthesis of nanoparticles and
metastatic potential studies based on quantum dot imaging of
their biological properties: a review. Critical reviews in
phagokinetic tracks. Advanced Materials, 14(12), 882-885.
microbiology, 42(2), 209-221.
[35] Shinkai, M., Yanase, M., Suzuki, M., Honda, H., Wakabayashi,
[21] BoroumandMoghaddam, A., Namvar, F., Moniri, M., Azizi, S.,
T., Yoshida, J., & Kobayashi, T. (1999).
& Mohamad, R. (2015). Nanoparticles biosynthesized by fungi
and yeast: a review of their preparation, properties, and medical
applications. Molecules, 20(9), 16540-16565

984 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Sustainable Development Through Biofuel as Future


Energy Resource
Dr. Shalini Jaiswal
Chemistry Department Amity University Greater Noida (India)
Email: sjaiswal@gn.amity.edu

Abstract- Cutting of forests, industrial farming, identifies a point of interest in the direction of
burning fossil fuels for electricity, ranching, and the reducing global warming, as well as revealing the
use of aerosols all contribute to the global warming technique and benefits of biofuel production.
of the environment, which in turn contributes to
Keywords: Renewable energy sources (RES),
the deteriorating of human health. Alternative fuel
Biofuel, Greenhouse emission and Microalgae.
is currently a major issue all over the world as a
result of efforts to reduce emissions. As a result, I. INTRODUCTION
concerns about the sustainability of life have
prompted a rise in international importance in the High Temperature and pressure can cause drastic
search for realistic trade measures to reducing changes such as melting ice, rising water levels, volcanic
global warming. A heated dispute is raging eruptions, and system disturbances. According to an
regarding the magnitude and severity of rising early report, the international average temperature has
surface temperatures, the effects of past and future risen 1°F since the early 1900s, and is expected to rise
warming on human life, and the need for action to 2.5 to 10.4°F over the next 100 years [1], requiring
mitigate future warming and deal with its countries to North America take the necessary action
consequences. The advantages of biodiesel as immediately. The exponential growth of global
diesel fuel are its portability, ready availability,
environmental temperature, especially through
renewability, higher combustion efficiency, non-
toxicity, higher flash point, and lower sulfur and
interference with human activities such as deforestation,
aromatic content, higher cetane number, and higher industrialized agriculture, burning of fossil fuels for power
biodegradability. generation, pasture and the use of aerosols, has led to
deterioration of human health.
Biodiesel is non-toxic, biodegradable, and made
from renewable resources, and it emits a small
amount of harmful greenhouse gases, such as CO2,
SO2, and NOx, into the ecosystem. The sources
of biodiesel are vegetable oils and fats. The direct
use of vegetable oils and/or oil blends is generally
considered to be unsatisfactory and impractical for
both direct injection and indirect type diesel
engines because of their high viscosities and low
volatilities injector coking and trumpet formation Fig.1-Projected global warming in 2100 for a range of
on the injectors, higher level of carbon deposits, emission scenarios
oil ring sticking, and thickening and gelling of the Generally speaking, when short wave radiation
engine lubricant oil, acid composition. Biodiesel is reaches the earth from the sun, as long as 1/2 is
obtained by trans esterifying triglycerides with
consumed, the left side will regenerate to the extended
methanol. Bio-fuel outputs are an environmentally
benign alternative to fossil fuels. The current study wavelength and will be reflected back to the house as
the associated infrared rays. Greenhouse gases absorb
the heat released by the earth and emit them to the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 985


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

surface of the earth in the opposite direction, thereby et.al., rising concentration of CO2 should result in the
controlling the temperature of the earth to close to 33 cooling of climate. [10] According to studies carried
degrees Celsius. When the greenhouse gases equivalent out by Howarth, use of fossil fuel is major source of
to carbon dioxide, methane, steam and fluorinated gases emission of green house gases. [11] Use of natural gas
are greatly amplified to a strong degree, they will act as can reduce the emission to considerable extent.
the mantle and prevent the release of heat [2]. The Ramanathan and Fengstudied global and regional
changes in energy absorbed and released by this perspectives ofair pollution, green house gases and
greenhouse gas are based on molecular structure and climate change.[12] Smith et.al.carried out studies on
pure algorithms. Therefore, it is mainly through the units various soil physical factors and the biological processes
of human sports venues that these greenhouse gas which cause the production and consumption in soils
changes around the earth are an important reason for of green house gases.
the modern warm-up results. The release of carbon dioxide, according to them,
II. GLOBAL GREENHOUSE GASES is function of temperature for considerably wide range
EMISSION of temperature. For dry soil, it becomes function of
water contents [13]. Gas diffusivity, according to them
Stojanovic et.al. carried out studies on green house is main factor controlling oxidation. According to studies
gases and means of their prevention.[3] According to carried out by Aggarwal and Markanda, the rapid
them, water vapor is one of the greatest contributors to heating of earth is taking place due to green house effect,
the green house effect on earth. According to an more so in last two decades.[14]. These green house
investigation carried outby ElZein and Chehaye, gases are produced both by natural processes and by
vehicular and industrial pollution is main contributor to human activities. The primary onesare:
the global warming. [4] Studies carried out by
A.Shrivastava and S.Shrivastava indicated that the • Carbon dioxide(CO2)
climate changes as a result of global warming • Methane(CH4)
havereached irregular levels. [5]According to Lacis, • Nitrous oxide (N2O)
combination of solar radioactive heating andt he strength
of the green house effect determine the surface • Industrial Gases, includinghydrofluorocarbons,
temperature of a planet. [6] Sreenivas et.al. investigated perfluorocarbons, and sulfur hexafluoride Water
influence of meteorology and interrelationship with green vapor is the most abundant greenhouse gas and plays
house gases. [7]They pointed out that gases like an important role in regulating the climate. Global
carbondioxide(CO2) and methane(CH4) are climate Warming
forcing agents. During their investigation, they observed Table 1: Global Warming Potential of greenhouse gases
that methane recorded the maximum during post Atmospheric Global Warming
monsoon and minimum during monsoon. The lifetime (years) Potential (GWP)
meteorological factors like air temperature, wind speed, Carbon dioxide Variable 1
wind direction and relative humidity had strong impact (CO2)
on GHGs. Fekete et.al. studied analysis of current green Methane (CH4) 12 21
house gas emission trends. [8] They studies green house Nitrous oxide (N 2O) 114 310
phenomenon in the light of prevailing policies and
Potential (GWP) [15]is an index that represents the
regulations. According to their estimates the current
global warming impact of a green house gas relative to
policies may lead to 3.7 degree risein temperature.
carbon dioxide. GWP represents the combined effect
Byrne and Gold blatt carried out studies on radio active
of how long the gas remains in the atmosphere and its
forcing of green house gases.[9] Their studies indicated
relative effectiveness in absorbing outgoing infrared heat.
that CO2 radio active forcing is consistent. Chilingar
Table 1 lists the GWP of the three main green house

986 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

gases (based on a100-year time horizon). As the table ocean ice into ceanic darkish surfaces that's reflective
shows, a given molecule of nitrousoxide has over 300 into inflated warmth tack capability leading to more
times the impact on global warming as does a molecule increment of world temperature, ocean interest,
of carbon dioxide. Assessments by the independent touching the growth of aquatic lifestyles, diverseness
Inter governmental Panelon Climate Change(IPCC) and related food web. Global warming boosts the
note that Earth's average global surface temperature probability of extreme weather events, like heat waves,
has risen between1.1° and 1.6° Fahrenheit over the far more than it boosts more moderate events. [19]
past century and that this is very likely caused by human Recent proof represented that heating adversely
activity [15] Local changes include shifts in the patterns effect on the plants like monocot genus vivipara [20,21],
and severity of rainfall and snowfall, droughts, heat impinge the seed germination and viability within
cloudiness, humidity, and growing season length[16]. the species like juniper. The accelerated greenhouse
gas has an impact on the expansion and yield by
mistreatment inhibiting Photosystem in some species of
Wedelia and Rubisco content in rice species. Moreover,
extended greenhouse emission awareness and/or inflated
temperature trigger the status to agent mediate illnesses
in wheat and barley, that has been careful greater in
barley that decreasing the quantity of protection
compound similar to p-coumaroyl hydroxyl agmatine
[22,25]. Moreover, inflated greenhouse emission cut
back the biological process composition of some plants
equivalent to expend ascorbic acid content in herb [26].
The impact of global warming on human fitness is
maximum massive, similar to the hotter temperature
Figure 2: Atmospheric concentrations of the naturally
occurring greenhouse gases carbon dioxide, methane, and
favours the enlargement and propagation of dipteron.
nitrous oxide over the past 2000 years. Data are from ice core So dramatically growing existence threatening dipteron
records and contemporary measurements.
born sicknesses like dengue fever, chikungunya
III. IMPACTS OF WORLDWIDE conjointly as can boom the vector borne and animal
WARMING borne illnesses. The potent heat waves by heating area
liable for a rise of temperature associated deaths.
Manyharmfulgasescausedifferenthealthproblems to
Furthermore pollution because of air conditioner,
human beings. [17-18] There is a scientific consensus
contributes to inflated quantity of pollutant that effects
that climate change is occurring, and that human
metabolic process and respiratory organ diseases
activities are the primary driver. Many impacts of climate
[27,28]. From decades, the warmth tack potential of
change have already been observed, including glacier
alkane series is firmer than CO2, therefore gripping 84
retreat, changes in the timing of seasonal events (e.g.,
times a lot of heat with in 1st two years of its unleash.
earlier flowering of plants), and changes in agricultural
Degradation of organic substances by anaerobic
productivity. Anthropogenic forcing has likely
bacteria can initiate discharge of acid fuel and alkane
contributed to some of the observed changes, including
collection. The human sports accountable for alkane
sea level rise, changes in climate extremes, declines in
series assortment releases area unit delivery of gasoline,
Arctic sea ice extent and glacier retreat.The principal
crude modification, oil and fuel structures. The human
risky impact of accelerating temperature leads to melting
activities liable for paraffin releases area unit transport
of the ocean beds of ice which stimulating unhitch of
fuel, crude trade, oil and gas systems.
alkane series compound. The second most effect of
global temperature increase is that the conversion of

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 987


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

IV. DIFFERENT GENRATION BIOFUEL of methyl group from high proportion of carboxylic
The fuel got from natural materials, including containing organic compound by trans-esterification
materials from living beings that passed on generally as reaction. The rate of reaction can be increasedby use
of late and from the metabolic results of living life forms of methyl alcohol or the other alcohol [29].
is called Biofuel. The technique for biofuel creation will B. 2nd generation Bio-fuel
be grouped into three (Fig.3) class to be specific
beginning age biofuel from eatable sustenance crops, They produce by the use certain techniques like
second era biofuel from non-eatable yields and waste organic chemistry and thermo chemical ways that utilize
oil feed stock and third era biofuel from algae. Note the lingo-cellulosic and plastic element additionally to
that the structure of the biofuel itself does not change sugar and starch element of non-edible food crops and
between ages, yet rather the source from which the waste oil. Organic chemistry process of "biomass follows
fuel is inferred changes. 3 steps admire pre-treatment either with ammonia or
steam explosion for separation of the plastic content",
that is regenerate to aldohexose by the aid of acid and/
or macromolecule by chemical reaction. Finally, they
are born-again to alcohol or plant product by microbes.
Thermal chemical methodology involves process at
higher temperature and pressure that features direct
combustion, chemical process, state change and shift.
Direct combustion of biomass inside the presence of
air turns out acid, water, and free heat would be
comfortable for domestic heating functions. Chemical
change involves transformation of biomass into vaporous
mixtures like CO, CO2, CH4, N2 and H2 referred to as
Figure-3-Different Generation of Biofuel
gas, whichcan directly be used in power generation
system or treated with catalyst or at higher temperature
A. 1st generation Bio-fuel to provide liquid fuel for transportation. Shift involves
Primary generation bio-fuel is food crops like corn, the direct conversion of biomass into vaporous product
soya bean, sugar cane, vegetable oil. Bio-ethanol is by application of intense heat, and reactions
combined from sugar stick, corn and maize yet biodiesel administrated inside the presence of element like group
is produces by mixing of soybean plant oil, sunflowers and at intervals the absence of element. The eminent
oil, and vegetable oil. Biogas is created by disintegration biofuel created by these ways are Fischer Tropsch
of natural material. Among these, corn was wont to liquid, Dimethyl Ether and alcohol fuel [30].
turn out fifteen billion gallon of plant item and sugar C. 3rd generation Bio-fuel
stick is particularly utilized for steady reason in Brazil.
Originally biofuels are created straightforwardly from It encounters the demerits of past 2 generation
sustenance trims by abstracting the oils for use in system and having abundant blessings, admire highest
biodiesel or delivering bio ethanol through aging. In content of oil in several alga strains admire of its dry
1st generation bio- fuel starch, sugar, polyose and/or weight. Their potential to grow extraordinarily speedy,
sugar content is regenerate to aldohexose which is wherever some strains might double their biomass inside
converted to alcohol by microorganism through 24 hours, with minimum necessities like water, daylight
chemical reaction, further purified by the distillation and carbonic acid gas and conjointly capable of growing
process. The foremost preferred supply of biodiesel is in harsh conditions that is unfavourable for terrestrial
soya bean. Biodiesel production involves regenerate plants. They are also feasible to culture in an exceedingly
wide scale over little space, with the supplemental

988 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

advantage that biofuel from alga to be non-cytotoxic, system is that the symbol bioreactors that might be a
perishable and with favourable emission profile because shut instrumentation, all around lit by star or counterfeit
it produces no monoxide, sulphur and turn organic light-weight and temperature controlled with persistent
compound [31,32]. The preferred choice for stream of water containing fundamental supplements,
manufacturing biofuel like biodiesel from microalgae as air and carbonic corrosive gas, so rising the yield of
a result of that is found to be high oil content whereas biofuel.
bioethanol and biogas from microalgae has richest sugar
content [33], despite it may well be created from
alternate sources. The success rate of biofuel production
lies within the choice of applicable strains of high oil
content and suitableness to grow in an exceedingly giant
scale with minimum demand let's say Botrycococcus,
alga species etc wide used for manufacturing biofuel.
D. 4th Generation Biofuel
Four Generation Bio-fills are gone for creating
reasonable vitality as well as a method for catching and
putting away CO2. Biomass materials, which have
retained CO2 while developing, are changed over into
fuel utilizing indistinguishable procedures from second
era biofuel. This procedure contrasts from second and
third era creation as at all phases of generation the carbon
dioxide is caught utilizing procedures, for example, oxy-
fuel combustion. The carbon dioxide would be able to
be geo sequestered by putting away it in old oil and gas
fields or saline aquifers. This carbon catch makes fourth
era biofuel generation carbon negative rather than just Fig.4 Biodiesel production from Microalgae
carbon unbiased, as it seems to be 'locks' away more
The developed alga is collected by topographical
carbon than it produces. This framework not just catches
marvel, filtration, characteristic process or film filtration
and stores carbon dioxide from the environment yet it
so specifically got dried out to dispose of the wetness
additionally diminishes CO2 discharges by supplanting
content at lower temperature and better pressure
petroleum derivatives.
respect 300oC, ten MPa [34]. This square measure
V. PRODUCTION OF BIODIESEL FROM pursued by significantly vital drying steps, that check
MICROALGAE the yield so expensive strategy for oil/triglycerides
extraction method that highlights mechanical ways like
There square measure three realistic strategies for
expeller press or with unbearable assisted extraction
developing microalgae relate degree exceedingly in an
and substance ways appreciate resolvent dissolvable
exceptionally monster scale incorporates an open
and extraction or by exploitation cell layer processing
framework, performed in partner open lakes that is at
chemicals.
risk to pollution and vanishing of water, so prompting
less efficiency, yet proper for developing alga with a So also, trans-esterification technique is utilized to
lower substance of oil, a second shut framework with change over triglycerides to FAME/biodiesel with
greatly managed temperature and less probability of glycerine as a side-effect, wherever the response rate
tainting anyway expensive than open framework and is duplicated inside the presence of impetus like
furthermore the last however the chief most famous corrosive or base respect NaOH or KOH. The

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 989


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

property of biodiesel relies upon relevant methods for throughout production, specially with protoctist biofuel,
oil extraction and strains of oil. The oil with high quantity so that isn't increasing the world acid gas level. In end
of immersed carboxylic apparently delivers high stable result, compared to 3 systems, biofuel from alga would
biodiesel because of, the nearness of poly unsaturated be a most property alternate supply of energy due to
carboxylic acid square measure subject to oxidization the many blessings to decision a number of not having
and antacid based for the most part trans esterification impact on food cycle, land usage and totally different
technique gives high quantitative connection of biomass living organism and drastically scale back the GHG
transformation [35,36]. An ongoing strategy alluded to emission."
as aqueous stage change, turn out biodiesel at
vasoconstrictor ~350oC and high twenty MPa that REFERENCES
doesn't require drying or lack of hydration. The 1. Steen M (2001) Greenhouse Gas Emissions from Fossil Fuel
Fired PowerGeneration Systems. European Commission Joint
efficiency and yield likely could be enhanced by the Research Centre.
expansion of carbonic corrosive gas and furthermore
2. Dusica Stojanovic, Svetlana Pejovic, Zoran Milosevic, "Green
the rate of alga duplicated by the expansion of house Gases And Means Of Prevention", Acta Medica Medianae,
component. 2013, 52(3),49-54.
3. Ahmad L. El Zein, Nour A. Chehaye,"The Effect of Greenhouse
VI. CONCLUSION on Gases on Earth's Temperature",I nternational Journal of
Environmental Monitoring and Analysis, 2015,3(2),74-79.
The global horrifying problem is worldwide warming
which affects the fundamental resources like land, water 4. Dr.Anshu Srivastava, Mr.Shakun Srivastava,"Brunt of Global
House Effect on Flora and Fauna, International Journal of
which leads to undesirable changes like metabolism of Environmental Science and Development,2010,1(4), 318-320.
living being and extremely short span of time. "The 5. Andrew A. Lacis,"Greenhouse Effect", Chapter From The Book
recent report in U.S Energy data administration Green house Gases-Emission, Measurement And Management,
calculate that a pair of 4 billion metric plenty of carbon Www.Intechopen.Com,2012, 1,275-292.
free into the atmosphere per annum for electricity 6. Gaddamidi Sreenivas, Pathakoti Mahesh, Jose Subin,Asuri
production, in addition as average carriage produces Lakshmi Kanchana, Pamaraju Venkata Narasimha Rao, and Vinay
Kumar Dadhwal, "Influence of Meteorology and Interrelationship
eleven,450 pounds of acid gas once a year and virtually with Greenhouse Gases(CO2 And CH4) at a Suburban Site of
246 million cars in U.S alone, this quantity would be India", Atmos. Chem. Phys.,2016,16,3953-3967.
unpredictable globally. But, absorption of carbon 7. Hanna Fekete, Marion Vieweg, Marcia Rocha, Nadine Braun,
through natural resources like plants and ocean unit Marie Lindberg, Johannes Gütschow, Louise Jefferey, Niklas
lesser and this may be further shrivelled by recent Höhne, BillHare, Michiel Schaeffer, Kirsten Macey, JuliaLarkin,
"Analysis of Current Green house Gas Emission Trends",
phylogenesis international amendment and Climate Action Tracker Report, 2013,1,1-120.
deforestation. It's calculable that nearly 9.9 billion u. s. 8. Michiel Schaeffer, Kirsten Macey, JuliaLarkin, "Analysis of
of America lots of acid gas free per annum in USA, Current Green house Gas Emission Trends", Climate Action
whereas ocean will absorb at the most of six.6 billion Tracker Report, 2013,1,1-120.
USA tons per annum and a tree will absorb forty eight 9. B.Byrne And C.Goldblatt," Radiative Forcings for 28 Potential
pounds of the carbonic acid gas every year, so the Archean Green house Gases", Clim.Past, 2014,10,1779-1801.

natural resources isn't compatible with the excess 10. G.V.Chilingar,O.G.Sorokhtin,L.Khilyuk, M. V. Gorfunkel,
"GreenhouseGases and Greenhouse Effect, EnvironGeol.,
quantity of greenhouse gases. Typically, biofuel turn out Springer-Verlag2008,1,1-7.
lesser quantity of acid gas admire, diesel from fuel oil
11. Robert W.Howarth,"A Bridge to Nowhere: Methane Emissions
and fossil fuel unleash 161 pounds and 117 pounds of and the Green house Gas Footprint of NaturalGas", Energy
acid gas severally compared to 228 pounds from coal Science& Engineering Published By The Society Of Chemical
fuel per British thermal unit [British Thermal Unit]. most Industry and John Wiley and Sons Ltd.,2014,1,1-14.
significantly, biodiesel and bioethanol emit and absorb 12. V.Ramanathan, Y.Feng, "Air Pollution, Green house Gases and
Climate Change: Global and Regional Perspectives", Atmospheric
virtually equal or additional quantity of acid gas Environment,2009,43,37-50.

990 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

13. K. A. Smith, T. Ball, F. Conen, K. 25. Adachi M, Hasegawa T, Fukayama H, Tokida T, Sakai H, et al.
E.Dobbie,J.Massheder,A.Rey,"ExchangeofGreenhouseGasesbetweenSoilandAtmosphere:Interactions (2014) Soiland water warming accelerates phenology and down-
of Soil Physical Factors regulation of leafphotosynthesis of rice plants grown under free-
andBiologicalProcesses",EuropeanJournalofSoilScience,December2003, air CO2 enrichment (FACE).Plant Cell Physiol 55: 370-80.
54, 779-791.
26. Khan I, Azam A, Mahmood A (2013) The impact of enhanced
14. R K A g g a r w a l , S a n g e e t atmosphericcarbon dioxide on yield, proximate composition,
Markanda,"EffectofGreenHouseGasesandHuman Population in elemental concentration, fattyacid and vitamin C contents of
G l o b a l tomato (Lycopersicon esculentum). EnvironMonit Assess 185:
Warming",JournalofEnvironmentalEngineeringandTechnology,2013,2(1),13- 205-14.
16.
27. Wiman, Bo LB (2011) Effects of global warming on environmental
15. .IPCC (2007). Climate Change 2007: Synthesis report. pollution: Anarea with many knowledge gaps. Climate change,
Contribution of Working Groups I, II and III to the Fourth Human system and policy.
Assessment report of the Intergovernmental Panel on Climate
28. Snow M, Snow R (2015) The impact of climate change on Human
Change [Core Writing Team, Pachauri, r.K and reisinger, A. (eds.)].
Health. Journal of Climatology and Weather Forecasting 3:1.
IPCC, Geneva, Switzerland.
29. Naik SN, Vaibhav V Goud, Prasant K Rout, Ajay K Dalai (2010)
16. U.S. Global Change research Program (2009). Climate Literacy:
Production offirst and second generation biofuels: A
The Essential Principles of Climate Sciences.http://
comprehensive review. Renewable andSustainable Energy Review
www.globalchange.gov/resources/educators/climate-literacy
14: 578-297.
17. Hattenbach, R. Wilson, P., Brown, K.,"Capture of Carbon Dioxide
30. Singh SP, Singh D (2010) Biodiesel production through the use
from Coal Combustion and its Utilization for Enhanced Oil
of differentsources and characterization of oils and their esters as
Recovery", Amsterdam International Journal of Green house Gas
the substitute: A review.Renewable and Sustainable Energy Review
Control,1999,4,217-222.
14: 200-216.
18. Sunil Jayant Kulkarni,Ajaygiri Kamalgiri Goswamiand Nilesh
31. Moheimani NR, Mchenry MP, Mehrani P (2013) Microalgae
Shinde, "Treatment and Recovery for Flue Gases: a Review",
Biodiesel andMacroalgae Bioethanol: The solar conversion
International Journal of Research, 2015,2(6),pp.515-519.
Challenge for IndustrialRenewable fuels. Book Natural and
19. Hansen, J; Sato, M; Ruedy, R (2012). "Perception of climate Artificial Photosynthesis: The SolarConversion Challenge for
change". Proceedings of the National Academy of Sciences. 109 Industrial Renewable Fuels.
(37): E2415-23. doi:10.1073/pnas.1205276109. PMC 3443154.
32. Anders S Carlsson, Jan B van Beilen, Ralf Moller, David Clayton
PMID 22869707.
(2007) Microand Macro Algae: Utility for Industrial applications.
20. Schwaab K, Dettling F, Bernhardt, Elsner C, Sartorius R, et al. CPL Press UK.
(2008)Fluorinated GreenHouse Gases in Products and Processes:
33. Dragone G, Fernandes B, Antonio AV, Jose AT (2010) Third
An evaluation ofTechnical Measures to Reduce Greenhouse Gas
generation Biofuelfrom microalgae. Current Research, Technology
Emission. German Federal.
and Education Topics inApplied Microbiology and microbial
21. Xie H, Liu K, Sun D, Wang Z, Lu X, et al. (2015) A field experiment biotechnology.
with elevatedatmospheric CO2-mediated changes to C4 crop-
34. Behera S, Singh R, Arora R, Sharma NK, Shukla M, et al. (2014)
herbivore interactions. SciRep. 18: 13923.
Scope ofalgae as third generation biofuels. Front Bioeng
22. Mikkelsen BL, Olsen CE, Lyngkjær MF (2015) Accumulation Biotechnol 2: 90.
of secondarymetabolites in healthy and diseased barley, grown
35. Douglas C Elliott, Todd R Hart, Andrew J Schmidt, Gary G
under future climate levelsof CO2, ozone and temperature.
Neuenschwander,Leslie J Rotness, et al. (2013) Process
Phytochemistry 118: 162-173.
development for hydrothermalliquefaction of algae feedstocks in
23. Gruwez R, De Frenne P, De Schrijver A, Leroux O, Vangansbeke a continuous- flow reactor. Elsevier AlgalResearch 2: 445-454.
P, et al.(2014) Negative effects of temperature and atmospheric
36. Najafi G, Ghobadian B, Talal FY (2011) Algae a sustainable energy
depositions on theseed viability of common juniper (Juniperus
source forbiofuel production in Iran: A case study. Renewable
communis). Ann Bot 113: 489-500.
and Sustainable EnergyReview 15: 3870-3876.
24. Song L, Chow WS, Sun L, Li C, Peng C (2010) Acclimation of
photosystem IIto high temperature in two Wedelia species from
different geographical origins:implications for biological invasions
upon global warming. J Exp Bot 61:4087-96.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 991


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The Prominence of Soft Skills in one's Academic and


Professional Enrichment
Madderi Muthuvel Gopi
Department of English Siddharth Institute of Engineering & Technology (Autonomous) Puttur, India
Email: gopimuthuvel14@gmail.com

Abstract- Soft skills include many skills that can • Leadership


be classified as a personality trait. In the soft skill
• Problem-solving
Interpersonal skills and communication skills are
more specific categories that many employers look • Research
for in job applicants. There are many soft skills that • Creativity
can be prepared for job application also. Soft skills
play an important role in resume writing, • Work ethic
Curriculum vitae, interviewing and finding success • Integrity
in communicating with people at work and in other
areas of life. While looking for jobs, one can find The above sub-skills create a wider range of soft
that many employers list specific soft skills on their skills and enhance one's ability in all aspects of life. Soft
job posts in the required sections. skills are often innate personality traits. Several
Key words--- Soft Skills, Personality, marketable soft skills will help the applicant to get
communication, Success, Employers, etc. success in a job. Though many are formed with
personality, soft skills can also be learnt and developed
I. INTRODUCTION with practice and experience. The following sub skills
Soft skills are often transferable across careers and are key soft skills and how those skills can enhance
industries. As a result of this, one can find that one ones performance during and after the job search
possesses many of the required traits even if one doesn't process.
match the exact profile in a job description. It is found A. Communication Skills
that it helpful to consider how one may showcase ones
soft skills in an interview. While displaying some skills Effective communication skills will be helpful through
like good communication, one can consider weaving the interview process and in one's career. The ability to
others into ones answers to interview questions. For communicate involves knowing how one should speak
example, while talking about problem-solving skills in to others in different situations or settings. For example,
specific answering a question like, "Tell me about a time when working with a team on a project, one may need
you overcame an obstacle." The question verifies your to communicate when one believe that an idea or
soft skills and other strengths. Soft Skills include the process is ineffective. It is a way to tactful and skillful
following skills namely disagree with others on the job without creating conflict
is an important skill that employer's value.
• Effective communication skills
Communication skills depend upon
• Teamwork
• Active listening
• Dependability
• Confidence
• Adaptability
• Conflict resolution
• Conflict resolution
• Organization
• Flexibility

992 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Good communication skills are a prime indicator of on industry knowledge to fix an issue immediately, as it
whether or not a candidate will make a good fit within occurs, or taking time to research and consult with
an organization. A huge part of communication involves colleagues to find a scalable, long-term solution.
listening. Today's business landscape is about Problem-solving skills include
communication, relationships and presenting ones • Creativity
organization in a positive way to the public and potential
employees. Soft skills in the workplace allow • Research
organizations to effectively and efficiently use their • Risk management
technical skills and knowledge without being hampered • Teamwork
by interpersonal issues, infighting and poor public and
market perceptions. Written and verbal communication D. Creativity
skills are important for the majority of jobs because Creativity is a broad ability incorporating many
they help you interact effectively with all of the people different skill sets including other soft and technical skills.
you encounter at work, such as, customers, networkers, Employees with creativity can find new ways to perform
traders, colleagues etc. and build strong relationships. tasks, improve processes or even develop new and
One needs to be able to communicate well in all exciting avenues for the business to explore. Creativity
platforms: face-to-face, video calls, over the phone, can be used in any role at any level. Creativity skills
via email etc. include
B. Characteristics of an effective communicator • Curiosity
• Active listening • Learning from others
• Adaptability - adapting your communication styles to • Open-mindedness
support the situation • Taking calculated risks
• Clarity
E. Adaptability
• Accuracy
While working in a technology-driven field or start-
• Confidence and assertiveness up, adaptability is especially important. Changes in
• Constructive feedback - giving and receiving it processes, tools or clients you work with can happen
• Emotional intelligence - identifying and managing your quickly. Employees who are capable of adapting to new
emotions, as well as other people's emotions situations and ways of working are valuable in many
jobs and industries. Adaptability skills include
• Empathy
• Consistency
• Interpersonal skills - social skills which are especially
useful in building strong rapports • Organization
• Interpretation of body language - this will help you • Optimism
understand how someone is feeling • Flexibility
• Open-mindedness
F. Work ethic
• Patience
Work ethic is the ability to follow through on tasks
• Simplifying the complex and duties in a timely, quality manner. A strong work
C. PROBLEM-SOLVING ethic will help ensure you develop a positive relationship
with your employer and colleagues even when one is
Employers highly value people who can resolve developing technical skills in a new job. Many
issues quickly and effectively. That may involve calling employers would rather work with someone who has

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 993


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

a strong work ethic and is eager to learn than a skilled managers and others involved in the hiring process to
worker who seems unmotivated. Work ethic skills assess them in potential hires, making them an important
include but elusive set of skills to look for. Soft skills in the
• Attention to detail workplace are becoming increasingly important as
organizations look to add additional value to their
• Integrity business.
• Persistence
IV. CREATIVE AND CRITICAL THINKING
• Time management
Employing a workforce of creative and critical
II. THE EFFECTIVE TIPS FOR thinkers is essential for introducing fresh ideas, services
IMPROVING SOFT SKILLS and products. In fact, creative and critical thinking skills
Many employers value strong soft skills over were ranked second and third on the World Economic
technical skills because they are often personality traits Forum's top skills employees will need to thrive in the
developed over a lifetime and can be difficult to teach. fourth industrial revolution. As artificial intelligence and
For example, an employer is seeking someone skilled automation in business evolve, creative and critical
in conflict resolution. It is naturally skilled at effective thinking skills will be increasingly needed to complement
communication to practice working through conflicts the capabilities of machines. However, creative and
with others. critical thinking skills are in short supply.
• Pick a soft skill you want to improve and practice it V. TEAMWORK
consistently.
Teamwork is weak points for many organizations,
• Observe and mimic the positive soft skills you see in and it's causing performance and productivity challenges.
others. Successful collaboration is strongly related to team
• Set milestone goals to improve soft skills. work along with effective communication skills.
• Find resources to help you learn. Communication skills include actively listening to
colleagues and willing engagement in conflict resolution
III. SOFT SKILLS FOR JOB APPLICATION to mitigate the effects of miscommunications as well as
A resume should include a section that lists your keeping projects and organizational initiatives on track.
relevant hard and soft skills. When deciding which skills VI. COMPASSION IN LEADERSHIP
to put on a resume, consider what skills are called for
in the job post and those you possess that can be Compassion is an important aspect of good
verified by your references. Cover letter should include leadership. Teams thrive when the members trust that
at least one well-developed and relevant soft skill that their leader cares about them. Research shows that
provides context as to why you're a good fit for the organizations with more compassionate leaders excel
job. One can do this by explaining how your soft skill at collaboration - already identified as a key soft skill in
aligns with the company's goals, values or mission. the modern workplace. Compassion is a pre-requisite
for effective communication and other soft skills in the
Soft skills are a combination of people skills, social workplace that enhance interpersonal relationships in
skills, communication skills, character or personality the workplace, which are essential to maintaining
traits, attitudes, career attributes, social intelligence, and workplace cohesion.
emotional intelligence quotients that enable employees
to navigate their environment, work well with others, VII. CONCLUSION
perform well and achieve their goals with Hence, Soft skills take an important role in academic
complementing hard skills. They are unquantifiable and professional enrichment. Recruiting for the right
professional attributes, it can be difficult for hiring blend of soft skills takes a measured and strategic

994 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

approach. It also requires an investment of time, patients 3. Thorpe Edger & Thorpe Showik, "Winning at Interviews",
Pearson Publications, 1st Edition.
and gut instinct. Make sure to think carefully about how
one can learn more about your candidates as humans 4. Pritchard J, "The importance of soft skills in entry-level
employment and postsecondary success: Perspectives from
interacting with other people. Soft skills are personal employers and community colleges" Seattle, WA: Seattle Jobs
attributes, typically linked to how you work and interact Initiative, 2013.
with others, which are necessary for success and your 5. Robles, M.M, "Executive perceptions of the top 10 soft skills
career development. Soft skills make it easier to form needed in today's workplace" Business Communication Quarterly,
75(4), pp. 453-465, 2012.
relationships with other people which make you visible
for the right reasons, consequently unlocking more WEB RESOURCES
career-related opportunities for everyone. www.en.wikipedia.com
REFERENCES www.softskills.com

1. Robert M. Sherfield et al, "Developing Soft Skills", Cornerstone www.softskillsindia.com


Publications. www.softskillsworld.com
2. Murphy, "Effective Business Communication", The McGraw
Hill Company, 7th Edition.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 995


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

The Importance of English Language and Literature in


the Development of Students Language Skills
Madhu Panse1, Hassan Md Jillun Noor2, Prajakta Vijaykumar Patil3
1,2,3
Department of English PhD Research Scholar JJTU,Rajasthan,India.
Email: madhupanse@gmail.com1 , Hassan.noor80@gmail.com2, patpraju2016@gmail.com3

ABSTRACT: Literature is a kind of art in which command of the language also lays the groundwork for
language and words are utilised to express meaning children to establish good interpersonal relationships
by depicting objective reality. Literature is as they move through school. At the moment, there is
distinguished from other creative genres such as
considerable social rivalry. When students join society
music, sculpture, painting, and other visual arts by
for the first time, they must have strong language abilities
the fact that it serves as the bearer of the work of
art's image. Literature has the ability to transcend in order to cope successfully with a variety of
the limitations of particular material materials, to interactions and to advance in social competitiveness
be unfettered by time and space restrictions, to as they climb the ranks. On the other hand, pupils'
represent a broad range of vibrant social life, and linguistic abilities have deteriorated. When individuals
to directly portray the individual's complex and interact, it is much more difficult for them to
sensitive inner reality. The study of literature is communicate effectively in the right language.'
essential to the development of language abilities, Numerous factors have a role in the development of
and this point cannot be emphasised enough. Along this issue. English language and literature teaching are
with providing many and vibrant materials, important components of the educational process when
literature may pique learners' interest in language
it comes to enhancing students' language abilities and
acquisition by creating the illusion of immersion
increasing students' English aptitude. Student-centered
and unintentionally completing the accumulation of
vocabulary, penetration of grammar, and English language and literature education can effectively
development of language sense. As the capacity to provide students with literature and language
comprehend increases, so does the ability to information, expand students' thinking space, and
construct a language. While reading and writing broaden students' visions, while also providing students
abilities improve, language capacity progresses with opportunities to engage in language practise
from basic comprehension and expression to in- activities that can significantly improve students' language
depth information and literary expression as abilities. As a result, the importance of prioritising English
literary literacy develops. The study of language language and literary instruction in school education, as
and literature has a significant impact on students' well as the development of pupils' language abilities, is
ability to communicate successfully in their own
emphasised.
language.
"Literature just adds to reality, it does not simply
Keywords: Literature; English; Language
Skills; Role describe it. It enriches the necessary competencies that
daily life requires and provides; and in this respect, it
I. INTRODUCTION irrigates the deserts that our lives have already become"
Language skills are critical for today's talents to C. S. Lewis (British Scholar and Novelist, 1898-1963).
develop in order to succeed in their professions.
II. THE ROLE OF LITERATURE IN
Language is the primary means of communication and
LANGUAGE LEARNING
interaction in contemporary life. Improving children'
expressive language abilities is important for overall The use of literature in language acquisition has been
communication capacity and efficacy. A strong criticised by a large number of people. Researchers,

996 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

on the other hand, have reacted rationally and "spoken" appearing in the participle form of the verb
emphasised the significance of literature in language "become." Simultaneously, the term "rule" made it very
acquisition. According to them, literature exposes kids clear that the British were in a "colonial" condition of
to relevant settings that are rich in descriptive language things. The sentence is divided into two parts, the first
and fascinating people. It offers a wide variety of of which begins with the word "because," and the second
vocabulary, dialogues, and prose that may be used to of which is a distinct phrase. Each verb's word form in
educate students to converse in the language utilising this phrase indicates that it occurred in the past.
new terms learned from the literary text. Literature Numerous verbs may be adequate to describe the
assists students in developing their interpretive skills. occurrence of the event; the two clauses are
Povey (1972) observed that "literature will improve all interchangeable when followed by the conjunction
language abilities since literature will expand linguistic "because," which retains the beauty of English sentences
knowledge by providing proof of vast and nuanced while also communicating the greatest amount of
vocabulary use, as well as complicated and precise meaning with the fewest feasible words.
syntax" (cited in McKay 1982: 529). Literature helps A firm understanding of fundamental information is
students get acquainted with global problems and required for both practical application and the
therefore encourages them to read. Another successful improvement of language use's aesthetics. Students may
method that enhances students' reactions and benefit from the experience when sentences are created
interactions with literature and offers greater language in line with English phrases. For another example, in
access for learners is the language-based approach the book The Catcher in the Rye, the only thing capable
(Littlewood, 1986). Literature study may help students of wearing everything away was time, with the exception
become more aware, introspective, and creative, which of tears. While emotions will be processed over time,
can help them learn a language faster. disputes will also be resolved over time. Author's brief
III. THE LANGUAGE ABILITY OF introduction: Chen Ruojing is a graduate student and
STUDENTS' COMPOSITION professor. The subject of the study is applied linguistics
and instructional methods.
To communicate successfully, you must first have a
firm grasp of the language. It is divided into two IV. AN ANALYSIS ON THE STRUCTURE
components: morphology and syntax, which together OF STUDENTS' LANGUAGE SKILLS
provide the linguistic foundation. The capacity of Students' language competence increases after the
students to communicate semantically and logically is completion of the course as a consequence of the
founded on morphology, while their ability to speak learning of specific language-related information. All
meaningfully is based on syntax. Simply said, individuals need adequate language abilities in order to
morphology is the use of language, while syntax is the communicate their innermost emotions and provide
logical process of sentence construction. important communication information. Simply put,
For instance, when the rulers of England first spoke without matching language abilities, the language's
Danish and then French, the English language became associated communication functions are lost, and the
less Germanic. When you closely examine this sentence, associated information that students acquire is
you will see that it has a very smart morphological and undermined. To evaluate someone's language aptitude,
syntactic organisation. Morphology dictates that the they must exhibit the following qualities: a fundamental
word "becoming" be followed by a verb prototype, understanding of language; language communication
which is why the word "like" occurs later in the phrase abilities; rhetorical talents; life taboos about language
as a verb prototype. usage; and other characteristics.
Basic knowledge of the English language
Additionally, this phrase is written in the past tense,
with terms like "become," "governed," "saying," and The fundamental comprehension of a language serves
as the foundation for language usage. To develop
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 997
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

specific language skills, children must first learn the thoughts and being understood by the other side of a
necessary foundational language knowledge. Because conversation, as specified by the Common Core
communication that does not adhere to linguistic norms Standards.
is unintelligible to both parties, and communication that
V.ADVANTAGES OF LANGUAGE
is incomprehensible to both parties is a senseless subject
LEARNING THROUGH LITERATURE
to begin with. The fundamental understanding of
language is divided into two sections: English There are three major benefits of learning a language
morphology and English syntax, which are treated via literature. They're:
separately here. • To aid in the development of intellect and sensitivity,
Capacity for Language Communication in a Wide as well as to inspire students' creative and literary
Variety of Situations Students have a particular capacity imaginations
for communicating since they have a fundamental • to raise pupils' overall cultural awareness
understanding of the language. However, students must • To improve language learning's psycholinguistic
be able to communicate successfully in daily life not component.
only via their basic knowledge of these languages, but
VI. THE IMPORTANCE OF ENGLISH
also through the acquisition of particular communication
LANGUAGE AND LITERATURE IN THE
skills related to the process of linguistic communication
DEVELOPMENT OF STUDENTS'
in everyday life. Language communication is a
ENGLISH
multifaceted process. Diverse individuals will
communicate the same idea in a variety of ways, and Students' interest in English language study may be
even the same person may express the same meaning piqued by the introduction of literature to the classroom.
in a variety of ways based on their personality. A person When it comes to literary works, the rich and varied
will either employ euphemisms or freely convey their vocabulary, expression, and beautiful chapters provide
feelings in their words. Each of these components must learners with the exquisite and charm that is more
be related to a specific linguistic context. To put it attractive than illustrative or expositive language
another way, the context of language has an effect on materials, and this may help to increase the innate desire
communication, and the capacity of language to study a language. Literary works that portray the
communicators to control that impact is a particular vastness of the world and the complexity of human
manifestation of their language abilities. beings may simultaneously inspire learners to interact
and ponder, leading their learning states to change from
The Use of Language in Rhetoric Students' language
passive to active. The study and collection of literary
communication may be categorised according to their
works, as well as the development of literary literacy,
communication characteristics; for example, students
will result in an improvement in one's own linguistic
can be split into two categories based on how they
ability.
communicate in English; those who speak verbally and
those who communicate in writing. On the other hand, Language resources that are both rich and vivid may
students are expected to demonstrate a certain degree be found in literary works. The language resources
of rhetorical competence in both oral and written included inside literary works are almost limitless. On
communication. In Chinese, rhetoric is defined as the the one hand, it makes use of words to create
use of a range of techniques to alter the meaning of the imaginative pictures, is not constrained by time or space
communicator's particular words and phrases. When constraints, and can always reflect the limitless social
students express themselves emotionally in English, they life and face of the world; on the other hand, it is capable
must also employ a variety of techniques in the specific of accurately portraying the characters' complex and
process of communication to ensure that their own sensitive hearts. The literary work library is also a
language is capable of both conveying their own language library, with excellent language materials that
may be accessed by anybody who wants them.
998 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Because of this, contacting, understanding, and result, instructors must be capable of leading children
absorbing a vast number of English language resources through a significant quantity of reading, moving from
is beneficial in consolidating and deepening fundamental quantitative to qualitative change, in order to improve
language knowledge as well as learning the vivid students' language skills. Second, it is critical to create
language and genuine expression technique on the basis English literature learning goals in order to lead students'
of original Chinese literary literacy. The rich and deliberate study of the language with the goal of
emotional writing helps the student understand the improving their language abilities.
vocabulary by placing it in a context that is meaningful
to him or her. REFERENCES
1. Liang L. Depicting Chinese parenting during the early years: a
When it comes to creating context and bridging time systematic review of the English language literature. 2014.
and place barriers, Literature Learning is very beneficial. 2. Matsumoto S. Literature and Language Education: An Analysis
In part due to the fact that English is not our native of Questionnaire Responses of First-Year English Majors at
language, the most important obstacle to learning is the Bukkyo University (4). Journal of the Faculty of Letters, 2015,
99:57-72.
absence of an appropriate linguistic context. Aside from
engaging with native English speakers, studying foreign 3. Upadhyay H. English Language Literature for the Students of
English Literature. 2016.
literature is the quickest and most effective way of
4. Kamtchueng L M. Non-standard Idioms in Cameroon English
learning the language. Literature is a combination of Literature and Their Impact on English Language Learning and
language and culture that is unique to each individual. Intelligibility. Theory Practice in Language Studies, 2014, 4(8).
In terms of temperament, social connections, cultural 5. Gilakjani, Abbas Pourhosein Sabouri, Narjes Banou. Learners'
characteristics, customs, and psychological states, Listening Comprehension Difficulties in English Language
literature is the most vivid and straightforward source Learning: A Literature Review. English Language Teaching, 2016,
9(6):123.
of information available about a nation. When a student
6. Owolabi D. The Domestication of the English Language for
reads a literary work, he or she seems to enter the Literary Purpose in Nigeria: Creating a National Identity.
author's world, which is based on real life, and to get 2017:488-492.
firsthand knowledge of the use of many different 7. Zhang X. A critical review of literature on English language
languages in a variety of situations. Learning entails teaching textbook evaluation: What systemic functional linguistics
much more than just memorising words and grammatical can offer. Journal of Language Cultural Education, 2017, 5.
rules. By immersing themselves in the target language, 8. Mohammed A, O'Neill G, Karcher A M, et al. Actinobacillus
hominisosteomyelitis: First reported case in the English language
learners may enhance their English communication
medical literature: Jmm Case Reports, 2016, 3(3).
abilities.
9. Scheidler J M. Mexican American English language learners in
VII. CONCLUSION Arizona: a literature review[J]. International Journal of Teaching
Case Studies, 2014, 5(3/4):314.
Students' language skills will improve as a result of 10. Zaid M A. Effectiveness of Using Literature for Teaching English
the provided English language and literature education. Language Writing Skills[J]. 2015.
To begin, children should be encouraged to engage in a 11. Zhuang P, Cheng L. About English-language Scholarship on
variety of reading activities to help them develop their Humor in Ancient Chinese Literature[J]. CLCWeb - Comparative
Literature and Culture, 2015, 17(1).
linguistic abilities. Language instruction requires
extensive reading, which implies that pupils must study 12. Abdelaziz B. Techniques for Selecting and Evaluating English
Language Literary Texts[J]. 2014(19):7-14.
and accumulate a significant quantity of reading material.
13. Banegas D. The Role of Literature in ELT - Part One, 2010.
Each instructor emphasises the value of linguistic sense
while teaching English language and literature. As a

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 999


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Challenges and Latest Trends in ELT


K. Nirmala Priya1, P.Kusuma Harinath2
1
Research Scholar SV UniversityTirupathi, India.
2
Professor & HOD, English DepartmentSV University Tirupathi, India
Email: nirmalapriya2003@gmail.com1, tirlangitirupathi@gmail.com2

Abstract- 'Teachers can change lives with just English teachers in present day ELT would also be taken
the right mix of chalk and challenges' was said by up. They ways in which students can put their learning
Joyce Meyer. Learning the language is a phobia into practice in day-to-day use to fulfill their practical
and a complex challenge for the majority. The
demands through effective communication skills apart
importance of teaching the language in order to
from gaining command over English language would
fulfill the ever growing demands of career
enhancing. New trends, technologies have be also be highlighted. We need to bridge the gap
supplemented English learning in authencity and between 'haves' and 'have-not'.
literacy such as reading, writing, speaking, listening
II. OBJECTIVES
skills of students. It is quite clear that English has
become a necessity today. It features the spread • To narrate the challenges and latest trends in teaching
of English in the world. A new trend is the general English language.
tendency or direction towards change. Recent • To trace the different methodologies and strategies
trends, challenges, methodologies and in teaching.
developments portray the vital role of education
sector in general with its internalization of the • To give a brief note on the developments in teaching
education process. This paper presents the famous English language.
challenges and trends in the ELT with specific • To identify the different needs of teaching.
refernce to the teaching.
• To use language for communication effectively.
Keywords-QualityEducation, Acquisition of
language structure,New trends in English, III. COMMON CHALLENGES IN
Methods, Trends, Learning process, Cooperative TEACHING
learning.
The history of language teaching presents a
I. INTRODUCTION fascinating variety of challenges. Different challenges
may be appropriate to different contents. If we start
As an introduction to the teaching of English language
searching for the perfect challenge or the ideal single
we have to learn about the nature of the four language
solution to the problems of language learning, we are
skills and methods.English is used not only for
bound to fail. Teacher need to use their discretion in
communicative purpose but also serves as a link
deciding on what method to use and when. (Richards
language for inter-state and intrastate coordination as
and Rodgers) So, a teacher should adopt eclectic and
the nation is found with the great ethnic and linguistic
pragmatic approach because no single approach is useful
diversity. Though modern technology has started playing
in all situations. When the teacher becomes slave to the
aconsiderable role in imparting and acquiring the
method, the whole teaching work becomes a
language. In the present times, so many books have
topsyturvy. A good teacher should keep all the challenges
been published in English about English language in
in his/her armory and use any challenges depending
general and English Language Teaching in
upon the learner's level, needs and classroom situation.
particular.Moreover, the importance of teaching English
Judicious use of any method can prove beneficial for
in order to fulfill the ever growing demands of English
the learners. Knowing the latest challenges of language
language is also stressed. Current challenges before
1000 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

teaching is like taking a loan from a bank without iv. All systematic and deliberate attempts to teach the
knowing how, when and where to invest the loan to structure of the language result only in interfering with
maximum advantage. It is worthwhile for the teacher to the other modes of unconscious language acquisition.
keep in mind various approaches rather than a specific v. Form is the best learnt when the learners attention is
method. It is possible to be flexible and adaptable in on meaning.
the English classroom if the teacher lets the class know V. CHANGE IN GOAL OF TEACHING IN
from the very first what his or her demands are pertaining ENGLISH
class work, class discipline and homework and clearly
states all goals and objectives. If we respect our students In my opinion, there are two key changes in the
and plan our curriculum to suit the needs of the class, purpose of teaching English. Firstly, noted the goal is
there won't be much difficulty. Most teachers do not "to produce fully competent English-knowing bilinguals
strictly stick to one teaching method or strategy but rather than imitation native speakers." As I mentioned,
rather combine different aspects of several strategies the purpose is not to aspire to become native speakers
to create effective classroom interaction. Every method of English, because we are already native speakers of
needs to be tailored to the local situations and the context our own L1, but to focus on English as a means of
of teaching. There is no single fool proof method, as it communication. Secondly, English is not viewed as an
were. It is left to the sound practical common sense of end in itself but as a means to learn content such as
the teacher to discover in what circumstances for what science and mathematics. Content and language
purpose which method is most effective. The order of integrate learning (CLIL) is an approach where the
progression, according to the new challenges, is: English teacher uses cross-curricular content and so
the students learn both the content and English.
Ability to read English Fluently.
VI. LATEST TRENDS IN TEACHING
Ability to write Efficiently.
English language teaching has undergone tremendous
Ability to speak and understand Effectively. changes over the years, especially the last ten years.
IV. STRATEGIC TEACHING AND Students are burdened with studying, learning and
LEARNING grasping the materials, and of course, lectures with the
collection of relevant information from prescribed texts.
Teaching in English language classes focuses on Many career alternatives once regarded insignificant are
fostering student thinking as well as language content, gaining importance at present such as communication
outcomes, and learning activities. There are significant skills, soft skills, technical skills, interpersonal skills, ICT
and complex student-teacher interactions inside and literacy etc. The need for chiseled graduates to merge
outside the classroom. The gamification of learning is successfully in the tough competition of survival in the
emerging as a way to make language learning more global market is in great demand nowadays. For this, a
engaging and relevant to the younger generation.Based change in the trend especially the teaching learning
on the following there are 5 strategies in teaching and process of English language has to undergo a transition
learning: for the betterment. Seasons change, fashionchanges,
i. Successful acquisition of language structure involved attitudes of human beings change but it is disheartening
in the acquisition of much more than is deliberately to note that in the last century English curriculum has
taught or consciously learnt. hardly undergone any change. There are so many trends
ii. A large part of language structure is acquired and in teaching. I am going explain a few of those trends in
operated unconsciously. this paper presentation
iii. The structure of the language is learnt best when 6.1.Web-based learning
teaching is not explicitly and consciously directed
In recent years the terminology has been changed
towards it.
for webbased learning; it was called as technology
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1001
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

based or distance learning, online education, in the end interaction with teachers in these virtual environment,
it is now called e-learning and web based learning. A they can communicate with not only teachers but also
variety of basic language skills can be developed with peers and share information.
the help of web-based language learning activities. It is
known that; there are four basic skills in English which 6.4. Mobile Devices
are listening, speaking, writing, and reading. These skills Today's world has been changed over the years and
can be put on the web and made interactive in a variety besides technology has been changed in other words it
of ways. One of these ways is internet communication has been developed. Mobile learning is one of those
tools such as m-learning, email, blogs, chat. These tools technologies which have been used for a few years.
provide integrated environment for teachers and Firstly; mobile learning means that people are learning
students. Students generally feel positive about web- whenever and wherever they want with their mobile
based learning tools, when they are: phones, PDA's and other technological devices if they
• well-designed, easy to learn, easy to use have. Mobile learning is also defined as any service or
facility that supplies learner with general electronic
• when the tool is good as support, not as replacement
information and educational content that aids in
of lectures
acquisition of knowledge regardless of location and
• when the use of diverse tool features, i.e. chat, bulletin time.
board, is relevant and tied into the specific course
structure and content. 6.5. skype
Technology is developing and changing very fast, Now a days every messenger services have audio
and if it is not used effectively and correctly some functions and technological equipments such as laptop
problems can be occurred. computers, also have cameras on them. So students
can talk with their instructors and peers far away. Skype
6.2.E-mail is a new emerging technology and the potential
E-mail is a communication tool which is being used application of it to language learning and teaching needs
in language learning. E-mail was in use before the to be further explored (Wu, 2005). And students can
internet even existed and is probably the most commonly speak with native speakers of language and compare
used Internet application. By getting a single e-mail their pronunciation with a native speaker. Speaking skills
account both foreign teachers and students can join e- can be developed by using this application. Also students
mail assisted language activities. For learners of English and teachers do not have to pay for this; they just pay
e-mail is an excellent way to communicate with their for internet access.
instructors because of its usefulness and easiness.
VII. CONCLUSION
6.3.Instant Messenger In conclusion, languages become the primary
ICQ was the first general messenger service in the mediator for delivering or sharing information. One of
early 1996 (www.worldstart.com/tips/tips.php/1498). the most widely used languages in the world is English.
During the years a variety of messenger services such English is well known as an international standard
as MSN Messenger, Yahoo Messenger, etc. began to language and it is very important for those who life in
serve to people. If students are required to type in this globalization era. There are over 750 million people
English only they can have the chance of improve their who speak English as a foreign language and in the year
writing and reading skills through typing and reading 2000 the British Council said that there were about a
the messages they get from their peers or instructors. billion people learning English. English is increasingly
Moreover, students of English have 442 used in many places and seems it has been dominate
GulcinNagehanSarica et al. / Procedia Social and the world communications. "A man who does not know
Behavioral Sciences 1 (2009) 439-445 better foreign language is ignorant of his own". As the most

1002 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

spoken language in the world, English holds a huge part REFERENCES


in the communication. International business goes well 1. Trends in English Language Teaching Today by Yogesh Ramani.
because of English. It helps people when they are using 2. Electronic sources:
technology products although growth of technology
• www.myenglishpages.com
increasing continuously. English also helps student to
• www.googleweblight.com
understand the subject that written in English properly.
Besides that, it makes the people keep in touch although • www.quotegarden.com
they have different language and come from different 3. Hedge T, Teaching and learning in the Language Classroom, Oxford
country. Finally, believe or not, English cannot be
separated from human life.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1003


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Soft Skills Among Professionals


Sailakshmi Yadav
Associate Professor in English, Dept. H&S, VEMU Institute of Technology, Chittoor.AP.India.

ABSTRACT: Skills can be defined as the INTRODUCTION


expertise or talent that one requires to do a job or
task. It is said to be a learned ability to perform an Skills
action with determined results. In fact, skills make
us confident and independent in life. They are very Skills are natural abilities that an individual possesses
essential for success. We are aware of the two Skills in certain areas. These are developed through training
namely Soft Skills and Hard Skills. These two are and experience. As Tom Peter states: 'It is the
important for all employers and employees of "performance" that matters today', firms are concerned
various departments in accordance to their cadre. about them to create increased corporate value. Now
But for professionals, the significant skills required the paramount question is how do we achieve it. What
in their work place is Soft Skills. It is because these factors generate and sustain high performances? After
enable us to work well with others in an
analyzing the performance of a number of corporations,
organization in a productive way. These cannot be
taught through books or lessons. Instead, these both the government and nonprofit organizations have
are ought to be developed, learnt and practised in identified a combination of Hard Skills and Soft Skills
everyday life. Some are instinct and innately as drivers of quality performance.
developed while others are learnt through
Each of us requires some skills, or the other for
experience in one's life. For instance,
Communication, Co-operation, Attitude, Conflict sustenance. It may be persons who are academically
Handling, Team Work, Self-Motivation, Positive strong, professionally high in cadre and working in
Thinking, Self-Confidence, Courage, Problem various departments in their respective fields or
Solving and so on and so forth. individuals who depend on carpentry, fishing, gardening,
painting, farming, constructing buildings and so on so
This paper presents the importance and role of forth: each has his or her own skill to complete a task
Soft Skills among professionals in their work place
for livelihood.
to achieve their goals for continuous professional
development and also for the growth of the
SOFT SKILLS
organization. This article discusses what
constitutes Soft Skills and how they help individuals Soft skills are intangible acquired through our
and organizations in achieving excellence in their dealings with others in our day-to-day life. These are
performance. It also enunciates Personal Traits emotion-based competencies unlike Hard Skills which
and Interpersonal Traits broadly with illustrations.
are task-oriented competencies. These are the
Eventually, it concludes by presenting effective tips
characteristic traits and interpersonal skills that
and strategies to tune students and make our
classes more interesting with a good source of characterize a person's relationship with others. These
knowledge and information. are subjective and so they are learned, developed and
practised through our experience at work place; by our
KEY WORDS: Expertise, Productive, dealings with others, getting feedback, guiding
Professionals, Personal Traits, Interpersonal Traits, individuals and through coaching. In certain sectors,
Positive Thinking, Self-Confidence, Attitude,
bosses and managers are mentors to help us improve
Strategies and Knowledge.
our soft skills together.

1004 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Chiefly speaking, Soft Skills are classified into two. acts towards it and responds to events, situations,
They are: people, circumstances, environment and lastly to himself
1. Personal Traits or herself. It is a kind of habit that showcases our reality.
It is a critical personal attribute. It doesn't happen to
2. Interpersonal Skills. you but it creates thoughts and we act according to the
Personal Traits: These are the characters that reflect thoughts. For example: A teacher hates students who
an individual's characteristic patterns of thoughts, tries to clarify some doubts at the time of teaching but
feelings and behavior. The key Soft Skills under this the teacherdislikes the act. It is the attitude of the teacher
traits include: Time Management, Positive Attitude, because she gets distracted and it irritates her. This is a
Responsibility, Ethics, Integrity, Values, Self- different attitude that hurts the feelings of the students.
Confidence, Courage, Consistency and Predictability. On the other hand, there are teachers who invite and
Let us discuss in detail the two most important traits encourage students to clarify doubts. In another
that are indispensably essential for working incident, teachers do hate late comers to class especially
professionals. They are Positive Attitude and Self- after lunch break. This cannot be considered harshness
Confidence & Courage. These skills are explained on of the teacher. Here it varies as students coming late to
two angles. Firstly, with respect to working class is not a good behavior. Hence the teacher should
professionals and their dealings with their boss, react and make the students understand. If necessary,
colleagues and others at work place and secondly with he/she can be harsh. The former is negative attitude
regard to teacher-student relationship in schools and and the latter is positive attitude of the teacher.
colleges. Types of Attitudes:
Do Professionals need Soft Skills: Indeed, soft Attitude can be classified into the following
skills influence our work status. It showcases how well categories:
we can work and interact with others and become • Positive or Negative
successful in our career. I do strongly recommend Soft • Optimism or Pessimism
Skills to teachers, lecturers and professors working in • Flexible or Stubborn
their respective institutions. Teachers need Soft Skills • Deep or Shallow
to train, learn and nurture students, to them give • Motivated or Demotivated
instructions, to deal with unwanted problems, to impart
• Humble or Arrogant
cultural intelligence, to handle emotional needs and to
build teamwork and solve problems. • Active or Passive
• Measured or Reactive
ATTITUDE AT WORK PLACE
Hugh Prather said, "I always seem to be feeling
superior or inferior, one upon or one down, better off
or worse off than everyone else. The superior moments
are elating, but the rare and blessed moments are when
I feel equal."
We quite often feel at work places 'I will be if I get
promotion or when I get hike in my salary.' Fortunately,
POSITIVE ATTITUDE if it happens, we feel calm, contended and quite satisfied.
When something happens against our wish, we suddenly
It is said "Your attitude, not your aptitude, will
plunge into fear, anger or despair. Yet, at other times
determine your altitude." Accordingly, a person's
we convince ourselves that we will be happy when we
attitude is the way he or she looks at life and feels or

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1005


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

reach some other goal. But when the goal is reached, ATTITUDE WITH STUDENTS
there are always others to fill the vacancy left behind It is said "Positivity makes us easier achieve goals."
by the fulfilled wish, making happiness ever a distant In accordance to the quote, when we are in positive
dream. Why a small remark by a colleague at workplace frame of mind, we will be able to make better decisions
hurls us into a depression? Is it possible to live in this and plan ahead rather than reacting to the setbacks we
world and find a way to sustain happiness all through encounter. Hence, we have to teach students with
life? Yes, it can be achieved through the unique way of positive attitude. As a matter of fact, it is very difficult
acceptance of the reality that things can and will go to handle and build relationships with studentsof different
wrong and the world is not designed to go our way. attitudes. Some are very studious, hardworking, and
Hence, it is one's own attitude and work habits that quick-learners. Others are idle, lazy, disinterested,
defines happiness that enables one to face the realities irregular and dunce. While some others are intelligent,
with humor, flexibility and serenity. topper of the class but arrogant and naughty. Some
Here is an illustrative example of a person's other students are intelligent, obedient, disciplined, well-
weakness and strength showcasing his attitude. mannered, honest and sincere. A few are slow learners
Weakness: Conflicting priorities kill me! but very obedient, respectful, disciplined and good at
Strength: Handling priorities is integral to any job. I conduct. We have to manage all these types of students,
have to do tasks for success. make them attend our classes by hook or crook and
It is quite common that we are given multiple tasks put them on the right track. It is the toughest task in the
in firms with a stipulated time to complete. Most of us life of a teacher.
are at sixes and sevens to take the task as we are afraid, We must remember that sometimes the teacher
we will be not able to complete. This is a kind of himself or herself becomes the root cause for the
pessimistic negative attitude. We whine and keep on students' negative attitude and misbehavior. Most of us
grumbling instead of thinking about the task given to label students, if we find him or her quite different from
us. It is here we must know how to handle these others. We get disgusted and leave the students to their
conflicting priorities. Of course, it is very difficult to know fate.As teachers, we have to know that students of any
what is more important and urgent. Despite, we need stream dislike negative strokes of theirteachers. This
to resolve it. Hence, we must clarify our current causes reluctance, obstinacy, negligence, despondency
priorities and look at the responsibilities and then identify and disobedience among them.
the deadlines. Accordingly, we must manage, re-
TEACHERS LIKED TEACHERS DISLIKED
negotiate positively that it is integral to our job and Helpful and supportive. Mean and unfair.
eventually do the tasks successfully by being professional Taking the time to explain the material Unwilling to help and explain the
in depth. material and ideas beyond instruction.
and flexible.
Friendly and personal. Unfriendly and impersonal.
If we are perfect in imperfections and strong in Knowledge of the subject with good Ignorant of the subject and vague in
weaknesses, everything becomes possible. understanding and analyzing. analyzing.

Passionate and inspirin g, humble with Impassionate, haughty and impolite


students and ever smiling. and indignant.

HOW TO MANAGE STUDENTS


We can do this by setting a good example, creating
a positive learning space and help our students visualize
a positive outcome from every step we take and
eliminate negative verbiage from students' way of
thinking and analyzing anything. We should be a blessed
teacher rather than a pedantic teacher. A feeling that

1006 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

we could not teach more than this is to be inculcated in working in teams. It is a collaborative effort made by a
the minds of teachers. Every student has to say, "Hey group using their individual skills to achieve a goal in
teachers, thanks for all that you do." We should teach the most effective and efficient way. It is selfless because
and educate students in such a way as it makes them the team works co-operatively with mutual
memorable. understanding despite their personal grudge or conflict
Now let us understand the concept well by clicking between the individuals. It helps solve problems easily.
the link given below: It has energized workplaces in many ways.
https://youtu.be/1UtCgZZeUel Here is an illustrative example showing two aspects
of aperson working for a team.
SELF-CONFIDENCE & COURAGE
Weakness: I do not care much about my teams'
Self-confidence is a natural instinct. It is to show success nor that of other members of my team.
faith in our strength and abilities to take new challenges Strength: My teams' success is my success.
in life with conviction. It is a sort of self-assurance.
We, as teachers should collaboratively work for the
Self-confidence makes us courageous to deal with any
success of the class of students who depend on us for
kind of task. It shows our ability and strength to face
their career.
pains in our lives. Hence courage is integral to self-
confidence. Another illustrative example to understand how one
can become successful in completing a task through
Here is an illustrative example of a person's
team work especially in problem solving.
weakness and strength showcasing his self-confidence.
Weakness: I try to do problem solving in isolation.
Weakness: I have worked in this domain and feel
pretty comfortable. I can't be asked to move into a Strength: I work together with my colleague who is
new one. facing the problem and involve him in problem
resolution.
Strength: I feel good in my current job, but must
understand the management who asked me to enter CONCLUSION
the domain. I am confident of my intrinsic skills.
I conclude my article with the following statement
It is a fact that most of us are not satisfied workingin given below:
a firm for some reason or the other. Yet we continue
• Life is but a constant expression of our inner activities,
our service till we get a better opportunity. But it takes if only we know our activities.
time. Till then we have to cope with the environment
• Soft skills make us a whole human being, a social
we work with. Some of us brood over the things which
and successful individual.
will happen in the long run. Instead of this, let us be a
part of the illustration given above and be confident • Deserved recognition should be facilitated to become
that this current job is good with a little bit of capable employees to accomplish our objectives in
today's competitive and knowledge -based economy.
understanding the management we are working,with all
our intrinsic skills. Otherwise, we cannot justify our job Let us enjoy the work by executing our roles just as
as well as the one who we are working for. In the case a child plays a game for the sake of play.
of teachers who are meant for tuning the lives of REFERENCES
students, it is more important.
1. Murthy GRK 'Soft Skills for Success.' The Icfai University Press,
INTERPERSONAL TRAITS 2008.
2. Sundar Valli GM, Kamalkar AS., et al. 'Communication and Soft
TEAM WORK: Together Everyone Achieves More Skills. 'Orient Black swan Private Ltd., 2015. ISBN 978-81-250-
As the proverbs go on "Two heads are better than 6010-9.

one" and "Sticks in a bundle are Unbreakable," 3. WWW.diarystore.com.cdn.ampproject.org.


teamwork is another soft skill required for employees
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1007
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Soft Skills Among Professionals


A.Manjubhashini
Asst.professor of english, Gokula krishna college of enginnering, Sullurpet.

ABSTRACT: What does mean by his feelings in the most appropriate and effective way.
'smart'?.......BILL GATES says "you can teach It tells how one should act and react in particular
smart people anything because they are endowed situations and with selected persons. To be more
with good SOFT SKILLS"
precise, it is a study about how you behave and interact
No generation has so much enjoyed the fruits with the people around you. These skills are transferable
of technology as does ours. Every age and skills, so they can be used in different types of jobs
generation have demanded particular kinds of skills altogether. They are personal qualities and attitudes that
for their bread and butter. We are in the age of can help you to work better comparatively and make a
communication. This age is called 'THE SPACE
positive contribution towards the organisations, where
AGE' or 'THE AGE OF INFORMATION
TECHNOLOGY' or even 'CYBER AGE'.In a
we are employed. However, it doesn't mean that
fraction of a second, modern man can speak to technical skills and knowledge aren?t important. But it
people around the world and watch as live show is the fact that technical skills can be taught easily than
whatever happens around the four corners of the soft skills comparatively. Educational degrees are
world. "INFORMATION IS POWER" is important, but the development of soft skills is more
yesterdays quote. "INFORM THE social than technical. These are a crucial part of fostering
INFORMATION IN THE RIGHT WAY" is a dynamic workforce and are always in high demand.
todays's one. 'Employment' is not today's problem, Everybody gains skills from past jobs, responsibilities,
but 'Employability' is. To be 'smart' is the crux of life experiences, daily occurring events and interests.
the issue. Soft skills which are the personification We may even have hidden skills and when they are
of this 'Smartness', will make a significant impact
identified can be added to our resume and help us to
on the working performance maximizing the
employees contribution to the organization and
become a better contender.
turn the professionals as " TOTAL QUALITY IMPORTANCE OF SOFT SKILLS
PERSONS" (TQP).The article outlines the set of
demanded soft skills,base,analysis and provides Soft skills are considered as time management,
practical guidelines to improve them for both the communication skills, interaction skills, interpersonal
trainer and the trainee. skills, the ability to work, the co-operation, the feeling
KEY WORDS:1.Interactions 2.Behaviour of sympathy and belongingness with others, and so on.
3.TechnicalKnowledge 4.Training 5.Acquired. A more complex definition of soft skills is "a range of
abilities including work ethics, courtesy, teamwork, self-
INTRODUCTION discipline and self-confidence, professional presence,
soft skills have drawn the attention of people in all language proficiency, cultural sensitivity, communication
sectors in modern times as it was never before. Soft skills, ability to accept and learn from criticism, ability
skills are the positive traits expected in a good and to handle client relationships, networking, creativity,
sincere person and have to be developed as a habit. It ability to motive yourself and lead others, time
is generally believed that all the positive aspects of a management, leadership and interpersonal skills". The
man and the values he respect will fall within the ambit relative importance of each skill is associated with its
of the term soft skills. It is accepted as intelligence which profession. In the IT Services industry, communication
is reflected by the manner in which a person expresses skills (particularly listening skills), business

1008 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

communication skills, problem solving skills and team ability to teach, interpersonal abilities and reliability. In
skills are considered crucial and complex to understand. the competitive selection process, most employers use
In organized retail, the main required skills are soft skills to differentiate one candidate from another.
communication skills, selling skills, advertising and Job seekers can gain a competitive advantage over other
distribution skills, customer service skills. This also holds candidates by gaining a firm understanding of their own
true for the financial services sector too. soft skills and then by clearly defining those skills to
potential employers.
SOFT SKILLS VS. HARD SKILLS
There are hard skills and there are soft skills. Hard SOME SKILLS WHICH ARE MUST FOR
skills are specific, can be taught. Hard skills are the PROFESSIONAL EXCELLENCE
minimum skills necessary to perform a job. It is seen 1. Meaningful Communication: This is the most
that most people with the same level of education and common entry on person specifications for job
experience should have roughly the same level of hard vacancies; skilled communicators get attention of their
skills. Hard skills would include knowledge, machine colleagues easily. The subordinates also listen and
understand instructions and put their point across them
operation, computer procedures, safety standards,
without getting angry or annoyed. In addition, they
financial systems, technical analysis, and sales
can change their style of communication as per
administration. Unlike soft skills, hard skills are typically demanded by their job time to time. This can be
easy to observe, quantify, and measure. Soft skills are invaluable in many situations, i.e. from handling conflict
more important than hard skills. They are must for a to trying to persuade a customer of the benefits of
person to be a good human being and to succeed in his buying your product. If one has got good
professional life. The position we hold in a Society communication skills you should be able develop
depends on our social skills that facilitates interpersonal constructive working relationships with colleagues and
behaviour. Our qualification or status will not contribute be able to learn from constructive criticism.
anything if we do not interact positively with others. A Communication skills involve active listening,
person who has a smile on his face and is helpful will presentation and excellent writing capabilities.
always gain more respect than a person who is harsh 2. Decision Making: It helps in better decision making
anddominant. It is said that hard skills may earn you an as soft skills save your energy which otherwise could
interview but it is your soft skills that will get you the have been wasted in anger and envy. Therefore, it
job. CEOs and HR Managers of many companies are helps in gathering the important facts, seeking advice,
looking at the big picture, considering alternatives,
suggesting that companies may perform better if they
being aware of repercussions will always help in
hire people with good soft skills and then train them to making a good decision.
develop their hard skills in their area of specialization.
3. Commitment towards work: Employers want
Soft skills are often intangible and are not easily taught.
people who are dependable, reliable, realistic,
Soft skills is related to a collection of personal, positive
enthusiastic and enjoy hard work. Employees that are
attributes and competencies that enhance your committed need very little supervision or motivation
relationships, job performance, and value to the market. to do their best and get the job done.
Soft skills include your ability to listen well, communicate
4. Flexibility in actions: We live in frequently changing
effectively, be positive, handle conflict, accept times in the workplace, so if one is adaptable and
responsibility, show respect, build trust, work well with flexible, only then he will be able to change with the
others, manage time effectively, accept criticism, work times. It?s a great asset if you are able to step outside
under pressure, be likable, and demonstrate good your comfort zone and try your hand at something
manners. They tend to be more of a function of you haven?t done before. Employers like people who
personality characteristics such as communication, are positive, upbeat and have a "can-do? attitude.
motivation, sociability and work ethic. Some soft skills 5. Time management: When deadlines are
include leadership, creativity, ambition, accountability, approaching, good time management is about

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1009


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

prioritising the most important tasks, and then deciding HOW TO BUILD YOUR SOFT SKILLS
which actions will produce the maximum output with
the minimum effort, so that task can be accomplished
Developing your soft skills takes training, just like
well in time. any technical skill. These blogs focus on developing
soft skills, and are great reading for anyone interested
6. Leadership skills: A good leader is the one who
in giving their career a boost:
inspires others and get the things done in his own
way. They look for people who lead constantly look • Getting Things Done - A blog about time
to improve, motivate themselves are having a positive management and becoming a more effective person,
outlook and they know very well as when to follow by world-famous speaker David Allen.
instructions and when to show initiative.
• Ask A Manager - One of the best! Allison Green
7. Team player: A good team player has the team goals shares workplace tips, with a focus on soft skills and
clear in their mind and works with others to achieve great discussion in the comments section.
them. They are open and honest, and offer • Brian Tracy's Blog - This brilliant author and speaker
constructive suggestions and listen to others. shares tips on building soft skills and success.
8. Accept and undertake responsibility: Employers • High Performance Blog - Become a better team
are on the lookout for people who take pride in their player, both as a team member and as its leader, with
work. They are confident enough to bring out the these valuable tips.
results. They also respect people who can hold their
hands up when things go wrong. Generally, everyone • Futility Closet - Exercise your mind and be a more
makes mistakes but it is more important than how interesting person with these fun puzzles and tidbits
you react on those mistakes and how you learn from of knowledge.
them that counts.
SIX SOFT SKILLS EVERY PROFESSIONAL
9. Work under pressure: In work, performance is NEEDS
must and it is also the fact that some people perform
better when they are in stress. This approach 1. A thirst for knowledge: Adrian Ridner, CEO and
sometimes helps us to perform beyond our co-founder of online learning platform Study.com, says
expectations that employers place a high value on candidates who
have an ability to learn. "Workplace needs are
10.Emotional Intelligence: Emotional intelligence is constantly changing, so we need employees who will
usually something that is revealed through actual be willing to learn and adapt along the way to meet
interactions with the hiring manger, but you can hint those changes. During the hiring process, it's important
that you have it with a strategic resume the addresses to assess if candidates have learning agility and the
areas where your experience and skills are lacking hunger to develop professionally."
relative to the job requirements.
2. Team mentality: "Many jobs are teamwork driven
and rely on each team member to get the project
completed," says Carrie-Anne McGrath, partner and
manager at talent acquisition firm WinterWyman. "It's
not enough to robotically say 'I'm a team player.' Focus
the discussion on your work with teams and the
important role you played. Give specific examples of
a team-focused project - share some interesting
details of the work and describe how it was completed
successfully."
3. Flexibility and commitment: McGrath also says
that being flexible and showing your commitment are
often hard to convey during an interview, but it's still
important to prove you possess these qualities.

1010 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

"Describe your flexibility by talking about a project STEPS TO BECOME MORE SELF AWARE
that was changed just before a due date and how IN SOFT SKILLS
you adapted to meet the new requirements. Discuss
an assignment that required a great deal of time and 1. Ask for feedback
lasted longer than anticipated and how you stuck with 2. Keep a journal
it until its successful completion. When things move
3. Make time to meditate
quickly and deadlines and scope change frequently,
hiring managers want to know their new employee is 4. Make goals and track your progress
flexible and able to adapt easily."
CONCLUSION
4. Project management: No matter what type of role
you're seeking, hiring managers will be looking for a
Soft skills are increasingly becoming the hard skills
candidate who is organized, can stay on task and can of today's work force. It's just not enough to be highly
work under pressure. "Team members should hit trained in technical skills, without developing the softer,
deadlines and let others know where there are on interpersonal and relationship-building skills that help
project timelines," says Jason Patel, former career people to communicate and collaborate effectively.
ambassador at George Washington University and These people skills are more critical than ever as
the founder of Transizion, a college and career prep organizations struggle to find meaningful ways to remain
company. "You need to be able to update others and competitive and be productive. Teamwork, leadership,
give alerts when trouble arises." and communication are underpinned by soft skills
5. Self-awareness: "People perceive us by how we development. Since each is an essential element for
carry ourselves," says Christopher K. Lee, founder organizational and personal success, developing these
and career consultant at PurposeRedeemed.com. skills is very important and does matter. The problem
"Being aware of how your words and actions come is, the importance of these soft skills is often
across, whether intended or not, is a foundation for undervalued, and there is far less training provided for
successful leadership." them than hard skills. For some reason, organizations
6. Communication skills:Ada Chen Rekhi, founder seem to expect people know how to behave on the
and COO of Notejoy, says that when she's hiring, job. They tend to assume that everyone knows and
she looks for communication skills, because she wants understands the importance of being on time, taking
to create a team that can collaborate together initiative, being friendly, and producing high quality
effectively. "They need to be able to explain the work. In fact, whenever you are unable to capitalize on
motivation for their decisions, and persuade others in the wealth of knowledge, experience and proficiency
the team to come along with their viewpoint," she within your team, then you should be assessing the level
says. "There's a huge difference in execution when
of communication and interpersonal skills that are
the entire team is bought in and believes in doing what
you've asked them to do, rather than being tasked present in your organization. The workplace has evolved
with work where they don't understand or agree with an interpersonal dynamic that can't be ignored. The acts
the significance. The result of a highly communicative of listening, presenting ideas, resolving conflict, and
team is that information is shared more quickly and fostering an open and honest work environment all come
the entire team can act with more conviction a speed." down to knowing how to build and maintain
relationships with people. It's those relationships that
HOW TO HIGHLIGHT SOFTSKILLS? allow people to participate fully in team projects, show
You can highlight your softskills in professional appreciation for others, and enlist support for their
areas. Showcasing your soft skills can be useful when projects. Most important you should be clear and
looking and applying for jobs, in an interview or in your intentional about what you want, keep aware of what
daily work. If you are looking for work, you can highlight is going on around you and inside you, have empathy
your soft skills on your resume and in your cover letter. for one another, appreciate your and other?s
performance, know your limits and stretch beyond them
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1011
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES: 3. "The Big Five personality dimensions and job Performance:A


Meta-Analysis", Barrick, M. and Mount, M. (1991),
1. "Need and Importance of Soft Skills in Students", Mangala Rani.
(2010) 4. "The Importance of Soft Skills: Education Beyond Academic
Knowledge", Journal of Language and Communication, Bernd S.,
2. "Personality as a Predictor of College Performance", Wolfe, R. (2008)
and Johnson, S. (1995)

1012 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Collaborative Method with a SMILE to Improve


English Language
S. Feroz Begum
Associate Professor Dept. of English, H&S Vemu Institute of Technology, P,Kothakota,Chittoor,A.P. India

Abstract: Language more often chooses us, then borrowing, particularly by cross-fertilizations from
we choose language. We use this or that language American English. Global media, the Internet, and ever-
according to the place, time and circumstance. For improving technology are just some of the reasons why
Sandhya prayer, the Sanskrit Gayathri; in homely
English is fast becoming 'a global language' or 'Globish.'
context, or for expressing emotion, the mother
Today it is considered to be the world's most essential
tongue; outside one's home, the regional or local
language, at cosmopolitan gathering, generally and useful language in communicating one's thoughts
English. However, there are no categorical and feelings both at the global and local level. In fact, it
imperatives governing the choice or use of has not only become a global phenomena but has a
language. All that matters is that what we speak or family of its own with all "varieties of Englishes' as some
write should bear a proper relation to the total scholars call within the family. In the words of Stephan
situation. Children train it by experimenting freely, Gramley (2003), "English is felt to be the language of
audaciously, adventurously with language. power, the language of prestige".
Usually in Indian classroom one sees a mixed
Another reason why people do not succeed in
group of learners like a) less advanced learners,
b) more advanced learners, and c) advanced
achieving fluency in English is that many teachers teach
learners. So the teacher should bear in mind the English through the regional language. Some other times,
problems of all learners and motivate them the instruction is vocabulary driven. In a typical
accordingly. In fact, the teacher is supposed to classroom, the teacher reads the lesson aloud or asks
enthuse, motive, stir, and guide the learner the learner to read parts of it in turn. He then asks the
positively. Only then the learner would proceed in learners to make a list of words and meanings - and
the right direction. So the teacher must instill a usually gives the meaning in the regional language. The
sense of optimism. While teaching the lessons he point is that, it is taught as a content subject through
has to draw the attention of the learners through rote-memorization of words and meanings, rather than
interesting facts and thought provoking questions as a skill to be used. The present paper is intended to
to stimulate a sense of inquiry and curiosity. He
provide collaborative learning method with a SMILE
has to create confidence by helping the learners to
experience success through understanding of the
that will ensure a teacher to teach as well as to a learner
concepts and their ability to apply those concepts to speak without inhibitions. SMILE stands for Syllabus,
for problem solving. The best method is to be Motivation, Interaction, Learner-Centric Enveronment.
suggested is collaborative method with syllabus,
Syllabus is an outline of a subject to study. It is
motivation, interaction, and learner centric
environment.
suggested that primary purpose of a syllabus is to
communicate with one's students, what the subject is
"Coming together is a beginning. about, why the subject is taught, and what is required
Keeping together is progress. to learn that subject. So one must be careful while
Working together is success - Henry Ford" framing the syllabus. The teachers must frame the
syllabus in such a way that it is simple and interesting
English has become an International language. The but not abstract, monotonous, and dreary.
reason for this is that it is constantly enriched by linguistic
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1013
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Generally speaking, a syllabus need not be a 'interaction' and 'collaboration' among learners is a very
complicated affair, but should aim at catering to the important component of effective learning.
needs of the learner. Many teachers' idea of a syllabus All the students should be asked to participate
is to calculate the amount of pages in the text book and actively in activities like - group discussions, seminars,
then divide that by the number of teaching days in a debates, role-play, and skits - so that they can use the
session. The resulting figure accounts for the amount of language more independently. Getting them to work in
pages that need to be covered in one lesson, and he pairs or small groups is also essential as each student
has a simple plan to make sure that the syllabus is have more time to practice which is the key to speaking
completed in a timely fashion. Perhaps this could be English. The best way to involve the learners in speaking
called a syllabus in some contexts, but it is really missing activity is by giving them interesting topics to know the
some important factors that could make applying the strengths and weakness. To do this the teacher has to
textbooks both more enjoyable and more effective.The think first about what is interesting for the learner rather
point is that the topics that are prescribed in the syllabus than to him or chose a current topic on which the student
should be properly used in the classroom in enriching can speak easily. For instance, give a topic like 'the
the language of the learner. For instance, the Higher spread of corona virus'. Naturally such topics would
Education Board in Andhra Pradesh has introduced arouse some curiosity among the learners to say
'Phonetics' for Intermediate and Undergraduate something on the topic. Unlike acquiring knowledge in
students. Though the intention is good, no learner is any field, which can be attained by listening to a lecturer
learning those sounds due to various reasons. One such or reading a book, language learning requires the learner
reason is, in the main examination the question on to 'use' the language.The teacher has to create and
'phonetics' is not compulsory and the learner is provide access to a learning environment that helps the
conveniently leaving it. To our dismay, sometimes even students how to learn and achieve their full potential. In
the teachers won't teach that subject throughout the fact, learning is an acme process in which meaning is
year as he himself is not properly trained in that area. A developed on the basis of experience. Learners actively
good teacher is one who can motivate the learner. The construct their own knowledge by connecting new ideas
following are some of the tips to motivate the learner while structuring and restructuring of ideas is an essential
• Be a role model, inspire, and properly guide the learner part of the learning process.
to realize that the language acquisition is simpler in
group learning than individual learning. Learner-centric approach also allows learners to
learn at their own pace. It also engages concepts,
• To take a confidence building approach, give the reflects on the underlying cause and effect relations,
learners lots of encouragement and have fun with
patterns. Similarities and interconnections to deepen
them.
understanding. Active engagement involves enquiry,
• Always sound positive. Instill confidence among the exploration, questioning, leading to theory building and
learners. Make them believe that they have the the creation of ideas.
potential to express themselves clearly in the target
language. Collaborative learning is a situation in which a group
of people learn an activity or skill together, unlike
• Use strategies that do not threaten them. It is very
important to learn and practice a language in a non
individual learning. People engaged in collaborative
threatening environment. learning capitalize on one another's resources and skills
that is by asking one another for information, evaluating
It is a fact that learning doesn't take place in Indian one another's ideas, monitoring one another's work etc.
classrooms. The reason is that there isn't enough More specifically, collaborative learning is used as an
'Interaction' between the teachers and the students. common term for a variety of approaches in education
Many students have few opportunities to speak the that involve joint intellectual effort by students or
target language either in and out of the class. In fact students and teachers. Collaborative learning redefines
1014 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

traditional student-teacher relationship in the classroom Whenever a teacher implements this method the
which results in developing good communication skills first step is to consider each stage involved in the group
and group dynamics. Collaborative learning activities work so that the teacher is ready to give support
can include collaborative writing, group projects, joint whenever needed.
problem solving, debates, study teams, team building Some topics should be identified within the syllabus
etc. and given to the students for collaborative learning and
This is student centered method. The teacher should their goals should be clearly defined. This also means
make the student understand that their interaction in considering how the students will be organized in groups
the group is mandatory as the success can be achieved during the collaboration. The teacher should keep in
only when each participant contributes their part. The mind the size of the group. Groups can be formed using
progress of the students should be evaluated by using self-selection, random assignment or criterion based
pre-test and a post test method which helps in improving selection. The choice of group size involves smaller
the learning level of the students. The learning level of groups (of three) which contains less diversity, and may
the students should be evaluated not only in terms of lack divergent thinking styles and varied expertise that
the knowledge and content but also in terms of active help to animate collective decision making. Conversely,
participation, interpersonal communication, data in larger groups it is difficult to ensure that all members
collection, team work communication skills etc. This participate. Hence depending upon the topic given, the
would bring some positive changes in the students as size of the group may vary.
well as teachers. While implementing this method there are certain
According to Vygotsky (1978) "Students are barriers that one definitely will encounter. The reason
capable of performing at higher intellectual levels when for these barriers is that in heterogeneous community
asked to work in collaborative situations than when with different socio-economic background, different IQ
asked to work individually". Group diversity in terms levels, environment, their ideologies, identities and
of knowledge, experience, different language skills like different language abilities cause different way of
sentence construction, vocabulary usage, and different expressing both in written and spoken form. They will
oral presentation skills contribute positively to the have to modify and redefine their original identities when
learning process. they enter a group. Moreover, limited communication
In this method students quickly learn how they are skills would become detrimental factor in presentation
to solve problems as a group that they might not have skills.
struggled with their own. This method can be applied In addition to the above mentioned barriers, the
to develop good communication skills. It helps them to collaborative learning method may have certain
understand matter in a better way and stimulates thinking limitations; it may not satisfy gifted students in a group
process. as they are the only resources in the group. And every
In this type of method, teacher acts as a analyst and topic is not suitable for this method. Sometimes conflicts
a facilitator, while the learner acts as a collaborator. may occur among group members and across group
Initially the feeling of security and belonging are members resulting indiscipline. Making changes in the
established. Later as the learners' ability improves, they groups should be avoided. It is important to keep the
achieve a measure of independence from the teacher. groups together even if the things are not going well
Learners can speak independently and they are ready with the groups. Changing the groups may change the
to take criticism and being corrected. It gives multiple dynamics of all the groups. Campbell and Li (2006)
opportunities to students to show intellectual identified that, "the lack of competitive element disturbed
competence, to express communicative skills, the students and fairness and appropriateness of group
knowledge, oral presentation skills, group dynamics etc. assessment...... became a major assessment to student
satisfaction"
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1015
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

In spite of some limitations the collaborative learning an environment in which students enjoy learning,
is good method to acquire knowledge, content, develop curiosity, and team 'how to learn by learning
communication skills and soil skills. Collaboration allows to share and sharing to learn'. Thus, the above said
students to actively participate in the learning process method may help the teacher in making the English
by talking with each other and listening to other points Language Teaching classroom interesting. It may also
of view. Collaboration establishes a personal connection help the learner to improve his skills in English and shape
between students and the topic of study and it helps his vision for future where he enjoys learning English
student think in a less personally biased way. Teachers with smile, free from stress and fear.
may employ collaboration to assess student's abilities
to work as a team, leadership skills, or presentation REFERENCES
abilities. Keeping all these benefits and limitations 1. Campbell, J., & L.i.M. (2006). Asian Students' perceptions of
group work and group assignments in a New Zealand tertiary
learning experiences are to be implemented. institution. In Opportunities for Growth in Higher Education:
22-24 November 2006, Nong Kat. Thailand.
For collaborative method to be effective, the teacher
should view teaching as a process of developing and 2. Linda Morable (2000). Using active Learning Techniques.
Technical Education Division, Texas. Dallas: Richland College.
enhancing students' ability to learn. The teacher's role
is not to transfer information, but to save as a facilitator 3. Stephan Gramley and Kurt-Michael Patzold (2003). A Survey
of Modern English. London: Routledge.
for learners. This involves creating and managing
meaningful learning experiences and stimulating students
thinking through real world problems. Teachers should
be encouraged to incorporate collaborative learning in
their classrooms.
The advances in technology and changes in the
organizational infrastructure put an increased emphasis
on teamwork within the student community. Students
should develop the ability to communicate fluently, think
creatively, solve problem and make decisions as a team.
CONCLUSION
New wave of Collaborative Learning Languages has
come into place with the Internet growth and the boom
of social networking technologies. These online social
network services help in information sharing and
collaboration tools, for which users can help other users
to learn languages by direct communication or mutual
correction or proposed exercises. Researchers suggest
that the collaborative learning also prepares students
for the modern work force where there is an increased
emphasis on team work (Fechner and Davis, 1991)
and for their meaningful participation in a democratic
society.
So, we, the teaching community, need to work
towards a process which prepares the students to learn
the language with much ease. The process also requires

1016 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6


Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Department of MBA

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1017
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

1018 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Understanding E-Commerce: A Study with Reference to


Present Scenario of COVID-19
Rajwinder Kaur
University School of Business, Chandigarh University, Gharuan (Mohali), Mohali (Punjab), India
Email: bimbrarajwinder@gmail.com

Abstract - E-commerce (electronic commerce) E-commerce is available at all hours of the day and
involves the purchase and sale of goods and night, seven days a week. Many supermarkets have a
services, as well as the transfer of funds and data, greater online range than they do in their retail stores.
over an electronic network, most commonly the
Furthermore, several online-only stores can offer
internet. Business-to-business (B2B), business-to-
customers specific inventory that cannot be found
consumer (B2C), consumer-to-consumer, and
consumer-to-business transactions are all possible. elsewhere. E-commerce allows vendors to reach a
The global spread of the COVID-19 pandemic has global audience. They dismantle the geographical barrier
thrown a wrench in how people purchase goods and (geography). Sellers and buyers can now meet in the
services, as well as how they view e-commerce. virtual world without having to travel. Transaction costs
The country's uniform lockout laws, as well as will be significantly reduced due to electronic
consumers' growing aversion to going outside to commerce. It reduces a lot of the fixed costs of running
shop for basic necessities, have moved the country a physical store. As a result, the businesses will enjoy a
toward e-commerce. The present study is an much higher profit margin. It ensures that goods are
attempt to explore the impact of COVID-19 on e- delivered quickly and with little effort on the part of the
commerce. The study will also put light on the
customer. It also saves both consumers and businesses
present status of e-commerce in India. For the
time, energy, and effort. Another significant benefit is
study basically data is collected by secondary
sources. The results of the study significantly the convenience it provides. A customer can shop 24
contribute to knowing the impacts of COVID-19 hours a day, 7 days of week. The website is available
on e-commerce. It will provide recommendations at all times; unlike a store, it does not have operating
for e-commerce businesses for new normal after hours. Electronic commerce often enables direct
the pandemic. communication between the customer and the business
Keywords: Business, E-Commerce, COVID-19, without the use of intermediaries. This makes it possible
Customer, Outbreak, Pandemic. to communicate and conduct business quickly. It also
adds a personal touch that is extremely precious
I. INTRODUCTION (www.toppr.com).
Electronic commerce, commonly known as e-
The global spread of the COVID-19 pandemic has
commerce or e-commerce, is a business framework
thrown a wrench in how people consume goods and
that helps individuals and companies to buy and sell
services, as well as how they view e-commerce. The
products over the internet. The purchasing and selling
country's standardised lockdown rules, as well as
of goods, products, and services via the internet is
customers' increasing aversion to going outside to shop
referred to as "e-commerce." Electronic commerce or
for basic necessities, have pushed the country toward
online commerce are other terms for e-commerce.
e-commerce. Consumers have shifted their purchasing
These services are delivered over the internet network.
habits from stores, supermarkets, and malls to online
E-commerce also includes the exchange of money,
websites and portals for everything from basic
funds, and data. E-commerce websites include
necessities to branded items
Amazon, Flipkart, Shopify, Myntra, Ebay, Quikr, and
(retail.economictimes.indiatimes.com). The scope of
Olx, among others (www.investopedia.com).
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1019
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

online purchases and online businesses is expected to People all over the world have been affected by the
increase since the social distancing norm has been COVID-19 pandemic. Consumers have also been
implemented for almost the entire year of 2020. Many affected to shop online as a result of their concerns
people are warming to the idea of online shopping, as about security. As a result, online retailers and platforms
evidenced by the increase in FTUs (First Time Users) have a lot of opportunities to grow their sales and
on e-commerce sites. E-commerce entails more than revenue, but they also have a lot of challenges. E-
just having a logo and selling goods on the internet. commerce is becoming more scalable as more people
Finding the right target audience, product niche, and are forced to buy online due to their fear of visiting
customer connection is critical because it helps to cut physical stores during a pandemic. The use of the
costs and provide products that are most appropriate internet for shopping has increased during the pandemic.
for the customer base (razorpay.com). Both online and brick-and-mortar retailers would invest
in smarter technologies in order to increase customer
II. LITERATURE REVIEW
engagement [8]. COVID-19 has been identified as a
E-commerce is the most popular and preferred pandemic health threat. Researchers are attempting to
method of buying various goods and services. discover the causes of these pandemic diseases.
Nowadays, traditional buying must take the place of e- According to China, the only way to combat this
commerce. The only reason for this is that consumers pandemic disease is to use response control strategies
have access to a wide range of products from all over and tactics. The country's situation is deteriorating as a
the world at their fingertips [4]. Financial literacy, result of this pandemic epidemic. Both in terms of health
standard of living, form of residence, payment system and economics, the country is hampered. This pandemic
(digital vs. cash), and, most importantly, manufacturing disease has severely hampered online businesses. The
company up-scaling are all factors that influence e- country is in dire straits as the death rate rises, but the
commerce growth. Daily used products appear to be country's economy has also deteriorated in recent days.
the least popular in the e-commerce mode, with only It is expected that returning to and enhancing the
the most marketed and personalised products with economy in the same way as before will be much more
standardisation being more popular [7]. Electronic difficult. It is therefore difficult to boost the country's
commerce is more than just another way to help or sell sales [5].
something existing businesses to be more successful.
Alternatively, it's possible that e-commerce has ushered The effects of the COVID-19 (corona virus)
in revolutionary changes in the marketplace. It is a pandemic will be felt for a long time. The COVID-19
problematic invention that is radically altering the pandemic has shown that in times of crisis, e-commerce
traditional business model. In our country, ecommerce can be a valuable tool/solution for consumers. E-
is paving the way for massive business growth [6]. commerce company sales are not clear across the
board. In 2020, industry is expected to generate $6
Due to the covid19 pandemic, E-Commerce
trillion in revenue. But it now seems to be too far.
businesses are facing some unexpected challenges. E-
Transactions are not taking place due to lockdowns
Commerce businesses are also facing some unexpected
and constraints, as well as factory closures and supply
challenges as a result of the covid19 pandemic.
chain problems. Essentials are being supplied, but the
COVID-19 has an immediate effect on e-commerce
road ahead is unclear [3]. COVID-19 improves e-
businesses, as well as a shift in consumer demand and
commerce. The effect on e-commerce would encourage
purchasing behaviour [4]. In the post-COVID-19
other researchers to dig deeper into this area, such as
period, the e-commerce industry will boom, and fast-
how corona changed e-commerce trends and future
fashion brands that are already on the platform must
trends [1].
realize the Percentage of Concentration (POC) on
which they must concentrate to avoid wastages and
spillover effects [2].

1020 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. GAPS IN EXISTING LITERATURE V. RESEARCH METHODOLOGY


By studying the existing literature it is seen that all The present study is descriptive type of study. The
the previous studies are done on the aspect of e- data for this study is mainly obtained from various
commerce in normal situations. Moreover, the recent sources. The information was gathered from a variety
studies which are done on e-commerce and COVID- of reports produced by various organisations and
19 are related to other aspects of pandemic. There is reputable independent agencies like India Brand Equity
need to develop extensive study on e-commerce and Foundation (IBEF). The information was gathered from
COVID-19. Some of the previous studies are focused a variety of reliable sources. Relevant research data
on challenges and opportunities in the field of e- has also been gathered from other websites, such as
commerce, e-commerce origin etc. Therefore the online databases such as EBSCO, JSTOR, Research
present study an attempt to explore about the present Gate, and Google Scholar.
status of e-commerce, impact of covid-19 on e-
commerce. VI. ANALYSIS AND DISCUSSION

IV. OBJECTIVES OF THE STUDY Present Status of E-Commerce in India

The present study fulfils the following objectives: E-commerce has transformed how people do
business in India. The Indian e-commerce market is
• To explore the present status of e-commerce in India. projected to grow from US$ 38.5 billion in 2017 to
• To analyse the impact of COVID-19 pandemic on e- US$ 200 billion by 2026, up from US$ 38.5 billion in
commerce. 2017. Most of the industry's growth has been fueled
by rising internet and smart phone penetration. The
• To provide recommendations for e-commerce
number of internet connections in India increased
businesses for new normal.
dramatically as a result of the "Digital India" initiative,
reaching 760 million by August 2020. Urban areas
accounted for 61% of all internet connections, with 97
percent of those connections being wireless.
Fig. 1 Market Size of E-Commerce in India (Source: www.ibef.org)

Fig. 2 Sector Composition of E-Commerce in India (Source: www.ibef.org)

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1021
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Fig. 3 Key Trends of E-Commerce in India (Source: www.ibef.org)

The Indian e-commerce market has been growing, contactless deliveries to reduce the risk of infection,
and it is expected to overtake the United States as the which is driving up demand for online purchases. In
world's second largest e-commerce market by 2034. addition, many retailers around the country are
The Indian e-commerce industry is expected to grow expanding their reach by going online.
at a 27 percent compound annual growth rate (CAGR)
It has increased e-commerce sales by providing
from US$30 billion in 2019 to US$99 billion in 2024,
consumers with a larger selection of products at
with grocery and fashion/apparel likely to be the
competitive prices. According to a Unicommerce report
primary drivers of incremental growth.
titled E-commerce Trends Report 2020, India's e-
India's e-commerce industry is ranked 9th in the commerce sector experienced a 17 percent increase in
world for cross-border growth, according to a overall order volume following the outbreak of COVID-
Payoneer survey. E-commerce is projected to rise from 19 as of June 2020. (www.globenewswire.com)
4% of overall food and grocery, clothes, and consumer
electronics retail trade in 2020 to 8% by 2025 in India. Online profit margin rates increased by 38%:

The government of India's governance and legal While increasing online sales is one thing, the Covid-
frameworks, such as 100 percent FDI in B2B E- 19 situation has also resulted in supply chain disruptions,
commerce and hundred percent FDI in the marketplace understaffed customer service, and other issues. This
model of B2C E-commerce under the automatic has a direct impact on the profit margin on the internet.
direction are expected to boost the sector's growth. During the global lockdown, it appears that 38 percent
According to the new FDI regulation, online businesses of ecommerce decision-makers saw an increase in their
that have earned foreign investment are prohibited from online profit margin.
selling products that are sold by retailers in which they (ecommercenews.eu)
own an interest. (Source: www.ibef.org)
Online Grocery Preferences and COVID-19:
Impact of COVID-19 pandemic on E-Commerce
People are shopping for groceries online in greater
The COVID-19 pandemic has driven the expansion numbers than ever before, with 58 percent reporting
of the e-commerce logistics industry. Alternative they are comfortable using digital platforms to assist
warehousing sites are being sought by e-commerce them in their grocery shopping. This party includes 71
players to assist with business continuity and delivery percent Gen Z and Millennial shoppers and 44 percent
delays. People have started using online platforms more Baby Boomers.
than before; even in rural areas, as awareness of social
Online grocery sales are expected to reach $89.22
distancing among Indians has grown.
billion in 2020, up 53% from the previous year. This
Furthermore, supply chains have been disrupted as represents an increase of $30.86 billion from the
a result of extended lockdowns in many countries. E- previous year. Following a sharp spike last year, online
commerce logistics companies are using alternatives like grocery sales are projected to increase at a more

1022 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

modest rate in 2021, increasing 5.2 percent to $93.83 warehousing (possibly using physical stores),
billion. distribution alliances, and auto-replenishment models
to make the supply chain more customer-centric.
COVID-19 and Social Media:
Enhance the technical infrastructure: Put the e-
Nearly half of adults were using social media more commerce platform to the test, extend necessary
at the start of the pandemic, with strong rises in capacity limits to plan for an evolving user flow, and
participation through Facebook, Instagram, and invest in advanced analytics technologies to ensure
Snapchat. Adults in the United States spent 7 minutes personal, timely, and automated customer experiences
longer per day on social media in 2020 than in 2019 - and recommendations across devices.
a total of 82 minutes. The pre-pandemic estimate was
76 minutes, suggesting a 0% increase from the previous (www2.deloitte.com)
year. (www.roirevolution.com) VII. CONCLUSION
Recommendations for e-commerce businesses The study concludes that COVID-19 makes e-
for new normal commerce easier. 2020 wasn't really a usual year. It
Revisit Digital Business Model: Evaluate the basis has provided opportunities for some while also putting
of the business model to ensure that it is still valid in the others through hardships. E-commerce, on the other
light of digital distribution platforms, benefit models, and hand, emerged as a clear backbone of the lockdown
the services that can be provided to clients. The time era. Due to the COVID-19 pandemic, e-commerce
has come to unleash the digital marketplace, the has become the preferred mode of shopping for the
subscription model, or the click-and-collect universe majority of Indian customers. Refunds are simple with
that you've been dreaming about. online payments. Customers have started to see this
industry in a whole new light as a result of online
Invest excessively in digital marketing channels: payments, quick refunds, and no-contact delivery.
Instead of out-of-home networks, marketing budgets
should be directed toward digital outlets and media. REFERENCES
Examine both paid and organic marketing's maturity [1] A. Bhatti, H. Akram, H. M. Basit, A. U. Khan, S. M. R. Naqvi,
(SEO). If the company lacks the scale to invest and M. Bilal, "E-commerce trends during COVID-19 Pandemic,"
competitively, find a suitable digital market place. Build International Journal of Future Generation Communication and
Networking, vol. 13, no. 2, pp. 1449-1452, 2020.
successful marketing messages during and after the
[2] A. S. Raja and S. Kannappan, "Marketing agility and E-Commerce
pandemic, above all. agility in the light of COVID-19 pandemic: A study with reference
Enhance the client experience: Recognize the buying to fast fashion brands," Asian Journal of Interdisciplinary
Research, vol. 3, no. 4, pp. 1-13, 2020.
journeys of (new) online customers and provide them
[3] K. S. Patil, "Impact of Covid-19 on E -Commerce," Journal of
with easy, human-centered UX design to create pleasant Emerging Technologies and Innovative Research (JETIR), vol. 7,
shopping experiences across devices using the latest no. 5, pp. 210-213, 2020.
technology. [4] K. Susmitha, "Impact of COVID 19 on E-Commerce," Journal
of Interdisciplinary Cycle Research, vol. 12, no. 9, pp. 1161-
Reshape the business: Since new digital talent (UX, 1165, 2020.
graphic design, scrum, etc.) will be needed, many
[5] M. W. Hasanat, A. Hoque, F. A. Shikha, M. Anwar, A. B. A.
current workers will be unable to adjust. To replenish Hamid, and H. H. Tat, "The Impact of Coronavirus (Covid-19)
the talent pool, use the most up-to-date business team on E-Business in Malaysia," Asian Journal of Multidisciplinary
and engagement tools, and invest heavily in culture and Studies, vol. 3, no. 1, pp. 85-90, 2020.
digital ways of working. [6] N. Goyal and D. Goyal, "Impact of E-Commerce in India: Issues
& Challenges," International Journal of Advanced Research in
Improve the fulfilment and supply chain: To manage Computer Science, vol. 7, no. 6, pp. 192-194, 2016.
profitability, many businesses also need flexible

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1023
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[7] N. Wadhawan and R. K. Arya, "Understanding E-Commerce: A https://razorpay.com/learn/impact-covid-19-e-commerce-india/


Study with Reference to Competitive Economy," Journal of
https://www.ibef.org/industry/ecommerce/infographic
Critical Reviews, vol. 7, no. 8, pp. 805-809, 2020.
https://www.ibef.org/industry/ecommerce-presentation
[8] S. Dinesh and Y. MuniRaju, "SCALABILITY of e-commerce in
the Covid-19 ERA," International Journal of Research - https://www2.deloitte.com/content/dam/Deloitte/dk/Documents/
GRANTHAALAYAH, vol. 9, no. 1, pp. 123-128, 2021. strategy/e-commerce-covid-19-onepage.pdf
https://www.globenewswire.com/news-release/2021/01/13/
WEB REFERENCES 2158012/0/en/India-E-commerce-Logistics-Market-2020-to-
https://www.investopedia.com/terms/e/ecommerce.asp 2027-COVID-19-Impact-and-Regional-Analysis.html
https://retail.economictimes.indiatimes.com/re-tales/impact-of- https://www.roirevolution.com/blog/2021/03/coronavirus-and-
covid-19-on-online-shopping-in-india/4115 ecommerce/

1024 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Exploring the Interrelationship between Green Human


Resource Management and Corporate Social
Responsibility
Sapna1, Anjali Gupta2, Mr. Pardeep Kumar3
1,2
Institute of Management Studies and Research, Maharshi Dayanand University,124001, Rohtak (Haryana), India
3
Department of Management Studies, CRSU, Jind (Haryana)
Email: sapna.jangra11@gmail.com1, anjaliimsar98@gmail.com2, pardeepkumar15august@gmail.com3

Abstract- Organizations are pressurized to are pressurized to reduce the impact on environment
reduce the impact on environment as well as as well as society in order to become more sustainable
society in order to become more sustainable. ([2], [3]). Due to this increased pressure from society,
Human resource is the active resource in the organizations are trying to become the part of the society
organization and thereby occupies the first place by fulfilling their social responsibility to meet the
among all other resources of the organizations.
expectation of the society [4-6] and thereby resulting
That is why, workers should be encouraged to
in sustainability in business processes [7]. Human
reveal environmental behaviour in order to achieve
competitive advantage. Corporate social resource has to act in a strategic manner [8] in order to
responsibility practices can be implemented by develop and implement true sustainable organizational
motivating and encouraging the human resources strategy which is considered essential for global
of the organization. Purpose of this paper is to organizations [9]. Human resource is the active resource
explore the interrelationship between Green in the organization and thereby occupies the first place
human resource management practices and among all other resources of the organizations. That is
Corporate Social Responsibility. It is descriptive why, workers should be encouraged to reveal
as well as exploratory research. Papers published environmental behaviour in order to achieve competitive
on green Human Resource Management and advantage [14]. That is why a new area has been
corporate social responsibilities have been
emerging called green Human Resource Management
reviewed. Papers for review has been selected
which can be defined as the integration of Human
from Emerald, Web of science, Taylor and Francis,
MDPI etc. Findings of the study indicate that Resource Management and environmental management
Significant Positive relationship exists between [10-13]. Corporate social responsibility practices can
Green Human Resource Management Practices be implemented by motivating and encouraging the
and Corporate Social Responsibility as found out human resources of the organization [15-17]. A little
by Various Researchers. But still, only a few studies attention has been given to the process of encouraging
were found which have empirically analyses the or triggering willingness of employees to engage in green
relationship among the two. practices in spite of importance of Human Resource
Keywords- Green Human Resource Management practices in addressing environmental
Management, Corporate Social Responsibility, issues [18]. Engagement in corporate social
Sustainable Organizations, Environmental responsibility activities by the organizations helps in
Management, Encouragement achievement of competitive advantage ([19],[20]) and
building reputation among stakeholders with the aim of
I. INTRODUCTION
gaining success ([19], [21-26]). Encouragement of
Fulfillment of economic responsibility was earlier employees can help in enhancing corporate social
considered the key to success of the organization, but responsibility practices by the companies [27].
the perspective has changed now [1]. Organizations

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1025
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

II. REVIEW OF LITERATURE legal demand [1] such as promoting business ethics,
corporate citizenship and sustainability [38]. Four
A. Green Human Resource Management dynamics corporate social responsibility theories were
Green Human Resource Management is an emerging discussed by Reference [39] includes:
concept which has been attracting the attention of • Generating long term profit for achievement of goals
professionals, scholars and Academics [28]. Research
is being conducted on sustainable development • Responsibly use the business power and impact
strategies of the organizations which will help to enhance • Social demand integration
the contribution of employees in sustainable
development strategies and improve the competitiveness • Doing ethically correct to contribute to the society
and sustainable performance of the organizations Sustainable development goals are an instrument
([29],[30]). Sustainability concept was firstly which provide the guidelines for Corporate Social
introduced by Reference [31] which is further being Responsibility, implications for strategic objectives of
supported by government and explored by researchers. the organization [40-42]. "Corporate social
Well known definition of sustainability was given by [32], responsibility encompasses the economic, legal, ethical
" Development that meets the current need without and philanthropic expectations that society has of
impacting the needs of future generation" is called organizations at a given point of time" [43]. Prevention
sustainable development. Three dimensions of of pollution waste management recycling Re-utilization
Sustainable performance discussed by [33] includes of by-products etc. under the purview of corporate
Social, Economic and Environmental performance. social responsibility [44].
Economical performance includes financial matters,
C. Green Human Resource Management and
Environmental performance includes environmental
Corporate Social Responsibility
issues and social performance delas with interest of
stakeholders [34]. Environmental initiatives can be Human resource plays a key role in implementing
effectively implemented by human resource managers environmental initiatives which are a part of Corporate
who act as business partners in effective adoption of Social Responsibility activities. Financial and sustainable
the initiatives concerning environment [3]. Organizational results can be achieved via human resource management
initiatives concerning green human resource management [45]. Human resource management practices provide
practices should be in line with environmental objectives support to corporate social responsibility activities
of the organizations so that they should be thereby creating synergy between corporate social
understandable and compatible by Human Resource responsibility and human resource management [46].
professionals [8]. Green human resource management As corporate social responsibility activities are
practices include Green Job design and description, implemented by human resource manager or by human
Green Recruitment and Selection, Green Training and resource manager in Association with other teams in
Development, Green Performance appraisal, Green the organization [5]. Increased demand for corporate
Compensation and Rewards, Green Employee social responsibility has enabled enhanced use of green
Empowerment etc. ([10],[12], [35-37]). Human Resource Management [47]. So,
interrelationship between green Human Resource
B. Corporate Social Responsibility Management and corporate social responsibility should
Corporate social responsibility is not a new concept. be explored. Green human resource management
It has existed since centuries [38]. Concept of practices implementation results in voluntary green
Corporate Social Responsibility assumes that behaviour of employees which helps in fulfilling strategies
businesses are not and 'extrinsic elements' to the society concerning corporate social responsibility [48]. Similar
[2]. Corporate social responsibility can be understood results were provided by the studies conducted by
as engagement in proactive behaviour irrespective of various researchers ([37],[49],[50]).

1026 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

III. METHODOLOGY such kind of study will be very helpful for policymaker's
It is descriptive as well as exploratory research. strategist human resource managers as well as
Papers published on green Human Resource organizations also. Government can take initiatives to
Management and corporate social responsibilities have promote sustainable development practices and
been reviewed. Papers for review has been selected environmental management. Managers can consider the
from Emerald, Web of science, Taylor and Francis, relationship among the two while formulating and
MDPI etc. implementing their strategies in order to achieve the
competitive advantage. So, in this article authors have
IV. DISCUSSION reviewed the literature available on green human
On the basis of literature review available on green resource management practices and corporate social
human resource management practices and corporate responsibility and explored the interrelationship between
social responsibility, it can be said that green human green human resource management practices and
resource management practices have significant positive corporate social responsibility. There exist of positive
impact on corporate social responsibility ([54],[56]) relationship between the two as highlighted by various
which in turn positively influences sustainable researches in their studies.
performance of the organizations [55]. Study conducted REFERENCES
by Reference [56] revealed that green human resource
[1] R. Kumar and P. Gupta, "Recent green innovation in organizational
management practices have direct as well as indirect HR practices for technological development", Journal of
effect on corporate social responsibility. Corporate International Business Innovative Research in Economics and
support for employee volunteering moderates the (JIRBE), Vol. 2 No. 1, pp. 14-20, 2018.

relationship between green human resource [2] L. Levkivska, and I. Levkovych, "Social responsibility in
Ukrainian agriculture: the regional issue", Eastern European
management practices and corporate social Journal of Studies, Center for European Studies, Alexandru Ioan
responsibility. Human resource management plays a Cuza University, Vol. 8, pp. 97-114, 2017.
critical role in making the organizations green [3] M. Yusliza, N.Z. Othman and C.J.C. Jabbour, "Deciphering the
([19],[37],[48],[51],[52],[53]) which helps in effective implementation of green human resource management in an
implementation of Corporate Social Responsibility emerging economy", The Journal of Management Development,
Vol. 36 No. 10, pp. 1230-1246, 2017.
practices. Research gap between green human resource
[4] C. Voegtlin and M. Greenwood, "Corporate social responsibility
management practices and corporate social and human resource management: A systematic review and
responsibility was explored by Reference [46], [3] & conceptual analysis", Human Resource Management Review,
[11] which was fulfilled by the researchers like [54-56] vol. 26, pp. 181-197, 2016.
etc. But still there is a need for empirical study on the [5] P. Mishra, "Green Human Resource Management: a Framework
relationship between these two through moderator and for sustainable organizational development in an emerging
economy", International Journal of Organizational Analysis, Vol.
mediating variable or in particularly Industrial and service 25 No. 5, pp. 762-788, 2017.
sector or in developing as well as developed countries [6] S. Tiba, F.J.V. Rijnsoever and M.P. Hekkert, "Firms with benefits:
context. a systematic review of Responsible entrepreneurship and
corporate social responsibility literature", Soc Corp. Resp Env
V. CONCLUSION Ma., pp. 1-20, 2018.

In conclusion it can be said that corporate social [7] S. Fiandrino, A. Devalle, and V. Cantino, "Corporate governance
and financial performance for engaging socially and
responsibility practices are positively influenced by Environmentally Responsible practices", Social Responsibility
Green human resource management practices as found Journal, Vol. 15 Issue 2, pp. 171-185, 2019.
out by many researchers. But there is still a great need [8] J.Y. Yong and Y. Mohd-Yusoff, "Studying the influence of
of empirical studies that are to be conducted by strategic human resource competencies on the adoption of green
incorporating various moderator as well as mediating human resource management practices", Industrial and
Commercial Training, Vol. 48 No. 8, pp. 416-422, 2016.
variables and in different context as discussed earlier

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1027
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[9] M. Gholami, G. Rezaei, M.Z. Mat Saman, S. Sharif and N. [23]A. D. Arndt, A. Singhapakdi and V. Tam, "Consumers as
Zakuan, "State-of-the-art System HRM Green: sustainability in employees: The impact of social responsibility on quality of
the sports center", Journal of Cleaner Production, Vol. 124 No. work life among Australian engineers", Social Responsibility
15, pp. 142-163, 2016. Journal, vol. 11, pp. 98-108, 2015.
[10]Jabbour, C.J.C. and Jabbour, A.B.L.S. (2016), "Green and green [24]A. Di Giuli, and L. Kostovetsky, "Are red or blue companies
human resource management supply chain management: emerging more likely to go green? Politics and corporate social
linking two schedules", Journal of Cleaner Production, Vol. 112 responsibility", Journal of Financial Economics, vol. 111, pp.
No. 3, pp. 1824-1833. 158-180, 2014.
[11]S. E. Jackson, R. S. Schuler and K. Jiang, "An aspirational [25]X. Deng, J.-K. Kang and B. S. Low, "Corporate social
framework for strategic human resource management", Academy responsibility and stakeholder value maximization: Evidence from
of Management Annuals, Vol. 8, pp.1-89, 2014. mergers", Journal of Financial Economics, vol. 110, pp. 87-109,
2013.
[12]C. J. C. Jabbour, "Environmental training in organizations: From
a Literature review to a framework for future Research", Resources [26]S. Paek, Q. Xiao, S. Lee and H. Song, "Does managerial ownership
Conservation and Recycling, Vol. 74, pp. 144-155, 2013. affect different corporate social responsibility dimensions? An
empirical examination of U.S. publicly traded hospitality firm",
[13]D. S. Ones and S. Dilchert, "Environmental sustainability at
International Journal of Hospitality Management, Vol. 34, pp.
work: A call to action", Industrial and Organizational Psychology,
423-433, 2013.
Vol. 5, pp. 444-466, 2012.
[27]C. N. Ana, and P. Arminda, "Corporate volunteering - an analysis
[14]D. E. Cantor, P. C. Morrow and F. Montabon, "Engagement in
of volunteers' motivations and demographics", Journal of Global
environmental behaviours among supply chain management
Responsibility, Vol. 4, pp. 31-43, 2013.
employees: An organizational support theoretical perspective".
Journal of Supply Chain Management, vol. 48, pp. 33-51, 2012. [28]J.Y. Yong, M.Y. Yusliza and O.O. Fawehinmi, "Green human
resource management: a systematic literature review from 2007
[15]C. J. C. Jabbour, A. B. L. Jabbour, A. A. Teixeira and W. R. S.
to 2019", Benchmarking: An International Journal, 2019.
Freitas, "Environmental development in Brazilian companies:
The role of human resource management", Environmental [29]N. Pham, H. Hoang and Q. Phan, "Green human resource
Development, Vol. 3, pp. 137-147, 2012. management: a comprehensive review and future research agenda",
International Journal of Manpower, 2019.
[16]T. A. Norton, H. Zacher and N. M. Ashkanasy, "Organizational
sustainability policies and employee green behaviour: the [30]R. Dubey, and A. Gunasekaran, "Exploring soft TQM dimensions
mediating role of work climate perceptions", Journal of and their impact on firm performance: some exploratory empirical
Environmental Psychology, vol. 38, pp. 49-54, 2014. results", International Journal of Production Research, Vol. 53
Issue 2, pp. 371-382, 2015.
[17]D. Antonioli, S. Mancinelli and M. Mazzanti, "Is environmental
innovation embedded within high-performance organizational [31]Brundtland, G.H. (1987). Our Common Future: Report of the
changes? The role of human resource management and World Commission on Environment and Development. Geneva,
complementarity in green business strategies", Research Policy, UN-Document A/42/427. http://www.un-documents.net/ocf-
Vol. 42, pp. 975-988, 2013. ov.html
[18]P. Paillé, Y. Chen, O. Boiral and J. Jin, "The impact of human [32]C. Higgins and B. Coffey, "Improving how sustainability reports
resource management on environmental performance: An drive change: A critical discourse analysis", Journal of Cleaner
employee-level study", Journal of Business Ethics, vol. 121, pp. Production, 136, pp. 18-29, 2016.
451-466, 2014.
[33]Elkington, J., "Towards the sustainable corporation: Win-win-
[19]T. Breitbarth, S. Walzel, C. Anagnostopoulos and F. Van Eekeren, win business strategies for sustainable development", California
"Corporate social responsibility and governance in sport: Oh, Management Review, vol. 36, pp. 90-100, 1994.
the things you can find, if you don't stay behind!", Corporate
[34]M. Yusliza, J.Y. Yong, M.I. Tanveer, T. Ramayah, J.N. Faezah,
Governance, Vol. 15, pp. 254-273, 2015.
Z. Muhammad, "A structural model of the impact of green
[20]M. Kadlubek, "The essence of corporate social responsibility intellectual capital on sustainable performance", Journal of
and the performance of selected company", Procedia-Social and Cleaner Production, vol. 249, p.119334, 2020.
Behavioral Sciences, vol. 213, pp. 509-515, 2015.
[35]B.F. Daily, and S. Huang, "Achieving through attention to
[21]M. Ismail, S. N. Alias and R. M. Rasdi, "Community as sustainability factors in environmental human resource
stakeholder of the corporate social responsibility program in management", International Journal of Operations and Production
Malaysia: outcomes in community development", Social Management, Vol. 21 Issue 12, pp. 1539-1552, 2001.
Responsibility Journal, Vol. 11, pp. 109-130, 2015.
[36]D.W.S. Renwick, T. Redman and S. Maguire, "Green human
[22]R. Giulianotti, "Corporate social responsibility in sport: critical resource management: a review and research calendar",
issues and future possibilities". Corporate Governance, Vol. 15, International Journal of Management Reviews, Vol. 15 No. 1,
pp. 243-248, 2015. pp. 1-14, 2013.

1028 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[37]A. A. Teixeira, C. J. C. Jabbour, A. B. L. D. Jabbour, H. Latan [48]M. Pinzone, M. Guerci, E. Lettieri and T. Redman, "Progressing
and J. H. C. Oliveira, "Green training and green supply chain the change journey towards sustainability in healthcare: the role
management: Evidence from Brazilian firms", Journal of Cleaner of 'Green' HRM", Journal of Cleaner Production, Vol. 122, pp.
Production, 116: 170-176, 2016. 201-211, 2016.
[38]A.B. Carroll, and K.M. Shabana, "The business case for corporate [49]J.Y. Yong, M. Yusliza, T. Ramayah, O. Fawehinmi, "Nexus
social responsibility: a review of concepts, research and practice", between green intellectual capital and green human resource
International Journal of Management Reviews, Vol. 12 Issue 1, management", Journal of Cleaner Production, vol. 215, 364-374,
pp. 85-105, 2010. 2019.
[39]E. Garriga and D. Mele, "Corporate social responsibility theories: [50]N.T. Pham, Z. Tu?cková, C.J.C. Jabbour, "Greening the
mapping the territory", Journal of Business Ethics, Vol. 53, pp. hospitality industry: How do green human resource management
51-71, 2004. practices influence organizational citizenship behavior in hotels?
A mixed-methods study", Tour. Manag., Vol. 72, pp. 386-399,
[40]P. Grover, A.K. Kar and V. Ilavasaran, "Impact of corporate
2019.
social responsibility on reputation-insights from tweets on
sustainable development goals by CEOs", International Journal [51]H. A. Masri, and A. M. Jaaron, "Assessing green human resources
of Information Management, Vol. 48, pp. 39-52, 2019. management practices in Palestinian manufacturing context: An
empirical study", Journal of Cleaner Production, Vol. 143, pp.
[41]J. Gunawan, P. Permatasari and C. Tilt, "Sustainable development
474-489, 2017.
goal disclosures: Do they support responsible consumption and
production?", Journal of Cleaner Production, Vol. 246, p. 118989, [52]M. Nejati, S. Rabieiand and C. J. C. Jabbour, "Envisioning the
2020. invisible: Understanding the synergy between green human
resource management and green supply chain management in
[42]A. Srivastava, "Standardizing evaluation process: necessary for
manufacturing firms in Iran in light of the moderating effect of
achieving SDGs - a case study of India", Evaluation and Program
employees' resistance to change", Journal of Cleaner Production,
Planning, Vol. 69, pp. 118-124, 2018.
Vol. 168, pp. 163-172, 2017.
[43]A.B. Carroll, "The pyramid of corporate social responsibility:
[53]S. Tariq, F. A. Jan and M. S. Ahmad, "Green employee
Toward the moral management of organizational stakeholders",
empowerment: a systematic literature review on state-of-art in
Business Horizon, vol. 34, pp. 39-48, 1991.
green human resource management", Quality & Quantity, Vol.
[44]A.N. Tran, S. Jeppesen, "SMEs in their own right: The views of 50, pp. 237-269, 2014.
managers and workers in Vietnamese textiles, garment, and
[54]W.R.S. Freitas, J.H.C. Oliveira, A.A. Teixeira, N.O. Stefanelli,
footwear companies", Journal of Business Ethics, vol. 137, pp.
T.B. Teixeira, "Green Human Resource Management and
589-608, 2016.
Corporate Social Responsibility: Evidence from Brazilian Firms",
[45]S. Ahmad, "Green human resource management: policies and Benchmarking: An International Journal, Vol. 27 No. 4, pp. 1551-
practices", Cogent Business and Management, Vol. 2, pp. 1-13, 1569, 2020.
2015.
[55]S.Y. Malik, Y.H. Mughal, T. Azam, Y. Cao, Z. WAN, H. Zhu and
[46]D. R. Jamali, A. M. El Dirani and I. A. Harwood, "Exploring R. Thurasamy, "Corporate Social Responsibility, Green Human
human resource management roles in corporate social Resource Management Practices and Sustainable Performance:
responsibility: The CSR-HRM co-creation model", Business Is Organizational Citizenship Behavior towards Environment
Ethics: A European Review, vol. 24, pp. 125-143, 2015. the Missing Link?", Sustainability, Vol. 13, 2021.
[47]S. Cheema, and F. Javed, "The effects of corporate social [56]M.M.A.A. Kerdawy, "The Role of Corporate Support for
responsibility toward green human resource management: the Employee Volunteering in Strengthening the Impact of Green
mediating role of sustainable environment", Cogent Business and Human Resource Management Practices on Corporate Social
Management, Vol. 4, pp. 1-10, 2017. Responsibility in the Egyptian Firms", European Management
Review, Vol. 16, pp. 1079-1095, 2019.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1029
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Study of Relationship Between Celebrity


Endorsement and Brand Personality
Simran Sikka1, Jitender Kumar2
1,2
IMSAR, MAHARSHI DAYANAD UNIVERSITY ROHTAK 124001
Email: Simran.rs.imsar@mdurohtak.ac.in1, Jitender.rathee.imsar@mdurohtak.ac.in2

Abstract: In today's era, when there is cut throat the businesses (and steady payments for the celebrities),
competition, it is very tough for marketers to gain but they also increased favourable exposure, exposure,
the attention of potential consumers. There is and engagement. As a result, celebrity endorsement may
plethora of brands available in the market. assist businesses in a variety of ways as Watching a
Companies trying very hard to grab the attention commercial with a well-known celebrity can capture
of their potential consumers. Now a days it is very
the attention of the audience, resulting in brand
common for company to spend handsome amount
for getting their product introduced by a well- recognition. People trust those who are well-known.
known face- A celebrity. A celebrity has great As a result, endorsement is a strategy for instilling trust.
influence on the people and the people who follow And in a market with a lot of options and a lot of
them start using those products which are being competition, this may be a tremendous advantage.
endorsed by them. A celebrity face not only has an Customer retention is always goal for businesses, and
impact over users, but also transfer his or her celebrity endorsement can assist them accomplish these
characteristics to brands. The personality of brand goals.
is highly get influenced by the person who endorsed
it. The endorser of the brand helps in The identification of human qualities and attributes
personification of brands as well. In this study, we with the brand to which buyers may relate is referred
attempt to study the relationship between the to as brand personality. It refers to the embodiment of
celebrity endorsement and building of brand a brand in simple terms. It's a collection of human traits
personality. For this study qualitative study has and qualities that have been attributed to a brand. When
been conducted. Interview of ten respondents were human-like qualities - such as distinctive,
taken regarding five Indian celebrity endorsing compassionate, humorous, trustworthy, creative, direct,
different types of products and then analysed. The dishonest, rebel, and so on - are ascribed to a brand, it
findings of the study suggest that celebrity develops a personality.
endorsement do impact the brand personality of a
brand. So, a marketers should select the endorser In the given study, we are trying to find out whether
of a product meticulously as it can affect the celebrity endorser has any impact over brand Personality
emotional relationship of consumer with the brands. or not. Whether the endorser's characteristics gets
Keywords-Celebrity, celebrity endorsement, transferred to personality of brand or not.
brand personality, personification, emotional
II. PROBLEM STATEMENTS AND
relationship etc.
RESEARCH OBJECTIVES
1. INTRODUCTION Every famous person has his or her own distinct
A marketing approach including the employment of personality. A portion of that is expected to rub off on
one or more celebrities to promote a certain product the brand as a result of the endorsement. However, no
or service is known as celebrity endorsement. In this consumer study has looked at this element of celebrity
scenario, the major aim is to reach a larger audience, personality's impact on brand personality. The BP
which is represented by the celebrity's fan base. These construct, on the other hand, has been researched.
sponsorships not only brought in billions of dollars for Aaker (1997) developed and verified a blood pressure

1030 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

scale. However, to the best of the researchers' findings of the study suggested that brand personality,
knowledge, no attempt has been made to combine both not only plays a crucial role in customer retention but
elements of celebrity endorsements and BP. As a result, also has a profound influence on the company's
the current research attempts to fill this gap in the performance.
literature. Through a qualitative study, the researchers • Trott (2011) in her research paper aims to find out
hope to see if celebrity personality has an influence on the influence of the brand personality of NOKIA on
Brand personality. The study tries to find out whether perceived quality. Subjects were asked to rate the
celebrity endorsement is one of the drivers of brand traits of brand personality as well as of perceived
personality. quality. The findings suggest that there is a significant
relationship between brand personality and perceived
Objectives of study quality only ruggedness showed negative relation, rest
all the other dimensions were positively related to
• To find out whether celebrity endorsement has any
perceived quality.
impact on brand personality
• Roy and Moorthy (2012) in their research
Hypothesis: The personality of a celebrity will have
exploresthe issues of celebrity personality affecting
significant impact on the personality of a brand the brand personality. The study aims to find out the
Personality same personality dimensions that exist for celebrity
and the brand endorsed respectively. The findings of
III. LITREATURE REVIEW
the paper suggested that there is a statistically
CELEBRITY ENDORSEMENT significant effect of celebrity personality on brand
personality. The BP scale develops by Aaker's was
• Sharma & Kumar (2013) explored in their study found out to be reliable and valid for both celebrity
whether celebrity endorsement can create long term and the brand. The study concluded that in the case
brand loyalty for marketers. The findings suggested of a new brand, care should be taken before going
that if celebrity endorsement and advertising for celebrity endorsement because there may be a
strategies get mixed up correctly in terms of matching transfer of some personality attributes from the
characterises of brand with traits off celebrity , then celebrity to the brand.
it may create buzz and consumer may develop a
feeling for brand. IV. RESEARCH METHODOLOGY
• Hassan and Jamie (2014) in their research paper This article is based on exploratory research since
identified whether celebrities of Pakistan and India the goal is to have a deeper knowledge of the research
crate any impact on purchase intention . through self- field. Furthermore, the study's research objective is to
administrated questionnaire 300 students and describe "how" a phenomenon happens, making it a
household were selected and they proved their descriptive study.
hypothesis
A qualitative technique was used for the collecting
• Hainietal (2018) in their research explored the
of empirical data. The rationale for this is that a
impact of celebrity endorsement on consumer
qualitative approach will give us a better grasp of the
behaviour in jewellery industry. The findings of the
study suggested that consumers perception, decision phenomena we're looking at.
making process and demeanour all get influenced by Personal communication is preferable when seeking
celebrity support. a solution to a research topic. As a consequence, a
BRAND PERSONALITY semi structured interview is the best data collecting
strategy for this study and will yield useful results.
• Farhat And Khan (2011) conducted a study to probe Because the interviews were expected to last at least
into the behaviour of customer willingness to buy a half an hour, respondents were picked from the authors'
brand/product, of what are the related factors which
social networks. Due to the duration of the interviews,
influence customer behaviour and attitude. The

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1031
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

it was thought that interviewing people who had Amitabh Bachchan has a reputation for being
previously been in a relationship was more suitable and sincere, trustworthy, and a man of his words.
possible. As a result, it was deemed improper to ALIA BHATT is a cheerful, chirpy young lady.
interview people at random. The interviewer was able
to properly organize the interview and conduct it in a Aishwarya Rai is described as the embodiment of
relaxed setting as a result of this. Another reason beauty and sophistication, whereas Ranveer Singh is
respondents were picked from the interviewers' social described as a cheerful, enthusiastic, and dynamic
networks was because it was believed that they would individual.
offer more detailed and honest responses because Questions like "how well do celebrity personality,
respondents and interviewers knew one other. lifestyle, and image blend in with items" were asked
A total of 10 respondents were chosen for interview. later in the interview. Various people have different ideas
The study has chosen top 5 Indian celebrity endorsers about how well a celebrity's personality matches with
who have maximum brand value. These celebrities are their merchandise. Many individuals disputed whether
or not the celebrity pick based on brand was
Virat Kohli-Vivo, Himalaya, Myntra, Manyavar, appropriate, while others disagreed. The female
Colgate, Puma. protagonist should be placed in the first cry.com when
Alia Bhat---Footie , Lays, Gionee , Make My Trip, Amitabh Bachchan was shown praising the product
Flipkart, Lux because it was all about parenting. Also, some
Aishwarya Rai Bachchan - Loreal Paris, Prestige, youngsters could be included in the Footie commercial
Kalyan Jewellers where Alia Bhatt was exhibiting her cheerful persona.

Ranveer Singh-- Vivo, Rupa Innerwear, Head And Another topic asked during the interview was what
Shoulders, Kellogg's, Royal Stag, Etc. the interviewees believed the motivation was for these
folks to be endorsers. Many people believed that money
Akshaya Kumar- Policy Bazaar, Liv Guard Energy, was the motivating factor behind their actions.
Harpic, Suthol, Dollar, Tata Motors, Pc Jewellers.
Some, on the other hand, said that "it is a method
The Interview Was Mainly Focused On The for them to sell themselves" and that "they may do it to
Different Brands Endorsed By Them. reinvent themselves." The fact that Akshay KUMAR
This Study Relied On Purposeful Sampling. People being featured in advertisements giving social messages
Born Between 1990 And 1999 Were Polled. aids him in reinventing himself.
This Study Has Followed The Three Steps By CONCLUSION:
Having The Data Reduction And Display Presented. As a result of the study's findings, the Hypothesis
Furthermore, The Conclusion Drawing And Verification presented in the conceptualization section could not be
Has Been Used In This Paper. dismissed. The study might lead a marketer to believe
V. RESULTS AND DISCUSSION that the celebrity's personality will have an influence on
the brand's personality. Thus, in the case of a new
The interviews began with the screening of a
company, caution should be used before seeking
commercial film featuring the aforementioned
celebrity endorsement, as there may be a transfer of
personalities supporting items. The interviewees were
personality traits from the celebrity to the brand, which
then asked to explain how they saw the celebrities in
the marketer does not desire.
the advertisement. The respondents' attitudes regarding
celebrities in the advertisement were very similar,
especially VIRAT KOHLI, who is enthusiastic about
fitness, health, and having an up-to-date personality.

1032 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES 4. S. Roy, Y.,Moorthi, "celebrity endorsement and brand


personality"in IIM Banglore Reserach Paper No. 289. Banglore:
1. M. Audi. The Effect of Celebrity Endorsement on Creating Brand SSRN
Loyalty : An Application on the Lebanese Cosmetic Sector ' s
Demand.(2015) 5. K.Sharma, S.Kumar, "celebrity endorsement in advertising;can it
lead to brand loyalty in the long run?"inInternational Journal of
2. R.Farhat, D. M. khan,"Importance Of Brand Personality To Marketing, Financial Services & Management Research,20132(3),
Customer Loyalty : A Conceptual Study", in New Media And 73-79.
Mass Communication,vol 1, 2011 pp 4-10.
6. S, Trott. "The influence of brand personality evidence from
3. R. A Jamil., Hassan, S. R., "Influence of celebrity endorsement India".in global journal of business research, 5(3), 2011 79-83.
on consumer purchase intention for existing products: a
comparative study", in Journal of Management Info,
vol1(4),2014, pp 1-8.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1033
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Government Schools: A Sustainable Initiative for


Parents With Reference to Post Covid Financial
Situation
Dr. Shweta Mishra1, Dr Sonal Sidana2
1,2
Department of Business Administration, Manipal University Jaipur, Jaipur, Rajasthan,India
Email: drshwetamishra306@gmail.com1, sonal.phd2013@gmail.com2

Abstract-This study is intended to examine the I. INTRODUCTION


financial effect of COVID-19 on parents and the
COVID-19 pandemic has been impacted Indian
need to have well-regulated Government schools.
During corona virus pandemic, economic crises has economy badly. Certainly, like many other aspects of
led many people either lost their job or are under everyday life, lockdown time pandemic had a serious
pressure to work on lesser pay or no pay. In Indian of negative impact on students, instructors, and
perspective, Middle class families were also highly educational organizations and parents around the globe
impacted during this time. Along with the regular (Mailizar et al. 2020). The pandemic resulted in closure
household expenditure, the major expenditure on of schools creating a stress situation both for parents
to the shoulders of every parent was their child and students. To make studies continue for the students,
education. Due to the COVID-19 pandemic, there conventional education is shifted to online and virtual
was anemergent need for educational institutes to learning with the already available technical resources
shift learning from offline mode to online class
creating a need for improvement in the techniques of
learning mode to make education accessible to
online learning making it sustainable for future. (Kaur,
every student. Delivery of online classes through
online platform has been became as a challenge 2020). The schools primarily focused on the transfer
for schools and students but it was equally a of educational content rather focussing on the teaching
challenge for parents also. The purpose of this and development of students. Covid has put a lot of
study was to measure financial burden on parents financial burden on parents. Many of them have lost
due to covid 19, their perception towards not their jobs and working on reduced pay or even without
withdrawal of admission their child to school even pay. This has created stress among the parents and had
after facing so much of financial stress, their created a need to have well-disciplined and well-
experience towards online learning suggesting regulated government schools in every city so as to
remedial measures making it sustainable for future make education competitive along with the affordability.
also. The sample of 50 parents has been collected
This research paper is designed to highlight the
online through google form comprising of 24 males
perception of parents towards online learning,
and 26 females. Online survey method was used
for the purpose of data collection. The findings awareness about government online portals, and the
shows thatThere is a need to have a well-regulated reasons for not selecting government schools for their
government school in every city inorder to make children even after facing so of much of financial stress
education a gift for every child not a burden on due to covid. This research paper will be of immense
parents. help in designing a sound well-regulated policy for
Keywords: Online classes in COVID-19, government schools making government schools priority
Parents Perspective for education system, for every parent and thereby resulting in increase in
Government school policies and facilities. government revenue and trust.

1034 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

II. LITERATURE REVIEW IV. RESEARCH METHODOLOGY


COVID pandemic has affected every sector of A. Sample Data:
economy. In some areas it has given positive effect like The key purpose of the research study was to know
Banks, food, health, online shopping industries etc. but perception of government school's student's parent's
in major areas, it has given negative effect like education, regarding financial burden on them and need of providing
manufacturing, agriculture industries etc. Education a platform to ease their burden. Toknow more about
industry had to shift its learning from offline to online the parent's perceptions about pros and cons of online
making it difficult for both the teachers and students to learning and their views for developing Government
cope up with this new technology. Parents are also the schools as a learning platform for lower- and middle-
sufferers as apart from facing financial crisis and class society. The sample of the study included 50
managing regular expenditures, they have to learn this parents consisting of 24 males and 26 females. All the
new technology to make their children comfortable with parents who participated in the survey are having
this new mode as online learning is a collaborative children going to schools and bearing financial burden
activity which can't be a success unless there is a mutual for the education.
understanding between teachers,students and parents.
Covid 19 has put parents in stress situation as many of B. Survey:
them have to lose their jobs or had to work on lesser An online survey technique was used to gather data
or no pay with all the regular expenditures onto their about the perceptions of parents to know their financial
shoulders.One such major expenditure is the education burden due to COVID 19 on account of their children
of their children as this new mode of online learning is education., their perception towards online learning of
new to both theteachers and students, still much is their children and highlighting the reasons for not
required to be changed and updated. Lack of selecting government schools. A structured
technology, lack of proper working environment, lack questionnaire was used to assess the perception of
of social connectivity,lack of personal involvement of parents towards not selecting government schools for
teachers makes online learning a burden for parents as their children. Students were asked about their
they are supposed to pay heavy fees for their children experience towards online learning, what are their
alongwith the heavy financial burden.Different schools expectations from government schools. Through pilot
are using different online learning platform making it study appropriate revisions and modifications were
burdensome for parents to adjust n learn different made in the questionnaire based on their ideas and
technologies for their child even after facing so much suggestions.
stress and burden, majority of the parents have not
shifted their children from the school they are studying V. DATAANALYSIS & RESULT
before covid situation. The reasons are parents don't DISCUSSION:
find government schools up to the mark in providing The data obtained through an online survey was
quality education. analysed based on students' responses. These
responses were stated in table format. Datawere
III. OBJECTIVES OF THE STUDY obtained using the Likert scale and is reported in
1. To measure the financial burden of children education percentage of students' responses.
on parents due to COVID 19 pandemic. TABLE 1:FREQUENCY LEVEL OF THE RESPONDENTS
(GENDER)
2. To analyze the perception of parents about online
learning and selection of government school. Gender Frequency Percent
Male 24 48.0
3. To understand the factors that influence selection of
F emale 26 52.0
private school over government school.
Total 50 100%

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1035
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE 1: represent the gender group of government salary between 3 lakhs to 6 lakhs, 12% parents are
school's student's parents who have responded towards having salary between 6 lakhs to 10 lakhs and only
their perspective regarding financial burden during 12% parents are having salary more than. Which shows
COVID 19 pandemic.among them 48% parents are their capacity of bearing financial burden.
male, 52% parents are female. TABLE 5 DOES COVID PANDEMIC HAS AFFECTED YOUR
SALARY?
TABLE 2: FREQUENCY LEVEL OF THE RESPONDENTS (NO.
OF CHILDREN) Frequency Percent
Decrease 18 36.0
N umber o f C hildren F requency Percent Constant 22 44.0
On e Ch ild 16 3 2 .0 No Pay 10 20.0
T wo Children 30 6 0 .0 Total 50 100.0
Th ree Ch ildren 4 8. 0
TABLE 5: represent the covid pandemic effects on
To tal 50 1 00 .0
salary of government school's student's parents who
TABLE 2: represent the number of children of have responded towards their perspective regarding
government school's student's parents who have financial burden during COVID 19 pandemic.among
responded towards their perspective regarding financial them 36% parents salary have been decreased, 44%
burden during COVID 19 pandemic, among them 32% parents salary have been constant, 20% parents have
parents are having one child, 60% parents are having not received any salary.
two children and 8% parents are having three children. TABLE 6 ARE YOU SATISFIED WITH THE ONLINE TEACHING
PATTERN OF YOUR CHILD SCHOOL?
TABLE 3: FREQUENCY LEVEL OF THE RESPONDENTS (TYPE
OF OCCUPATION) Frequency Percent
Strongly Agree 26 52.0
Ty pe of Occupation Frequency P erce nt Agree 24 48.0
Private J ob 22 4 4.0 Neutral 0 0.0
Bu sines s 22 4 4.0 Disagree 0 0.0
G ov ernmen t Jo b 6 1 2.0 Strongly Disagree 0 0.0
To tal 50 10 0. 0 Total 50 100.0

TABLE 3: represent the type of occupation of TABLE 6 represent the government school's
government school's student's parents who have student's parents' perspective regarding Satisfaction with
responded towards their perspective regarding financial the online teaching pattern of their children during
burden during COVID 19 pandemic, among them 44% COVID 19 pandemic.among them 28% parents are
parents are having private jobs, 44% parents are having satisfied, 52% parents are not satisfied, 20% parents
business and 12% parents are having government. are still in dilemma regarding online teaching pattern.
TABLE 7 IF GIVEN AN OPTION, WHICH MODE OF
TABLE 4: FREQUENCY LEVEL OF THE RESPONDENTS TEACHING YOU PREFER FOR YOUR CHILD IN FUTURE?
(INCOME SLABS (IN RS.))
Frequency Percent
Income Slabs (in Rs.) Frequency Percent Online 2 4.0
0-3,00,000 20 40.0 Offline 30 60.0
Hybrid (both offline and
3,00,000-6,00,000 16 32.0 online mode) 18 36.0
6,00,000-10,00,000 8 16.0 Total 50 100.0
Above 10,00,000 6 12.0 TABLE 7 represent the government school's
Total 50 100.0
student's parent's perspective regarding which mode
TABLE 4: represent the income slabs of government of teaching they prefer for their child in future.among
school's student's parents who have responded towards them only 4% parents prefer online teaching in future
their perspective regarding financial burden during learning, 60% parents prefer offline teaching in future
COVID 19 pandemic. among them 40% parents are learning, 36% parents agree with Hybrid (both offline
having salary less than 3 lakhs, 32% parents are having and online mode)teaching learning.

1036 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE 8 HOW DO YOU RATE LEARNING AND SOCIAL andregulations.72% parents are agreed, 4% parents
ENVIRONMENT IN GOVERNMENT SCHOOLS?
are not agreed, and 24% parents are still in dilemma
Frequency Percent with this statement.
Fair 28 56.0
Good 4 8.0 TABLE 12 DOES GOVERNMENT SCHOOLS FOLLOW THE
Poor 18 36.0 AGE CRITERION WHILE TAKING ADMISSIONS?
Total 50 100.0
Frequency Percent
TABLE 8 represent the government school's Yes 14 28.0
No 10 20.0
student's parent's perspective regarding learning and Maybe 26 52.0
Social Environment in Schools.among them 56% Total 50 100.0
parents are feeling fair environment, 8% parents are TABLE 12represent the government school's
feeling good environment, and 36% parents are feeling student's parent's perspective regarding procedure the
poor environment in schools. age criterion while taking admissions. 28% parents are
TABLE 9 DO YOU AGREE THAT SCHOOL ENVIRONMENT agreed, 20% parents are not agreed, and 52% parents
IMPACTS YOUR CHILD LEARNING AND DEVELOPMENT?
are still in dilemma with this statement.
Freque ncy Percent
TABLE 13 DO YOU FEEL THE NEED TO HAVE WELL-
Yes 14 28.0
REGULATED AND DISCIPLINED GOVERNMENT SCHOOLS
No 26 52.0 IN YOUR CITY
Maybe 10 20.0
Total 50 100.0 Frequency Percent
Yes 42 84.0
TABLE 9represent the government school'sstudent's No 4 8.0
Parents' perspective regarding school environment Maybe 4 8.0
impacts their child learning and development.52% Total 50 100.0

parents are strongly agreed, 48% parents are agreed TABLE 13 represent the government school's
with this statement. student's parent's perspective regarding need of having
TABLE 10 IS THE SCHOOL FEES OF YOUR CHILD well-regulated and disciplined Government schools in
JUSTIFIED FOR ONLINE LEARNING? their city. 84% parents are agreed, 8% parents are not
Frequency Percent agreed, and 8% parents are still in dilemma with this
Yes 4 52.0 statement.
No 42 48.0
Maybe 4 8.0 TABLE 14. IS THE THOUGHT OF SHIFTING YOUR CHILD
Total 50 100.0 TO GOVERNMENT SCHOOL EVER CAME TO YOUR MIND
DURING THIS PANDEMIC SITUATION DUE TO FINANCIAL
TABLE 10 represent the government school's BURDEN?
student's parent's perspective regarding school fees of Frequency Percent
their Child for online learning. 52% parents are agree, Yes 24 48.0
48% parents are not agree and 8% parents are still in No 20 40.0
Maybe 6 12.0
dilemma with this statement. Total 50 100.0
TABLE 11 DO YOU FIND TAKING ADMISSIONS IN PRIVATE
SCHOOL IS TOUGHER AND INVOLVES MORE RULES AND
TABLE 14represent the government school's
REGULATIONS? student's parent's perspective regarding thought of
Frequency Percent
shifting their child to government school during this
pandemic situation due to financial burden.48% parents
Yes 36 72.0
No 2 4.0 are agreed, 40% parents are not agreed, and 12%
Maybe 12 24.0 parents are still in dilemma with this statement.
Total 50 100.0

TABLE 11represent the government school's


student's parent's perspective regarding admissions in
private school is tougher and involves more rules

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1037
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

TABLE 15 HAVE YOU SHIFTED YOUR CHILD TO ANOTHER TABLE 19 IF YES, WHICH LEARNING PORTAL YOUR
SCHOOL DUE TO POST COVID FINANCIAL BURDEN? CHILD USE THE MOST TO ENHANCE HIS/HER
KNOWLEDGE?
Frequency Percent
Yes 44 88.0 Frequency Percent
No 6 12.0 Diksha 6 12.0
Total 50 100.0 E-Pathshala 10 20.0
Swayam P rabha 6 12.0
TABLE 15represent the government school's Other 28 56.0
student's parent's decision regarding shifting their child Total 50 100.0
to school during this pandemic situation due to financial TABLE 19 represent the government school's
burden.88% parents are agreed, 12% parents are not student's parent's perception regarding the Learning
agreed with this statement. Portal mostly used by their child to enhance his/her
TABLE 16 DO YOU RECOMMEND SAME CURRICULUM FOR knowledge.12% parents prefer Dikha learning mode,
PRIVATE AND GOVERNMENT SCHOOLS?
20% parents prefer E-Pathshala learning mode, 12%
Freque ncy Percent parents prefer Swayam Prabha learning mode, and
Yes 42 84.0
No 8 16.0 56% parents prefer different learning mode.
Total 50 100.0 TABLE 20 ACCORDING TO YOU, WRITE ONE REASON
FOR SELECTING GOVERNMENT JOB BUT NOT
TABLE 16represent the government school's GOVERNMENT SCHOOL FOR YOUR CHILD?
student's parent's recommendation regardingsame
Frequency Percent
curriculum for private and Government Schools.84% Poor Infrastructure and facilities 16 32.0
parents are agreed, 16% parents are not agreed with Government job is good for future 34 68.0
this statement safety but government schools
learning environment is not
TABLE 17 DO YOU FEEL REGULAR PERFORMANCE satisfactory
APPRAISAL OF GOVERNMENT TEACHERS WOULD TOTAL 50 100.0
IMPROVE THEIR QUALITY OF TEACHING?
This table represent the government school's
Frequency Percent
Yes 38 76.0 student's parent's perception regarding reason for
No 2 4.0 selecting Government job but not Government School
Maybe 10 20.0 for their Child. 32% parents are agreed with statement
Total 50 100.0
Poor Infrastructure and facilities, 68% parents are
TABLE 17 represent the government school's agreed with statement that Government job is good for
student's parent's perception regarding regular future safety but government schools learning
Performance Appraisal of Government Teachers to environment is not satisfactory.
improve their Quality of Teaching.76% parents are
agreed, 4% parents are not agreed, and 20% parents VI. CONCLUSION
are still in dilemma with this statement. In today's world, education is considered as a
TABLE 18 ARE YOU AWARE ABOUT THE E- LEARNING necessity such like food for livelihood. Spread of
PORTALS LAUNCHED BY GOVERNMENT?
COVID-19 in 2019-2020, has burdened parents with
F requency Percent lot of financial issues worldwide leading to difficulty in
Yes 24 48 .0
No 24 48 .0 survival. Education industry has shifted from offline
Maybe 02 4. 0 towards e-learning to make education accessible to
Total 50 1 0 0.0
majority of students. Parents perception towards online
TABLE 18 represent the government school's learning is not satisfactory. While the present paper aims
student's parent's awareness regarding the e- learning to suggest that COVID 19 pandemic has created a
portals launched by Government.48% parents are huge financial burden on parents and also, they are not
agreed, 48% parents are not agreed, and 4% parents finding online classes comfortable for their children even
are still in dilemma with this statement. though majority of them has not shifted their children

1038 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

from private schooling to government. This research of parents of both private and government school's
paper highlights the need that much effort is needed to student's parents regarding online learning and selection
make government schools sustainable for the future of government school.
generations and meet the expectations of parents.
Absence of Teaching and learning environment is IX. REFERENCES
considered as the biggest concern for parents. Also, it 1) Aliyyah, R. R., Rachmadtullah, R., Samsudin, A., Syaodih, E.,
Nurtanto, M., & Tambunan, A. R. S. (2020). The perceptions of
is observed to have a common curriculum for both primary school teachers of online learning during the COVID-19
private and government schools. Although Government pandemic period: A case study in Indonesia. Journal of Ethnic
has taken various initiatives in proving education to all and Cultural Studies, 7(2), 90-109.
sections of the society by launching various online 2) Zhang, W., Wang, Y., Yang, L., & Wang, C. (2020). Suspending
learning portals. Still it is observed that awareness classes without stopping learning: China's education emergency
management policy in the COVID-19 outbreak.
regarding the same is not up to the mark. Parents have
3) Alonge, B. D., Onnoh, O. G., Olusesean, O. J., Ojo, O. A., &
shown a positive opinion about adoption of hybrid Nathaniel, O. O. (2020). Working Conditions and Salary as
classes. Much scope is generated in this field of online Correlates of Teachers' Productivity in Government-Owned
learning. As per parents' perception Microsoft teams is Secondary Schools in Emure Local Government Area of Ekiti
State, Nigeria. Journal of Educational Issues, 6(1), 89-97.
considered as the most comfortable online learning
platform by more than 50 % respondents. Parents are 4) Al-Samarrai, S., Gangwar, M., & Gala, P. (2020). The impact of
the COVID-19 pandemic on education financing.
of the opinion that school environment impacts their
5) Rowe, E., & Perry, L. B. (2020). Inequalities in the private funding
child learning and development and find government of public schools: parent financial contributions and school
schools far behind in this area. It was strongly socioeconomic status. Journal of Educational Administration and
recommended by parents to have a regular History, 52(1), 42-59.
performance appraisal of government teachers to 6) Sasikumar, S., & Balaji, P. (2020). Perception of Students towards
enhance their learning. Thus, there is a need to develop Cost-Free Welfare Schemes in School Education-A Study with
Special Reference to Government Schools of Tamil Nadu.
Government Schools making it a priority for all parents International Journal of Management (IJM), 11(3), 511-518.
and proper awareness regarding online government
7) Nearchou, F., Flinn, C., Niland, R., Subramaniam, S. S., &
learning portals so that it can be utilised to a maximum Hennessy, E. (2020). Exploring the impact of COVID-19 on
extent towards child learning. mental health outcomes in children and adolescents: a systematic
review. International journal of environmental research and public
VII. MANAGERIAL IMPLICATIONS health, 17(22), 8479.
8) Aslam, M., Malik, R., Rawal, S., Rose, P., & Vignoles, A. (2019).
The findings of the study highlight the negative impact Do government schools improve learning for poor students?
of the COVID 19 on parents. The study has explored Evidence from rural Pakistan. Oxford Review of Education, 45(6),
the the factors that influence selection of private school 802-824.
over government school. Findings of the study will also
serve as feedback for the administrators, and
government policies makers to rectify the weakness and
shortcomings in planning and organization of government
school administration.
VIII. WAY FORWARD
This paper identifies the factors of the financial
burden of children education on parents due to COVID
19 pandemic. In future research, more study required
of revision policies of government school's structure,
types of training provided to increase teachers
performance. There is need to analyze the perception

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1039
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

An Evaluative Comparative Study on SBI & ICICI


Bank in India
Dr.K.Karthikeyan1, M.Dinesh Kumar2
1
Dean and Controller of Examinations, Coordinator, Naren IAS Academy Associate Professor of Commerce,
PG and Research, Department of Commerce, Vivekananda College, (Affiliated to Madurai Kamaraj University)
Thiruvedakam West, Madurai
2
Assistant Professor, Department of Commerce, K.L.N. ARTS & SCIENCES COLLEGE (Affiliated to Alagappa University,
Karaikudi) Pottapalayam - 630 612. Sivagangai District, Tamilnadu, INDIA
Email: karthikeyan.madurai@gmail.com1, dkumar0784@gmail.com2

Abstract- Now banking sectors are moving ICICI Bank under Deposit and Loan for regression
modern technology based and to connect on analysis P-value is highly significant.
electronic devices, banking websites and mobile Keywords: State Bank of India (SBI), Industrial
apps initiatives and implementation banking Credit and Investment Corporation of India
sectors. State Bank of India (SBI) is an Indian (ICICI) Bank, Automatic Teller Machine (ATM),
universal public sector bank and financial services Deposit, Loan & Advances and Nonperforming
process as per law main headquartered in Mumbai Assets (NPA).
and Maharashtra. SBI is the 43rd largest bank in
the world; and the ranked 221st in the "Fortune I. INTRODUCTION
Global 500" list of the world's top corporations of
2020, creating the simply Indian bank on the list. State Bank of India (SBI) is an Indian universal
Industrial Credit and Investment Corporation of public sector bank and financial services process as
India (ICICI) Bank is an Indian global private sector per law main headquartered in Mumbai and
bank financial services company with its registered Maharashtra. SBI is the 43rd largest bank in the world;
headquarters in Vadodara, Gujarat, and corporate- and the ranked 221st in the "Fortune Global 500" list
office in Mumbai, Maharashtra. It offers an of the world's top corporations of 2020, creating the
extensive series of banking products and financial simply Indian bank on the list. It is a public sector bank
services for corporate and retail customers during and the very largest bank in India with a (23%) market
a variety of rescue channels and specialized share by assets and an (25%) share of the total loan
subsidiaries in the areas of deal banking, life, non- and deposits market. It is also the fifth largest employer
life insurance, venture capital and asset
in India with virtually 250,000 employees. SBI is one
management. In the bank has a network of 5,275
branches and 15,589 ATMs across India and has a of the biggest employers in the world with 245,652
presence in 17 countries. The SBI and ICICI Bank employees as on 31st March 2021. Out of the total
has been playing the role of developing the nation personnel, the demonstration of women employees is
by taking several initiatives to ensure a safe, nearly (26%). The percentage of Officers, Associates
secure, sound, efficient, accessible and authorized and Subordinate staff was (44.28%, 41.03% and
No. of Branches, No. of ATMs, Total Deposit, Total 14.69%) likewise on the same date. Each employee
Loan & Advance and Total Nonperforming Assets contributed a net profit of Rs. 828,350 (US$12,000)
(NPA) in India. Analysis mean, SD., average growth during FY 2020-21.
rate and simple percentage trend graphs have been
used to analyze and interpret the data on Progress Industrial Credit and Investment Corporation of
of Deposits, Loans and NPA SBI and ICICI Bank India (ICICI) Bank is an Indian global private sector
in India during the study period of 10 years (2011 bank financial services company with its registered
to 2020). SBI under Deposit and Loan for headquarters in Vadodara, Gujarat, and corporate-
regression analysis P-value is highly significant and office in Mumbai, Maharashtra. It offers an extensive

1040 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

series of banking products and financial services for thereby guarantees economic development. The Indian
corporate and retail customers during a variety of banking industry is one of the best growing banking
rescue channels and specialized subsidiaries in the industries in India. Suggesting the first and second
areas of deal banking, life, non-life insurance, venture making financial division of reforms, the Indian banking
capital and asset management. ICICI bank has a industry has observed essential changes and huge growth
network of 5,275 branches and 15,589 ATMs across during the last few years. It is based on secondary data
India and has a presence in 17 countries. sources on SBI and ICICI in India.
The SBI and ICICI Bank has been playing the role Balakrishnan C., (2019) observed that ICICI grew
of developing the nation by taking several initiatives to to be the primary Indian company and the initial bank
ensure a safe, secure, sound, efficient, accessible and or financial institution. This study was based on
authorized No. of Branches, No. of ATMs, Total analytical nature. The main study was financial
Deposit, Total Loan & Advance and Total performance of ICICI bank in India using camel analysis
Nonperforming Assets (NPA) in India. Analysis mean, model. The secondary data was collected from ICICI
SD., average growth rate and simple percentage trend Bank annual report; the data has been analyzed using
graphs have been used to analyze and interpret the data ratio analysis. The concluded that ICICI bank was in
on Progress of Deposits, Loans and NPA SBI and an increasing trend and liquidity restrictions were on
ICICI Bank in India during the study period of 10 years the apex pose.
(2011 to 2020). Bhagyalakshmi Burra., (2020) said India is the top
II. OBJECTIVES OF THE PAPER rising Smartphone user nation. In India, more than 900
million customers are utilizing Smartphone users, but
The following are the objectives of the present paper: only 40 million banking customers also use mobile
1. To examine the SBI & ICICI Bank in India. banking transactions. There can be different factors,
2. To compare the SBI & ICICI Bank for No.of including the need for dynamic cooperation between
Branches, No. of ATMs, Total Deposit, Total Loan banks. Variables are one of the world's best growing
& Advance and Total NPA (2011 to 2020) in India. markets. SBI has successfully launched several more
applications which have resulted in banking a future
III. RESEARCH METHODOLOGY simpler business for customer's services.
The present paper is descriptive in nature and is Comparative Analyze for SBI & ICICI bank for
based on SBI & ICICI Bank in India secondary data number of branches, number of ATMs, total deposit,
only. The data were collected from SBI & ICICI Bank total loan & advance and total NPA (2011 to 2020) in
in India annual reports last 10 years (2011 to 2020) India
and other related publications. The literature was
collected from authorized national and international An Evaluative Study on comparative analysis for SBI
published journals and related websites. The analysis & ICICI bank in the number of branches, number of
was based on trend line graphs, growth analysis and ATMs, total deposit, total loan & advance and total
descriptive statistics regression has been used to analyze NPA (2011 to 2020) in India.
this data.
IV. LITERATURE REVIEW
Brahma Chaudhuri., (2018) said that the banking
industry is moving to play a role in the economic
development of a country. It provides the support of
the economy, finance institutions, those chains and
promotes growth in all the banking industries and

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1041
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Chart 1 SBI & ICICI Bank number of branches in India Chart 3 SBI & ICICI Bank Total Deposit in India

Source: SBI & ICICI Bank Annual Report on 2010-11 to 2019-20.


Source: SBI & ICICI Bank Annual Report on 2010-11 to 2019-20.
In these measures of Trend Line Graphs on Progress
In these measures of Trend Line Graphs on Progress
of SBI & ICICI Bank in India are presented below the
of SBI & ICICI Bank in India are presented below the
SBI No. of branches that is positive trend; R-squared
SBI Total Deposit that is positive trend ; R-squared
value is 0.884. So, it has a correct fit of the trend line
value is 0.949. So, it has a correct fit of the trend line is
is nearest to 88% growth and ICICI Bank No. of
nearest to 95% growth and ICICI Bank Total Deposit
branches has a positive trend; R-squared value is 0.916.
that is positive trend; R- squared value is 0.950. So, a
So, it has a correct fit of the trend line is nearest to
correct fit of the trend line is nearest to 95% growth.
92% growth. Hence ICICI Bank number of branches
Hence the nearest to collect the same deposit for SBI
is high for customer services.
& ICICI Bank is equal for customer services.
Chart 2 SBI & ICICI Bank number of ATMs in India
Chart 4 SBI & ICICI Bank Total Loan & Advance in India

Source: SBI & ICICI Bank Annual Report on 2010-11 to 2019-20.

These measures of Trend Line Graphs on Progress Source: SBI & ICICI Bank Annual Report on 2010-11 to 2019-
of SBI & ICICI Bank in India are presented below the 20.
SBI No. of ATMs that is positive but below 50% trend In these measures of Trend Line Graphs on Progress
; R-squared value is 0.455. So, it has a correct fit of of SBI & ICICI Bank in India are presented below the
the trend line is nearest to 46% growth and ICICI Bank SBI Total Loan & Advance that is positive trend ; R-
No. of ATMs has a positive trend; R-squared value is squared value is 0.852. So, it has a correct fit of the
0.886. So, it has a correct fit of the trend line is nearest trend line is nearest to 85% growth and ICICI Bank
to 89% growth. Hence ICICI Bank number of ATMs Total Loan & Advance that is positive trend; R-squared
is high for customer services. value is 0.991. So, it has a correct fit of the trend line is
nearest to 99% growth. Hence Total Loan & Advance
for ICICI Bank is high for customer services.

1042 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Chart 5 SBI & ICICI Bank Total NPA in India Table 2 Descriptive Statistics Analysis ICICI Bank (2010- 11 to
2019-20) in India

No. of No. of Total Total Total


Year Branches ATMs Deposit Loan & NPA
Advance
Mean 3973 12116 4364 4130 107
SD 1149 3208 1801 1424 95
CV 28.921 26.477 41.265 34.468 89.559
Skewness -0.863 -1.146 0.712 0.238 0.976
Kurtasis -0.025 1.097 -0.476 -0.979 -0.259
Growth 2357 7557 2209 2286 20
CAGR 0.135 0.130 0.146 0.129 0.170
Source: Computed Data

It is clear from the table 2 shows that are the


Source: SBI & ICICI Bank Annual Report on 2010-11 to 2019-20. difference between ICICI Bank process under No.
of Branches (3973), No. of ATMs (12116), Total
In these measures of Trend Line Graphs on Progress
Deposit (4364), Total Loan & Advance (4130) and
of SBI & ICICI Bank in India are presented below the
Total NPA (107) for mean value range. It is a good
SBI Total NPA that is positive trend ; R-squared value
measure of central value because the Std. Deviation
is 0.715. So, it has a correct fit of the trend line is nearest
(SD) value range but Total NPA is not a good process.
to 72% nearest to 46% growth. Hence Total Loan &
Covariance (CV) is a better result but NPA is not
Advance for ICICI Bank is high for customer services.
regular. As the Skewness value is good. Which is
Table 1 Descriptive Statistics Analysis SBI (2010-11 to 2019-
20) in India
between -1 or greater than 1, the distribution is highly
skewed. If the kurtosis ranges from 0 to 3, there is
Year No. of No. of Total Total Total
Branches ATMs Deposit Loan & NPA normal distribution. But the calculated kurtosis has no
Advance normal distribution No. of ATMs is improving. Growths
Mean 17518 54729 18786 2525 291
SD 3418 6360 8186 1029 210 are better than results. It is classified as Compound
CV 19.509 11.620 43.574 40.739 72.056 Average Growth Rate (CAGR) higher than total NPA.
Skewness 0.618 -1.040 0.589 0.033 1.006
Kurtasis -1.318 -0.649 -1.125 -1.702 0.026 Table 3 SBI Loan, Deposit and NPA Ratio and Percentage
Growth 13162 48100 9042 1250 84 Analysis
CAGR 0.056 0.029 0.148 0.114 0.192
Loan to Deposit/
Source: Computed Data Reserve NPA/Loan &
Year Deposit Reserve Loan
Ratio Advance (%)
Ratio ( %)
It is clear from the table 1 shows that are the 2010-11 0.128 8144 1.147 13 7.353
2011-12 0.122 9166 1.139 12 9.091
difference between SBI process under No. of Branches 2012-13 0.141 10336 1.164 14 6.719
(17518), No. of ATMs (54729), Total Deposit 2013-14 0.131 12113 1.151 13 7.767
2014-15 0.13 13716 1.15 13 8.729
(18786), Total Loan & Advance (2525) and Total NPA 2015-16 0.187 14074 1.23 19 8.345
(291) for mean value range. It is a good measure of 2016-17 0.155 17271 1.184 16 10.15
2017-18 0.134 23442 1.154 13 19.517
central value because the Std. Deviation (SD) value 2018-19 0.138 25084 1.161 14 13.53
2019-20 0.097 29270 1.108 10 13.595
range but Total Loan & Advance and Total NPA is not
a good process. Covariance (CV) is a better result but Source: Computed Data

NPA is not regular. As the Skewness value is good. It is analyzed from the table 3 that the difference
Which is between "-1 or greater than 1", the distribution between SBI under Loan, Deposit and NPA Loan to
is highly skewed. If the kurtosis ranges from 0 to 3, Deposit Ratio range is from 0.097 to 0.187, Reserve
there is normal distribution. But the calculated kurtosis value is 8144 to 29270, Reserve Ratio range is 1.108
has no normal distribution. Growths are better than to 1.184, Deposit/Loan (%) range is 10 to 19 and NPA/
results. It is classified as Compound Average Growth Loan & Advance (%) range is 7 to 19.517.
Rate (CAGR) higher than total NPA.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1043
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Table 4 ICICI Bank Loan, Deposit and NPA Ratio and Table 6 Regression Analysis of SBI Deposit & Loan
Percentage Analysis
Sum of Mean R
Model df F Sig. R
Squares Square Square
Loan to Deposit NPA/Loan
Reserve Regression 7350523 1 7350523
Year Deposit Reserve /Loan & Advance 0.001 b 0.879 a
Ratio Residual 2169490 8 271186 27 0.772
Ratio (%) (%) Total 9520013 9
2010-11 0.959 93 24 96 1.136 a. Dependent Variable: SBI Loan
2011-12 0.993 18 142 99 0.747 b. Predictors: (Constant), SBI Deposit
2012-13 0.992 23 127 99 0.77 Coefficients
2013-14 1.02 -68 -49 102 0.975 Standardized
Unstandardized Coefficients
Model Coefficients T Sig.
2014-15 1.072 -259 -14 107 1.632 B Std. Error Beta
2015-16 1.033 -138 -30 103 3.055 (Constant) 450.940 431.055 - 1.046 0.326
2016-17 0.947 258 19 95 5.482 S BI
0.110 0.021 0.879 5.206 0.001
2017-18 0.913 486 12 91 5.442 Deposit
2018-19 0.898 663 10 90 2.314 a. Dependent Variable: SBI Loan
2019-20 0.837 1257 6 84 1.567 Source: Computed Data
Source: Computed Data
It is analyzed from table 6 that the difference
It is observed from the table 4 that the difference between SBI under Deposit and Loan for regression
between SBI under Loan, Deposit and NPA Loan to analysis based on F-value is 27.105, R square value is
Deposit Ratio range is from 0.837 to 1.072, Reserve 77% and P-value is highly significant.
value is -259 to 1257, Reserve Ratio range is -49 to Table 7 Regression Analysis of ICICI Bank Deposit & Loan
142, Deposit/Loan (%) range is 84 to 107 and NPA/ Sum of Mean R
Model df F Sig. R
Loan & Advance (%) range is 0.747 to 5.482. Regression
Squares
17768372 1
Square
17768372
Square

Table 5 Correlation Coefficient Analysis of SBI and ICICI Residual 470903 8 58863 302 0.000b 0.987 a 0.974
Total 18239274 9
Bank a. Dependent Variable: ICICI Loan
b. Predictors: (Constant), ICICI Deposit
SBI ICICI Bank
Coefficients
Total Total Standar dized
Items Total Total Total Total Unstandardized Coefficients
Loan & Loan & Model Coefficients T Sig.
Deposit NPA Deposit NPA
Advance Advance B Std. Error Beta
Total Deposit 1.000 - - 1.000 - - (Constant) 725.352 210.46 - 3.447 0.009
Total Loan & ICICI
0.879 1.000 - 0.987 1.000 - 0.780 0.045 0.987 17.374 0.000
Advanc e Deposit
Total NPA 0.884 0.888 1.000 0.580 0.622 1.000 a. Dependent Variable: ICICI Loan

Source: Computed Data Source: Computed Data

It is related between from the table 5 that the It is analyzed from table 7 that the difference
Correlation Coefficient Analysis of SBI and ICICI Bank between ICICI Bank under Deposit and Loan for
under Total Deposit, Total Loan & Advance and Total regression analysis based on F-value is 301.86, R
NPA of correlation relationship between Total Deposit square value is 97% and P-value is highly significant.
to Total Loan & Advance & Total NPA are 88% that
V. CONCLUSION
is a very highly positive relationship, Total Loan &
Advance to Total NPA are 88% that is a very highly The result was concluded by comparative analysis
positive relationship. ICICI Bank correlation relationship of the SBI & ICICI Bank under No. of Branches, No.
between Total Deposit to Total Loan & Advance 99% of ATMs, Total Deposit, Total Loan & Advance and
and Total NPA are 58% that is a very highly positive Total NPA in India. In these measures of Trend Line
relationship. Total NPA to Total Loan & Advance are Graphs on Progress of SBI & ICICI Bank in India
62% that is a very highly positive relationship. under ICICI Bank number of branches is high for
customer services. ICICI Bank number of ATMs is high
for customer services. Nearest to collect the same
deposit for SBI & ICICI Bank is equal for customer
services. Total Loan & Advance for ICICI Bank is high
for customer services. Total Loan & Advance for ICICI
Bank is high for customer services. SBI under Deposit
and Loan for regression analysis based on F-value is

1044 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

27.105, R square value is 77% and P-value is highly [5] Brahma Chaudhuri., (2018). A Comparative Analysis of SBI and
ICICI: Camel Approach. International Journal of Research in
significant and ICICI Bank under Deposit and Loan Management, Economics and Commerce, 8 (1), 151-156.
for regression analysis based on F-value is 301.86, R
[6] Dr. G. Santiyavalli, "Customer Perception of Service Quality of
square value is 97% and P-value is highly significant. State Bank of India - A Factor Analysis", International Journal of
The RBI guidelines to SBI and ICICI banking sectors Management and Business Studies, 1(3), 78-84.
are improving on providing loan & advances and proper [7] https://community.gooddata.com/metricsandmaqlkbarticles43/
collection of NPAs. SBI has a customer base very high normalitytestingskewnessandkurtosis241
and ICICI Bank have a customer base is nearest to [8] https://dbpedia.org/page/ICICI_Bank
high. So, Therefore customer is credits for banks. [9] https://en.wikipedia.org/wiki/State_Bank_of_India

REFERENCES [10]https://en.wikiredia.com/wiki/State_Bank_of_India
[11]https://ijbed.com/PDF/no1vol6/IJBED202029.pdf
[1] Alagarsamy.K., & Wilson, S., (2013). A study on customer
behavior towards banking services with special reference to public [12]Routray (2008), "Wireless ATM: A Technological Framework
sector banks in Sivagangai Dist, Asia Pacific Journal of Marketing, to M-Banking", Journal of Internet Banking and Commerce,
2 (2), 183-196. 13(1), 2-9.
[2] Arun Kumar Kaushik., (2012). E-banking system in SBI. [13]Sangmi, M. and Nazir, T. (2010). Analysing financial performance
International Journal of Multidisciplinary Research, 2 (7), 76- of commercial banks in India, Application of CAMEL model,
97. Pakistan Journal of Commerce and Social Science, 4(1), 40-55
[3] Balakrishnan C., (2019). A Study on Financial Performance of [14]Siddiqi, K. O., (2011). Interrelations between Service Quality
ICICI Bank. Cikitusi Journal for Multidisciplinary Research, 6 Attributes, Customer Satisfaction and Customer Loyalty in the
(4), 694-701. Retail Banking Sector in Bangladesh, International Journal of
Business and Management, 6 (3), 12-36.
[4] Bhagyalakshmi Burra., (2020). A Comparative Study between
Customer Perceptions towards SBI YONO and other Mobile [15]Uppal R.K. (2010). Emerging Issues and Strategies to Enhance
Banking Services. Science, Technology and Development, 11 (12), M-Banking Services. African Journal of Marketing. 2(2), 29-36.
349-359.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1045
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Digital Marketing- A Boost to Today's Businesses


Dr.Balaji.K
Assistant Professor in MBA, Sree Vidyanikethan Institute Of Management, Tirupati, Andhrapradesh, India.
Email:drkbalajimba@gmail.com

Abstract: Digital marketing is the marketing of [2]Platforms


products or services using digital technologies,
mainly on the Internet, but also including mobile [3]Technologies used
phones, display advertising, and any other digital [4]Quality content
medium. Digital marketing's development since
the 1990s and 2000s has changed the way brands [5]Inputs & expenditures
and businesses use technology for marketing. As [6]Interactions
digital platforms are increasingly incorporated into
marketing plans and everyday life, and as people B. Importance of Digital Marketing
use digital devices instead of visiting physical
The importance of digital marketing is that you can
shops, digital marketing campaigns are becoming
easily track and monitor your campaigns. When you
more prevalent and efficient. This paper mainly
focuses on conceptual understanding of digital invest time and money into your campaigns, you want
marketing cases in the form of examples. to know that they are working. Digital marketing makes
it easy for you to track your campaigns, which allows
Key Words: Digital marketing, Physical shops,
you to adapt and drive better results.
Marketing campaigns, Today's business
C. Channels Of Digital Marketing
I. INTRODUCTION
The Following are some of most common digital
Digital marketing encompasses all marketing efforts marketing tactics and the channels involved-
that use an electronic device or internet. Businesses
leverage digital channels such as search engines, social • Search Engine Optimization (SEO): This is
media, email and their websites to connect with current process of optimizing website to "rank" higher in
search engine results pages, thereby increasing the
and prospective customers. This can also be referred
amount of organic (or free) traffic your website
as 'online marketing', 'internet marketing' or 'web
receives. The channels that benefit from SEO include
marketing'. Digital marketing is defined by use of Websites, Blogs, and Info graphics.
numerous digital tactics and channels to connect with
customers where they spend much of their time: online. • Social Media Marketing: This practice promotes
From website to business's online branding assets - your brand and your content on social media channels
to increase brand awareness, drive traffic, and
digital advertising, email marketing, online brochures,
generate leads for your business. The channels you
and beyond -- there's spectrum of tactics falling under can use in social media marketing include Face book,
the umbrella of "digital marketing." Twitter, LinkedIn, Instagram, Snap chat, Pinterest,
II. THEORITICAL BACKGROUND OF THE and Google+.
STUDY • Content Marketing: It denotes the creation and
promotion of content assets for the purpose of
A. Factors Affecting Digital Marketing generating brand awareness, traffic growth, lead
Digital marketing is influenced by various factors. generation, and customers. The channels that can play
They are a part in your content marketing strategy include Blog
posts, EBooks and whitepapers, Info graphics, Online
[1]Audiences brochures and look books.

1046 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

• Affiliate Marketing: This is a type of performance- • Online PR: Online PR is practice of securing earned
based advertising where you receive commission for online coverage with digital publications, blogs, and
promoting someone else's products, services on your other content-based websites. It's much like traditional
website. Affiliate marketing channels include Hosting PR, but in the online space. The channels you can
video ads through the YouTube Partner Program and use to maximize your PR efforts include: Reporter
Posting affiliate links from your social media accounts. outreach via social media Engaging online reviews
of your company, Engaging comments on your
• Native Advertising : Native advertising refers to
personal website or blog.
advertisements that are primarily content-led and
featured on a platform alongside other, non-paid D. Digital Marketing -Role in Today's
content. Buzz Feed-sponsored posts are a good Businesses:
example, but many people also consider social media
advertising to be "native" - Face book advertising and Regardless of what your company sells, digital
Instagram advertising. marketing still involves building out buyer's personas to
identify your audience's needs and creating valuable
• Marketing Automation: Marketing automation
refers to the software that serves to automate your
online content.
basic marketing operations. Many marketing • Content Performance and Lead Generation
departments can automate repetitive tasks they would
otherwise do manually, such as Email newsletters, • Attribution Modeling
Social media post scheduling, Contact list updating, • Online behavioral advertising
Lead-nurturing workflows, Campaign tracking and
reporting. • Collaborative Environment

• Pay-Per-Click (PPC): PPC is a method of driving • Data-driven advertising


traffic to your website by paying a publisher every • Game advertising
time your ad is clicked. One of the most common
types of PPC is Google Ad Words, which allows you • Ease of access
to pay for top slots on Google's search engine results F. Measurement of Effectiveness of Digital
pages at a price "per click" of the links you place.
Marketing Campaigns
Other channels where you. can use PPC mainly
include Paid ads on Face book, Promoted Tweets on Below are some aspects that need to be considered
Twitter, Sponsored Messages on LinkedIn. to have an effective digital media campaign:
• Email Marketing: Companies use email marketing 1. Interesting mail titles differentiate one
as a way of communicating with their audiences. advertisement from the other. This separates
Email is often used to promote content, discounts and advertisements from the clutter.
events, as well as to direct people toward the
2. Establishment of customer exclusivity: A list of
business's website. The types of emails you might
customers and customer's details should be kept on
send in an email marketing campaign include Blog
database for follow up and selected customers can
subscription newsletters, Follow-up emails to website
be sent selected offers and promotions of deals
visitors who downloaded something, Customer
related to customer's previous buyer behavior.
welcome emails, Holiday promotions to loyalty
program members, Tips or similar series emails for 3. Low Technical Requirements: In order to get full
customer nurturing. use out of digital marketing it is useful to make you
advertising campaigns have low technical
• Inbound Marketing: Inbound marketing refers to requirements.
the "full-funnel" approach to attracting, engaging, and
delighting customers using online content. You can 4. Rewards: The lucrative offers would always help in
use every digital marketing tactic listed above making your digital campaign a success. Give some
throughout an inbound marketing strategy. reward at end of campaign.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1047
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

E. Pros and Cons of Digital Marketing: proliferation, and changing consumer demographics.
Digital marketing allows marketers to see accurate Three of these four biggest challenges correspond to
results in real time. If an advert is put in newspaper, it is the development of digital marketing. [8, 9].
difficult to estimate how many people actually flipped Professor George Day of Wharton has identified a
to that page and paid attention to ad. There's no surefire growing gap between the accelerating complexity of
way to know if that ad was responsible for any sales at markets and the ability of most marketing organizations
all. Yet digital marketing would help you to know reach to understand and cope with this complexity. While
for your product/service, to get engaged with market fragmentation and rapid change forces are
prospective customers, to have global reach, to everywhere, we believe that the use of the Internet is a
promote in personalized manner. However, with digital major driver of widening the gap. [10]
marketing have some setbacks .Digital marketing is According to Jamal, the Internet has become one
highly dependent on the internet. Because internet may of the most important markets for goods and services
not be accessible in certain areas or consumers may transactions. For example, consumer spending in the
have poor internet connection. It has lot of clutter, so U.S. Internet has exceeded $100 billion (already in
marketers find it hard to make their advertisements 2007), and online demand for information products such
stand out, and get consumers to start conversations as books, magazines and software is growing at a rate
about an organizations brand image or products. But of 25% to 50% [11].
still large amount of competing goods and services that
are also using same digital marketing strategies can be Social media have changed the way a brand's
the disadvantage. Some companies can be portrayed content is created, distributed and consumed,
by customers negatively as some consumers lack trust transferring the power to shape the brand image from
online due to the amount of advertising that appears on marketers to online communications and consumer
websites and social media that can be considered content [12].
frauds. Even an individual or small group of people can The Institute of Digital Marketing (DMI) defines
harm image of an established brand. Digital marketing digital marketing as "the use of digital technology to
disseminates only information to prospects most of create integrated, targeted and measurable
whom do not have purchasing authority/power. Hence communication that helps to acquire and retain
reflection of digital marketing into real sales volume is customers in building deeper relationships with them"
skeptical. [13].
III. REVIEW OF LITERATURE IV. A LIGHT ON REAL CASES UNDER
Transforming communication channels is a complex DIGITAL MARKETING:
task for all industries, but especially for communication 1. Every Smile Matters: Britannia Good Day
and marketing industries.As Malhern notes, "Digitization supports children born with cleft lip
of the media represents a phase shift in the history of
On World Smiles Day, October 5th, Britannia Good
communications. [7]
Day launched the Every Smile Matters campaign. The
According to Fader (2012), the 1990s were a campaign focuses on very important aspect that in
decade of e-commerce, and the beginning of the 21st today's day and age, smiles have been taken for granted
century was an era of social commerce. The role of and we don't smile enough. Good Day, has partnered
"digital marketing" is confirmed by IBM's research, with Smile Train India, the world's leading cleft charity
which consists of interviews with CMOs (IBM Institute that provides free cleft surgery and care to children.
for Business Value, 2011). These WSCs articulate the According to a Smile Train study, 1 in 1,000 Indian
following four biggest challenges: data explosion children are born with a cleft lip -common birth
(sometimes also called big data), social media, channel condition that can occur alone or as part of genetic

1048 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

condition or syndrome. Not only does this condition REFERENCES


prohibit smiling, it can also cause difficulty in natural [1] Bala M., Verma D," A Critical review of Digital Marketing," Vol
activities such as eating and speaking. 11,PP 11-16 , 2011.,
[2] ooms, B. H. and Bitner, M. J, "Marketing strategies and
2. Parle Kismi spreads love this Valentine's Day organization structures for service firms", Marketing of services,
in collaboration with the dabbawalas Vol 25(3), pp.47-5 ,1981.

The Har Kismi Mein Hai Kiss campaign by Parle [3] Chaffey, D. and Ellis-Chadwick, F."Digital Marketing: Strategy,
Implementation and Practice. 1st ed". Harlow: Pearson Education.
Kismi is an attempt to spread some love on Valentine's
[4]Dahiya R., "A Research Paper on Digital Marketing
Day by dropping in a reminder to consumers with the Communication and Consumer Buying Decision Process: An
help of their Dabbawalas. Working professionals often Empirical Study in the Indian Passenger Car Market", Journal of
forget Valentine's Day and Parle Kismi wanted to send Global Marketing 31(2):1- 23, September 2017.
out a sweet reminder to consumers to wish their partners [5]Elizabeth S. B, "Digital Marketing" Vol 14, PP 28-34
in time. 'Food is way to one's heart' so Parle February2011.
collaborated with the most successful food delivery [6] French, A. and Smith, G. "Measuring brand association strength:
system - The Dabbawalas. They made pouch of love a consumer based brand equity approach",European Journal of
Marketing, Vol 47(8), pp.1356-1367,2013.
that consisted of Kismi pan toffees - new variant of
[7] Mulhern, F. J. Mark. Comm., Vol 15(2- 3), pp 85-101,2009.
Kismi and a reminder note asking them to express love
to their loved ones this Valentine's. This pouch was [8]. P. S. Fader, R. S. Winer, Mark. Scie., Vol 31(3), pp 369- 371,
2012.
attached to each dabba and was received by almost
[9] IBM CMO C-suite Studies. (2011)
one lakh people. This simple act by Parle Kismi brought
joy to lives of many couples in Mumbai. Parle Kismi [10] G. S. Day, J. Mark., Vol 75(4), pp 183-195, 2011.
has always stood as an enabler and bringing about small [11] C. Wymbs, J. Mark. Educa., Vol 33(1), pp 93-106,2011.
moments of happiness in lives of its consumers. This [12] P. Albuquerque, P. Pavlidis, U. Chatow, K. Y. Chen, Z. Jamal,
campaign was an extension of the thought for Valentine's Mark. Sci.,Vol 31(3), pp406- 432,2012.
Day. [13] W. H. S. Tsai, L. R. Men, J. Inte. Adv., Vol 13(2), pp76-87,2013.

V. CONCLUSION
To summarize, digital marketing has a bright future
for long term sustainability of the product or services in
the current technological market with all its pros and
cons.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1049
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Study on the Efficacy of the Public Distribution


System in India
Kiran Sudi
Research Scholar in Economics, Department of Development Studies, Kannada University Hampi, Vidyaranya-583276
Emal: kiransudi16071994@gmail.com

Abstract- Public Distribution System in India has regular basis at reasonable prices, (ii) work as an
been one of the most crucial elements in food policy effective anti- inflationary measure and (iii) make
and food security system in the country and with significant contribution in raising the nutritional standard
special emphasis to the functioning of public sector of the poor. Over the years, it expanded enormously
agricultural warehousing agencies such as Food
emerging as food security and poverty alleviation
Corporation of India (FCI) and Central
Warehousing Corporation (CWC), engaged in the measure to become a permanent feature in Indian
procurement, transportation, storage and Economy and it evolved as a major instrument of
distribution of food grains, It is the largest government economic policies. In 1992, PDS was
distribution network of its kind in the world. It replaced with Revamped Public Distribution System
emerged out as rationing measure in the backdrop (RPDS) as an experiment in geographical targeting
of Bengal food crisis as well as a war-time measure because PDS was criticized on the grounds of its being
during Second World War. It evolved in 1950s and urban biased. Subbarao (1988) observed that the poor
1960s as mechanism for providing price support in rural areas did not benefit much but the urban
to producers and food subsidy for consumers. Over population undoubtedly benefitted from PDS. Another
the years it has expanded enormously as poverty scholar (Shah 1986) observed that nearly 57 percent
alleviation and food security measure to become a
of PDS food grains was for urban areas and only 27
permanent feature of Indian Economy. The present
paper discusses the present scenario of Public
percent was for rural areas. RPDS was started with a
distribution system in India across states. It throws view to provide relief to the poor people of desert,
light on the working of PDS and some policy hilly, drought prone and Adivasi areas of the country.
measures for its better working. Finally the system was restructured to target the poor
households as Targeted Public Distribution System
Key Words: Public Distribution System, Fair
Price Shops, BPL, APL, TPDS (Targetedpublic (TPDS) across all regions in 1997. TPDS aims at
distribution system), and FCI (Food corporation providing food grains to people below poverty line
of India) and CWC (CentralWarehousing (BPL) at highly subsidized prices and food grains to
Corporations). people above the poverty line (APL) at much higher
prices than BPL beneficiaries. Thus TPDS adopted by
I. INTRODUCTION the Government of India maintains the universal
The origin of Public Distribution System (PDS) in character of the PDS but adds a special focus on people
India can be traced from the Second World War (1939- living below poverty line. PDS with a wide network of
45) and in the backdrop of Bengal famine in 1943, about 4.99 lakh Fair Price Shops (FPSs), better known
which evolved in 1950s and 1960s as mechanism for as Ration Shops, is perhaps the largest distribution
providing price support to producers and food subsidy network of its kind in the World. The quantity of grains
for consumers. The concept of Public Distribution to be procured is determined by the central government
System has evolved as a major policy instrument to (i) considering the existing requirement and by allotting a
reach essential commodities to the people, particularly buffer to meet any emergency arising out of flood, famine
the weaker sections of the society, on an assured and or other such natural calamities. The food grains are
bought from the farmers through the purchase centers
1050 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and then sent to FCI warehouse or FCI affiliated Few researchers have documented the administrative
warehouse. The food grains are distributed across states problem in PDS and shown in many states that there is
depending on the productivity and climate of that state. large scale diversion of grain, wastage and low quality.
Major flaw in the working of PDS is that it has wrongly
Theme of Research: excluded a large number of deserving persons and
The main objective of this paper is to present the families. Karat (2008) pointed out that planning
picture of coverage of PDS across states and to throw commission evaluated that 57% of poor had been
light on the flaws in the working of PDS. The present actually excluded from the BPL system. According to
study is based on the data obtained from Food grains the report of National Sample Survey, at all India level
Bulletin and Census of India 2011. We have taken total 70.5% of rural households either possessed no card or
cereal quantity not crop specific quantities because the held an APL card and are effectively excluded from
states differ with respect to tastes and preferences PDS (Swaminathan 2008). Very high proportion of
across crops. For example, the rice is consumed mainly landless and near landless household did not possess
in south while the wheat in north. BPL or Antyodaya cards in many states (86% in
Sikkim, 80% in Goa, 79% in Uttar Pradesh, 76% in
Flaws in The Working of PDS:
Haryana, 75% in Jharkhand and 74% in Uttaranchal
All is not well with public distribution in India. There for example) and mere excluded from PDS (ibid).
are many problems associated with the working of PDS Besides the targeting error, there is another serious
that are: problem of leakage and diversion. There is 36 percent
• Large errors of exclusion of BPL families and diversion of wheat, 31 percent of rice and 23 percent
inclusion of APL families. diversion of sugar from the system at the national level
(Jena 2002). Khera (2011) has pointed out that 44%
• Diversion of subsidized food grains to open market. of PDS grain was diverted at the all India level in 2007-
• Prevalence of ghost cards. 08. According to another scholar (Mishra 2008) about
58% subsidized food grains issued from Central Pool
• Lack of transparency in the selection of procedure
of PDS dealers.
do not reach to the BPL families owing to leakages and
diversion. Moreover, the cost of income transfer to poor
• Poor quality of food grains (PDS articles). is much higher e.g. for one rupee worth of income
• Lack of Infrastructure and shortage of funds with transfer to poor, the government of India spent R.3.65.
the governments of many states. Due to lack of effective targeting mechanism and large
scale leakage due to corruption, the cost effectiveness
• Weak monitoring and lack of transparency and
inadequate accountability of official implementing the
of extending food subsidy to the poor has been low.
scheme. According to a scholar (Parikh 1994) the "cost
effectiveness of PDS reaching the poorest 20 percent
• A large number of homeless and poor, without having of the households through the PDS cereals is very small.
permanent address are denied ration cards and thus For every rupee spent, less than 22 paisa reaches the
excluded from PDS, despite being Indian citizens.
poor in all states excepting Goa, Daman and Diu where
• The poor don't have cash to buy the entire quantity 28 paisa reach the poor. This is not to suggest that PDS
of entitlements at a time. does not benefit the poor at all, but only to emphasize
• The present procedure for selection of BPL that this support is provided at highest cost." If one
beneficiaries is not satisfactory. takes Central Government cost into account, Rs. 4.3
was incurred to transfer one rupee of income to the
• Cost effectiveness of PDS is very small.
poor (Jena 2002).
• Not lifting their ration quota by APL households as
APL price is close to open market price.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1051
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Literature Review: poor, revealed that the program is not well targeted
Previous studies on different public distribution and the poor as well as the non-poor receive subsidy
systems yielded mixed conclusions. The benefits of PDS benefits. The inefficiency of state institutions in controlling
were well recognized by emerging economies. Public food prices and managing PDS with implications on
distribution schemes in Bangladesh, Cambodia and quality of the products was previously reported by
Pakistan have helped to get more girls into education Ramaswamy and Balakrishnan (2002). The study shows
(Ahmed et al., 2007).The PDS in India has been that demand switches will not occur as long as the
operational for more than five decades. Growth of the market price of food grains remains higher than the
PDS, its functioning, coverage and its efficiency on subsidized grains. However, the quality of the product
providing food security was discussed by (Bapana, becomes the determining factor when the price of the
1990). Several developing countries including India open market is similar to that of the subsidized
achieved food self-sufficiency because of well organized commodities.
PDSs for agricultural produce. The PDS makes food
accessible and transfers income in the form of subsidy.
As per Jha (1992), about 40-50 % of the population
buys subsidized rice and wheat and about half of them
are non-poor. It means that a substantial part of PDS
benefits accumulates to the non-poor. It was previously
reported about the PDS, that the access to resources
and utilization of commodities has been low and it has
hardly impacted the nutritional status of the targeted
populations. (Khera, 2011; Radhakrishna et al., 1997).
Arora (2013) examined food subsidy in India and FIG: Amount of Government Expenditures on Food Subsidy
investigated the reasons behind the failure of PDS in
Many among scientists, policy reformers and other
many parts of the country. The study reports the system
stake holders argued that the PDS need to be reformed
failed to reach the poor in most of the states other than
so as to target specifically the poor and needy (Jha
the southern states like Andhra Pradesh, Tamil Nadu
1992; Ahluwalia 1993; Pal et al., 1993). Consequently,
and Kerala, where it has been partially successful.
the Government relaunched PDS as Targeted Public
Rashpaljeet and Kaur (2014) studied the organization
Distribution System (TPDS) which aims to reach a
and working of PDS in Punjab and reported the major
provide 60 million families below poverty line with 20
leaks and weaknesses in the functioning of the scheme
kg grains each month. According to the study conducted
in the state. The study found that in Punjab, nearly 76%
by Sivakkolundu and Loganathan (2013), about six
of the food grains were diverted to the open market
crores families the nation is benefited by the TPDS.
and another 13% was diverted APL households. A mere
The functioning of organizations like Food Corporation
10% of the grains reach the BPL beneficiaries. It has
of India and Central Warehousing Corporation in
been argued that "common issue price" could be a
ensuring procurement, transportation, storage and
possible way to reduce leakages and misappropriation
distribution of commodities provided by the public
of commodities. However, considering the enormity of
distribution system was critically analyzed by Pal (2011).
food insecurity and hunger in India the provision of food
subsidy and rationalizing the distribution of grains is not The study reveals that that the current system is
adequate for the population (Jha et al., 2010) In another extremely corrupt and fails to address issues related to
comparative study on PDS conducted by the same stoke shortage, fake supply entries in ration cards,
authors (Jha et al., 2013) based on the factors like food diversion of commodities for sale to open market, ,
subsidy, income transfer and the involvement of the irregularity and poor quality of food grains etc. The

1052 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

situation calls for urgent technical up gradations and owing to the provision of higher minimum support prices
policy reforms to ensure transparency, and improve (MSP) for food grains, an elevated level of procurement
performance to solve the above mentioned problems. of was recorded during the last five years, This in turn,
not only ensured remunerative prices to farmers but
METHODOLOGY: also caused strain on available storage capacities with
The data for a period 5 years from 2007-08 to 2011- the State agencies involved in procurement. States have
12 has been collected from secondary sources such as been facing severe deficits for covered storage capacity.
annual reports of Food Corporation of India, Central FCI recorded an annual turnover of Rs. 97719.59
Warehousing Corporation, Warehousing Development crores in 2011-12. The capital employed turnover ratio
and Regulatory Authority (WDRA), CAG report reduced to 16.10 from 5.35 in 2007-08. The net worth
onstorage management and movement food grains in reduced from Rs. 2433.66 to 2155.04 crores. The
FCI, Planning Commission report on warehousing annual turnover of CWC was Rs. 1218.65 crores with
development and regulation for the twelfth plan period a capital employed turnover ratio of 0.99. The net worth
(2012-17) and Agricultural Statistics -2013, Directorate increased substantially from 1080.24 crores in 2007-
of Economics and Statistics. The data has been 08 to 1304.08 crores in 2011-12. The capital employed
analyzed to find the capacity, stock position and turnover ratio shows how efficiently capital employed
percentage of utilization of warehouses during the last in the corporation has been utilized in generating revenue
5 years. Furthermore, the aggregate food grain and establishes the relationship between the amount of
procurement, per-capita availability of food grains, sales and capital employed. The reduction in capital
consumer subsidy on food grains etc. was also employed turn over ration of FCI in on account of the
evaluated. subsequent growth in working capital as compared to
slight growth in overall sales. A consistent increase in
RESULTS AND DISCUSSION:
net worth indicates good financial health of CWC;
The total operating capacity and percentage of conversely, the net worth of FCI may be depleted by
capacity utilization of CWC and FCI warehouses during annual operating losses such as transient and storage
the 2007-08 to 2011-12. The overall percentage of losses of commodities or other depreciations etc. The
utilization of CWC warehouses increased from 73.61% procurement volume of rice steadily increased from
in 200-08 to 91% in 2011-12. However, a marginal 287.36 LMT during 2007-08 to 344.64 LMT in 2011-
3% increase was recorded in the capacity utilization of 12. Wheat procurement during the period also observed
FCI warehouses during the period of study. The average similar trend i.e 111.28 LMT during 2007-08 to 283.35
operating capacity and the utilization of storage capacity LMT in 2011-12. However, as per the recent CAG
per warehouse. The average utilization of storage report on storage management and movement of food
capacity per warehouse has been calculated by dividing grains in FCI, The average food grains procurement of
total utilization of storage capacity during the period of 514 LMT during the period was lower than the average
study by the number of warehouses.The CWC allocation of 593 LMT made by the Government of
warehouses have 0.215 lakh metric tons (LMT) average India to states for distribution under Targeted Public
operating capacity in 2012 of which 0.194 LMT is Distribution System (TPDS) and other welfare schemes
utilized whereas, FCI warehouses has 0.089 LMT in (CAG Report 2013). With the objective of reducing
average storage capacity. The average storage the overdependence of the State Governments on the
utilization recorded in 2012 was 0.074 LMT. The results FCI for TPDS and reducing transportation costs by
indicate that the average utilization per warehouse was ensuring availability of locally produced food grains,
less than the average storage capacity per warehouse the Government introduced the scheme of Decentralized
in all the 5 years because the average storage capacity Procurement (DCP) of food grains. Under this scheme,
of the warehouses was not fully utilized by the which is being implemented in eleven States and Union
depositors over the study period. On the other hand, Territories can retain the quantity required for TPDS

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1053
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

and surrender the rest to FCI for the Central Pool. The corresponding period. The consumer percentage share
actual wheat stocks at the beginning of 2012 were in total FCI subsidy was ranged between 87 to 90.3%
256.76 LMT against the minimum buffer stock of 122 during the study period whilst, the share of buffer stock
LMT as stipulated by the government. The rice stocks subsidy was reduced from 13.9 % to 9.7%. According
recorded a total volume of 297.18 LMT against the to the economic survey (2011-12), the main reasons
minimum buffer stock of 138 LMT. Buffer stocks are for increasing in consumer subsidy are steep rises in
maintained by FCI in order to stabilize the availability minimum support or procurement prices, accumulation
and prices of food grains, and, thereby, to achieve of large stocks of grains, rising economic costs of food
national food security. Maintenance of low buffer stocks grains, and a constant central issue prices of food grains.
adversely affects the national food security, whereas The per capita net availability of rice and wheat declined
carrying too high stocks is costly and inflationary (Gulati from 71kg and 56.5 kg respectively in 2008 to 69.4
et al., 1996). The annual wheat purchase volume kg and 55.9 kg in 2012. However the total availability
steadily progressed from 114.1 LMT in 2007-08 to of cereals and other pulses increased considerably. The
226.8 LMT in 2011-12 whereas rice purchase per capita availability of food grains has been widely
increased from 197.1 LMT to 226.8 LMT during the accepted as an indicator of food security at household
period. Consequently the sale volume also recorded level. It is estimated that the post harvest loss of total
higher progressions. The total food grain sales increased agriculture food grain produce in India is about 7-10%
311.2 LMT in 2007-08 to 468.8 LMT in 2011-12. A and another 4-5% is lost during the marketing and
minimum support price (MSP) for the producers is fixed distribution processes. An overall loss of 11-15% which
by the Government of India and procurement is done estimates to 12-16 million metric tons that can feed
at this rates. There are various programs under the another 70-100 million people in the country, since the
TPDS and other welfare schemes in which a Central average per capita consumption of food grains in India
Issue Price (CIP) of food grains are fixed and specific is 15 kg per month. (Rehman et al., 2012).
quantities are allocated to each state. The difference
between the economic cost (MSP plus the post REFERENCES:
procurement and distribution cost) and the CIP is the 1. Jena, A.C: "Public distribution System: Impact, Status and Future
Programmes," Kurukshetra, October, pp. 56-64. (2002),
operational loss of the corporation which is reimbursed
by the Government of India as food subsidy. Besides 2. Karat, Brinda : "Food at Slake", Yojana, July, pp. 35-38. (2008),

this, Government of India also reimburses the cost of 3. Agricultural Statistics: Directorate of Economics and Statistics.
Department of Agriculture and Cooperation, Ministry of
carrying of buffer stock of food grains maintained by Agriculture, Government of India. (2013).
FCI as a part of subsidy (FCI annual report 2011-12).
4. Ahluwalia, D: Public Distribution of Food in India: Coverage,
The Antyodaya Anna Yojana (AAY) scheme was Targeting and Leakages. Food Policy, 18 (1): 33-54. (1993).
launched in December 2000 in which ten million poorest 5. Ahmed, T., Rashida, A., Francisco Espejo., Aulo Gelli and Ute
households among the 65 million below poverty line Meir: Food for education improves Girls education: the Pakistan
(BPL) families were identified and provided them with Girls education programme,. World Food Programme report,
2007.
25 kg of food grains per family per month at a low
price of Rs 2/kg for wheat and Rs 3/kg for rice. As a 6. Arora, R.U: Food Subsidies for the Poor in India: Are they
Working? Journal of Asian Public Policy. 6(3): 13-21. (2013).
result, the average consumer subsidy on wheat has
7. Bapana, S.L: Food Security through the PDS: The Indian Expe
increased from Rs. 1148.70 per quintal in 2007-08 to
rience. In D.S. Tyagi (ed). Increasing access to Food, The Asian
Rs. 1451.90 in 2011-12, whereas subsidy on rice Experience, Sage Publications. (1990).
increased from Rs. 1271.40 to Rs. 1880.20 per quintal. 8. Bhat, G.M and Hussain, B.A. Efficiency of Public Distribution
In the case for BPL households the subsidy on wheat System in Kashmir: Micro Economic Analysis, International
was raised from Rs.738.70 per quintal to Rs.1041.90 Research Journal of Social Sciences. 1(4): 24-27. (2012).
per quintal and for rice the subsidy was increased from
Rs. 741.40 to Rs.1354.20 per quintal during the

1054 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

9. CAG : Report Performance Audit Report (No:7) of the


Comptroller and Auditor General of India on Storage Management
and Movement of Food Grains in FCI. Ministry of Consumer
Affairs, Food and Public Distribution. (2013).
10. Central Warehousing Corporation. (2008). 51st Annual Report
and Audited Statement of Accounts. (2007-2008).

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1055
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

A Systematic Application for Public Distribution-


Ration Shop
Sanjeeva Kumara
Research Scholar in Economics, Department of Women's Studies, Kannada University Hampi, Vidyaranya - 583276
Hospet (Taluk), Vijayanagara (Dist), Karnataka (State), India.
Email: jeeva27121995@gmail.com

Abstract: A Public Distribution System (PDS), under Ministry of Consumer Affairs, Food and managed
also known as "Ration Shop" or Fair Price jointly with state governments of India. In India this
Shop"(FPS). It is a part of India's public distribution scheme was launched on June 1997. This system
system established by the Government of India distributes both basic food and non- food commodities
under Ministry of Consumer Affairs, Food and
to the vulnerable sections of the society at very cheap
Public Distribution. The main motto of the project
is Government distributes rations at a subsidized
rates. India is the largest distribution network in the
price to the poor. Usually these are known as world has 478000 ration shops. Ration Shops are
"Ration shops" and chiefly sell wheat, rice, operated throughout the country by the joint assistance
kerosene and sugar at a price lower than that of of both central and the state government but are
market price. Now other essential commodities are managed under private sector.Under PDS scheme, a
also sold. To buy these items one must have a ration Below Poverty Line (BPL) card holder should be given
card. The items from these shops are much cheaper 35kg of food grain and the card holder Above the
but are of poor quality. Ration shops are now Poverty Line (APL) should be given 15kg of food grain
present in most localities in villages, towns and on the monthly basis. Central Government provides
cities. All activities of this shop are done manually. special schemes
They keep all records in big paper file. Government
provides Register Book, Issue Book, Bill book, Andhyothaya Anna Yojana (AAY)
through the Supply Office to the Ration Shop
dealers. The Dealers must keep and maintain these Under this scheme, 35 Kgs of food grains is
three books with proper entry of data. Due to the distributed to the poorest of the poor families at the
manual entry through paper work in the three rate of Rs. 1/Kg. The scheme is implemented from 25-
books, duplicate entry or wrong entry may occur, 2-2001 onwards. Since then the scheme was expanded
resulting in wasting time and resources. "A twice w.e.f 01/2004 and 01/2005. Now the number of
Systematic Application For Public Distribution: beneficiaries under the scheme is 595800 Central
Ration-Shop" is intended to fully automate Ration allotment of rice for AAY scheme is 20855 MTs/month.
shops. This system provides easy interface so that Government is issuing this rice to the beneficiaries @
person of little computer knowledge can use it Rs. 1/Kg, meeting the additional expenditure from the
easily and efficiently. This system provides
state exchequer.
enhanced functionalities and efficient process
design. Annapurna (ANP)
Keywords: Public Distribution System; Below Under this scheme, 10 Kgs of food grains is
Poverty Line; Above Poverty Line; Fair Price distributed per month free of cost to destitute above
Shops; Civil Supply Office.
the age of 65 years with no or meager subsistence. The
INTRODUCTION: Government of India fixed the target at 44,980 being
20% of the number of persons who are eligible for
Public Distribution System is an Indian Food
National Old Age Pension, but not getting the pension
Security Scheme, initiated by the Government of India
for some reasons.
1056 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Civil Supplies Department


The Civil Supplies Department discharges the
important responsibilities of managing the ration-shop.
The primary function of the Civil Supplies Department
is to run the Public Distribution System efficiently and
to ensure distribution of rationed articles to the people
at the price fixed by the Government. The department
is also entrusted with the responsibility of ensuring
availability of essential commodities in the market at
reasonable price .The functions carried out by the
Department are: Work Flow of Public Distribution

1. Control of Rationing and marketing of Supply officer


essential commodities The supply officer enters the website using his login
In India which was very high deficit in the production id and password. The supply officer can add new
of food grains, the civil supplies department has great consumers. Every month the supply officer has to update
relevance and importance. Timely lifting of commodities quantity of goods to be distributed by the dealer to
allocated from central pool and ensuring distribution of each category like APL, BPL,AAY, and ANP. This can
the same through more the ration shops and ensuring be viewed by the dealer and the consumer. Supply
timely lifting and distribution of that same is a major officer has to add the new consumers to the respective
function of the Department. The Department keeps ration shops. Once in a week supply officer have to
vigilance to discourage and prevent hoardings and black check the purchase details.
marketing of essential commodities.
Dealer
2. Consumer Affairs The dealer enters into the website using his login id
Keeping in view the importance and need for and password. When a consumer came to shop for
promotion of consumer awareness and protection of buying goods the dealer have to analyze whether he is
their rights, Government formed a separate wing in the the correct person or not by checking his ration card
Food Civil Supplies and Consumer affairs Department number and Aaadhar card number. If the person is
to attend to the subject, Consumer Affairs. proper consumer, the dealer provides goods depending
on their category. Then dealer will enter the details of
RELATED WORK the purchase done by the consumer. The supply officer
This project is mainly intended to fully automate and the consumer can view these details in their home
Ration Shops. The system must provide an easy page. After delivering goods, it will be deducted from
interface so that person of little computer knowledge the total amount of units allocated to the particular dealer.
can use it easily and efficiently. The proposed system The same transaction reflects in the two modules i.e.,
provides enhanced functionalities and efficient process supply officer and the consumer.
design. This system consists of three modules. They
are: Consumer

1. Supply Officer The consumer can see his monthly transaction by


visiting the website by entering his ration card number
2. Dealer and also he can give Feedback or Complaint to the
3. Consumer particular ration shop.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1057
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Innovative Marketing Communications


Dr. Sindhu Varghese
MBA Department, Loyola Academy, Secunderabad, Telangana, India
Email: Sindhuvijo2019@gmail.com

Abstract- The need for innovative plan that recognizes the impact of social media on each
communicative strategies is a demand of today's business performance. It is important to identify the
dynamic market.The marketer is moving two ways various ways in which social media should be used to
that is towards technical advancement and to fulfil the objectives of the enterprise. There is an
understand the psyche of the consumer in a better
increased awareness of digital marketing tools and aids
manner. In this paper. It is emphasized that the
marketer should make a strategic plan for the
among various business. Organizations assimilate
effectivity of promotion especially through social external knowledge from the virtual environment and
media. The communications functions should be internal knowledge to enhance their capacity. [1]
in a manner to build the brand image and the brand Firms operating in fast changing dynamic
equity. This communication is important for the environments can develop the right means to
reduction of perceived risk in the mind of
continuously adapt, integrate, reconfigure, and redeploy
consumers. Also, the importance of communication
from the marketer's perspective and the advantage
resources and capabilities to become more competitive
of the consumers is discussed. There are many and disruptive in their offerings. Virtual Reality can
technologies which are harnessed by companies replace drafting, physical testing, and model building
to reach out to the consumers like virtual reality approaches to many other design tasks, consequently
and augmented reality.Apart from technology the reducing costs, development time, and uncertainties
study of human mind is also important. These both involved in engineering and design of projects. In the
ways can help the company have a successful automotive industry, augmented reality-based systems
communication strategy in an innovative manner. can support a variety of services in a factory, such as
Keywords-Innovative promotion, social media, selecting parts in a warehouse and sending repair
Psychology, Promotion strategy instructions over mobile devices to the workers. These
systems are still in early development[2]
I. INTRODUCTION
There is a need to come up with a strategic plan for
Marketing communication is how the marketer social media communication. Nowadays companies are
communicates with the final consumer also the other using data analysis and wireless networks. The best
stakeholders. The various partners, intermediaries also way of promotion is corporate marketing strategy,
to the shareholders. The work of the communication especially brand marketing These include Innovative
has grown beyond just creating awareness,informing, products,Price positioning, managing channels and
or reminding but also persuading. The communications policy on promotion. There has to refinement in brand
functions in a manner to build the brand image and the image promotion and maintenance. There is a need in
brand equity. The customers tend to create a favorable the market for high end brand services, because of
attitude towards the brand. Of the many benefits of globalization.[3]
brand image creation, it is the reduction of perceived
risk in the mind of consumers, II. DISCUSSION
It is important to understand the role of social media A. Innovative marketing communications
and its effect on current and potential customers.
Since a few years social media has gained
Therefore, it focuses on the need to create a business
prominence.There are many dynamics about
1058 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

communicate on. here are a few of the elements used Examples - Snickers ad displayed in between cricket
by the marketers to communicate to the customer. One matches, Radio ads, Spotify ads. The third element is
of them is colors. Gestalt means "Unified Whole", it studies on how
Colour psychology studies how different colours consumers perceive, process and piece together
determine human behaviour. The psychology of colour fragmented parts.The three important Gestalt principles
is used in advertising and marketing to evoke emotional are
reactions. Colour Psychology showed that colour can • Proximity or Grouping
affect human behaviour, influence human perception, • Closure
and enhance effectiveness. In a study called "Impact of
colour in marketing" it showed that 90% of customers' • Figure and Ground
product judgments are based on colour alone. For Gestalt Psychology suggests that the human brain is
example, we can discuss the impact of two colours and holistic. So, marketers use this technique to manipulate
the companies using these. different aspects of ads to indirectly communicate
Red- The colour red creates a sense of urgency, meaning to the consumer below their level of
suitable for clearance sales. It also encourages appetite. consciousness.
Thus, it is frequently used by fast-food chains. The III. CONCLUSION
colour physically stimulates the body, raising blood
pressure and heart rate. It is associated with movement, This paper discusses about the importance of
excitement, an passion. communication from the marketer's perspective and the
advantage of the consumers. There are many
Eg; Pinterest, Netflix, YouTube, red bull, Kellogg's, technologies which are harnessed by companies to
airtel, etc. reach out to the consumers like virtual reality and
Green - This colour is associated with health, augmented reality apart from technology the study of
tranquillity, power, and nature. It is used in stores to human mind is also important.
relax customers and promote environmental issues. It The psychology used by the communicator studies
stimulates harmony in your brain and encourages a the deep thought process and evaluates and incorporates
balance leading to decisiveness. it with the communication technologies to give a long-
Starbucks is a major global brand that uses this lasting impactful experience to the consumer. The
colour scheme. Green shows that Starbucks hopes to importance of understanding this communication
promote a sense of relaxation in its cafes, inviting process is needed.
customers to come in for a coffee break during a
REFERENCES
stressful day.The next element is - Marketers break
through the top - down attention by resembling to the [1] B. Surya, F. Menne, H. Sabhan, S. Suriani, H. Abubakar, and M.
Idris, "Economic growth, increasing productivity of smes, and
show.Top-down Attention here refers to the open innovation," J. Open Innov. Technol. Mark. Complex., vol.
advertisement clutter that every media consists of. Also, 7, no. 1, pp. 1-37, 2021, doi: 10.3390/joitmc7010020.
otherwise known as Noise in a marketing [2] M. Royo-Vela and M. V. Serrano, "Value co-creation process and
communication model. Therefore, Top-Down Attention measurement in 4.0 smes: An exploratory research in a b2b
marketing innovation context," Adm. Sci., vol. 11, no. 1, 2021,
is a trick, rather a psychological tactic by which
doi: 10.3390/admsci11010020.
marketers inject the message into the show itself which
[3] G. Wang and Y. Wang, "Innovative Marketing Framework for
results in lot more relevance and entertainment. The Enterprises Using Edge-Enabled Data Analysis," Mob. Inf. Syst.,
marketers thus accomplish their goal by fixating the vol. 2021, 2021, doi: 10.1155/2021/6699420.
audience's attention to their Ads

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1059
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Management of Non-Performing Assets in Banking


Sector in India
Dr. P. Raghunadh Reddy1, Y. Maheswari2
1
Professor& Head, Department of Management Studies, Sri Venkateswara University,Tirupati(A.P)
2
Assistant Professor, Department of Management Studies, Sri Venkateswara College of Engineering,
Karakambadi Road, Tirupati-517507

Abstract: The Indian banking sector has practices for monitoring the NPA's and its effective
emerged as one of the strongest drivers of India's recovery.
economic growth. The Indian banking industry has
Key words: Non-performing assets,
made outstanding advancement in last few years,
liberalization, financial, Banking sector, economy.
even during the times when the rest of the world
was struggling with financial meltdown. India's 1. INTRODUCTION OF BANKING
economic development and financial sector SYSTEM IN INDIA
liberalization have led to a transformation of the
Indian banking sector over the past two decades. The banking system of a country plays an important
Today, all the banks face the matter of non- role in the economic development of any country.
performing assets whether it's public sector bank Banking system comprises of the banking institutions
or private sector bank. Non-performing assets are functioning in the country. Banking system comprises
single largest cause for irritation of banking sector from the central bank to all banking institutions which
in India. When the borrowers stops paying interest are functioning and providing financial facilities to any
or principal on loan, the lender will lose money. developmental sector like agriculture, industries, trade,
Such a loan is understood as non-performing assets
housing etc. Under the Indian banking structure central
(NPA).a strong banking sector is vital for
bank in the name of the Reserve Bank of India which
flourishing economy. The failure of the banking
sector may have an adverse impact on other regulates, directs and controls the banking institutions.
sectors. However, the banks will have to maintain Separate institutions are functioning to meet the financial
an additional provisioning of 10 per cent on such requirement of the different sectors of the economy.
accounts, RBI Governor Shaktikanta Das also said.
"In respect of all accounts for which lending
institutions decide to grant moratorium or
deferment, and which were standard as on March
1, 2020, the 90-day NPA norm shall exclude the
moratorium period, i.e., there would an asset
classification standstill for all such accounts from
March 1, 2020 to May 31, 2020," RBI said in the
statement. On March 27, RBI announced a three-
month moratorium on term loans whose
instalments were due between March 1 and May
31. NPA is a crucial parameters within the analysis Commercial Banks: Commercial banks mobilize
of monetary performance of a bank because it leads savings of general public and make them available to
to decreasing margin and better provisioning large and small industrial and trading units mainly for
requirements for doubtful debts. Besides, the working capital requirements. Commercial banks in
paper also tries to explore measures for the control India are largely Indian-public sector and private sector
and prevention of growth of NPA's, procedures and with a few foreign banks. The public sector banks

1060 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

account for more than 92 percent of the entire banking historical perspective. The past four decades and
business in India-occupying a dominant position in the particularly the last two decades witnessed cataclysmic
commercial banking. The State Bank of India and its 7 change in the face of commercial banking all over the
associate banks along with another 19banksare the world. Indian banking system has also followed the
public sector banks. same trend. In over five decades since dependence,
Regional Rural Banks: The Regional Rural Banks banking system in India has passed through five distinct
(RRBs) the newest form of banks, came into existence phase, viz.
in the middle of 1970s (sponsored by individual 1) Evolutionary Phase(priorto1950)
nationalized commercial banks) with the objective of 2) Foundation phase(1950-1968)
developing rural economy by providing credit and
deposit facilities for agriculture and other productive 3) Expansion phase(1968-1984)
activities of all kinds in rural areas. The emphasis is on 4) Consolidation phase(1984-1990)
providing such facilities to small and marginal farmers,
5) Reformatory phase(since1990)
agricultural laborers, ruralartisans and other small
entrepreneurs in rural areas. 3. INTRODUCTION OF NON-
Cooperative Banks: Cooperative banks are so- PERFORMING ASSETS
called because they are organized under the provisions The banking industry has undergone a sea change
of the Cooperative Credit Societies Act of the states. after the first phase of economic liberalization in 1991
The major beneficiary of the Cooperative Banking is and hence credit management came into picture. The
the agricultural sector in particular and the rural sector primary function of banks is to lend funds as loans to
in general. The cooperative credit institutions operating various sectors such as agriculture, industry, personal
in the country are mainly of twokinds: agricultural and housing etc. and to receive deposits. Receiving
(dominant) and non-agricultural. There are two separate deposit involves no risk, since it is the banker who owes
cooperative agencies for the provision of agricultural a duty to repay the deposit, whenever it is demanded.
credit. One for short and medium-term credit, and the On the other hand lending always involves much risk
other for long-term credit. The former has three tier because there is no certainty of repayment. In recent
and federal structure. At the apex is the State Co- times the banks have become very cautious in extending
operative Bank (SCB) (cooperation being a state loans, the reason being mounting nonperforming assets.
subject in India), at the intermediate (district) level are Non-performing assets had been the single largest cause
the Central Cooperative Banks (CCBs) and at the of irritation of the banking sector of India. Earlier the
village level are Primary Agricultural Credit Narasimha committee-I had broadly concluded that the
Societies(PACs). Long-term agriculture credit is main reason for the reduced profitability of the
provided by the Land Development Banks. The funds commercial banks in India was given importance to
of the RBI meant for the agriculture sector actually pass priority sector lending. The committee had highlighted
through SCBs and CCBs. Originally based in rural that priority sector lending was leading to the building
sector, the cooperative credit movement has now up of non-performing assets of the banks and thus it
spread to urban areas also and there are many urban recommended it to be phased out. Subsequently, the
cooperative banks coming under SCBs. Narasimha committee-II also highlighted the need the
zero nonperforming assets for all Indian banks with
2. GROWTH OF BANKING SYSTEM IN
international presence. A major portion of the money
INDIA
lent comes from the deposits received from the public.
In order to understand present make up of banking These deposits are mostly repayable on demand.
sector in India and its past progress, it will be fitness of Therefore while sanctioning credit the banker should
things to look at its development in a somewhat longer appraise the project reasonably or else it leads to the

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1061
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

non-repayment of loans and advances. Most of the I. Substandard Assets:


banks today in India are facing the default risk wherein With effect from 31 March 2005, a substandard
some part of the profit is reserved for covering the non- asset would be one, which has remained NPA for a
performing assets. period less than or equal to 12 months. In such cases,
Types Of Non Performing Assets: the current net worth of the borrower/ guarantor or the
I. Gross Non Performing Assets current market value of the security charged is not
enough to ensure recovery of the dues to the banks in
II. Net Non Performing Assets full. In other words, such an asset will have well defined
Gross Non Performing Assets credit weaknesses that jeopardize the liquidation of the
debt and are characterized by the distinct possibility
Gross NPAs are the sum total of all loan assets that that the banks will sustain some loss, if deficiencies are
are classified as NPAs as per RBI guidelines as on not corrected.
Balance Sheet date. Gross NPA reflects the real NPAS
and the quality of the loans made by banks. It consists II. Doubtful Assets:
of all the nonstandard assets like as sub-standard, With effect from March 31, 2005, an asset would
doubtful, and loss assets. It can be calculated with the be classified as doubtful if it has remained in the
help of following ratio: substandard category for a period of 12 months. A loan
Gross NPAs Ratio = Gross NPAs /Gross Advances classified as doubtful has all the weaknesses inherent in
×100 assets that were classified as substandard, with the
added characteristic that the weaknesses make
Net Non-Performing Assets: collection or liquidation in full, - on the basis of currently
Net NPAs are those type of NPAs in which the known facts, conditions and values - highly questionable
bank has deducted the provision regarding NPAs. Net and improbable.
NPA is obtained by reducing the provisions from Gross
III. Loss Assets:
NPAs and shows the actual burden of banks. Since in
India, bank balance sheets contain a huge amount of A loss asset is one where loss has been identified by
NPAs and the process of recovery and write off of the bank or internal or external auditors or the RBI
loans is very time consuming, the provisions the banks inspection but the amount has not been written off wholly.
have to make against the NPAs according to the central In other words, such an asset is considered uncollectible
bank guidelines, are quite significant. That is why the and of such little value that its continuance as a bankable
difference between gross and net NPA is quite high. It asset is not warranted although there may be some
can be calculated by following salvage or recovery value.
Net NPAs = Gross NPAs - Provisions on Gross 4. OBJECTIVES OF THE STUDY
Advances The following are the specific objectives of the study:
Categories of Non-Performing Assets: • To have a brief an overview of the non-performing
Categories of NPAs Banks are required to classify assets in Indian banking sector.
nonperforming assets further into the following three • To study the growth of banking sector in India.
categories based on the period for which the asset has
remained nonperforming and the reliability of the dues: 5. DATACOLLECTION

I. Substandard Assets The sources of the secondary data are bank's balance
sheet, RBI publications, published data of banks, news
II. Doubtful Assets paper clippings, economic survey and other reports of
III. Loss Assets
1062 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

government of India, published and unpublished loans. Before this law came, lenders could enforce their
research works of various eminent scholars in the field. security interests only through courts, which was a time-
consuming process.
6. Provision of NPA
Joint Lenders Forum - 2014 It was created by
According to the RBI, "Reduction of NPAs in the the inclusion of all PSBs whose loans have become
Indian banking sector should be treated as a national stressed. It is present so as to avoid loan to the same
priority item to make the system stronger, resilient and individual or company from different banks. It is
geared to meet the challenges of globalization. It is formulated to prevent the instances where one person
necessary that a public debate is started soon on the takes a loan from one bank to give a loan of the other
problem of NPAs and their resolution." Issues and bank.
Challenges for Banking Industry. As per prudential
norms of Reserve Bank of India (RBI), banks are Strategic debt restructuring (SDR) - 2015 Under
required to make provision against their different classes this scheme banks who have given loans to a corporate
of assets (loans & advances) to meet the future expected borrower gets the right to convert the complete or part
loss which may arise due to non-realisibility of dues in of their loans into equity shares in the loan taken
full from such assets. company. Its basic purpose is to ensure that more stake
of promoters in reviving stressed accounts and
What are the various steps taken to tackle providing banks with enhanced capabilities for initiating
NPAs? a change of ownership in appropriate cases.
NPAs story is not new in India and there have been Insolvency and Bankruptcy code Act-2016 It
several steps taken by the GOI on legal, financial, policy has been formulated to tackle the Chakravyuaha
level reforms. In the year 1991, Narsimham committee Challenge (Economic Survey) of the exit problem in
recommended many reforms to tackle NPAs. Some of India. The aim of this law is to promote
them were implemented. entrepreneurship, availability of credit, and balance the
SARFAESI Act - 2002 interests of all stakeholders by consolidating and
amending the laws relating to reorganization and
The Securitization and Reconstruction of Financial insolvency resolution of corporate persons, partnership
Assets and Enforcement of Security Interest firms and individuals in a time-bound manner and for
(SARFAESI) Act, 2002 - The Act permits Banks / maximization of value of assets of such persons and
Financial Institutions to recover their NPAs without the matters connected therewith or incidental thereto.
involvement of the Court, through acquiring and
disposing of the secured assets in NPA accounts with The need of the hour to tackle NPAs is some urgent
an outstanding amount of Rs. 1 lakh and above. The remedial measures. This should include:
banks have to first issue a notice. Then, on the • Technology and data analytics to identify the early
borrower's failure to repay, they can: warning signals.
1. Take ownership of security and/or • Mechanism to identify the hidden NPAs.
2. Control over the management of the borrowing • Development of internal skills for credit assessment.
concern.
• Forensic audits to understand the intent of the
3. Appoint a person to manage the concern. borrower.
ARC (Asset Reconstruction Companies)The 7. RESEARCH METHODOLOGY
RBI gave license to 14 new ARCs recently after the
amendment of the SARFAESI Act of 2002. These The present study is aimed to get an overview of
companies are created to unlock value from stressed NPA and also to explore the effective measures for the
prevention, growth and recovery of NPA. As it is a

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1063
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

proven fact that the management of NPA is one of the equivalent time the banks are required to provide
major issues as it directly contributes in the economic provisions for NPAs from their current profits. The
development of the country. The study is mainly based interest income of banks is thereby reduced. the present
on secondary data which is collected through books, profits of the banks are eroded due to provision of
published reports, newspapers, journals, projects, doubtful and bad debts. Management is to make sure
websites etc. that service level requirements are achieved. If recovery
7.1 Percentage NPA of some of the Banks, as is evident from is being properly made then it'll help to get fund and
the following table as on 31.03.2020. thus the bank having sufficient fund, could provide loans
Table: 1 and advances to its customer and generate its business.
Name of the Bank Gross NPA \ Gross So it might be said that if recovery is correctly done
Advance % then it'll help all round development of the bank and
SBI 5.88
PUNJAB NATIONAL 14.21 overall economy. For banks it's necessary to stay the
BANK extent of NPA low because it impacts upon the
UNION BANK OF INDIA 13.49 profitability of the banks and hence it's necessary to
CANARA BANK 8.23
BANK OF BARODA 9.40 possess strong recovery system that ought to be
BANK OF INDIA 14.78 operated effectively with control and supervision of
INDIAN BANK 6.87 upper authorities.
ICICI 5.53
HDFC 1.37 9. SUGGESTIONS
AXIS BANK 4.86
IDB I 27.3 Various steps are taken by the govt and RBI to
YES BANK 15.36
KOTAK MAHINDRA 2.25 recover and reduce NPAs. Preventive measures are to
BANK stop the asset from becoming a non performing asset.
FEDERAL BANK 2.84 Banks has to concentrate on the following to minimize
Graph: 1 the level of NPAs. The quality management of NPAs
credit assessment, risk management by the banks
Gross NPA \ Gross Advance %
30
concerned. Banks should have adequate preventive
25
20
measures, fixing presanctioning appraisal responsibility
15
10 and an efficient post-disbursement supervision.
5
0
10. REFERENCES
[1] Aggarwal, Monica and Sharma, Rishi Raj (2005), "Indian Banking:
Present and Future", the Indian Journal of Commerce, Vol.58,
No.3, July-September.
[2] Ahluwalia, MontekS.20 02: Economic reforms in India since
Source: (www.Money control.com)
1991: Has Gradualism worked?, in: Journal of economic
Gross NPA to total assets ratio (GNPA ratio), one Prespectives, 16(3), pp.67-88.
of the key tools of measuring NPA levels of the Indian [3] Arora, Sangeeta and Kaur, Shubpreet (2006), "Financial
banking industry (i.e., their efficiency), stood at about Performance of Indian Banking Sector in Post Reforms Era", The
Indian Journal of Commerce, Vol.59, No.1, Jan-March.
8.5% at the end of March 2020 (11.3% for PSBs and
[4] Dr.A.Arumugam, Dr.G.Selvalakshmi (2014): Impact of Banking
4.2% for private banks), and is expected to increase Sector Reforms in India in the Post-Reforms Era.
to a level of around 14% by March 2021.
[5] India Banking Sector Report(2014) Presentation Transcript.
8. CONCLUSION [6] Indian Brand Equity Foundations-the Indian Banking sector:
Recent development Growth &Prospects2013.
NPA isn't just a problem for bank, but also bad for
[7] Janaki Ramudu P, Durga Rao,(2006) "A Fundamental analysis of
the economy of the country. The money which is locked Indian Banking Industry",The ICFAI Journal of Bank
in NPA isn't available for productive activities at an Management.

1064 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

[8] Narasimham Committee-I (1991) report and the Narasimham [13]Reddy, B.Rama Chandra and Reddy, SVijayulu(2003), "Banking
Committee-II (1998) report Sector Reforms in India-A Review", Internet Edition, Business
Line, Nov19.
[9] Rangarajan.C, (1997), "The Financial Sector Reforms: The Indian
Experience, "RBI Bulletin, July 1997. [14]Santosh Kumar Das (2010): Performance of the Indian Banking
Sector: Impact of Reform.
[10]Rao, D.Nageswara (2002), "Indian Banking in the new scenario",
Front Line, October-November 2002. [15]SheteN.B, "Banking Sector Reforms and Priority Sector Credit",
Management and Accounting Research, Vol.3.No.1, July-
[11]RBI Discussion Paper on Banking Structure in India (2013)-
September 1999, pp.1-20.
The Way Forward.
[12]RBI Paper: statistical tables relating to banks in India2012-13

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1065
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Digitalization in India: Opportunities and Challenges


Dr. P. Subramanyachary1, Dr.B.M.Raja Sekhar2
1
Head, Department of MBA, Sri Venkateswara College of Engineering,
Karakambadi, Tirupati, Chittoor District, Andhra Pradesh
2
Department of Management Studies, KMM Institute of Technology & Science, Tirupathi.
Email: bmrajasekhar@gmail.com2

Abstract: This paper highlights the importance, new market growth opportunities, jobs and become
challenges and advantages of digitalization in India. the biggest business opportunity of mankind in the next
Digitization is the representation of an object, 30 to 40 years. The momentum that 'Digital India' has
image, sound, document or signal by generating a given to our technological progress is noteworthy
series of numbers that describe a discrete set of
indeed.Digital India Program is a national campaign to
its points or samples. The digital economy is the
new productivity platform that some experts regard
transform India into a globally connected hub. It includes
as the third industrial revolution. India is an various proposals and incentives given to companies,
initiative of the Central Government of India basically the manufacturing companies both domestic
"designed to transform India into a global digitized and foreign to invest in India and make the country a
hub" by reviving a rundown digital sector of India digital destination. The emphasis of Digital India
with the help of improving digital connectivity and campaign is on creating jobs and skill enhancement in
skill enhancement and various other incentives to the Broadband Highways, e-Governance, and
make the country digitally empowered in the field Electronic delivery of services, Universal access to
of technology. The 2016 Union budget of India Mobile Connectivity, Electronics Manufacturing, and
announced 11 technology initiatives including the Information for All etc. The campaign's aim is to resolve
use data analytics to nab tax evaders, creating a
the problems of connectivity and therefore help us to
substantial opportunity for IT companies to build
out the systems that will be required. The initiative
connect with each other and also to share information
also lacks many crucial components including lack on issues and concerns faced by us. In some cases
of legal framework, absence of privacy and data they also enable resolution of those issues in near real
protection laws, civil liberties abuse possibilities, time. Digital India is an initiative of the Central
lack of parliamentary oversight for e-surveillance Government of India "designed to transform India into
in India, lack of intelligence related reforms in a global digitized hub" by reviving a rundown digital
India, insecure Indian cyberspace, etc. It is sector of India with the help of improving digital
mandatory that economy has to push merits of connectivity and skill enhancement and various other
Digitalization and check the problems arise from incentives to make the country digitally empowered in
digitalization. In the era of Globalization the field of technology.
transactions are increasing. So that digitalization
to be given priority for both quick and transparent DEFINITIONS
transactions.
Integration of digital technologies into everyday life
INTRODUCTION by the digitization of everything that can be digitized:-
Digitization is the representation of an object, image, Business Dictionary
sound, document or signal by generating a series of Digitalization is the way in which many domains of
numbers that describe a discrete set of its points or social life are restructured around digital communication
samples.The digital economy is the new productivity and media infrastructures. In the pages that follow, we
platform that some experts regard as the third industrial discuss these distinct, yet interrelated, concepts. :-
revolution. This is also known as 'The Internet Economy' Oxford Dictionary
or Internet of Everything (IoE) and expected to generate
1066 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

PILLERS OF DIGITALIZATION DISADVANTAGES


There are several pillars of opportunities that are The following are disadvantages of Digitalization.
going to be built to escalate public behavior and 1. Government employment might reduce which in turn
expectation in digital way: may lead to civil servants' unrest.
1. Broadband Highways 2. People will use free wifis just for time pass which is
2. Digital Locker current scenario in metros.
3. Illiteracy people may lose with digitalisation as they
3. Mobile connectivity
are not aware of it.
4. e-Kranti
4. Cyber crimes may increase
5. Jobs 5. It impacts unemployment problem.
6. Manufacturing
DIGITALISATION IN INDIA
7. MyGov
Digital India is a campaign launched by the
8. Information for all Government of India to ensure that Government services
9. Scope with Foreign Universities are made available to citizens electronically by improving
online infrastructure and by increasing Internet
ADVANTAGES connectivity or by making the country digitally
The advantages of Digitalization include Customer empowered in the field of technology. It was launched
experience, Technology push, and Economic benefits on 1 July 2015 by Prime Minister Narendra Modi. The
along with the following advantages. initiative includes plans to connect rural areas with high-
speed internet networks. Digital India consists of three
1. Digital Empowerment of Native Indian People.
core components. They are 1.The creation of digital
2. Delivery of all Government Services electronically infrastructure 2. Delivery of services digitally 3. Digital
(E-Governance). literacy. The vision of Digital India program is inclusive
3. A Digital Identification which will verify the end user. growth in areas of electronic services, products,
4. A Mobile for worldwide access to all services.
manufacturing and job opportunities etc. and it is
centered on three key areas - Digital Infrastructure as
5. A Bank account for Immediate Benefit Transfers of a Utility to Every Citizen, Governance & Services on
subsidies and payments. Demand and Digital Empowerment of Citizens.The
6. The program also aims to eliminate all electronics Government of India entity Bharat Broadband Network
imports from foreign countries by 2020 and make Limited which executes the National Optical Fibre
India a electronics manufacturing super power Network project will be the custodian of Digital India
7. It will help in decreasing crime if applied on whole. (DI) project.BBNL had ordered United Telecoms
8. It will help in getting things done easily.
Limited to connect 250,000 villages through GPON to
ensure FTTH based broadband. This will provide the
9. It will help in decreasing documentation. first basic setup to achieve towards Digital India and is
10.Some of the services which will be provided through expected to be completed by 2017.The government is
this desire effort are Digital Locker, e-education, e- planning to create 28,000 seats of BPOs in various
health, e-sign and nationwide scholarship portal. states and set up at least one Common Service Centre
11. It will ostensibly create a lot of jobs. in each of the gram panchayats in the state.
12.It will be a boost to industry; both large and small The 2016 Union budget of India announced 11
enterprises. technology initiatives including the use data analytics to
nab tax evaders, creating a substantial opportunity for
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1067
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

IT companies to build out the systems that will be program e-kranti or electronic delivery of services,
required. Digital Literacy mission will cover six crore information for all, and IT for jobs. Besides these
rural households. It is planned to connect 550 farmer Broadband highways, now called Bharat Net, is
markets in the country through the use of technology. supposed to connect up to gram panchayat, but laying
Out of 10% English speaking Indians, only 2% reside fiber optic cables is the least of the challenges here.
in rural areas. Rest everyone depends on their The biggest challenge is ensuring that each panchayat
vernacular language for all living their lives. However, point of broadband is fired up, functional, used and
as of now, email addresses can only be created in distributed. Our research work found that more than
English language. To connect rural India with the Digital 67% of the NOFN points are non-functional, even at
India, the Government of India impelled email services the pilot stage. Besides, if the broadband highways
provider giants including Gmail, office and rediff to programme is not implemented well and soon, we may
provide email address in regional Languages. However, not be able to implement other pillars of the programme,
the email provider companies has shown positive sign such as the public Internet access programme, e-kranti,
and is working in the same process. An Indian based information for all, and even IT for jobs. All these are
company, Data Xgen Technologies Pvt Ltd, has dependent on access infrastructure.
launched world's first free linguistic email address under Out of the many initiatives launched during the Digital
the name 'DATAMAIL' which allows to create email India week, one that could make a serious impact is
ids in 8 Indian languages, English; and 3 foreign BSNL's (Bharat Sanchar Nigam Ltd) mass deployment
languages - Arabic, Russian and Chinese. Over the of Wi-Fi hotspots across the country. If the government
period of time the email service in 22 languages will be pushes BSNL to ensure at least one hotspot per
offered by Data X Gen Technologies. panchayat or per village, it can do wonders, and the
OPPORTUNITIES government can also show off this as a positive outcome.
However, if the selection of the locations for the hotspots
A Digital India Year would make sure that each and necessarily were those populated by mostly tribal's,
every aspect of the program is pushed to show results backward castes, minorities and geographically difficult
on the ground and not go into hibernation after one areas, then the impact would be something that would
week of enthusiasm. Considering that most of the nine be a national story. A well-connected nation is a
pillars of the Digital India program face serious prerequisite to a well served nation. Once the remotest
challenges in implementation, it is imperative that of the Indian villagers are digitally connected through
focused, persistent attention be given to each of its pillars broadband and high speed Internet, then delivery of
so that the big programme does not end up in electronic government services to every citizen, targeted
embarrassment and failure. Considering that the Digital social benefits and financial inclusion can be achieved
Empowerment Foundation has a footprint at more than in reality. One of the key areas on which the vision of
150 locations in India at the village level, and that too Digital India is centered is 'digital infrastructure as a
with the purpose of digitally enabling the poorest of the utility to every citizen.
poor, let me highlight some of the major challenges of
the Digital India program. A key component under this vision is high speed
Internet as a core utility to facilitate online delivery of
First and foremost is that the entire program is various services. It is planned to set up enabling
designed as a top-down model. There is no idea of infrastructure for digital identity, financial inclusion and
how it would be implemented on the ground to be ensure easy availability of common services centres. It
successful. For example, let's consider six of the nine is also proposed to provide citizens with 'digital lockers'
pillars of the programme directly related to consumers which would be sharable private spaces on a public
and people at large: broadband highways, universal cloud and where documents issued by government
access to mobile connectivity, public Internet access departments and agencies could be stored for easy

1068 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

online access. It is also planned to ensure that the a lighter note, I can say that net addition in total
cyberspace is made safe and secure. Over the years, a telephony (mobile plus landline) from April 2014 to
large number of initiatives have been undertaken by February 2016 is equivalent to the population of France
various State Governments and Central Ministries to and Italy put together. The growth rate of total telephony,
usher in an era of e-governance. Sustained efforts have which was 3.90 per cent in 201314, posted 6.76 per
been made at multiple levels to improve the delivery of cent in 201415, and 5.65 per cent till February this
public services and simplify the process of accessing year, and I am sure the rate must have crossed 6.50
them. E-governance in India has steadily evolved from per cent in March. This is the position - a clear growth
computerization of Government Departments to - and what is important is the rural growth is more than
initiatives that encapsulate the finer points of the urban. Rural teledensity has increased 6.62 per cent
Governance, such as citizen centricity, social between February 2014 and February 2016.
responsibility, service orientation transparency Therefore, the telecom sector is rising and with 'Digital
accountability. India', it is going to rise further. My biggest personal
The National e-Governance Plan (NeGP) was satisfaction is the recovery of the postal department.
approved in 2006 to take a holistic view of e- Postal services have become the biggest deliverer of
governance initiatives across the country, integrating ecommerce items - there are more than 57 centres in
them into a collective vision. Around this idea, a massive the country, fully automated and computerised. The
countrywide infrastructure reaching down to the ecommerce parcel revenue, which was down 2 per cent
remotest of villages is being developed, and large-scale in 2013-14, rose 45 per cent in 2014-15 and 80 per
digitization of records is taking place to enable easy cent in 2015-16, and by February, it has reached 100
and reliable access over the Internet. The ultimate per cent.
objective was to make all government services CHALLENGES
accessible to the common man in his locality, through
common service delivery outlets, and ensure efficiency, The challenges of digitalization in India are as follows.
transparency and reliability of such services at affordable The initiative also lacks many crucial components
costs to realize the basic needs of the common man. including lack of legal framework, absence of privacy
For example if we take Communications and IT and data protection laws, civil liberties abuse
development, Today, Sanchar Bhawan is free from possibilities, lack of parliamentary oversight for e-
middlemen, there is no scam or scandal, and decisions surveillance in India, lack of intelligence related reforms
are taken in a free and fair manner. We had the highest in India, insecure Indian cyberspace, etc. Some other
spectrum auction ever of 1.10 lakh crore (last year).All challenges are
the policy initiatives pending for the past 710years - Implementation: The entire program is designed
defence band identification, spectrum trading sharing, as a top level model on the technological front. There is
harmonization, liberalization, cloud policies, open source hardly any guidance on how to implement the same on
in IT and creating an ecosystem of sound investment - the ground level to make it successful. To be precise,
are in place. As a result, IT and IT enabled exports most of the nine pillars of the program are directly
today are worth $108 billion, the highest ever in the related to high-end consumers in urban areas and not
history of India. India has received $4,091 million (over for 70% of the rural population in India.
?26,000 crore) foreign direct investment in telecom. Deploy W-Fi Centers & Hotspot: BSNL's
Mobile telephony has shown growth. The postal sector (Bharat Sanchar Nigam Ltd) mass deployment of Wi-
had tremendous growth of ?122.66 million between Fi hotspots across the country. If the government pushes
April 2014 and February 2016.India crossed one billion BSNL to ensure at least one hotspot per village, it can
mobile phones under our government, one billion plus do wonders and experience the positive outcome.
Aadhaar cards and 400 million plus Internet users. On

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1069
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

However, if the selection of the hotspot locations were 5. Digital Inclusion: 1.7 Cr trained for IT, Telecom and
those populated by mostly tribal backward castes, Electronics Jobs
minorities and geographically difficult areas, then the 6. Job creation: Direct 1.7 Cr. and Indirect at least 8.5
impact can bring a new era in the life styles and other Cr.
culture of the people in our country significantly and 7. e-Governance & eServices: Across government
also impact in other countries.
8. India to be leader in IT use in services - health,
Improve IT Literacy: Improving IT literacy is very education, banking Digitally empowered citizens -
important because the entire mass who is using internet public cloud, internet access
should know how to secure his/her online data.
Providing proper usability guidance of Anti-Virus CONCLUSION
software and its role in securing the records should Since Technology advances as time passes every
happen simultaneously to avoid illegal things in all the economy and individual has to adopt upcoming
economic and other money transactions . technology for digitalization. It is mandatory that
Data Vulnerability: Each and every citizen of India economy has to push merits of Digitalization and check
would have all the personal details online including bank the problems arise from digitalization. In the era of
details, Income tax details, PAN details which might Globalization transactions are increasing. So that
be vulnerable if not secured properly. In case this is digitalization to be given priority for both quick and
breached, then any individual would lose the privacy of transparent transactions.
the data and would be compromised. This leads to lose REFERENCES
of personal money in the form digital transactions.
1 Mazars, Digitalization: a vehicle of the new age of transformation,
Excessive server Hits: If majority of the 2011
population start using online, then definitely the 2 EY, Digitization of everything, 2011
Government portal sever will start getting more number 3 PWC, Managing for performance: Transaction banking, 2012
of hits day by day. This is limitless and the IT team 4. Kelly, Kevin (May 14, 2006). "Scan This Book!". New York
needs to be prepared to tackle the situation where the Times. Retrieved 2016-10-26
possibility of crash would minimize. 5. www.dqindia.com.
Man-In-The-Middle Attack: It is a type of 6. www.ncaer.org.
cyber-attack where a malicious actor intrudes him/ 7. www.dnaindia.com
herself into a conversation between two parties, imitates 8. www.digitalindia.gov.in
both parties and gains access to information that the
two parties were trying to send to each other. A man-
in-the-middle attack allows such intercepts of the data
meant for someone else, without knowledge of either
of the party until it is too late.
IMPACT OF DIGITALISATION BY 2019:
1. Broadband in 2.5 lakh villages, universal phone
connectivity
2. Net Zero Imports by 2020
3. 400,000 Public Internet Access Points
4. Wi-fi in 2.5 lakh schools, all universities; Public Wi-Fi
hotspots for citizens

1070 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Sports Marketing-A Pioneering Style of Marketing


Management
Dr.B.M.Raja Sekhar
Associate Professor, Department of Management Studies, KMM Institute of Technology & Science, Tirupathi.
Email: bmrajasekhar@gmail.com

Introduction: Nowa day's Sports marketing Challenge of Sports Marketing


became as a subdivision of marketing which focuses 1. With millennial switching to new platforms to access
on the promotion of sports and also teams as well as sport, the role of traditional media and sports
the promotion of products and services through sporting marketing is changing.
events and sports teams. This is a service where the
2. Outmoded inflexible contracts can leave little budget
element promoted can be a physical product or a brand for the all-important activation, and with fans choosing
name. The main goal is to provide the client with rival unofficial channels for gossip and insider
strategies to promote the sport or to promote something information, the rewards can be hard won.
other than sport through sports. Sports marketing are
3. New and accessible ways to view sports, from
designed to meet the needs and wants of the consumer
mobile to social to VR, means there is less incentive
through exchange processes. These strategies follow for fans to attend events in person, while more
the classical four "P"'s of general marketing namely expectation is placed on sports stars to pull off an
Product, Price, Promotion and Place. authentic natural voice for their brand.
Sports marketing mix: Additional four "P"'s are Marketing Products through sport' is a concept that's
added to sport marketing, relating to the fact sports been used since the 1980s, but has increased in
are considered to be a service. The additional 4 P's importance in the last two decades due to the growth
are: Planning, Packaging, Positioning and Perception. and expansion that the different types of sports have
Sports marketing includes the element of sports enjoyed since then. "Marketing through sports" it is a
promotion which involves a wide variety of sectors of marketing strategy that can be used in sports in two
the sport industry including broadcasting, advertising, different ways. First, the use of marketing and promotion
social media, digital platforms, ticket sales, and can be carried out through the sport or through the sports
community relations. club. In the first case, the use of marketing is under
Benefits of Sports Marketing: The benefits of responsibility of the different sporting associations, while
sports marketing are as follows. in the second case, the responsibility falls on the different
sports clubs. In this manner, marketing and promotion
1. Stakeholders involved in sports include leagues, teams,
through the sport and through the club involve
athletes, and fans as well as cities and countries hosting
sporting events. sponsorship, corporate events and boxes, licensed
merchandise, names and images also known as
2. The media and businesses who promote their products "endorsement", advertising through broadcaster,
and services through sports also receive benefits.
advertising such as advertising as ground signage/
3. Direct benefits to leagues, teams, and athletes include clothing/equipment advertising, promoting games,
revenue from tickets, media rights, and sponsorships. promoting using players/club/league or developing
4. Cities and countries also receive revenue from taxes, 'business opportunities.'
and all of the stakeholders gain from the exposure The peculiarity of sports is that "sport is the only
provided through sports.
entertainment where, no matter how many times you

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1071
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

go back, you never know the ending." This singular year. Under Armour and Adidas are also major apparel
fact is used by marketing companies as an advantage: brands as Under Armour sponsors Notre Dame for $9
every time the audience attends an event it will see the million per year while Adidas provides more than $7
advertisements again and again, providing a wide range million each year to both UCLA and Louisville. These
of opportunities for the different companies which are examples of sports marketing because as it is
operate on this field as follows. defined, sports marketing are a marketing strategy in
which companies related to sports products or services
1. Sponsorship of events promote their trademark through design, production or
One of the oldest examples of the marketing of other resources. In this case apparel companies Nike,
products through sports is Slazenger's supplying of the Under Armour, and Adidas, which are all completely
official ball of Wimbledon (1902- 2015).Another related to sports, design the uniforms of these teams
international example of marketing products through and as a consequence their trademarks are being
sport is Adidas' sponsorship of FIFA, which includes promoted every time there is a game.
the company supplying the balls used in the World Cup
and having its logo on the side boards along the field of 3. Sponsorship of athletes
play. In what it described as a "world first" in corporate Apparel companies also sponsor professional
sport sponsorship, in 2016 BNY Mellon and Newton athletes such as Kevin Durant who receives $30 million
Investment Management announced they had donated per year from Nike. Stephen Curry is speculated to
their title sponsorship of the annual Oxford and receive even more money than Durant from his contract
Cambridge Boat Races to Cancer Research UK. with Under Armour. Meanwhile, Puma pays sprinter
Usain Bolt $10 million per year. Many athletes maintain
2. Sponsorship of teams contracts with a variety of companies, some that are
Sponsorship of teams is found throughout sports. related to sports and others that are not. Roger Federer
Some of the most visible examples are found in the holds agreements with Nike, Wilson, Rolex, Mercedes-
MLS as company names and logos are featured on Benz, and Gillette, worth in sum close to $60 million
team jerseys. For example, Alaska Airlines is the official each year. LeBron James' contracts with Nike, Beats
jersey sponsor of the Portland Timbers while Valspar by Dre, Coca Cola, Kia, McDonald's, and Samsung
is the official sponsor of the Chicago Fire. These are accrue the NBA player more than $40 million per
examples of sponsorships of companies that are not year.[32] Peyton Manning meanwhile holds sponsorship
related to sports. Turkish Airlines established a sports agreements with companies including Buick, DirecTV,
marketing strategy involving high-profile sports teams, Gatorade, Nationwide and Papa John's worth in sum
players, and sport associations including Manchester approximately $12 million per year. Fellow NFL
United, FC Barcelona, the Euroleague basketball quarterback Drew Brees earns $11 million each year
competition, NBA player Kobe Bryant, the Turkey from his contracts with Wrangler, Vicks, Verizon, Nike,
national football team, and tennis player Caroline and Microsoft. Another example of marketing through
Wozniacki. Another example of sports marketing sports is the strategy used by Gillette to promote its
through sponsorships of teams is the apparel contracts personal hygiene products through representative figures
seen throughout sports. In 2011 Nike agreed to become of each sport on television during broadcast sports
the official apparel company of the NFL in exchange events. Gillette uses athletes such as tennis player Roger
for around $220 million per year a deal that has been Federer, golfer Tiger Woods, and soccer player Thierry
extended through 2019. At the college level, Ohio State Henry. In the commercial these celebrities appear using
and Nike maintain a contract that provides the school the products of the company showing the results in
a value of $16.8 million per year in cash and product order to demonstrate that if successful people use the
through the 2033-34 academic year. Michigan products you should use them to. It is a clear example
meanwhile receives a total value of $15.3 million per of this concept, because the company using this

1072 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

marketing strategy is not related to sports at all, but goals, they should view their customers as partners for
through important personalities of each sport it has the life rather than here and now consumers, and attempt
possibility to get to its target audience. Nike and to understand their ever-evolving needs, desires and
Gatorade also hold sponsorship agreements with top values. By doing so, sport businesses are able to
athletes. Included among Nike's clients are Federer, maintain and enhance their fan base easier than through
Woods, golfer Rory McIlroy and tennis player Rafael the more commonly used short-term transactions such
Nadal while Gatorade has deals with NBA star Dwayne as merchandise and ticket sales, with the use of social
Wade, Serena Williams, and Peyton and Eli Manning. media enabling this to be practiced much more
Grassroots sport marketing is part of the field of effectively.
marketing known as social marketing. This refers to 5. Social Media and relationship marketing
marketing something that is of benefit to the public, and
is normally done by government or charities rather than Social Media and relationship marketing in sport
private sector organizations. It is normally done with a Used as global communication and interaction channel,
much smaller budget than marketing of sports teams social media has changed the conventional offline
and event or marketing of products through sports as it business to customer relationship into a tool that enables
does not bring any direct financial benefit. Although this customers' engagement into an instantaneous and active
marketing normally drives people to clubs where they back-to-back conversation. Customers are increasingly
will pay to play sport it still needs to be subsidized in incorporating social media within their daily lives and
order to be run. The money therefore comes from local using it as part of their communication mix. Today, sport
councils with a remit to increase participation or from businesses can use social media to actively listen to their
public health sector which wants to decrease the cost customers, recognise and follow their specific needs
of disease. Examples of the promotion of sport to and wants rather than use out-dated methods of data
increase participation is the United States Golf collection such as surveys and focus groups, which do
Association's initiatives to increase golf participation as not provide rich information to better understand
well as MLB's One Baseball campaign, which attempts customers. It allows sport businesses to keep their
to unify baseball organizations at all levels with the customers updated on the latest news and information
overall goal of increasing youth participation and as well as interacting with them on an individual basis.
consequently creating new fans. This instant, two-way dialogue available to sport
businesses, which allows them to provide quality content
4. Relationship Marketing Sports within short time frames, can be seen as a form of
Relationship marketing encompasses the notion of competitive advantage. They are able to interact the
preserving customers through the success of long-term way they want, in the way that they wish, through
reciprocated contentment by an organisation and their whichever medium they feel best. This gives sport
customers. Sport businesses need to communicate and businesses an added impetus to effectively utilise social
participate in discussion with their customers in order media in order to provide their customers with the best
to create, sustain and improve relationships. Existing possible experience and to expand their marketing
studies offer insightful information into relationship abilities. As well as sport businesses benefiting from
marketing and the general consensus that sport the use of social media in the context of relationship
businesses can benefit from its use. In many situations, marketing, customers also experience the same level
sports marketing affairs include some sort of relationship of benefits. The constant interaction between sport
marketing, where clubs, organisations, fans and athletes businesses and their customers allows organisations to
have relationships with one another that are dependent know and learn about each individual customer on a
on the successful management of those relationships. deeper level. As a result of this, customers feel a greater
In order for sport businesses to be successful in their sense of value from the organisation and in return, offer
a greater amount of loyalty. Social media enables sport

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1073
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

businesses to involve customers in the marketing process or "followers" for their Face book and Twitter Pages
by receiving feedback and ideas, which can then be in order to obtain recognition. In order to have the
implemented in future products and services. By doing opportunity to apply for pre-sale tickets for their
so, sport businesses emphasise the engagement between Michigan football games, at the largest football arena
in the nation 'The Big House,' fans are required to
organisation and customer, and reinforces the
"follow" or "like" their page on Face book or Twitter,
importance that customers hold in the brand building
which allows them to be able to purchase pre-sale
process. tickets for any game that they desire, making this
6. Sport marketing through social media method of marketing a great tool to gain awareness
for their team and many other things.
Professional leagues, teams, and athletes have begun
9. Louisville Slugger Scavenger Hunt: After the St.
using social media as part of their marketing strategy in
Louis Cardinals won the World Series in 2011, Hillerich
recent years. The most popular social media platforms & Bradsby, makers of Louisville Slugger bats and
are Facebook and Twitter, but athletes and teams have other baseball equipment, created a scavenger hunt
begun using sites including Instagram and Snapchat. through Twitter in order to raise awareness for their
Like all business, the advantages of social media use in company. The hunt involved baseball hats, scattered
sports include building brand awareness, reaching a all over the city of St. Louis, Missouri. The Louisville
large audience in an easy and cost-effective way as Slugger Twitter page posted "tweets" that hinted at
well as creating brand advocates and engaging where the hats were located within the city. The fan
passionate sport fans. Numerous examples exist within or participants used their mobile phones in order to
sports of athletes and teams using social media well to be up to date on the specific "tweets" referring to the
hunt. If a fan or participant found one of the several
execute their strategy. For a brand like Babolat, for
hats, the participant was told that they were to be
example, having a world icon like Rafael Nadal as its
kept by the seeker. The reason this company held a
top representative is priceless. There is no better way scavenger hunt was to receive recognition and to
to stand up to your competition than by joining up with increase their followers on Twitter. The statistics
the strongest. But you must know how to do it, it is not shows that their fan base skyrocketed 143%. Many
a case of anything goes. And this is where knowing teams have incorporated sponsorships into their social
how to use social media is fundamental. "A message on media, such as the Minnesota Vikings "Touchdown
Twitter is not just an advertising channel with which Tracker" Instagram image, which was sponsored by
you can win an audience. Its power lies in the message FedEx. The Cleveland Browns also displayed
being relevant and credible", explains Edwin sponsorship integration in their tweets recapping
Schravesande. touchdown drives, sponsored by Cooper Tires. Many
athletes including Kobe Bryant, Russell Wilson, and
7. Baylor Rewards Program: When fans decide to Rafael Nadal have taken advantage of social media
"Like" or "Follow" Baylor athletics on either Twitter to increase their followers and enhance their
or Facebook, they are given day-to-day updates on brand.[54] Athletes have also engaged in promoting
their favorite teams. From a marketing aspect, the brands through social media including Russell Wilson's
Baylor athletics page on Facebook and Twitter sponsorship of Recovery Water and Serena Williams'
(@BaylorAthletics) keeps track of fans who have promotion of Wheels Up.[55] Because of this
"tweeted" or "commented" on certain links, posts, or marketing tool, these fan-based website pages have
tweets. There is an incentive for these fans to post increased greatly in numbers and give them the
and tweet because at the end of each year, the top recognition that they were looking for.
three posting or tweeting fans who are selected
receive prizes, from free jerseys and merchandise to
season tickets]
8. Michigan Presale Incentive: Michigan created a
very clever way to enhance the total amount of "likes"

1074 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

REFERENCES 4. S. Mason, D. (1999). "What is the sports product and who buys
it? The marketing of professional sports leagues". European
1. Stewart, B., Smith, A. C., & Nicholson, M. (2003). "Sport Journal of Marketing. 33 (3-4): 402-419.
consumer typologies: A critical review". Sport Marketing
Quarterly. 12 (4): 206-216. 5. https://esportes.estadao.com.br/blogs/blog-do-baldini/wp-
content/uploads/sites/675/2018/02/chavez_haugen.jpg
2. Kotler, P (2011). The view from here. In Peppers. D., & Rogers,
M. (Eds.), Managing customer relationships: A strategic 6. ^ https://www.latimes.com/fashion/alltherage/la-ar-hublot-
framework. Hoboken, NJ: Wiley. pp. 1-14. sponsorship-of-mayweather-20150504-story.html

3. Abeza, G; O'Reilly, N; Reid, I (2013). "Relationship Marketing 7. https://en.wikipedia.org/wiki/Sports_marketing


and Social Media in Sport'". International Journal of Sport
Communication. 6 (2): 120-142.

ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1075
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

Role of Women in the Entrepreneurship Context: A


Brief Literature Study
Mahanish Panda
MBA Student, National Institute of Technology Hamirpur, (H.P) 177005, India
Email- 20mmb002@nith.ac.in

Abstract- Over the years, it's been seen that Entrepreneurship is the best way to make rational
women entrepreneurs have been taking up new use of human and non-human resources and
role in different areas. Their Contribution and improve the living conditions of the poor. In this
significance are praiseworthy in the every article, the author tries to pay attention to the
country's financialprogress and growth. In the 2012 growth of women's entrepreneurship, the
World Development Report indicated that challenges and suggestions of women's
companies which are being owned by the women entrepreneurship growth, etc.
have shown extraordinaryprospective for
Keywords - Women entrepreneurship, women
imminentfinancialdevelopment and employment
empowerment, business, motivation.
creation. Hence, the United Nations has launched
many initiatives to promote and inspire women's INTRODUCTION-
entrepreneurship in developing and under
developed countries. Sophisticated women of our Women-owned small businesses are making an
country still have to cover a larger pathin order to increasingly important contribution to the global
accomplishthe sameprivileges and status, since economy and growing faster than men (Langowitz and
traditions are deeply entrenched in ourculture, Minniti, 2007). Although academic research on
where societal structure has always been controlled entrepreneurship (Ahl, 2006) focuses on men, it has
by men. Regardless ofcountlesssocietal barriers, been suggested that in most countries, women-owned
the women of our country stand out from other businesses account for about 30% of all small businesses
groups and remain praised for their achievements (Javadian and Singh, 2012; Minniti et al., 2005, Minnity
in their respective fields. Women entrepreneurs
and Nord, 2010). Entrepreneurship is increasingly
can be defined as women or groups of women who
start, organize, and run businesses. The Indian
important in the modern age. This is a global
government defines women entrepreneurs as phenomenon. Developed countries are already enjoying
companies owned and controlled by women. They the fruits of business development. In contrast, in
have at least 51% of the capital's economic interest developing economies such as India, entrepreneurship
and provide at least 51% of the jobs created by has recently become more and more important. In
the company to women. As the driving and pulling developing countries, it is considered a way to promote
factors encourage women to pursue their own self-employment. However, in order to improve and
careers independently, women entrepreneurs have maintain the country's economic growth, it is necessary
begun to participate in business activities. The to see more. The development of any region or country
feeling of making independent decisions about your requires effective and optimal use of generally available
life and career is the motivating factor behind this
resources, especially human resources. Competent
drive. One of the main treatments prescribed by
advocates of women's empowerment is
human resources will definitely make the best use of
empowering women through entrepreneurship. It other resources. Developing economies like India need
reflects the ray of hope of the unemployed to earn entrepreneurs who can use scarce natural resources.
a living and maintain a dignified life, as well as the Entrepreneurship has been a male-dominated
economic development of the country. phenomenon from a very young age, but time has turned

1076 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021

this around, making women the most memorable and LITERATURE REVIEW
inspiring entrepreneurs today. It is estimated that women Women of different backgrounds have realized that
entrepreneurs currently represent around 10% of the exerting entrepreneurial spirit will help them establish
total number of entrepreneurs in India, and this an identity in society and have a dignified lifestyle
proportion is increasing every year. If the general trend (Marlow, 2002). Both push and pull factors contribute
continues, it is likely that within the next five years, to business awakening. However, pull factors are
women will account for 20% of business power considered to be more influential than push factors
(Saidapur et al., 2012). The Tenth Five-Year Plan because they are driven by inner desires, motivations,
(200207) aims to empower women by translating the personalities, family society and observational learning,
recently approved National Policy for the role models, and learning from experience from personal
Empowerment of Women (2001) into action and and professional past (Shinnar and Young, 2008).
ensuring the survival, protection and development of Surinder Pal Singh (2008) identified the reasons and
women and children through an approach based on in influencing factors behind women's entry into
rights. entrepreneurship. He explained the characteristics,
OBJECTIVE obstacles and challenges of his business in an Indian
The objective of this manuscript is to recognize the context. He mentioned that the main obstacle to the
existing research works on the field of women growth of female entrepreneurs is the lack of interaction
entrepreneurship. I have investigated the existing with successful female entrepreneurs, society does not
research works on this field and presented my views. I accept female entrepreneurs, fa

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy