Helical gears are commonly used in industry as
they have advantages of higher power density, quieter
operation etc., compared to spur gears. Conventional gear
design is based on various design criteria, including durability
and bending strength load rating. In recent times, fracture
failure modes are gaining importance in addition to
conventional failure modes. Stresses due to operating fatigue
loads and internal residual stresses can cause fatigue fracture
failure on the surface, sub-surface of gear flanks or at tooth
root of gears. During gear design, various parameters are
optimized, and one such parameter is the helix angle that is
optimized for power density and gear noise. However, effect of
possible defects (voids and inclusions) in the gear tooth is not
usually considered in these calculations. This paper is a study
on severity of defects in a gear blank relative to power density
increment. Three different gear geometries (spur and helical
gears with two different helix angles) each with similar defects
are considered. Finite Element Analysis (FEA) is used to
analyze Tooth Interior Fracture (TIF), and study variation of
Stress Intensity Factor (SIF) with crack size and helix angle.
It is seen that power density increment of a common gear
blank through helix angle increment poses a higher risk of
crack severity, as the same gear blank is exposed to higher
operating loads.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Investigation of stresses in the thin rimmed spur gear tooth using femeSAT Journals
Abstract In this paper results are presented from a two-dimensional finite element stress analysis of three tooth sector of spur gear and the boundary conditions are provided at the radial end of the teeth of the rim. The different diametric ratio from 1.02 to 2 is used to get the stress variation. In the analysis of this three tooth sector the Maximum Principle stresses and von mises stresses at the root and fillet are in consideration. The main objective of this paper is to find out the minimum thickness of spur gear for different diametric ratio Md using analytical results by Lewis equation and FE results. In this study the CATIA software used for the geometrical construction and stress analysis is accomplished by commercial finite element package MSC PATRAN and NASTRAN. Keywords— Diametric ratio Md, Maximum Principle Stress analysis, Finite element method, three tooth sector of spur gear.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Investigation of stresses in the thin rimmed spur gear tooth using femeSAT Journals
Abstract In this paper results are presented from a two-dimensional finite element stress analysis of three tooth sector of spur gear and the boundary conditions are provided at the radial end of the teeth of the rim. The different diametric ratio from 1.02 to 2 is used to get the stress variation. In the analysis of this three tooth sector the Maximum Principle stresses and von mises stresses at the root and fillet are in consideration. The main objective of this paper is to find out the minimum thickness of spur gear for different diametric ratio Md using analytical results by Lewis equation and FE results. In this study the CATIA software used for the geometrical construction and stress analysis is accomplished by commercial finite element package MSC PATRAN and NASTRAN. Keywords— Diametric ratio Md, Maximum Principle Stress analysis, Finite element method, three tooth sector of spur gear.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Experimental and Numerical Assessment of Crash Behavior of Welded Thin Wall R...IDES Editor
The crash behavior of Cold Rolled Mild Steel
(CRMS) closed form thin section produced by stitch welding
at periodic intervals of length was studied by conducting axial
compressive tests at loading velocities of 5 mm/min and 6000
mm/min. The deformation shape, peak forces and energy
absorption capacity of the sections estimated numerically
showed a good correlation with the experimental data.
Free vibrational analysis of curved beam with uniform rectangular cross sectioneSAT Journals
Abstract
Curved beams are plays an important role in different field like house roofing, bridges, cranes, automobiles chasses etc. The study
deals with the investigation of free vibrations of thick curved beams of SS316 and MS1018, both experimentally and using ANSYS.
The curved beams having different R/t ratio were fabricated by using mild steel material. Three different boundary conditions are
imposed for curved beams are as follows; free-free, clamped-free, clamped-clamped. For experimental investigation, magnetic
transducer and VIBXpert are used to conduct experiment on different curved beams. The present work also aims at developing a
numerical model for comparing ANSYS results with experimental results to analyze the frequencies and mode shapes
corresponding to three different boundary conditions. The curved beam were modelled, meshed and analyzed using ANSYS. The
first ten natural frequencies from finite element solutions are then compared with the experimental results. These effects also
become more significant for higher modes. It is also observed that the finite element solutions are closely in agreement with
experimental results.
Key words: Curved beams, Experimental investigation, Natural frequencies, modes
Fe investigation of semi circular curved beam subjected to out-of-plane loadeSAT Journals
Abstract Curved beams are used as machine or structural members in many applications. Based on application of load they can be classified into two categories. Curved beams subjected to In-Plane loads are more familiar and are used for crane hooks, C-clamps etc. The other categories of curved beams are the ones that are subjected to out-of-plane loads. They find applications in automobile universal joints, raider arms and many civil structures etc.The results of this research on semicircular curved beam subjected to out-of-plane loads have revealed some interesting results. For semicircular curved beams subjected to out-of-plane loads, it is shown that every section is subjected to a combination of transverse shear force, bending moment and twisting moment. By using ANSYS tool it is shown that Maximum principal stress occurs at section 120 degrees from the section containing the loading line. Moreover it is observed that fixed end of this curved beam is subjected to a state of pure shear. Key Words: Semi circular curved beam, Stress in curved beam, Out-of-plane load, FE analysis.
To Study Weld Strength and Strain Energy Absorption of Roll Over Protection S...IOSR Journals
The roll over protection structure, referred as ROPS is designed to protect the driver from the injuries caused by roll-overs. In addition to safety against roll-overs and collisions, it also acts as a single rugged base for mounting the sub-systems of the all terrain vehicle. This study will deals with edge preparation techniques employed prior to welding to strengthen the ROPS and corresponding strain energy absorption at the time of collision. The design of ROPS depends on the vehicle size, weight distribution, sub-system mounting, occupant's safety and ergonomics; followed by force analysis under specified crash conditions.
Analytical Investigation on External Beam-Column Joint Using ANSYS By Varying...IJERA Editor
The beam-column joint has been a topic of study for over 30 years now and still there are many things that yet to
be completely understood. The joint was considered to be rigid, however researches have shown that failure may
occur at the joint instead of the beam or column. This study was carried out to determine the effect of the
diameter of longitudinal reinforcement of the beam on the strength, deformation and ductility in the beamcolumn
joint using ANSYS. It was seen that the load carrying capacity and the deformation increases as the
diameter of reinforcement in the beam increases.
Profile modification of adhesively bonded cylindrical joint for maximum torqu...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Performance Optimization of Tie rod using FEAIJERD Editor
Structural performance of any mechanical component is measured basically in terms of its natural frequency, deformation, stiffness, maximum stress level, fatigue life etc. In case of vehicle suspension system; however tie rod is mainly under compressive and fluctuating forces encounter from steering and bumping of vehicle. When steering acts to turn the vehicle, tie rod comes under compressive load. And when vehicle running on rough road condition, fluctuating forces.
MECHANICAL BEHAVIOUR OF DAMAGED CENTRAL CORE STRAND CONSTITUTING A STEEL WIRE...IAEME Publication
The main objective of this study is to predict the evolution of damage of the central core (strand) that represent the heart of a wire rope, based on simple experimental tensile test conducted on virgin samples and others artificially damaged by breaking wires constituting the samples at different percentages. The experimental results obtained have allowed us to follow the evolution of the damage and quantify it. Thereafter, it was possible to identify three stages of damage. Therefore, be able to intervene in time for predictive maintenance. This study also includes a correlation between two methods of calculating the damage namely static damage and damage by unified theory and this by analogy to cyclical behavior. The comparison shows good agreement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Finite Element Modeling On Behaviour Of Reinforced Concrete Beam Column Joint...IJERA Editor
Recent earthquakes have demonstrated that most of the reinforced concrete structures were severely damaged during earthquakes and they need major repair works. Beam column joints, being the lateral and vertical load resisting members in reinforced concrete structures are particularly vulnerable to failures during earthquakes. The existing reinforced concrete beam column joints which are not designed as per code IS13920:1993 must be strengthened since they do not meet the ductility requirements. The Finite element method (FEM) has become a staple for predicting and simulating the physical behaviour of complex engineering systems. The commercial finite element analysis (FEA) programs have gained common acceptance among engineers in industry and researchers. The details of the finite element analysis of beam column joints retrofitted with carbon fibre reinforced polymer sheets (CFRP) carried out using the package ANSYS are presented in this paper. Three exterior reinforced concrete beam column joint specimens were modelled using ANSYS package. The first specimen is the control specimen. This had reinforcement as per code IS 456:2000. The second specimen which is also the control specimen. This had reinforcement as per code IS 13920:1993. The third specimen had reinforcement as per code IS 456:2000 and was retrofitted with carbon fibre reinforced polymer (CFRP) sheets. During the analysis both the ends of column were hinged. Static load was applied at the free end of the cantilever beam up to a controlled load. The performance of the retrofitted beam column joint was compared with the control specimens and the results are presented in this paper.
Experimental and Numerical Assessment of Crash Behavior of Welded Thin Wall R...IDES Editor
The crash behavior of Cold Rolled Mild Steel
(CRMS) closed form thin section produced by stitch welding
at periodic intervals of length was studied by conducting axial
compressive tests at loading velocities of 5 mm/min and 6000
mm/min. The deformation shape, peak forces and energy
absorption capacity of the sections estimated numerically
showed a good correlation with the experimental data.
Free vibrational analysis of curved beam with uniform rectangular cross sectioneSAT Journals
Abstract
Curved beams are plays an important role in different field like house roofing, bridges, cranes, automobiles chasses etc. The study
deals with the investigation of free vibrations of thick curved beams of SS316 and MS1018, both experimentally and using ANSYS.
The curved beams having different R/t ratio were fabricated by using mild steel material. Three different boundary conditions are
imposed for curved beams are as follows; free-free, clamped-free, clamped-clamped. For experimental investigation, magnetic
transducer and VIBXpert are used to conduct experiment on different curved beams. The present work also aims at developing a
numerical model for comparing ANSYS results with experimental results to analyze the frequencies and mode shapes
corresponding to three different boundary conditions. The curved beam were modelled, meshed and analyzed using ANSYS. The
first ten natural frequencies from finite element solutions are then compared with the experimental results. These effects also
become more significant for higher modes. It is also observed that the finite element solutions are closely in agreement with
experimental results.
Key words: Curved beams, Experimental investigation, Natural frequencies, modes
Fe investigation of semi circular curved beam subjected to out-of-plane loadeSAT Journals
Abstract Curved beams are used as machine or structural members in many applications. Based on application of load they can be classified into two categories. Curved beams subjected to In-Plane loads are more familiar and are used for crane hooks, C-clamps etc. The other categories of curved beams are the ones that are subjected to out-of-plane loads. They find applications in automobile universal joints, raider arms and many civil structures etc.The results of this research on semicircular curved beam subjected to out-of-plane loads have revealed some interesting results. For semicircular curved beams subjected to out-of-plane loads, it is shown that every section is subjected to a combination of transverse shear force, bending moment and twisting moment. By using ANSYS tool it is shown that Maximum principal stress occurs at section 120 degrees from the section containing the loading line. Moreover it is observed that fixed end of this curved beam is subjected to a state of pure shear. Key Words: Semi circular curved beam, Stress in curved beam, Out-of-plane load, FE analysis.
To Study Weld Strength and Strain Energy Absorption of Roll Over Protection S...IOSR Journals
The roll over protection structure, referred as ROPS is designed to protect the driver from the injuries caused by roll-overs. In addition to safety against roll-overs and collisions, it also acts as a single rugged base for mounting the sub-systems of the all terrain vehicle. This study will deals with edge preparation techniques employed prior to welding to strengthen the ROPS and corresponding strain energy absorption at the time of collision. The design of ROPS depends on the vehicle size, weight distribution, sub-system mounting, occupant's safety and ergonomics; followed by force analysis under specified crash conditions.
Analytical Investigation on External Beam-Column Joint Using ANSYS By Varying...IJERA Editor
The beam-column joint has been a topic of study for over 30 years now and still there are many things that yet to
be completely understood. The joint was considered to be rigid, however researches have shown that failure may
occur at the joint instead of the beam or column. This study was carried out to determine the effect of the
diameter of longitudinal reinforcement of the beam on the strength, deformation and ductility in the beamcolumn
joint using ANSYS. It was seen that the load carrying capacity and the deformation increases as the
diameter of reinforcement in the beam increases.
Profile modification of adhesively bonded cylindrical joint for maximum torqu...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Performance Optimization of Tie rod using FEAIJERD Editor
Structural performance of any mechanical component is measured basically in terms of its natural frequency, deformation, stiffness, maximum stress level, fatigue life etc. In case of vehicle suspension system; however tie rod is mainly under compressive and fluctuating forces encounter from steering and bumping of vehicle. When steering acts to turn the vehicle, tie rod comes under compressive load. And when vehicle running on rough road condition, fluctuating forces.
MECHANICAL BEHAVIOUR OF DAMAGED CENTRAL CORE STRAND CONSTITUTING A STEEL WIRE...IAEME Publication
The main objective of this study is to predict the evolution of damage of the central core (strand) that represent the heart of a wire rope, based on simple experimental tensile test conducted on virgin samples and others artificially damaged by breaking wires constituting the samples at different percentages. The experimental results obtained have allowed us to follow the evolution of the damage and quantify it. Thereafter, it was possible to identify three stages of damage. Therefore, be able to intervene in time for predictive maintenance. This study also includes a correlation between two methods of calculating the damage namely static damage and damage by unified theory and this by analogy to cyclical behavior. The comparison shows good agreement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Finite Element Modeling On Behaviour Of Reinforced Concrete Beam Column Joint...IJERA Editor
Recent earthquakes have demonstrated that most of the reinforced concrete structures were severely damaged during earthquakes and they need major repair works. Beam column joints, being the lateral and vertical load resisting members in reinforced concrete structures are particularly vulnerable to failures during earthquakes. The existing reinforced concrete beam column joints which are not designed as per code IS13920:1993 must be strengthened since they do not meet the ductility requirements. The Finite element method (FEM) has become a staple for predicting and simulating the physical behaviour of complex engineering systems. The commercial finite element analysis (FEA) programs have gained common acceptance among engineers in industry and researchers. The details of the finite element analysis of beam column joints retrofitted with carbon fibre reinforced polymer sheets (CFRP) carried out using the package ANSYS are presented in this paper. Three exterior reinforced concrete beam column joint specimens were modelled using ANSYS package. The first specimen is the control specimen. This had reinforcement as per code IS 456:2000. The second specimen which is also the control specimen. This had reinforcement as per code IS 13920:1993. The third specimen had reinforcement as per code IS 456:2000 and was retrofitted with carbon fibre reinforced polymer (CFRP) sheets. During the analysis both the ends of column were hinged. Static load was applied at the free end of the cantilever beam up to a controlled load. The performance of the retrofitted beam column joint was compared with the control specimens and the results are presented in this paper.
Finding the Stresses and Deflection of a Snag Crane Sun Spur Gear Using Fea P...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
SIMULATION AND ANALYSIS OF TRANSMISSION ERROR IN HELICAL NON CIRCULAR GEAR MO...IAEME Publication
Gears are one of the most critical components in mechanical power transmission systems.Transmission error is considered to be one of the main contributors to noise and vibration in a gear
set. Transmission error measurement has become popular as an area of research. To estimate transmission error in a gear system, the characteristics of involute gears were analyzed using ANSYS. The contact stresses were examined using 2-D FEM models. The bending stresses in the tooth root were examined using a 3-D FEM model.
PROBABILISTIC DESIGN AND RANDOM OPTIMIZATION OF HOLLOW RECTANGULAR COMPOSITE ...IAEME Publication
This study represents simulation of hollow rectangular composite beam by using Monte Carlo method i.e. direct sampling. A three dimensional transient analysis of large displacement type has been carried out. Finite element analysis of hollow rectangular composite structure has been
carried out and uncertainty in Bending Stress is analyzed. More over optimization of selected design variables has been carried out by using random optimization method. Bending Stress was objective function. Beam length, elastic modulus of epoxy graphite, ply angles of hollow rectangular composite section, radius and force are randomly varied within effective range and their effect on Bending Stress has been analyzed.
PROBABILISTIC DESIGN AND RANDOM OPTIMIZATION OF HOLLOW CIRCULAR COMPOSITE STR...IAEME Publication
This study represents simulation of hollow circular composite beam by using Monte Carlo method i.e. direct sampling. A three dimensional transient analysis of large displacement type has been carried out. Finite element analysis of hollow circular composite structure has been carried out and uncertainty in bending stress is analyzed. More over optimization of selected design variables has been carried out by using random optimization method.
Impact of Misalignments on Root Stresses of Hypoid Gear Setsijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analysis of Stress and Deflection of Spur Gear by Using New Analytical Method...ijtsrd
One of the most important measures of transmission performance is the gear tooth root stress TRS . High root stress can directly damage the gear tooth and indirectly affect the life of the gear. This paper considered reducing the stresses in the base of the change in the gear profile. Accurate calculation of the maximum tooth root stress TRS and deflection is fundamental to the prediction and optimization of gears. The Finite Element Method FEM gives accurate results. But, the calculation requires a lot of resources and time. Moreover, the results obtained from the Lewis, the ISO, and the AGMA methods were useful. This paper approved the results of the new method as useful as other methods. Therefore, in the current results, a new analytical method based on mechanic theory is created using exact profile equations to calculate stress and deflection. Firstly, the load sharing ratio is considered using the Taguchi method. Finally, tooth root stress and deflection are calculated from this profile. The result of tooth root stress obtained from the new method is compared with the FEM method. The result of the new method is found the consistent with FEM method. Khin Khin Thant | Than Than Htike "Analysis of Stress and Deflection of Spur Gear by Using New Analytical Method Based on Taguchi Method and Finite Element Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-6 , December 2023, URL: https://www.ijtsrd.com/papers/ijtsrd60165.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/60165/analysis-of-stress-and-deflection-of-spur-gear-by-using-new-analytical-method-based-on-taguchi-method-and-finite-element-analysis/khin-khin-thant
THE EFFECTS OF BOLT PRELOAD ON VIBRATION AMPLITUDE OF GANTRY CNC ROUTERIAEME Publication
The joint properties significant affect on the dynamic performance and spindle
vibration of gantry CNC router structure. This paper presents the relationship
between the vibration amplitude of the spindle nose of a gantry CNC router and a bolt
pre-tightening force. The dynamic model from machine structures with bolt joints was
developed to consider the impact of a bolt pre-tightening force to spindle vibration of
CNC router structures and dynamic behavior. Based on the dynamic model, harmonic
analysis is conducted to specify the spindle nose’s displacement corresponding to the
different bolt pre-tightening force. The FE analysis results indicate that bolt pretightening
forces have great influence on the spindle nose vibration amplitude and
when the pre-tightening force of bolt joints was increased, the dynamic stiffness of the
spindle also increases while the vibration amplitude decreases. The accuracy and
effectiveness of the model have also been confirmed by experimental results. The
achieved result will enhance the rigidity, improve the vibration resistance of the
machine structure to improve the reliability as well as machining precision, and attain
the best surface quality
Similar to Analysis of Crack Severity on Power Density Increment of Gears (20)
Power System State Estimation - A ReviewIDES Editor
The aim of this article is to provide a comprehensive
survey on power system state estimation techniques. The
algorithms used for finding the system states under both static
and dynamic state estimations are discussed in brief. The
authors are opinion that the scope of pursuing research in the
area of state estimation with PMU and SCADA measurements
is the state of the art and timely.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
Reactive Power Planning is a major concern in the
operation and control of power systems This paper compares
the effectiveness of Evolutionary Programming (EP) and
New Improved Differential Evolution (NIMDE) to solve
Reactive Power Planning (RPP) problem incorporating
FACTS Controllers like Static VAR Compensator (SVC),
Thyristor Controlled Series Capacitor (TCSC) and Unified
power flow controller (UPFC) considering voltage stability.
With help of Fast Voltage Stability Index (FVSI), the critical
lines and buses are identified to install the FACTS controllers.
The optimal settings of the control variables of the generator
voltages,transformer tap settings and allocation and parameter
settings of the SVC,TCSC,UPFC are considered for reactive
power planning. The test and Validation of the proposed
algorithm are conducted on IEEE 30–bus system and 72-bus
Indian system.Simulation results shows that the UPFC gives
better results than SVC and TCSC and the FACTS controllers
reduce the system losses.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.