call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses a study that uses the ke-REM (ke-Rule Extraction Method) classifier to predict promoter regions in DNA sequences. The study evaluates the performance of ke-REM compared to existing promoter prediction techniques. ke-REM constructs rules based on attribute-value pairs from a dataset of 106 E. coli DNA sequences, each containing 57 nucleotides. The results show that ke-REM competes well with existing methods for identifying promoter regions in DNA.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses the emerging health threats posed by electronic waste (e-waste). It begins by defining e-waste and noting that it makes up 2.7-3% of total waste but contains many toxic and hazardous elements. The main constituents of e-waste are discussed, including heavy metals like lead, mercury, and cadmium which can cause health effects when exposed. India's annual e-waste generation is estimated at 400,000 tons and is growing rapidly. While formal recycling systems exist, most e-waste in developing countries is handled by the informal sector without proper health and safety practices, exposing workers and local communities to the toxic materials. Proper regulations and disposal facilities are needed to address this important environmental and public
This document summarizes an academic paper presented at the International Conference on Emerging Trends in Engineering and Management in 2014. The paper proposes a design and implementation of an elliptic curve scalar multiplier on a field programmable gate array (FPGA) using the Karatsuba algorithm. It aims to reduce hardware complexity by using a polynomial basis representation of finite fields and projective coordinate representation of elliptic curves. Key mathematical concepts like finite fields, point addition, and point doubling that are important to elliptic curve cryptography are also discussed at a high level.
1. The document describes a five-level cascaded H-bridge inverter used as a distribution static compensator (DSTATCOM) to compensate for reactive power and harmonics in a power system.
2. A DSTATCOM is connected in shunt with the distribution system and uses a voltage source converter to generate a set of three-phase output voltages that can be adjusted to control the exchange of active and reactive power with the system.
3. The five-level cascaded H-bridge inverter topology reduces device voltage stress and output harmonics. Level shifted pulse width modulation and phase shifted pulse width modulation techniques are investigated for controlling the DSTATCOM.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses a study that uses the ke-REM (ke-Rule Extraction Method) classifier to predict promoter regions in DNA sequences. The study evaluates the performance of ke-REM compared to existing promoter prediction techniques. ke-REM constructs rules based on attribute-value pairs from a dataset of 106 E. coli DNA sequences, each containing 57 nucleotides. The results show that ke-REM competes well with existing methods for identifying promoter regions in DNA.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses the emerging health threats posed by electronic waste (e-waste). It begins by defining e-waste and noting that it makes up 2.7-3% of total waste but contains many toxic and hazardous elements. The main constituents of e-waste are discussed, including heavy metals like lead, mercury, and cadmium which can cause health effects when exposed. India's annual e-waste generation is estimated at 400,000 tons and is growing rapidly. While formal recycling systems exist, most e-waste in developing countries is handled by the informal sector without proper health and safety practices, exposing workers and local communities to the toxic materials. Proper regulations and disposal facilities are needed to address this important environmental and public
This document summarizes an academic paper presented at the International Conference on Emerging Trends in Engineering and Management in 2014. The paper proposes a design and implementation of an elliptic curve scalar multiplier on a field programmable gate array (FPGA) using the Karatsuba algorithm. It aims to reduce hardware complexity by using a polynomial basis representation of finite fields and projective coordinate representation of elliptic curves. Key mathematical concepts like finite fields, point addition, and point doubling that are important to elliptic curve cryptography are also discussed at a high level.
1. The document describes a five-level cascaded H-bridge inverter used as a distribution static compensator (DSTATCOM) to compensate for reactive power and harmonics in a power system.
2. A DSTATCOM is connected in shunt with the distribution system and uses a voltage source converter to generate a set of three-phase output voltages that can be adjusted to control the exchange of active and reactive power with the system.
3. The five-level cascaded H-bridge inverter topology reduces device voltage stress and output harmonics. Level shifted pulse width modulation and phase shifted pulse width modulation techniques are investigated for controlling the DSTATCOM.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Flow meter to gateway radio to various rtuAsif Sheriff
The document describes a flow totalizer system that polls flow measurement devices using Modbus RTU communication. The flow totalizer system includes a base unit that connects to a turbine flow meter, Allen-Bradley PLC, Emerson thermo unit, and ABB devices using a generic connector and collects flow data from each device using Modbus polling.
2016-01-21 Boiler Water Treatment Automation Project As-builtsAndrew Snider
This document describes the control logic for a boiler water treatment system. It contains information on blowdown control, chemical pump control, and the sequence of operations. For each boiler, blowdown time is calculated based on feedwater pump run time and a user adjustable multiplier. Chemical pump run time is also calculated based on feedwater pump time and a user adjustable multiplier. The system uses a timer to divide the day into sampling intervals, during which boiler parameters are monitored and chemical treatments are administered.
IRJET- CFD Flow Analysis of Station PipelineIRJET Journal
This document summarizes a study analyzing the pressure, temperature, and velocity profiles within a station pipeline carrying fuel from booster pumps to a sample point, using computational fluid dynamics (CFD). Three cases were analyzed representing different operating conditions of the booster pumps. The CFD model was developed in ANSYS and divided into two parts due to software limitations. Results showed the pathlines for pressure, temperature, and velocity within the pipeline for each case. Overall, the study used CFD to better understand fuel flow characteristics within the station pipeline under various pump operating scenarios.
The document describes several applications of voltage-to-frequency and frequency-to-voltage converters including: ratiometric measurement using two V/F converters, RPM/speed indication using an F/V converter, motor speed control using feedback from an F/V converter, proportional flow control using an F/V converter, temperature measurement using a V/F converter, analog to digital conversion with a microcontroller using a V/F converter, a 13-bit analog to digital converter using a V/F converter and counter, a 4-digit voltmeter with optoisolated input using a V/F converter and frequency counter, and a long-term integrator with infinite hold using a digital counter.
The document summarizes the major systems and components of a boiling water reactor (BWR) plant. It describes the reactor vessel internals that produce steam from heating water, the moisture separators and dryers, main turbine system that converts steam to electricity, and emergency core cooling systems. The BWR uses circulating water to transfer heat from the reactor core to power the main turbine, and has safety systems to inject water into the reactor vessel in the event of a loss of coolant accident.
The document summarizes the major systems and components of a boiling water reactor (BWR) power plant. It describes the reactor vessel internals that house and cool the reactor core, produce steam to drive the turbine, and provide emergency core cooling. It also discusses the turbine generator, condenser, and other systems that complete the steam cycle to produce electricity and return water to the reactor vessel. Additionally, it outlines several emergency core cooling systems that provide backup cooling in the event of a loss of coolant accident.
The document is a submittal data sheet for a Solar Pumping Station (SPS-PC) that provides all the necessary components for a closed loop solar water heating system in a single pre-insulated and pre-plumbed module. It features a variable speed circulator to optimize flow and maximize energy gain from the solar collectors. The SPS-PC simplifies installation with just a few connections and includes a variable speed solar differential control, temperature gauges, valves, and other safety equipment to monitor and control the solar system. Specifications are provided for the materials, maximum temperatures, pressure ratings, and dimensions.
The document is a submittal data sheet for a Solar Pumping Station (SPS-PC) that provides an all-in-one pre-insulated and pre-plumbed module for solar water heating installations. It features a variable speed circulator to optimize flow and energy gain from solar collectors. The SPS-PC includes valves, gauges, and a variable speed solar differential control to simplify installation. Specifications include a maximum working temperature of 250°F, a pressure relief setting of 87 PSI, and flow meter and connections for easy integration.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
More Related Content
Similar to Welcome to International Journal of Engineering Research and Development (IJERD)
Flow meter to gateway radio to various rtuAsif Sheriff
The document describes a flow totalizer system that polls flow measurement devices using Modbus RTU communication. The flow totalizer system includes a base unit that connects to a turbine flow meter, Allen-Bradley PLC, Emerson thermo unit, and ABB devices using a generic connector and collects flow data from each device using Modbus polling.
2016-01-21 Boiler Water Treatment Automation Project As-builtsAndrew Snider
This document describes the control logic for a boiler water treatment system. It contains information on blowdown control, chemical pump control, and the sequence of operations. For each boiler, blowdown time is calculated based on feedwater pump run time and a user adjustable multiplier. Chemical pump run time is also calculated based on feedwater pump time and a user adjustable multiplier. The system uses a timer to divide the day into sampling intervals, during which boiler parameters are monitored and chemical treatments are administered.
IRJET- CFD Flow Analysis of Station PipelineIRJET Journal
This document summarizes a study analyzing the pressure, temperature, and velocity profiles within a station pipeline carrying fuel from booster pumps to a sample point, using computational fluid dynamics (CFD). Three cases were analyzed representing different operating conditions of the booster pumps. The CFD model was developed in ANSYS and divided into two parts due to software limitations. Results showed the pathlines for pressure, temperature, and velocity within the pipeline for each case. Overall, the study used CFD to better understand fuel flow characteristics within the station pipeline under various pump operating scenarios.
The document describes several applications of voltage-to-frequency and frequency-to-voltage converters including: ratiometric measurement using two V/F converters, RPM/speed indication using an F/V converter, motor speed control using feedback from an F/V converter, proportional flow control using an F/V converter, temperature measurement using a V/F converter, analog to digital conversion with a microcontroller using a V/F converter, a 13-bit analog to digital converter using a V/F converter and counter, a 4-digit voltmeter with optoisolated input using a V/F converter and frequency counter, and a long-term integrator with infinite hold using a digital counter.
The document summarizes the major systems and components of a boiling water reactor (BWR) plant. It describes the reactor vessel internals that produce steam from heating water, the moisture separators and dryers, main turbine system that converts steam to electricity, and emergency core cooling systems. The BWR uses circulating water to transfer heat from the reactor core to power the main turbine, and has safety systems to inject water into the reactor vessel in the event of a loss of coolant accident.
The document summarizes the major systems and components of a boiling water reactor (BWR) power plant. It describes the reactor vessel internals that house and cool the reactor core, produce steam to drive the turbine, and provide emergency core cooling. It also discusses the turbine generator, condenser, and other systems that complete the steam cycle to produce electricity and return water to the reactor vessel. Additionally, it outlines several emergency core cooling systems that provide backup cooling in the event of a loss of coolant accident.
The document is a submittal data sheet for a Solar Pumping Station (SPS-PC) that provides all the necessary components for a closed loop solar water heating system in a single pre-insulated and pre-plumbed module. It features a variable speed circulator to optimize flow and maximize energy gain from the solar collectors. The SPS-PC simplifies installation with just a few connections and includes a variable speed solar differential control, temperature gauges, valves, and other safety equipment to monitor and control the solar system. Specifications are provided for the materials, maximum temperatures, pressure ratings, and dimensions.
The document is a submittal data sheet for a Solar Pumping Station (SPS-PC) that provides an all-in-one pre-insulated and pre-plumbed module for solar water heating installations. It features a variable speed circulator to optimize flow and energy gain from solar collectors. The SPS-PC includes valves, gauges, and a variable speed solar differential control to simplify installation. Specifications include a maximum working temperature of 250°F, a pressure relief setting of 87 PSI, and flow meter and connections for easy integration.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Welcome to International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 5, Issue 11 (February 2013), PP. 09-15
Management of Maintenance by Vibratory Analysis
Illustration in the Case of a Coolant Pump
Bensaci M1, Chaib R2, Benretem A3, Verzea I4
1
Université 20 Août 1955, Skikda, 2Université Constantine1.
3
Université Badji Mokhtar, Annaba, 4Technical University Gh. Asachi Iasi, Romania
Summary:- With the opening of the markets, today, the problems of the company are to be
competitive under the best conditions of production, quality, cost and the shortest times to satisfy its
customers. Unfortunately, the industrial plants are disturbed by dysfunctions, which affect quoted
conditions. A fact the unavailability of the machines comes to cut down the output heavily and thus to
increase the cost price. It is one of the major plagues of industry. Our objective is to guarantee the
availability of the machines, stake major of the production, by decreasing to the maximum the
expenditure related to the purchases and operations of maintenance, while setting up an effective
system of management of maintenance, using the vibratory signal. The use of the methods of signal
processing emitted by the bodies of the machines, enable us to extract from information on the
operating condition of these machines, and thus to envisage the early appearance of the dysfunctions,
even an intervention advisedly, while following the evolution in the time of the symptoms of drift of
state of the equipment: A better targeted maintenance, it is less unavailability; a controlled
maintenance, they is less expenditure.
Key words: Availability, analyzes spectral, level total, conditional maintenance, precocity, failure.
I. INTRODUCTION
The costs of maintenance in a power station represent a particularly significant share of the life cycle
cost. In addition, the optimization of these costs is a major stake in this competing and strategic sector of all the
industrial sectors. The production of electricity represents the part upstream of this industry and with the
opposite, the part downstream that is unavailability. Currently, of the methods and the means of maintenance are
thus developed, to allow to evaluate and to reduce these costs [ 1 ] and thus to increase the availability of
stations major stake the generating of the production, relatively much higher than the direct cost of maintenance.
However as maintenance influences the two factors: a better targeted maintenance, it is less unavailability; a
better controlled maintenance, they is less expenditure [2].
Until a recent date, the maintenance of the machines and the replacement of the parts subjected to wear
could be considered in two manners: waiting of breakage (curative maintenance) or the replacement with regular
intervals (systematic maintenance) [3, 4, 5].Waiting of breakage is not economic any more and the systematic
interventions are often useless, expensive in spare parts, labour and loss of production, without also counting
that a lack of spare parts at one critical time can induce direct and indirect expenses significant. During
disassembling and start-ups and the inevitable human errors (estimated of 10-15 %), these interventions can
harm reliability [3, 6].From now on, the monitoring and the diagnosis of the mechanical systems became one of
the concerns major of the industrialists.
Among the various methods of diagnosis used, the vibratory analysis is most used in conditional
maintenance, because of the increasing performances of the treatment of the signal. Those allow today, to
improve the availability and the safety by early detection and the follow-up of degradation of the critical
elements [7]: The vibratory signal is the identity of the machine [8]; it contains its kinematics signature, related
to the operating conditions. This makes it possible to guarantee the availability of the machine, by decreasing to
the maximum the expenditure related to the purchases and operations of maintenance.
This is why; this article aims at the detection and the diagnosis of the dysfunctions of the complex vital
machines, such as the coolant pump in a power station. An intervention advisedly, while following the evolution
in the time of the symptoms of drift of state of the equipment, is then possible: to make selective maintenance.
Technical 2-characteristics of the power station:
Fuel : the fuel used for the boilers is the natural gas of flow necessary to ensure the full load of the two
groups 160.000 Nm3/h.
9
2. Management of Maintenance by Vibratory Analysis Illustration in the Case of a Coolant Pump
Vapor generator (boiler): has as a role to transform water into vapor with high pressure to feed it
(AWG).
Harness (KWU/RFA): the turbine transforms the thermal energy contained in the vapor coming from
the boiler into a rotational movement of the tree, mechanical work obtained is used to actuate the alternator.
Water of refrigeration : the hydrant located at sea at 900 m of the station of pumping and filtration.
After crossing of the condenser, the water of refrigeration is rejected towards the channel, which ends in the sea.
The station of water : is the whole of the equipment which preheats water and transfers it from the
condenser to the boiler while passing by the food cover.
Alternator : transform the mechanical energy into electric power.
Auxiliaries common to both sections :
- a station of production of hydrogen;
- a gas pressure regulator station;
- a station of discharge and transfers fuel;
Station of demineralization : it completes the treatment of water before its use in the cycle water vapor.
Station electrochloration: the chlorination of sea water makes it possible to protect the circuit from
water against any clogging.
Evacuation of energy : the produced electric power is evacuated via lines of 225 Kv.
2.1-order and control:
The power station is characterized by a high degree of automation and centralization of the orders, figure1. One
counts forty closed loops by group of production, which allows an automatic piloting of the group.
Analysis and alarm, monitoring systems :
- to allow a good control of the group of production of the operating parameters (temperature, pressure, level of
water, vibrations.), various equipment of the group, is indicated, recorded permanently in control room and is
announced in the event of going beyond of threshold.
- For a better analysis in the event of incident a consignor of state is installed. He makes it possible to record
alarms in a chronological order.
2.2-room of centralized order
Each pair of sections is monitored and regulated since a control room. The control room includes/understands
for each section:
- Two (02) desks of conduits,
- Two (02) vertical tables where are resembled the control units and the apparatuses of recording of most
of the parameters.
- One (01) synoptic table schematizing the electric auxiliaries.
SCHEMA SYNOPTIQUE D’UNE TRANCHE
Cheminé THERMIQUE
Tube Ballon
support
Resurchauffeur Alternateur
Economiseur s Vapeur RA
BP
MP
Resur 1
HP
Surchauffeurs
Surch 1
By pass BP
Vapeur RB
Resur. 2
TS
Surch. 3 Eau de mer
TP
Vapeur RC
Surch. 2
By pass HP
Combustible
Condenseur
Réchauffeurs
Réfrigérant
Rotatif
D’air
Réchauffeurs HP D’été
5 et 6 Dégazeur
S4
O Eau RM
Ventilateur Colonne Bâche
de recyclage Ecrans d’alimentation alimentaire
Vapeur RQ vaporisateurs
Réchauffeurs BP
Pompes Eau RL Pompes
alimentaires d’extraction
Préchauffeur Ventilateur
d’air à vapeur O de soufflage
Figure 1: Synoptic diagram of a thermal section
10
3. Management of Maintenance by Vibratory Analysis Illustration in the Case of a Coolant Pump
II. DESCRIPTION OF THE MONITORING SYSTEM
In order to optimize the programmed actions of maintenance, while taking account of the reliability, we
called upon maintenance based on reliability (MBF) [9, 10]. Among the constituent links the technological
chain, since the extraction of sea water until the production of electricity while passing by the various operations
and technological processes, and being given the evolution of the relations of cause for purpose binding the
variables of the technological chain, a detailed attention is given to the coolant pump, strategic equipment in the
production process of electricity.
In order to know the state of ` santé' pump, a system monitoring was adopted, using the software of
analysis VIBROEXPERT Cm-400.This software is conceived to treat the data of vibrations, collected on the
revolving machines and allows the comparison of the spectra as well as a better visualization of the dynamic
signals. The preventive one applied to the coolant pump consists to supervise and analyze continuously the
operating condition like its evolution in time and to decide the maintenance actions necessary.
The function ` santé' of a revolving machine is based on the installation of one or several indicators
with preset thresholds not to exceed, indicators calculated starting from the vibratory signals of the supervised
parts. Each going beyond generates an alarm whose analysis will start maintenance actions (figure2), [5]. More
precisely, the calculated indicators are defined to be sensitive to the early detection of the defects on the
revolving parts. The vibrations emitted by these machines or certain bodies of these machines in their spectral or
temporal forms, make it possible to extract from information making it possible to envisage the early detection
of faulty operations, even the intervention necessary.
III. CHARACTERISTIC OF THE COOLANT PUMP
Technical 3.1-characteristics of the machine
- Driving drive has:
- Power:6kw
- Number of revolutions:1484 tr/min
- Stages engine:02 bearings
- Bearing with dimensions of coupling: 6322C
- Frequencies characteristic of the bearing: 123Hz, 76Hz, 100Hz and 9, 55 HZ
- Bearing with dimensions opposed of coupling:N321
- Frequencies characteristic of the bearing:192Hz, 132Hz, 132Hz and 10,3HZ.
B Pump cooling NORIA 11:
- Frequency of passage of the blades: 175 Hz
- Values limit according to Normes 2, 5 mm/s
- Values limit according to Normes 2, 5 mm/s
- Values limit according to Normes 2, 5 mm/s
Figure 3 : Pump cooling NORIA 11
11
4. Management of Maintenance by Vibratory Analysis Illustration in the Case of a Coolant Pump
3.2 - The raised spectral ones of the defect
Measurements were taken on a coolant pump coupled with an engine of drive.
- The points of measurement are:PM1, PM2, PM3 and PM4 (see figure 4)
- Date of catch of measurement: from the 21/01/03 to the 18/01/05
- Number of revolutions 1490 tr/min (25 Hz);
- The directions of measurement are horizontal and vertical.
- Measurement is in Acceleration geff by means of an accelerometer.
IV. ANALYZE TENDENCIES
The determination of the thresholds of intervention is certainly one of the operations most delicate and
most significant for a good tracking. These preset thresholds can be fixed while being based on standards,
statistics or histories of machines or by time still, according to the experiment of the manufacturer. The going
beyond of threshold results practising a more complex analysis and in using the tools for diagnosis. It should be
noticed that the choice of the threshold is fundamental (frequent and unjustified alarms or the breakdown can
occur without preliminary alarm).
Diagrams of the figures (5.1), (5.2), (5.3), (5.4), (5.5), (5.6), (5.7), and (5.8) show 1' interest of the data
storage and their representation in the form of diagram of evolution. The layout of the curve of tendency gives 1'
evolution in the time of an indicator (total level acceleration, speed, displacement), which can bring invaluable
elements to confirm or cancel assumptions on the nature of the defect. The diagrams as of the these figures
concerning the evolution of the spectral indicator (total level acceleration) measured on stages 1, 2, 3 and 4
according to the corresponding direction, are respectively:
The figure (5.1) represents the evolution of the tendency as in point 1 in the horizontal direction for the date of
the 12/10/03 and raises a brutal increase of the total level acceleration, which reaches the value 5,128 geff,
exceeding the threshold of danger.
12
5. Management of Maintenance by Vibratory Analysis Illustration in the Case of a Coolant Pump
The diagram of figure 5.2 represents the evolution of the tendency as in point 1 in the vertical direction
for the same date, a significant increase in the total level acceleration, which reaches the value 4,409 geff,
exceeding the alarm.
threshold. For the point of measurement PM2, according to the two directions (Horizontal and Vertical), one
also notices that there is a significant increase for the two tendencies (Figures 5.3, 5.4), for values of 3,376 geff
and 3,814 geff exceed the threshold of alert.
D' after the results of the points of 1H measurements, 1V and 2H, 2V, one notices goings beyond of
alarm threshold of the total level which is respectively 5,128 geff, 4,409 geff, 3.376 geff and 3,814 geff. That
13
6. Management of Maintenance by Vibratory Analysis Illustration in the Case of a Coolant Pump
resulted in a going beyond of the threshold of judgement suggested by the in-house standards (the threshold of
alarm is of 2, 5 geff and the alarm threshold is of 4, 5 geff), even a problem to be identified.
To identify the type of defect and as the analysis total level does not make it possible to qualify the defect,
therefore it became necessary to pass to the spectral analysis (figure 5.5, 5.6, 5.7 and 5.8) in order to make a
diagnosis and to identify the defect. These figures illustrate well the spectra of the defect on the level of stages 1
and 2 of the pump.
14
7. Management of Maintenance by Vibratory Analysis Illustration in the Case of a Coolant Pump
4. Report: The spectral analysis forms BCUeff of it, enables us to make the following observations. One notices
in the spectra of the figures (5.5, 5.6, 5.7 and 5.8) that there is an anomaly translated by an increase in amplitude
of the fundamental frequency, which is 120 Hz like its harmonics. This last component corresponds to the
frequency of the internal ring of the bearing 6313 N which is closer to value 123 Hz (frequency characteristic of
the bearing) with an amplitude of 3,745 BCUeff, 1,9 BCUeff, 2,924 BCUeff, and 0,982 BCUeff. The alarm
threshold is 2, 5 BCUeff.The spectral analysis confirms the defect: is a defect of bearing of the internal ring.
V. CONCLUSION
The change of the bearing of the pump, after the defect announced on 12/10/03, stabilized the shape of
the curve of tendency of point PM1 (figures 5.1) and of point PM2.From this period, experimental
measurements and the comparison between the peaks of the spectra and the alarm thresholds total level
acceleration (figures 5.2, and 5.3), did not express any value of amplitude exceeding the threshold values. The
examination of all these figures shows the essential role that the treatment of the signal in the identification of
the defect plays.
This example illustrates the fact well that 1' analyzes spectral is a reliable technique of investigation
which requires on behalf of the operator a knowledge of the precise kinematics of the machine and vibratory
images of the defects suitable for affect the machine and consequently to make selective maintenance, to see
targeting the defective component. A better targeted maintenance, it is less unavailability; a better controlled
maintenance, they are less expenditure.
BIBLIOGRAPHIES
[1]. R. Chaib, A. Benretem, S. Teyar and I Verzea, Management of maintenance by vibratory analysis box:
has planetary reducer, World Journal of Engineering.Vol.4, N.1 (2007), pp 22-27.Sun Publishing Light,
Canada. ISSN: 1708-5284.
[2]. A. Despujols, Method of optimization of the strategies of maintenance, Technique of the engineer, MT
9 050, 2005.
[3]. A.Tomache, Communication EMS-ERCE, Symposium on the plant maintenance, Aeid-iap.Algiers, 21-
23, January 2001.
[4]. S.Elfezazi et al..Towards a tool, based on the functional analysis, for the placement of the indicators of
measurement of performance of the function maintenance.French review of industrial
management.Vol.22, N3/2003.
[5]. R. Chaïb, M. Benidir, N Boulkroune and I.Verzea, To determine the priority of the actions of
maintenance, Formalization of a method of hierarchisation of the actions realized starting from the
analysis of the dysfunctions of the belt conveyors of 4 cement factories, 18th Forum (inter)national of
maintenance 2006, Exhibition site, Paris, November 7-8 and 9.
[6]. A.Boulonger, C. Pachaud, vibratory Diagnosis in preventive maintenance, Dunod, Paris 1988.
[7]. Mr. Bensaci, vibratory analysis, invaluable tool for the detection of the defects of bearing, thesis of
magister of the university August 20, 1955, Skikda 2007.
[8]. M.Glade, I.Yves longère, P.Lyonnet, Impact of the use of a system monitoring of the failures on the
costs of exploitation and maintenance of mechanics of helicopter. French review of industrial
management. N Special Maintenance, Mars2003.
[9]. I.Versea, M.Cabriel, D.Richet, total MBF, a strategic stage towards the TPM, French Review of
industrial management, flight 18, N2, Paris 1999.
[10]. J.P.Mouse, methods and tools of maintenance, to make reliable at lower cost, N519 maintenance, April
1999.
15