Sei sulla pagina 1di 195

NCRASEM 13 Paper ID:CSE01

SELECTION OF JUDGE USING


DISRIBUTED COURT SYSTEM FOR
INTRUSION DETECTION IN
MANETS
Dr. N. Kamaraj
Professor and Head
Department of EEE
Thiagarajar College of Engineering
Madurai

T. Manikandan
Assistant Professor
Department of CSE
Thiagarajar College of Engineering
Madurai

D. Srinivasarao
PG Student
Department of CSE
Thiagarajar College of Engineering
Madurai

Abstract: Mobile adhoc networks (MANTEs) are susceptible to a variety of attacks that threaten operation and
provided services. The traditional way of protecting networks with firewalls, encryption and authentication are not
sufficient and effective. Intrusion detection systems serving as a second line defense, it works as a court in real life to
find investigate and taking appropriate countermeasures for the malicious behavior nodes in the network. In this
paper we represent a selection of judge for the court, which works as the central authority to make final decision
through the information collected. To improve the detection accuracy we aims to select high energy, stable and high
reputation node as the judge for the court.
Keywords: mobile adhoc networks, intrusion detection system

I. INTRODUCTION
Mobile Adhoc Networks characteristics includes Dynamic topology, mobility, no centralized infrastructure
and robustness to single point failure. Each device in a MANET is free to move independently in any direction.
The characteristics of MANETs, including autonomy without infrastructure support and robustness to single
point failure, lend themselves to simple and quick deployment in various scenarios, like disaster relief, battle
field, and unknown space exploration. With the growing popularity of MANETs, the Security problems have
also gained great attention. It has been realized that standard defensive mechanisms, such as encryption and
authentication, are inadequate to address security problems, especially attacks from insiders. Intrusion Detection
System (IDS), serving as the second line of defence, has become an indispensable and complementary part in
securing MANETS. Kannhavong et al., 2008; Huang and Lee, 2003; Awerbuch et al., 2008; Zhang et al., 2003;
Sun et al.,; Yang et al., 2006) that have been proposed for tackling network-layer threats, our work intends to
establish a complete system to solve some key requirements of IDS using a novel and light-weight architecture.
An effective way to identify when an attack occurs in a MANET is the deploymentof an Intrusion Detection
System (IDS). The IDS is a sensoring mechanism that monitors network activity in order to detect malicious
actions and, ultimately, an intruder. Upon detecting an intruder, the IDS takes an appropriate action ranging
from a mere user notification to a more comprehensive defensive action against the intruder.
The existing IDS architectures for MANETs fall under three basic categories [13]: (a) stand-alone, (b)
cooperative, and (c) hierarchical. The stand-alone architectures use an intrusion detection engine installed at
each node utilizing only the nodes local audit data [14]. However, the fact that these solutions are relying only
on local audit data to resolve malicious behaviors limits them in terms of detection accuracy and the type of
attacks that they detect (due to the distributed nature of MANETs). On the other hand, the cooperative and
hierarchical architectures [13] process each hosts audit data locally (i.e., similarly to stand-alone), but they also

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 1
NCRASEM 13 Paper ID:CSE01

use collaborative techniques to detect more accurately a wider set of attacks. Thus, the majority of the most
recent IDSs for MANETs is based on them. More specifically, the cooperative architectures include an intrusion
detection engine installed in every node, which monitors local audit data and exchanges audit data and/or
detection outcomes with neighboring nodes in order to resolve inconclusive (based on single nodes audit data)
detections. The hierarchical architectures amount to a multilayer approach, by dividing the network into clusters.
Specific nodes are selected (based on specific criteria) to act as cluster-heads and undertake various
responsibilities and roles in intrusion detection that are usually different from those of the simple cluster
members. The latter typically run a lightweight local intrusion detection engine that performs detection only on
local audit data, while the cluster-heads run a more comprehensive engine that acts as a second layer of
detection based on audit data from all the cluster members.
In this paper we present a hierarchical IDS architecture, Distributed Court System (DCS), it solves the
challenges described above. It works like a court in real life. Every citizen has the right to bring before a court
his accusation against someone who is suspected of illegal behavior (we call such citizen an accuser). Similarly,
those accused of a crime, or defendant, has the right to present a defence, which can also be assisted by witness,
if any. The judge has the authority to make the final decision through examining the information or evidence
collected.
The main contribution of this paper are as follows
Selecting the judge for the distributed court system. It will work as centralized recourse for dispute resolution.
Proposing a localized detection mechanism for detecting the false routing updates.Proposing a cooperative
investigation to reduce the false positives. The rest of the paper is explained as follows. Section2 briefly
explains the optimized link state routing protocol and the security threats it faces. The overview of DCS
architecture and its operating modules is presented in Section 2.

II. OLSR PROTOCOL AND SECURITY THREATS


In this section, we briefly discuss about the Optimized Link State Routing Protocol (OLSR) (Clausen and
Jacquet, 2003), and some security threats faced by it.
A Description of OLSR
The Optimized Link State Routing (OLSR) protocol is a proactive routing protocol designed for mobile adhoc
networks. It employs periodic exchange of link state information to maintain topology information of the
network at each node. Based on topology information, each node is able to calculate the optimal route to a
destination. In OLSR, routes are immediately available when needed .The key concept of the protocol is the use
of "multipoint relays"(MPR).Each node selects a set of its 1-hop neighbor nodes as MPR. Only nodes, selected
as such MPRs, are responsible for generating and forwarding topology information, intended for diffusion into
the entire network. MPRs provide an efficient mechanism for flooding topology information by reducing the
number of transmissions required. The protocol is best suitable for large and dense network as the technique of
MPRs work well in this context. The fig1. shows how flooding topology information is going on in OLSR
protocol
In OLSR, two types of control message are used, namely, HELLO message and Topology Control (TC) message.
HELLO message
HELLO messages are used for neighbor sensing and MPR selection. Each node broadcasts a HELLO message
periodically. The HELLO messages are broadcasted within only one hop and are not forwarded further. A
node's HELLO message contains its own address, a list of its 1-hop neighbors and a list of its MPR set.
Therefore ,by exchanging HELLO messages, each node is able to obtain the information about its 1-hop and 2-
hop neighbors and can find out which node has chosen it as an MPR.
TC message
TC messages are used for topology diffusion and it is the message that is used for calculating routing table.
Each node which is selected as an MPR node periodically generate TC message to containing its MPR
selector(nodes who has selected this node as MPR)list and only its MPR nodes are allowed to forward TC
messages. Upon receiving TC messages from all MPR nodes in the network, each node learn all node's MPR set
and hence obtains knowledge of the whole network topology .Based on these topology, nodes are able to calculate
routing table.
MPR Selection
Each node independently selects a subset of its 1-hop neighbors as an MPR set. This subset is selected such that it covers
the nodes all 2-hop neighbors in term of radio range. In case there is multiple choice the minimum subset is selected
as an MPR set

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 2
NCRASEM 13 Paper ID:CSE01

Figure 1. Methodology of OLSR

III. SYSTEM ANALYSIS AND DESIGN


In this part, we illustrate the design of Intrusion detection system in details. The outline of system architecture
is presented in Section3.1. In section 3.2 we describe initiating the network functions to emulate the court in real
life, for this we need to cluster the network, then each cluster works as court and we select one node as a cluster
head which will work as a judge for the court In Section3.2, we describe a localized detection method in which
judge node detects anomalies in a distributed and localized manner. Upon detection of any anomaly, it will send
accusation message towards the neighbours of the suspicious node. How to deal with the false accusations from
malicious nodes or unnecessary accusations from good nodes are described in Section3.3. After the nodes
neighbouring the suspicious one receive the accusation, they would cooperatively investigate its validity quickly
and efficiently, which is explained in Section3.4. The actions taken after the suspicious node is confirmed are
stated in Section3.5.
A overview of system design
Fig 4. Shows how the system works, it has following modules, which are
Judge selection : selecting judge for the court, it will work as a centralized authority for the court.
Detection : detecting the anomalies based on the routing updates of the neighbor of malicious node.
Accusation: judge node can make accusation of misbehaviors detected by the neighbours of the suspicious
node. Investigation: after accepting an accusation, the group of neighbours cooperatively investigate the
truth.
Action: when investigation and defence are complete, the nodes involved in the investigation take a series of
actions against the accused node who has been proven to misbehave
B Selecting the judge for the court
We adopt a secure cluster based court formation method, in which network is divided into clusters, each
cluster form as a court with cluster head in it as a judge. The judge has the authority to make the final decision
through examining the information or evidence collected. Judges are re-selected every time the cluster structure
changes. Security is taken into consideration during the judge election process, in which judge in each
neighborhood should be elected by all the nodes in it to prevent a single node from controlling the entire election
process.
Judge metric components
To decide how much a node is suited for being a judge to offer security services, we take into consideration
the following characteristics:
The node remaining energy (E): We should elect nodes with high remaining battery
power as judge since they will offer security services to ordinary nodes. E can be easily
retrieved from the node at any time.
The Reputation of node: Judges (Cluster heads) will ensure security services. Thus,
we should elect trustworthy nodes as judges. Nodes with a highest reputation level will be
accepted as candidate for Typebeing judgeequation(clusterhereheads).: Each node is assigned a
static repu ation value initially. However, this reputation value can be increased if nodes
selected as judge.judge in each neighborhood should be elected by all the nodes in it to
prevent a single node from controlling the entire election process.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 3
NCRASEM 13 Paper ID:CSE01

Fig .4. overall architecture of the system


Judge election process
Initially, each node starts the election procedure by broadcasting a Hello message to all the nodes that
are 1 hop of the node. This message contains the value of the nodes cost of analysis and its unique identifier
(ID).
Algorithm 1(Executed by every node)
\* On receiving Hello, all nodes reply with their cost *\ 1.if (received Hello from[ all ]neighbors) then
2. Send Begin-Election (ID; cost);
2.1. find cost \* it returns the ID of the node which is having min cost *\
2.2. judge =
3. else if(neighbors= ) then
4. Launch DCS.
5. end if
each node checks whether it has received all the cost values from its neighbors. Nodes from whom the
Hello message have not received are excluded from the election. On receiving the Hello from all neighbors,
each node sends Begin-Election as in Algorithm 1, which contains the cost of analysis of the node. If node is the
only node in the network or it does not have any neighbors, then it launches DCS.
C Detection of anomalies in OLSR
We adopt a localized detection method, in which judge node monitors the routing updates from its neighbors and
inspect whether they conform to the specifications of the adopted routing protocol. The generation of routing updates
at each node is not independent, but relies on the current state of the neighborhood and routing updates received from
the neighbours. For example, in OLSR, a node generates its TC message, based on neighbours HELLO messages. In
OLSR, each node advertises HELLO message locally and TC message globally as routing updates to disseminate the
information about its MPRs and MPR selectors. The lists of MPRs and MPR selectors are generated totally based on
neighbours' HELLO messages

According to Equations (3.1) and (3.2), the monitoring node can exactly predict the expected TC and HELLO
messages from node i being monitored, if it knows in real time all the latest HELLO messages received by node i.
Unfortunately, there is no way for a node to get all the necessary HELLO messages in standard OLSR protocol, where
HELLO message is broadcast one-hop away instead we send HELLO messages to to two-hops away, in order that
each monitoring node can obtain all the necessary HELLO messages, which serve as inputs to the routing protocol on
neighbouring nodes being monitored.
Monitoring node, e.g.m, monitors behaviors of node, e.g. i, according to the observed inputs to node i, which
can be expressed as

It is worth noticing is the actual set of inputs for the generation of routing update at i; while is the
set of inputs, with respect to i, observed at m. Node m detects attacks against itself through observing ,

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 4
NCRASEM 13 Paper ID:CSE01

which is its own HELLO message; and detects attacks against other neighbouring nodes of i through observing
.
D Accusation
Whenever a monitoring node detects an anomaly, accusation(messages) against the suspicious node is issued to the
judge but such accusation is forbidden to be immediately disseminated throughout the networks in order for
preventing malicious accusations disseminated to large scale. The Accusation message should include the type of
attack detected, the suspected node ID, the suspicious routing update(RU) as evidence, and signature of the accusing
node.
Accusation Msg := [AttackType, SuspectedNodeID, SuspiciousRU, Signature]
E Investigation
The investigators can actually be categorized into two types, confident and Unconfident investigators, according to
whether the information they possess can prove if the received accusation is valid or invalid. Confident investigators
have no need to resort to other investigators for integrating additional information, while unconfident investigators
have to rely on the cooperative investigation to collect useful information from the accused node and other
investigators, trying to achieve consensus among unconfident investigators on the truth.The request for integrating
information is via the Investigation Message, and the supply of useful information is via the Defence Message. Their
formats are as follows:
Investigation Msg := [AttackType, AccuserID, AttackTime, Signature]
Defence Msg := [AttackType,Proof,Signature]
F Action
when investigation and defence are complete, the nodes involved in the investigation take a series of actions against
the accused node who has been proven to misbehave. As the malicious node travels around the whole network and
continues to disseminate faked routing updates, more and more nodes would detect it and restrict its request for
resources. Finally, the attackers would be totally isolated from the whole network.

IV. RELATED WORKS


The seminal work by Zhang and Lee[1]is among the first to design intrusion detection system in wire-less ad hoc
networks. Then a lot of works are proposed in [2],[5] are proposed to deal with different security problems in such
networks. However, some of the works are only focused on independent detection and give less emphasis on
collaboration
among nearby nodes who usually possess most firsthand and latest information about the detected suspicious
behavior. But later the detection result is collaboratively validated and inspected by nearby nodes, in order to improve
the raw detection output of an individual node and suppress malicious output from attackers. Adoption of cooperation
and information integration in IDS begins to draw more attention from [3],[4] are two early and insightful works that
take cooperation among distributed detectors into consideration. ZBIDS in [3] organizes network into non-
overlapping zones, where interzone nodes are the ones connecting more than one zone and intra-zone nodes only
connect nodes within the same zone. Each node performs independent and local detection and can generate alerts
when anomalies are detected. However, only inter-zone nodes can publish alarms after integrating and analyzing alerts
from intra-zone nodes.
The inspiring paper of Yang et al.[4] systematically describes an in-trusion detection system SCAN. Each node
independently detects attacks according to the promiscuously overheard packets. Detection results from neighbouring
nodes are cross validated based on the m out of N" strategy. Then once a node is determined to be malicious, its
neighbours would collaboratively revoke its token, which is necessary in participating in the network activity .A
node's token is collaboratively generated and periodically renewed by its neighbours based on its cumulated credit
value. In SCAN, determining attackers largely depends on the value of m/N. If its value is large, some attackers can
escape from punishment due to no enough neighbouring nodes being agree on the detection result. In SCAN, a node
who does not detect any misbehavior, can be cheated into believing the blackmailed node as an attacker, if more than
m/N percentage of
neighbouring nodes are colluding blackmail attackers. In [2], a secure version of OLSR, SA-OLSR, is proposed. The
detection method is based on exchanging of acknowledgement between two-hop neighbors when the control traffic is
successfully received. Although the communication overhead is reduced noticeably compared with the one in [7],
there are no analysis or simulation results to demonstrate its effectiveness on detection rate and false positive rate.

V. EXPERIMENTAL RESULTS
In this model, the node that has the least cost of analysis becomes the leader. In this way, all the nodes can keep a
balance of their energy level with time. Hence, all the nodes will live long and die at the same time which is clearly
shown in Fig. 5. Fig. 5a indicates that our model is able to balance the resource consumption among all nodes Fig 5.
Energy level of a model

VI. CONCLUSION
In this we proposed an intrusion detection system that is Inspired by the features of court procedures in justice
system, DCS adopts a court like structure, cluster head will work as a judge and that organizes a group of nodes

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 5
NCRASEM 13 Paper ID:CSE01

neighbouring the suspicious node to collaboratively accept accusations, investigate their validity, and take actions
against malicious nodes. Such system not only provides a way for accurate and timely detection of attacks, but also
increases IDS's capability in reducing false positive rate and suppressing malicious accusations.

VII. REFERENCES
[1] Zhang Y, Lee W, Huang Y. Intrusion detection techniques for mobile wireless networks. Wireless Network 2003;9(5):
545-56.
[2] Kannhavong B, Nakayama H, Nemoto Y, Kato SA-OLSR: security aware optimized link state routing for mobile ad
hoc networks, In: IEEE international conference on communications,2008. p. 1464-8. ICC'08, 2008.
[3] Sun B, Wu K, Pooch U. Zone-based intrusion detection for mobile ad hoc networks, International Journal of Ad Hoc
and Sensor Wireless Networks 2(3).
[4] Yang H, Shu J, Meng X, Lu S. SCAN: self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas
in Communications 2006;24(2):261-73.
[5] Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual
international conference on mobile computing and networking. New York, NY USA: ACM; 2000.p. 255-65.
[6] Buchegger S, Le Boudec J. A robust reputation system for mobile ad-hoc networks. In: Proceedings of P2PEcon;2004.
[7] Vilela J, Barros J. A Cooperative Security Scheme for Optimized Link State Routing in Mobile Ad-hoc Networks, Proc. of the 15th IST
Mobile and Wireless Comm. Summit.
[8] Peng Ning and Kun Sun How to misuse AODV: A case study of attacks against Mobile Adhoc Routing Protocols,
Ad Hoc Networks,2005;3(6):795-819.
[9] Buchegger S, yves Le Boudec J. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks;2003.
[10] Dhillon D, Zhu J, Richards J, Randhawa T. Implementation and evaluation of an IDS to safeguard OLSR integrity in MANETs. In:
Proceedings of the 2006 international conference on wireless communications and mobile,computing ACM; 2006.p.45-50.
[11] Elhdhili M, Ben Azzouz L, Kamoun F. CASAN: clustering algorithm for security in ad hoc networks. Computer
Communications,2008;31(13):2972-80.
[12] Zhang D, Yeo CK. A novel architecture of intrusion detection system. In:Consumer communications and networking conference,2010
7th IEEE;2010. p.1-5.
[13] Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis, Department of Digital Systems, University of Piraeus, Greece. A
Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks.
[14] G.A. Jacoby, N.J. Davis, "Mobile Host-Based intrusion Detection and Attack Identification," IEEE Wireless Communications, vol. 14,
issue 4, pp. 53-60, August 2007.
[15] Noman Mohammed, Hadi Otrok, Lingyu Wang,Mourad Debbabi,Mechanism design based secure leader election
For IDS in MANETs. IEEE Transactions on dependable and secure computing, vol. 8, No. 1, Jan-Feb 2011

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 6
NCRASEM 13 Paper ID:CSE02

Decision Tree for Uncertain Data Using


Probability Distribution Method
Srikanth Jillelamudi
Department of Information Technology
SRM University , SRM Nagar, Kattankulathur ,Kancheepuram District, Tamilnadu , India
Email- jillelamudisrikanth@gmail.com

Rajasekar P
Department of Information Technology
SRM University , SRM Nagar, Kattankulathur ,Kancheepuram District, Tamilnadu , India
Email- rajasekar.p@ktr.srmuniv.ac.in

Abstract- Traditional decision tree classifiers work with data whose values are known and precise. We extend such
classifiers to handle data with uncertain information. Value uncertainty arises in many applications during the data
collection process. Example sources of uncertainty include measurement/quantisation errors, data staleness, and multiple
repeated measurements. With uncertainty, the value of a data item is often represented not by one single value, but by
multiple values forming a probability distribution. Rather than abstracting uncertain data by statistical derivatives (such
as mean and median), we discover that the accuracy of a decision tree classifier can be much improved if the complete
information of a data item (taking into account the probability density function (pdf)) is utilised. We extend classical
decision tree building algorithms to handle data tuples with uncertain values. Extensive experiments have been conducted
that show that the resulting classifiers are more accurate than those using value averages. Since processing pdfs is
computationally more costly than processing single values (e.g., averages), decision tree construction on uncertain data is
more CPU demanding than that for certain data. To tackle this problem, we propose a series of pruning techniques that
can greatly improve construction efficiency.

Keywords Uncertain Data, Decision Tree, Classification, Data Mining

I. INTRODUCTION
Classification is a classical problem in machine learning and data mining. Given a set of training data tuples, each
having a class label and being represented by a feature vector, the task is to algorithmically build a model that predicts
the class label of an unseen test tuple based on the tuples feature vector. One of the most popular classification
models is the decision tree model. Decision trees are popular because they are practical and easy to understand. Rules
can also be extracted from decision trees easily. Many algorithms, such as ID3 and C4.5 have been devised for
decision tree construction. These algorithms are widely adopted and used in a wide range of applications such as
image recognition, medical diagnosis, credit rating of loan applicants, scientific tests, fraud detection, and target
marketing.
II. PROPOSED ALGORITHM
A. Traditional Decision Trees
A dataset consists of d training tuples, {t1 , t2, , , , td}, and k numerical (real-valued) feature attributes, A1, , ,
, , Ak. The domain of attribute Aj is dom(Aj). Each tuple ti is associated with a feature vector Vi = (vi,1,
vi,2 vi,k) and a class label ci, where vi;j dom(Aj) and ci C, the set of all class labels. The classification
problem is to construct a model M that maps each feature vector (vx,1.vx,k) to a probability distribution Px
on C such that given a test tuple t0 = (v0,1 ..v0,k, c0), P0 = M(v0,1 .. v0,k) predicts the class label c0
with high accuracy. We say that P0 predicts c0 if c0 = arg maxc C P0(c).
B. Handling Uncertainty Information :
A decision tree under our uncertainty model resembles that of the point-data model. The difference lies in the
way the tree is employed to classify unseen test tuples. Similar to the training tuples, a test tuple t0 contains
uncertain attributes. Its feature vector is thus a vector of pdfs (f0,1 , , , , ,f0,k). A classification model is thus a
function M that maps such a feature vector to a probability distribution P over C. The probabilities for P are

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 7
NCRASEM 13 Paper ID:CSE02

calculated as follows. During these calculations, we associate each intermediate tuple tx with a weight wx [0; 1].
Further, we recursively define the quantity n(c; tx;wx) , which can be interpreted as the conditional probability that
tx has class label c, when the subtree rooted at n is used as an uncertain decision tree to classify tuple tx with weight
wx.

Figure 1. Classifying a test tuple

III. EXPERIMENT AND RESULT


We discuss two approaches for handling uncertain data. The first approach, called Averaging, transforms
an uncertain dataset to a point-valued one by replacing each pdf with its mean value. A decision tree can then be
built by applying a traditional tree construction algorithm.
To exploit the full information carried by the pdfs, our second approach, called Distribution-based,
considers all the sample points that constitute each pdf. The challenge here is that a training tuple can now pass a
test at a tree node probabilistically when its pdf properly contains the split point of the test. Also, a slight change of
the split point modifies that probability, potentially altering the tree structure. We present details of the tree-
construction algorithms under the two approaches in the following subsections.

Averaging:
A straight-forward way to deal with the uncertain information is to replace each pdf with its expected
value, thus effectively converting the data tuples to point-valued tuples This reduces the problem back to that for
point-valued data, and hence traditional decision tree algorithms such as ID3 and C4.5 can be reused. We call this
approach AVG (for Averaging). We use an algorithm based on C4.5. Here is a brief description.

Figure 2: (a) Averaging (b) Distribution-based

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 8
NCRASEM 13 Paper ID:CSE02

Distribution-based:
For uncertain data, we adopt the same decision tree building framework as described above for handling
point data. After an attribute Ajn and a split point zn has been chosen for a node n, we have to split the set of tuples
S into two subsets L and R. The major difference from the point-data case lies in the way the set S is split. Recall
that the pdf of a tuple ti S under attribute Ajn spans the interval [ai,jn., bi,jn]. If bi,jn<=zn, the pdf of ti lies
completely on the left of the split point and thus ti is assigned to L. Similarly, we assign ti to R if zn < ai;jn. If the
pdf properly contains the split point, i.e., ai;jn <= zn < bi;jn, we split ti into two fractional tuples tL and tR add them
to L and R, respectively. We call this algorithm UDT (for Uncertain Decision Tree).

Figure 3 Example decision tree before post-pruning

Graph 1: Experiment with controlled noise on dataset Segment

IV. CONCLUSION
We have extended the model of decision-tree classification to accommodate data tuples having numerical
attributes with uncertainty described by arbitrary pdfs. We have modified classical decision tree building algorithms
(based on the framework of C4.5[3]) to build decision trees for classifying such data. We have found empirically
that when suitable pdfs are used, exploiting data uncertainty leads to decision trees with remarkably higher
accuracies. We therefore advocate that data be collected and stored with the pdf information intact. Performance is
an issue, though, because of the increased amount of information to be processed, as well as the more complicated
entropy computations involved. Therefore, we have devised a series of pruning techniques to improve tree
construction efficiency. Our algorithms have been experimentally verified to be highly effective. Their execution
times are of an order of magnitude comparable to classical algorithms. Some of these pruning techniques are
generalisations of analogous techniques for handling point-valued data. Other techniques, namely pruning by
bounding and end-point sampling are novel. Although our novel techniques are primarily designed to handle

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 9
NCRASEM 13 Paper ID:CSE02

uncertain data, they are also useful for building decision trees using classical algorithms when there are tremendous
amounts of data tuples.
V. REFERENCE
1) R. Agrawal, T. Imielinski, and A. N. Swami, Database mining: A performance perspective, IEEE Trans. Knowl. Data Eng., vol. 5,
no. 6, pp. 914925, 1993.
2) J. R. Quinlan, Induction of decision trees, Machine Learning, vol. 1, no. 1, pp. 81106, 1986.
3) C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993,ISBN 1-55860-238-0.
4) C. L. Tsien, I. S. Kohane, and N. McIntosh, Multiple signal integration by decision tree induction to detect artifacts in the neonatal
intensive care unit, Artificial Intelligence in Medicine, vol. 19, no. 3, pp. 189 202, 2000.
5) G. L. Freed and J. K. Fraley, 25% error rate in ear temperature sensing device, Pediatrics, vol. 87, no. 3, pp. 414415, Mar. 1991.
6) O. Wolfson and H. Yin, Accuracy and resource consumption in tracking and location prediction, in SSTD, ser. Lecture Notes i n
Computer Science, vol. 2750. Santorini Island, Greece: Springer, 24-27 Jul. 2003, pp. 325343.R. Mehul, "Discrete Wavelet
Transform Based Multiple Watermarking Scheme", in Proceedings of the 2003 IEEE TENCON, pp. 935-938, 2003.
7) W. Street, W. Wolberg, and O. Mangasarian, Nuclear feature extraction for breast tumor diagnosis, in SPIE, vol. 1905, San Jose,
CA, U.S.A.,1993, pp. 861870. [Online].
8) N. N. Dalvi and D. Suciu, Efficient query evaluation on probabilistic databases, The VLDB Journal, vol. 16, no. 4, pp. 523 544,
2007.
9) E. Hung, L. Getoor, and V. S. Subrahmanian, Probabilistic interval XML, ACM Transactions on Computational Logic (TOCL), vol.
8, no. 4, 2007.
10) A. Nierman and H. V. Jagadish, ProTDB: Probabilistic data in XML, in VLDB. Hong Kong, China: Morgan Kaufmann, 20-23 Aug.
2002, pp. 646657.
11) J. Chen and R. Cheng, Efficient evaluation of imprecise locationdependent queries, in ICDE. Istanbul, Turkey: IEEE, 15-20 Apr.
2007, pp. 586595.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 10
NCRASEM 13 Paper ID:CSE03

SESSION PASSWORDS FOR ANDROID


MOBILES
S.Archana1, T.Meena2, A.S. Vaishnavi3, and A. Bazila Banu 4
Department of Information Technology
Velammal College of Engineering and Technology, Madurai-625 009, Tamil Nadu, India
sarchanamdu@gmail.com1, dewdropmt@gmail.com2, vaishnavishivanath@gmail.com3, and abb@vcet.ac.in4

Abstract: The mobiles that are marketed today are developed with extended features that include the data storage. To
protect the data most people make use of the textual passwords or Graphical passwords in spite of its high security issues
such as eavesdropping, dictionary attacks, social engineering and shoulder surfing. Hence as a milestone in the field of
security, the experts developed the idea of Session password that has come into existence. This paper involves the
implementation of two techniques that combine the texts and colors to generate session passwords. One of the techniques
involve a 6*6 alphanumeric matrix while the other includes a color palette along with a numeric matrix that are unlocked
using the concepts of playfair cipher cryptographic method for the high rate of security in android mobiles.

Keywords: Authentication, Session passwords, Security

I. INTRODUCTION
Security in mobiles has become a major concern for its users. From Android to Symbian and even, most iOS in
the mobile market are targeted by the malicious hackers. At the same time people have also started to know about
mobile security and they have began their search for new technologies that safeguard them from the mobile threats.
Since a sheer number of people have started using android, it has become a chief target for the malicious hackers.
Yet many people do not believe that android security is a major threat to them.
Many authentication techniques have been developed to protect the mobiles from the existing and evolving
threats. One of the techniques that are used widely today is the textual password. This practice is subjected to many
vulnerabilities like eves dropping, dictionary attack, social engineering, shoulder surfing and even. Though lengthy
and random passwords increase the security, the main problem in this method is the difficulty of remembering those
passwords. In order to eliminate this intricacy many users tend to pick short passwords or passwords that they could
remember easily. The shortcoming of this technique is that these passwords can be easily guessed and cracked. The
alternatives to this practice are graphical passwords and biometrics. These methods are also accounted with their
own disadvantages. Biometrics that deal with finger prints, iris scan or facial recognition provide more security still
they are not used in wide because it is highly expensive and its identification process is slow. Many graphical
passwords have been developed in the last decade which suffer shoulder surfing. There are even graphical
passwords schemes that resist shoulder-surfing but they have their own drawbacks like usability issues or taking
more time for user to login or having tolerance levels. Thus new authentication methods have to be developed to
protect mobiles or any PDAs that are used to store confidential information like PIN number or passwords etc.
In this paper we have explained about the implementation procedure of two authentication schemes that increases
the mobile security. The authentication here is carried out using session passwords. Session passwords are dynamic
passwords that change each and every time the user logs in. That is, once the session is terminated the password is
no longer useful. For every login, users input different passwords that provide better security against dictionary and
brute force attacks. The proposed authentication schemes use text and colors for generating session passwords.

II. MATERIALS AND METHODS


Android [17] being a Linux based OS is predominantly used for touch screen devices. The user interface is based
on direct manipulation, using touch inputs that loosely correspond to real world actions like tapping, swapping and
even to manipulate on-screen objects. The drag and drop tools in the resource folder is used in designing the UI.
Completing the UI, the logics are written using JAVA.
The SQLite database [18] that has been used is a software library that implements a self-contained, server less,
zero-configuration, transactional SQL database engine. The source code for SQLite is in the public domain. Android
applications run in a sandbox, an isolated area of the system that does not have access to the rest of the system's
resources, unless access permissions are explicitly granted by the user when the application is installed.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 11
NCRASEM 13 Paper ID:CSE03

III. MOTIVATION AND OBJECTIVE


Security and usability are considered as the most important factors of the system design that increase the user
friendliness of the system. Android mobile is one such system that requires high user friendliness. Since the attack
on android mobiles has increased in present times, highly secured authentication scheme has become a necessary.
Most secured schemes compensate with their usability which becomes a shortcoming on the other hand. Thus the
main objective of our paper is to implement an authentication scheme to android mobiles, providing both usability
and security by combining colors with numbers and texts.

IV. RELATED WORK


RECALL-BASED SYSTEMS
Recall-based graphical password systems are occasionally referred to as draw metric systems [1] because users
recall and reproduce a secret drawing. In these systems, users typically draw their password either on a blank canvas
or on a grid.
DRAW-A-SECRET
Draw-A-Secret (DAS) [2] was the first recall-based graphical password system proposed. Users draw their
password on a 2D grid using a stylus or mouse. A drawing can consist of one continuous pen stroke or preferably
several strokes separated by pen-ups that restart the next stroke in a different cell. To log in, users repeat the same
path through the grid cells. The system encodes the user-drawn password as the sequence of coordinates of the grid
cells passed through in the drawing, yielding an encoded DAS password. Its length is the number of coordinate pairs
summing across all strokes.
PASSDOODLE
Pass doodle [3-4] is similar to DAS, allowing users to create a freehand drawing as a password, but uses more
complex matching process without a visible grid. The use of additional characteristics such as pen color, number of
pen strokes, and drawing speed were suggested to add variability to the doodles.
PASS GO
The Pass-Go scheme designed by [5] was motivated by an expected DAS usability issue: the difficulty of
accurately duplicating sketches whose lines cross near grid lines or grid line intersections. It is named for the ancient
board game Go, which involves strategically placing tokens on the intersection points of a grid. In Pass-Go, users
draw their password using grid intersection points (instead of grid cells in DAS). The users movements are snapped
to grid-lines and intersections, eliminating the impact of small variations in the trace.
A grid-based system resembling a mini Pass-Go has also been deployed commercially for screen-unlock on Google
Android cell phones. Pattern Lock [10], a similar system, is available for the Blackberry. Rather than entering a 4-
digit PIN, users touch-draw their password on a 3 3 grid. The Android screen-unlock scheme has been shown to
be susceptible to smudge attacks, where attackers can determine a users password through the finger smudges left
on the smart phones surface [11].
RECOGNITION-BASED SYSTEMS
Recognition-based systems, also known as Cognometric systems [1] or Search metric systems generally require
that users memorize a portfolio of images during password creation, and then must recognize their images from
among decoys to log in.
PASS FACES
The recognition-based system studied most extensively to date is Passfaces [7]. Users pre-select a set of human
faces. During login, a panel of candidate faces is presented. Users must select the face belonging to their set from
among decoys. Several such rounds are repeated with different panels. For successful login, each round must be
executed correctly. The set of images in a panel remains constant between logins, but images are permuted within a
panel, incurring some usability cost. The original test systems had n = 4 rounds of M = 9 images per panel, with one
image per panel from the user portfolio.
The user portfolio contains exactly 4 faces, so all portfolio images are used during each login. The theoretical
password space for Passfaces has cardinality Mn, with M = 9, n = 4 yielding 6561 " 2^13 passwords.
RANDOM IMAGES
In Dj Vu [8], users select and memorize a subset of random art images from a larger sample to create their
portfolio. To log in, users must recognize images belonging to their pre-defined portfolio from a set of decoy
images; in the test system, a panel of 25 images is displayed, 5 of which belong to the users portfolio. Users must
identify all images from their portfolio and only one panel is displayed. Images of random art are used to make it
more difficult for users to write down their password or share it with others by describing the images from their

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 12
NCRASEM 13 Paper ID:CSE03

portfolio. The authors suggest that a fixed set of 10000 images suffices, but that attractive images should be hand-
selected to increase the likelihood that images have similar probabilities of being selected by users.
CONVEX HULL
In the Convex Hull Click Scheme [15], users select and memorize a portfolio of images, and must recognize these
images from among decoys displayed, over several rounds. The images are small icons and several dozen are
randomly positioned on the screen. Each panel contains at least 3 of the users icons. Users must identify their icons,
visualize the triangle they form, and click anywhere within this triangle. This design is intended to protect against
shoulder surfing, but comes at a cost of longer login times.
CUED-RECALL SYSTEMS
Cued-recall systems typically require that users remember and target specific locations
within an image. This feature, intended to reduce the memory load on users, is an easier memory task than pure
recall. Such systems are also called loci metric [1] as they rely on identifying specific locations. This memory task
differs from simply recognizing an image as a whole
PASS POINTS
During creation of a Pass Points password, users are presented with an image. A password is a sequence of any n
= 5 user-selected click-points (pixels) on this image. The user selects points by clicking on them using a mouse.
During login, re-entry of the click-points must be in the correct order, and accurate within a system-specified
tolerance.
Wiedenbeck et al. [2005b; 2005c; 2005a] conducted three lab-based user studies of Pass Points. Users took 64
seconds to initially create a password, and required an additional 171 seconds of training time on average to
memorize their password. Login took between 9 and 19 seconds on average. Login success rates varied from 55-
90%, with users returning at different intervals to log in again. User performance was found to be similar on the four
images tested, and it was recommended that tolerance areas around click-points be at least 1414 pixels for
acceptable usability

V. IMPLEMENTATION
PAIR BASED AUTHENTICATION
Mobile phones are enhanced with the feature of storing personal and confidential information like passwords and
PIN numbers. Thus authentication to these devices has become a need. To satisfy the required, two new
authentication techniques named pair based and hybrid are implemented. Both the techniques involve the use of
session passwords. Pair based authentication [17] consists of phases like registration, login, grid generation,
intersection and verification. In registration phase, user enters his username and password. One constrain that has
been imposed in this phase is the length of the password. Password length is restricted to 8 since as the length
increases, degree of usability decreases. Next is the login phase, where the user enters his username. As soon as the
username is entered the password is retrieved from the database (SQLite) based on the username given and a 6*6
grid containing alphabets and numbers is formed using this password. With the grid in the grid generation phase,
user has to enter the session password based on the secret pass. The user is supposed to segment his password in
terms of character pairs. The first letter in the pair is used to select the row and the second letter is used to select the
column. The intersection letter is part of the session password. This is repeated for all pairs of secret pass. Later in
the verification phase, session password is verified by comparing the row and column of the intersection character
against the pairs of the secret pass. This 6*6 grid interface dynamically changes with no repetition. For ever y login
the grid gets randomized, so that the session password changes for every session.
HYBRID BASED AUTHENTICATION
Hybrid authentication [16] is similar to pair based with a contrast that, it involves the use of both colors and grid
of numbers. Hybrid authentication consists of phases like rating the colors, login, grid and color palette generation
and verification.
During registration phase, user provides ratings or ranking (1 -8) to colors. User can remember the rating given to
colors using some concepts or stories. In login phase, an interface is displayed. The interface consists of 8X8
number grid in which numbers from 1 to 8 are placed haphazardly. In addition to this, a color grid is also displayed
containing 4 pairs of colors. Both these grids changes for every session. After a successful registration, user forms a
number sequence. This number sequence depends upon the position of the colors in the color grid. User then
performs pairing on this sequence of numbers and based on this pairing, session password is generated. Verification
phase of hybrid based authentication is similar to that of pair based authentication.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 13
NCRASEM 13 Paper ID:CSE03

VI. RESULT

Figure 1 Pair Grid Generation

Figure 2 Hybrid Grid Generations

VII. CONCLUSION
Though passwords possess their own benefits, still they suffer from various attacks. We have presented an
alternate approach to password entry, based on session method which prevents wide range of these attacks.

VIII. REFERENCES

[1] De Angeli, A., Coventry, L., Johnson, G., and Renaud, K. 2005. Is a picture really worth a thousand words? Exploring the feasibility of
graphical authentication systems. International Journal of Human-Computer Studies
[2] Jermyn, I., Mayer, A., Monrose, F., Reiter, M., and Rubin, A. 1999. The design and analysis of graphical passwords. In 8th USENIX Security
Symposium.
[3] Goldberg, J., Hagman, J., and Sazawal, V. 2002. Doodling our way to better authentication (Student poster). In ACM Conference on Human
Factors in Computing Systems (CHI).
[4] Varenhorst, C. 2004. Passdoodles: A lightweight authentication method. MIT Research Science Institute.
[5] Tao, H. and Adams, C. 2008. Pass-Go: A proposal to improve the usability of graphical passwords, International Journal of Network Security
[6] Renaud, K. 2009a. Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and
Computer Security
[7] Passfaces Corporation. 2009. The science behind Passfaces. White paper,
http://www.passfaces.com/enterprise/resources/white papers.htm.
[8] Dhamija, R. and Perrig, A. 2000. Dj Vu: A user study using images for authentication. In 9th USENIX Security Symposium.
[9]Wallace Jackson, android apps for absolute beginners, apress, second edition
[10] Tafasa. 2010. Pattern lock. http://www.tafasa.com/patternlock.html.
[11] Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. 2010. Smudge attacks on Smartphone touch screens. In USENIX 4th
Workshop on Offensive Technologies
[12] Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., and Memon, N. 2005a. Authentication using graphical passwords: Basic results. In 11th
International Conference on Human- Computer Interaction (HCI International).
[13] Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., and Memon, N. 2005b. Authentication using graphical passwords: Effects of tolerance
and image choice. In 1st Symposium on Usable Privacy and Security (SOUPS).

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 14
NCRASEM 13 Paper ID:CSE03

[14] Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., and Memon, N. 2005c. Pass Points: Design and longitudinal evaluation of a graphical
password system. International Journal of Human-Computer Studies 63, 1-2, 102127.
[15] Wiedenbeck, S., Waters, J., Sobrado, L., and Birget, J. 2006. Design and evaluation of a Shoulder-surfing resistant graphical password
scheme. In International Working Conference on Advanced Visual Interfaces (AVI)
[16] Authentication Schemes for Session Passwords using Color and Images. In International Journal of Network Security & Its Applications
(IJNSA), Vol.3, No.3, May 2011
[17] http://en.wikipedia.org/wiki/Android_%28operating_system%29#Security_and_privacy
[18] http://www.sqlite.org/
[19] Wallace Jackson, Android Apps for Absolute Beginners, Apress, Second Edition
[20] http://developer.android.com/guide/developing/index.html
[21] http://www.vogella.de/articles/AndroidSQLite/article.html

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 15
NCRASEM 13 Paper ID:CSE05

Performance Evaluation of Overhearing Data


Cashing in Wireless Networks
Divya Chegoor
Department of Computer Science Engineering
Turbomachinery Institute of science and Technology, Hyderabad, AndhraPradesh
Email: chegoordivya@gmail.com

Abstract: Wireless ad hoc network is a networking technology that provides user with Internet access anywhere anytime.
To cope with resource constraints of wireless ad hoc networks, data caching is widely used to efficiently reduce data
access cost. In this paper, an efficient data caching algorithm is proposed which makes use of the overhearing property of
wireless communication to improve caching performance. Due to the broadcast nature of wireless links, a packet can be
overheard by a node within the transmission range of the transmitter, even if the node is not the intended target. The
proposed algorithm explores the overheard information, including data request and data reply, to optimize cache
placement and cache discovery. The simulation results show that, compared with one representative algorithm and a
naive overhearing algorithm, the proposed algorithm can significantly reduce both message cost and access delay.

Key Terms - Ad hoc network, cooperative caching, mobile computing, wireless communication.

I.INTRODUCTION
In recent years, wireless ad hoc network has received a lot of attention from both academia and industry
communities. In a wireless ad hoc network, there is no support of any fixed infrastructure and network nodes
communicate with each other through multi hop paths. A network node can be any computing device, ranging from a
mobile device to a computer and to a backbone network device, e.g., mesh routers [10], or even an embedded small
sensor node [12]. Due to the advantages in flexible deployment, cost and easy maintenance, wireless ad hoc
networks are especially suitable for the scenarios where the deployment of network infrastructure is too costly or
even impossible.
On the other hand, wireless ad hoc networks are resource constrained in terms of bandwidth, power, etc., so data
access cost is a major concern. Data caching has been widely used to reduce data access cost in traditional computer
networks [4]. It is much more desirable and effective in wireless ad hoc networks. When data are delivered through
multi hop paths, caching the data at intermediate nodes can significantly reduce the message cost and consequently
save various resources, from network bandwidth to battery power. Accessing data at cache node can also help reduce
data access delay (AD).
Quite a lot of work has been conducted for data caching in wireless ad hoc networks, including cache placement,
cache discovery [8], and cache consistency [17]. Cache placement refers to determining where and what to cache;
cache discovery refers to the mechanism to find and obtain a cached data item; and cache consistency means to
ensure that the data value in cache copies is consistent with the source copy at the data server. The first two problems
are so closely related that they are usually studied together.
The cache placement problem in ad hoc networks has been proved to be NP-hard, even if only one data item is
considered [1]. Existing works on cache placement mainly focus on how to make use of the data access frequency
information and network topology information in selecting cache nodes [5], [18]. For cache discovery, recent
research has been focused on combining passive and active query approaches [8], [9], [13], [14].
Although there have been quite a number of algorithms for ad hoc networks, the openness of wireless link has not
been considered in designing cooperative caching system. Due to the openness of wireless links, a network node
transmits data in a broadcast way by nature, so a packet can be received by any node within the transmission range
even if the node is not the intended target of this transmission. In this case, we say that the node overhears the
packet. Correspondingly, we say that the intended target node hears the packet. Here, the target node means the
node specified as the receiver of the packet in MAC address. It can be an intermediate node in the routing path or the
destination node of the massage.
In this paper, a novel cooperative caching algorithm is proposed for wireless ad hoc networks by taking
overhearing into consideration. The algorithm makes use of the overhearing property to significantly improve the
performance of data caching in several aspects. First, by overhearing, a requesting node can obtain data copies from

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 17
NCRASEM 13 Paper ID:CSE05

an intermediate node forwarding the data copy so as to reduce data access cost. Second, overhearing helps collect
more data access information, e.g., access frequency, which is necessary to make decision on cache placement.
To evaluate the performance of the proposed algorithm, conducted extensive simulations. Consider various
scenarios with different parameter settings and compare the algorithm with the one proposed in [30], which is the
best one among existing distributed caching algorithms for ad hoc networks. To show the advantage of the
placement metric, also simulate a naive overhearing algorithm as the baseline of overhearing caching. The
simulation results show that the proposed algorithm performs much better than the other two algorithms in terms of
both message cost and data access delay.

II.OVERHEARING-AIDED CACHING ALGORITHM


The overhearing-aided data caching algorithm consists of two parts: cache placement and cache discovery. The
cache placement part is used for a node to choose data items to cache based on the proposed data access cost
function. The cache discovery part realizes the overhearing-aided data access by providing a node with the
mechanism to serve data requests by overhearing.
Basically, the caching algorithm work as follows: Each node maintains a nearest cache list, which indicates the
nearest node for each data item. Originally, there is no cache copy in the system and the source node is definitely the
nearest one. When a node wants to access some data item, it will send a data request message to the nearest cache
node. The request message is forwarded toward the destination node by intermediate nodes. During the forwarding,
the nodes along the path, including the intermediate nodes and nodes overhearing the request, will update the data
access information record (statistics of frequency) accordingly.
When the destination node receives the request message, it will reply the requesting node by sending the data
copy. During the forwarding of the data reply, the intermediate nodes and the overhearing nodes will try to cache the
data copy with respect to placement metric, i.e., the benefit of the data item. The benefit of a data item is calculated
based on the data access information collected by a node itself. If the data item is added to the cache space, the new
cache node will broadcast a message to inform other nodes to update the nearest cache list.
To ease the understanding of the description, all the notations used in the algorithm design are listed in Table 1

Table 1. Notations used in the algorithm design

A Definition of Benefit
The benefit of caching a data item is defined by the change in the overall data access cost of the whole network.
Based on Function (2), benefit is formally defined as follows: Definition 1 (Benefit). The benefit of caching a data
item Dj at a node i with respect to the current cache placement M is defined as

B(i,j,m) = 0 if i Mj
= T(G,M)-T(G,MMjuI) if i Mj and

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 18
NCRASEM 13 Paper ID:CSE05

Max(T(G,M)) |{ Mj |i Mj }| < mj
= -T(G,MMju{i}) if i Mj and|{ Mj |i Mj }| >= mj

The notation Mx denotes the set M with some change in the element set X of Mx. The first condition in Function
(3) specifies that the benefit of caching Dj at node i is zero if i has already cached a copy of Dj. The second
condition specifies that, if node i has not cached Dj and i has some empty space to cache it, the benefit of caching Dj
at node i is the reduction in the access cost. Finally, under the third condition, node i has not cached Dj and the
cache space of i is full. If node i wants to cache Dj, some existing cache item must be replaced. The change in the
data access cost is different if different cache items are selected for replacement. In this case, the benefit of caching
Dj at node i is defined as the maximum reduction in data access cost. Please notice that the definition of benefit is
similar but essentially different from that in [30] because cache replacement and overhearing in data access is
considered.

Figure. 1. The overhearing-aided algorithmcache placement

B Data Structures and Message Types


When executing the algorithm, a node needs to maintain the cache information using the following data structures:
Nearest-cache table: each node uses this table to maintain the nearest cache node for each data item. For
example, the table entry Nj indicates the nearest node with a cache copy of Dj.
Overheard-cache list: each element of this list is a Boolean flag Oj, which is set to be true if a request for
Dj is still pending and the reply for this request can be (over)heard. This list is maintained at each node
individually.
. Cache-list: the set of nodes caching a data item Dj. This is maintained by only the source node of Dj.
Besides the data structures above, the data caching algorithm involves the following message types:
ADD(i, j): the message from node i to inform others that i has added a copy of Dj.
ADDEL(i, j, t, Mt): the message from node i to inform others that i has added a copy of Dj by replacing a
copy of Dt. The updated cache-list of Dt, i.e., Mt is also included in the message.
REQ(i, j, Nj): the request message from node i to the nearest cache node Nj for data Dj.
REP(i, Dj): the reply message of data Dj to node i, the requestor.
C Cache Placement
The pseudocode of the cache placement operations of the algorithm is shown in Figure. 1. This code is executed
by each node. When a data item Dj is (over)heard by a node i, i will first calculate the benefit of caching Dj using
Definition 1.
The key parameters in Definition 1 are aij and opkj. To collect and calculate aij and opkj, the algorithm can
simply follow existing methods in other cooperative caching algorithms. A simple approach is letting a node

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 19
NCRASEM 13 Paper ID:CSE05

calculate the parameter values based on the historical data request information observed by the node itself. That is, a
node does the calculation based on the data access request/reply information heard and overheard. The access
frequency can be calculated based on data request messages. To calculate the overhearing probability, an additional
flag needs to be added to each reply message, which indicates whether the data copy included in the reply is
obtained by overhearing.
Based on the benefit of caching the data item Dj, node i can determine whether Dj should be cached. If the benefit
of caching Dj exceeds some specific threshold value TH, node i will cache it (line 102). TH can be specified by the
user. If Dj is cached in some empty space, node i broadcasts an ADD(i, j) message to inform other nodes about the
new cache copy. Otherwise, a cache copy of data item Dt must have been replaced by Dj. Node i first needs to get
the cache-list Mt for Dt from the source node St and then broadcasts an ADDEL(i, j, t, Mt) message. Upon
(over)hearing an ADD(i, j) or ADDEL(i, j, t,Mt) message at a node k, if node i is nearer than the current Nj at node
k, Nj would be updated to i. Moreover, if Dt has been replaced by Dj at nodes i and node i is currently the nearest
cache node of Dt to node k, i.e., Nt = i, node k updates Nt based on Mt.

D Cache Discovery
Cache discovery concerns about how a node can find the nearest copy of a data item requested. It includes two
parts, i.e., request and reply. Different algorithms may have different methods to maintain the cache information,
based on which the nearest cache node is discovered. Basically the proactive approach is adopted where each node
maintains anearest cache list, which indicates the nearest node for each data item. Then, the request can be routed to
the nearest cache node after looking up the list.
The major challenge in the design of overhearing aided discovery is to find that, in what cases, overhearing is
useful and utilizable for data caching. Overhearing may occur in numerous scenarios, but not all of them can be
utilized. Intuitively, if a node knows that a data reply for some pending request will be heard or overheard, the later
requests for the same data item can be certainly served without sending the request to the cache node. Such an
overhearing of data reply is called as a predictable reply overhearing.
How to determine whether a reply overhearing is predictable? The question is answered by the following theorem.
Theorem 1 (Predictable reply overhearing). If a node m overhears a request for a data x from some intermediate
node, then m can overhear data x in the reply corresponding to the request overheard.

Figure. 3. The overhearing-aided algorithmcache discovery.

Based on Theorem 1, design the following mechanisms to handle data request and reply, the pseudocode of which
is shown in Fig. 3. When a node i has a request for data Dj which is not cached locally, node i sends a request
message REQ(i, j,Nj) to the nearest cache node Nj (line 202) and then waits for the corresponding reply.
The request message needs to be forwarded by the intermediate nodes between i and Nj. If an intermediate node k
has a cache copy of Dj (due to the inaccuracy of Nj), it replies the requestor by sending a REP(i,Dj) message (line
206). Otherwise, it can still serve the request for Dj if its Oj is true, i.e., another request for Dj is still pending and
the reply for this request can be (over)heard, the request will be put in the pending list (line 209). Node k will then

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 20
NCRASEM 13 Paper ID:CSE05

stop propagating the request and wait for the reply for the pending request (line 209). If neither of the above two
cases is true, node k will continually forward the request toward Nj (line 211) and set Oj to be true so that it can
serve other requests for the same data item when it gets the reply corresponding to the current request.
Besides the intermediate nodes in the path between node i and Nj, some other nodes may also get the request for
Dj by overhearing. If a node l can overhear a request forwarded by some intermediate node (line 213), it sets its Oj
to be true so as to serve future requests for the same data item. Upon overhearing or hearing a reply message
REP(i, Dj), a node resets Oj to be false and forwards the reply message to all pending requestors forDj (line 217).
Please notice that a request can only be pended and replied by intermediate nodes in the path between the requestor
and destination cache node, so no duplicate reply copies will occur.
Table 2 Key Settings in Simulations

III. CONCLUSION AND FUTURE WORK


In this paper, overhearing-aided data caching algorithm is proposed for wireless ad hoc networks. Due to the
broadcast feature of wireless links, a data request or reply may be heard by all the nodes within the transmission
range even if they are not the intended destination nodes. Based on this observation, an efficient data caching
algorithm is designed to reduce data access cost by making use of data copies overheard. The algorithm consists of
two parts: cache placement and cache discovery. For cache placement, a novel placement metric with the
consideration of overhearing property in evaluating data access cost is proposed. More precisely, the length of data
access path is represented by the distance between a data requestor and the node that may reply the request by data
overheard. For cache discovery, a mechanism to capture data copies through overhearing is designed. How to
predicate the overhearing copy is at the core of such mechanism. It is analyzed for all possible cases and established
a simple but effective rule for predictable data overhearing.
To evaluate the performance of the design, an extensive simulation is conducted. For comparison purpose, two
other algorithms are simulated. One is the algorithm proposed in [30], which is the best among existing algorithms
for ad hoc networks. The other one is an algorithm as the baseline of overhearing. Simulation results show that the
proposed algorithm performs much better than the other two, in terms of both message cost and access delay.
Some challenges are to be addressed to further explore overhearing in caching. First, how to handle node mobility
is still a challenging task. The proposed enhancing mechanism to handling mobility is not efficient in terms of
message cost. Mobility may affect the probability of overhearing, so both the placement metric and discovery
mechanism need to be improved. Second, overhearing has not yet been considered in cache consistency
maintenance. Intuitively overhearing can help reduce the cost of cache update, but how to realize it is far from
trivial.
IV. REFERENCES
[1] I. Baev and R. Rajaraman, Approximation Algorithms for Data Placement in Arbitrary Networks, Proc. Ann. ACM-SIAM Symp.
Discrete Algorithms (SODA 01), 2001.
[2] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, Web Caching and Zipf-Like Distributions: Evidence and Implications, Proc.
IEEE INFOCOM 99, 1999.
[3] T. Camp, J. Boleng, B. Williams, L. Wilcox, and W. Navidi, Performance Comparison of Two Location Based Routing Protocols for
Ad Hoc Networks, Proc. IEEE INFOCOM, 2002.
[4] P. Cao and C. Liu, Maintaining Strong Cache Consistency in the World Wide Web, IEEE Trans. Computers, vol. 47, no. 4, pp. 445-
457, Apr. 1998.
[5] G. Cao, L. Yin, and C.R. Das, Cooperative Cache-Based Data Access in Ad Hoc Networks, Computer, vol. 37, no. 2, pp. 32-39,
Feb. 2004.
[6] J. Cao, Y. Zhang, L. Xie, and G. Cao, Data Consistency for Cooperative Caching in Mobile Environments, Computer, vol. 40, no. 4,
pp. 60-66, Apr. 2007.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 21
NCRASEM 13 Paper ID:CSE05

[7] N. Chatterjee, Y.J. Lakshmi, A. Potluri, and A. Negi, Effect of Adapter Promiscuous Mode Operation on DSR Performance in
MANETs, Proc. Intl Conf. Signal Processing, Comm. and Networking (ICSCN), 2007.
[8] N. Chauhan, L.K. Awasthi, N. Chand, R.C. Joshi, and M. Mishra, A Cooperative Caching Strategy in Mobile Ad Hoc Networks
Based on Clusters, Proc. Intl Conf. Comm., Comp. and Security, Feb. 2011.
[9] G. Chiu and C. Young, Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks, IEEE Trans. Mobile
Computing, vol. 8, no. 3, pp. 384-396, Mar. 2009.
[10] S.M. Das, H. Pucha, and Y. Charlie Hu, Mitigating the Gateway Bottleneck via Transparent Cooperative Caching in Wireless Mesh
Networks, ECE technical reports, Purdue Univ., 2006.
[11] M.K. Denko, T. Nkwe, and M.S. Obaidat, Efficient Cooperative Caching with Improved Performance in Wireless Mesh Networks,
Proc. IEEE Intl Conf. Comm. (ICC), 2010.
[12] N. Dimokas, D. Katsaros, L. Tassiulas, Y. Manolopoulos, High Performance, Low Complexity Cooperative Caching for Wireless
Sensor Networks, Wireless Networks, vol. 4, no. 3, pp. 717-737, Apr. 2011.
[13] Y. Du and K.S. Gupta, COOP: A Cooperative Caching Service in MANETs, Proc. Joint Intl Conf. Autonomic and Autonomous
Systems and Intl Conf. Networking and Services (ICAS-ICNS), pp. 58-63, 2005.
[14] Y. Du, K.S. Gupta, and G. Varsamopoulos, Improving on- Demand Data Access Efficiency in MANETs with Cooperative Caching,
Ad Hoc Networks, vol. 7, no. 3, pp. 579-598, 2009.
[15] X. Fan, J. Cao, and W. Wu, Contention-Aware Data Caching in Wireless Multi-Hop Ad Hoc Networks, J. Parallel and Distributed
Computing, vol. 71, no. 4, pp. 603-614, Apr. 2011.
[16] L.M. Feeney and M. Nilsson, Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking
Environment, Proc. IEEE INFOCOM, Apr. 2001.
[17] R. Gunasekaran, V.P. Divya, and V. Rhymend Uthariaraj, Mitigating Channel Usage in Cooperative Caching for Mobile Ad Hoc
Networks, Intl J. Ad Hoc and Ubiquitous Computing, vol. 7, no. 2, pp. 87-99, 2011.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 22
NCRASEM 13 Paper ID:ECE01

ATTENDANCE MONITORING SYSTEM


USING ARM9 AND QR CODE
J.Satheesh Kumar
B.Tech-Student, Department of Electronics and Communication Engineering
RVR Institute of Engineering & Technology, Hyderabad, Andhra Pradesh, India
Email- Satish966639@gmail.com

G.Venkatesh
B.Tech-Student, Department of Electronics and Communication Engineering
RVR Institute of Engineering & Technology, Hyderabad, Andhra Pradesh, India
Email- venkygundagoni@gmail.com

Kumar.Keshamoni
Asst.Professor, Department of Electronics and Communication Engineering
RVR Institute of Engineering & Technology, Hyderabad, Andhra Pradesh, India
Email- kumar.keshamoni@gmail.com

ABSTRACT: The main aim of this paper is to design an Attendance monitoring system using ARM9 and QR code. In
the existing system we are using the finger scan technology, which takes a sufficient amount of time for the process of
recognizing the fingerprints to be completed. For example in a class of 60 students, the whole process takes around 15 to
20 minutes, which if think in terms of the new technology we could incorporate, would stand out to be an ample waste of
time. In my paper, one class of 60 students is taken as a sample to conduct the experiment. the faculty has 60 QR images
of the students with him. The images corresponding to each student who is present in the class will be scanned by the
faculty by mobile which has QR reader software installed in it, which confirms the attendance of the students. This data
will be sent to the ARM memory through GSM. Then through Ethernet, this data will be sent to the PC, using which the
data is collected and maintained. The students who has less than 75%attendence ,their data will be sent to the ARM
processor through Ethernet again at every two weeks .Then the ARM processor will send the students attendence to their
respective parents through the GSM (or) free SMS services like way2sms.com, which saves time and manpower which is
the scope of my paper.

Keywords: - ARM, Minutiae, QR-Code, Ethernet, ARM9, GSM

I. INTRODUCTION
In many institutions and organization the attendance is a very important factor for various purposes and its one of
the important criteria that is to follow for students and organization employees. The previous approach in which
manually taking and maintains the attendance records was very inconvenient task. After having these issues in mind
we develop an automatic attendance system which automates the whole process of taking attendance and
maintaining it.
A Fingerprint Recognition:
The Fingerprint is the feature pattern of one finger or an impression of friction ridges found on inner surface of
finger as shown in figure 1(a). Everyone in this world has his own fingerprint with the permanent uniqueness. A
fingerprint is made up of ridges and furrows, which shows good similarities like parallelism and average width.
However the research conducting on fingerprint verification and identification shows that we can distinguish
fingerprint with the help of minutiae, which are the some abnormal points on the ridges. There are two type of the
termination of minutiae, immediate ending of ridges or a point where ridge ends abruptly called ending or
termination and the point on the ridge from which other branch drives or a point from where ridge splits into two or
more branches is known as bifurcation as shown in figure 1(b).

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 23
NCRASEM 13 Paper ID:ECE01

Figure 1. (a) The fingerprint image, which describes the important features in fingerprint. (b) Minutiae points (valley is also known as furrow,
Termination is also called ridge ending, and Bifurcation is also known as Branch).

A fingerprint is captured by user interface, which are likely to be an optical, solid state or an ultrasound sensor.
Generally, there are two approaches are used for fingerprint verification system among them first one is Minutiae
based technique, in which minutiae is represented by ending or termination and bifurcations. Other one is Image
based method or matching pattern, which take account of global feature of any fingerprint image. This method is
more useful then the first one as it solve some intractable problem of method one, but this paper talk about the
minutiae based representation of fingerprint. The fingerprint verification can be defined as the system that confirm
the authenticity of one person by comparing his captured fingerprint templates against the stored templates in
database. One to one comparisons are conducted to identify the person authenticity. After this if the authenticity of
person is verified then system signal true else false.

Figure .2 Automatic attendance system architecture representing the stages of preprocessing, extraction of minutiae and matching of minutiae

B.Matching of Minutiae
Matching of minutiae is that when we have two set of minutiae of fingerprint image and using a algorithm we
determines whether the give set of minutiae is from the same finger or not. There are some matching techniques as
correlation based matching in which two fingerprint images are superimposed and finding out the correlation
between corresponding pixel, Ridge feature based matching in which feature extracted are compared to extracted
ridge pattern and the other one is Minutia based matching technique in which minutiae extracted from two
fingerprint and stored as sets of point in two dimensional plane. We described this technique here:

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 24
NCRASEM 13 Paper ID:ECE01

a) The stage of Alignment:


In this stage anyone minutiae is choose from each image then calculate the similarity of the two ridges associated
with the two referenced minutiae points. If the threshold value is smaller than similarity then transform each set of
minutiae to new coordinate system whose origin is at referenced point and x-axis is coincident with the direction of
referenced point.
b) The stage of Matching:
After deriving the set of transformed minutiae points, an algorithm is used for matching the pairs, assuming that
minutiae have nearly identical direction and position.To evaluate the performance of our proposed system we
closely experimented on FVC2002 database and evaluated each and every step from enhancement of image,
binarization, thinning and enhanced thinning, elimination of false minutiae to matching of extracted minutiae.

II.PROPOSED SYSTEM
In my paper, one class of 60 students is taken as a sample to conduct the experiment. the faculty has 60 QR
images of the students with him. The images corresponding to each student who is present in the class will be
scanned by the faculty by mobile which has QR reader software installed in it, which confirms the attendance of the
students. This data will be sent to the ARM memory through GSM. Then through Ethernet, this data will be sent to
the PC, using which the data is collected and maintained. The students who has less than 75%attendence ,their data
will be sent to the ARM processor through Ethernet again at every two weeks .Then the ARM processor will send
the students attendence to their respective parents through the GSM (or) free SMS services like way2sms.com,
which saves time and manpower which is the scope of my project.

Figure3.MODULES

A. Introduction to QR Code:
A QR code is a 2-dimensional bar code. This means that pieces of information are encoded horizontally and
vertically instead of being only horizontally encoded like a standard bar code.

Figure 4. (a) 2D code (b) Bar code

The acronym QR is derived from the term Quick Response. The company Denso Wave originally spawned the
term 'QR' as the creator intended that such barcodes and their contents were to be decoded at high speed
electronically. QR-Codes first hit mainstream when they were initially used for tracking parts by vehicle
manufacturers. After a while, companies began to see a newscope for where QR-Codes could be used else where

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 25
NCRASEM 13 Paper ID:ECE01

within the world. The most commercial use for QR-Codes is in the telecommunications industry where the mobile
phone seems to be the biggest driver of their popularity. Data Capacity: QR-Codes are capable of handling of sorts
of data, including numbers, alphabetic characters, Kanji, Kana, Hiragana, symbols, binary and control codes. A total
of 7,089 characters can be encoded in one symbol alone.

Table1. QR-code Data capacities

QR-Code Data Capacities


Numeric only Max 7,089 characters
Alphanumeric Max 4,296 characters
Binary (8 bits) Max 2,953 bytes
Kanji, full-width Kana Max 1,817 characters

Barcodes vs. QR-Codes

Figure5. Picture of Traditional Barcode

QR-Codes have become more popular than the typical barcode as the typical barcode can only hold a maximum of
20 digits, whereas the QR-Code can hold up to 7,089 characters. This makes the use and diversity of QR-Codes
much more appealing than their older counter part, the barcode. Partially part of the reason QR-Codes can hold more
data, is because if you compare a typical barcode to a QR-Code, you can see one major difference; barcodes only
span horizontally whereas QR-Codes can span both horizontally and vertically. Statistic QR-Codes are capable of
encoding the same amount of data in approximately one-tenth the space of a traditional barcode. Such minute QR-
Codes are called Micro QR-Codes. Position A great feature of QR-Codes is that you do not need to scan them from
one particular angle. QR-Codes are capable of omnidirectional (360 degrees) high-speed reading. QR-Codes
scanners are capable of determining the correct way to decode the content within the QR-Code due to the three
specific squares that are positioned in the corners of the symbol.

Figure 6. QR code scanner

Multiples: QR-Codes can be combined into one large symbol. One symbol can then be divided into 16 separate
symbols making the data capacity extremely large.
B .QR Code Generator:
With this tool you can create QR codes for the following content types: Text, URL, Phone number, SMS number,
Email, Business card (vCard), Geographic location After you have selected a content type enter the required data in
the corresponding fields. This tool allows you to enter up to 450 characters. You should scan the generated QR code
with a camera phone to test if the embedded data can be extracted. This service will give you full control over: The
block size, the padding size, the border size, the background color, the block color, the border color The image
below explains each of these values

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 26
NCRASEM 13 Paper ID:ECE01

Figure 7. QR code Generator

If the block size is large the generated QR code is more stable and easier to read with a QR code scanner. On the
other hand, as the QR code symbol size gets larger, a larger printing area is required.It is recommended to set the
block size to 5px. The generated QR code image can be very large depending on the number of characters entered,
block size, padding size and border size. To give you an idea how much a pixel (px) is, use the conversion tool to
convert the pixel size in millimeters [mm], centimeters[cm],inches[in],points[pt] or picas[pc].

The generated QR code can be rotated and converted into other image types.
The generated QR code image can be downloaded in the output area.
In this output area you also find the QR code in a binary form (qr_code_string).
This qr_code_string value together with the code template Display QR code with JavaScript are used to
display the QR code.

C. QR Code Reader:
If you have a Smartphone like an iPhone, Android or Blackberry then there a number of different barcode scanner
applications such as Red Laser, Barcode Scanner and QR Scanner that can read and decode data from a QR code.
The majority of these are completely FREE, and all you have to do once you install one is to use your phone's
camera to scan the barcode, which will then automatically load the encoded data for you. To read a QR code, a
smart phone set up with a camera and a QR code reader is required. The QR code reader is an application (to install
on your smart phone) which uses the camera to capture the code and decode it.

Figure 8. QR code readers

A wide range of QR code readers is available, below are the main ones: i-nigma, NeoReader, ScanLife, BeeTagg, ARM9:

III . ETHERNET
Ethernet Technologies: In the OSI model, Ethernet technology operates at the physical and data link layers One
and Two respectively. Ethernet supports all popular network and higher-level protocols, principally IP. Traditional
Ethernet supports data transfers at the rate of 10 Megabits per second (Mbps). Over time, as the performance needs
of LANs have increased, the industry created additional Ethernet specifications for Fast Ethernet and Gigabit
Ethernet. Fast Ethernet extends traditional Ethernet performance up to 100 Mbps and Gigabit Ethernet up to 1000

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 27
NCRASEM 13 Paper ID:ECE01

Mbps speeds. Although products aren't yet available to the average consumer, 10 Gigabit Ethernet (10000 Mbps)
also remains an active area of research. Ethernet cables likewise are manufactured to any of several standard
specifications. The most popular Ethernet cable in current use, Category 5 or CAT 5, supports both traditional and
Fast Ethernet. The Category 5e (CAT5e) cable supports Gigabit Ethernet To connect Ethernet cables to a computer,
a person normally uses a network adapter, also known as a network interface card (NIC). Ethernet adapters interface
directly with a computer's system bus. The cables, in turn, utilize connectors that in many cases look like the RJ-45
connector used with modern telephones.

IV.REFERENCES

[1] Fakhreddine Karray, Jamil Abou Saleh, Mo Nours Arab and Milad Alemzadeh, Multi Modal Biometric Systems: A State of the Art
Survey, Pattern Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo, Canada.
[2] Anil K. Jain, Arun Ross and Salil Prabhakar, An introduction to biometric recognition, Circuits and Systems for Video Technology,
IEEE Transactions on Volume 14, Issue 1, Jan. 2004 Page(s):4 20.
[3] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, Handbook of Fingerprint Recognition, Springer, New York, 2003.
[4] Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu, Fingerprint Verification System using Minutiae
Extraction Technique, World Academy of Science, Engineering and Technology 46 2008.
[5] H. C. Lee and R. E. Gaensslen, Advances in Fingerprint Technology, Elsevier Science, New York, ISBN 0-444-01579-5.
[6] Guide to Fingerprint Recognition DigitalPersona, Inc. 720 Bay Road Redwood City, CA 94063 USA, http://www.digitalpersona.com
[7] L. OGorman, Overview of fingerprint verification technologies, Elsevier Information Security Technical Report, Vol. 3, No. 1, 1998.
[8] B.G. Sherlock. D.M. Monro. K. Millard., Fingerprint enhancement by directional Fourier filtering, IEE hoc.-Vis. Image Signal
Processing, Vol. 141, No. 2, April 1994.
[9] Lin Hong., "Automatic Personal Identification Using Fingerprints," Ph.D. Thesis, ISBN: 0-599-07596-1, 1998.
[10] E. Hastings, A Survey of Thinning Methodologies, Pattern analysis and Machine Intelligence, IEEE Transactions, vol. 4, Issue 9, pp.
869 885, 1992.
[11] U. Halici, L. C. Jain, A. Erol, "Introduction to Fingerprint Recognition," Intelligent Biometric Techniques in Fingerprint and Face
Recognition, L.C. Jain, U. Halici, I.Hayashi, S.B. Lee, S. Tsutsui (editors), CRC Press, 1999.
[12] S. Pal, Some Low Level Image Segmentation Methods, Algorithms and their Analysis, Ph.D. Thesis, Department of Computer Science
& Engineering, Indian Institute of Technology, Kharagpur 1991.
[13] Ying Jie,YuanYi fang, Zhang Renjie, Song Qifa. Fingerprint minutiae matching algorithm for real time system. Pattern Recognition 39
(2006) 143 146.
[14] Feng Zhao, Xiaoou Tang, Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction, Pattern Recognition
40(4): 1270-1281 (2007).
[15] Henry Selvaraj, S. Arivazhagan and L. Ganesan, Fingerprint Verification Using Wavelet Transform, International Conference on
Computational Intelligence and Multimedia Applications, 2003.
[16] Cheong Hee Park and Haesun Park, Fingerprint classification using fast Fourier transform and nonlinear discriminant analysis, Pattern
Recognition 38 (2005) 495 503.
[17] Asker M. Bazen and Sabih H. Gerez, Segmentation of Fingerprint Images, Workshop on Circuits, Systems and Signal Processing,
Veldhoven, 2001.
[18] Chaur-Chin Chen and Yaw-Yi Wang, An AFIS Using Fingerprint Classification, Image and Vision Computing, 2003.
[19] Virginia Espinosa-Dur6, Fingerprints Thinning Algorithm, IEEE AES Systems Magazine, 2003.
[20] Pradeep M. Patil, Shekar R. Suralkar and Faiyaz B. Sheikh, Rotation Invariant Thinning Algorithm to Detect Ridge Bifurcations for
Fingerprint Identification, IEEE International Conference on Tools with Artificial Intelligence, 2005.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 28
NCRASEM 13 Paper ID:ECE02

Glitch-suppression Charge Pump design for


PLL Applications
Kumar.Keshamoni
Asst. Professor, Department of Electronics and Communication Engineering
RVR Institute of Engineering & Technology, Hyderabad, Andhra Pradesh, India
Email- kumar.keshamoni@gmail.com

Abstract:- This paper presents an improved phase frequency detector (PFD) and a novel charge pump (CP) for phase
locked loop (PLL) applications. The output signals of the proposed PFD have perfect symmetry with the additional four
latches. Two small PMOS transistors and two inverters are added to work as level recovery to avoid the uncertain state of
PFD when the circuit powers on. The proposed CP circuit employs two rail-to-rail OP amplifiers to minimize the
mismatch between the charging and the discharging current, which minimizes the steady-state phase error in a PLL and
reduces the reference spurs. Moreover, a simple but effective technique is proposed to suppress the glitches of the output
current, which also decreases the level of reference spurs in a PLL and at the same time increases the dynamic range of
the CP. A PLL adopting the proposed PFD and CP is fabricated in TSMC 0.13um 1.2V CMOS process, and test results
indicate that the PLL can achieve -56dBc reference spur level.

I.INTRODUCTION
Fully monolithic phase-locked loops in CMOS have been widely utilized in a wide variety of systems. Since
Phase/Frequency Detectors (PFD) and Charge Pump (CP) are key functional blocks of PLL, much attention has
been concentrated on them. The CPPLL structure is shown in Figure1.

Figure 1. Structure of charge pump PLL


The PFD senses the transition at the reference input and output of the divider, detects phase and frequency
differences, and activates the CP accordingly. The CP tunes the control voltage so that the input and output
synchronizes [1]. In the design of a conventional PFD circuit, the symmetry and the uncertainty of the output

Figure 2. The schematic of the proposed PFD

Figure 3. The output signals of the proposed PFD


signals when the circuit powers on are not attention-getting. However, the two issues are critical as they can lead to

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 29
NCRASEM 13 Paper ID:ECE02

the abnormal operation of the CP and increase the reference spur level. This paper focuses on the two problems of
PFD and finally a practical solution is proposed. The mismatch between the charging and the discharging current is
one of the most important non-idealities in the CP circuit. The glitch of the output current is another important
design consideration. The mismatch and the glitch of the CP will lead to a high reference spur. A novel glitch-
suppression CP circuit is presented to minimize the two problems in this paper, which can reduce the reference spur
level availably.
This paper is organized as follows. Section 2, 3 describes the design of the proposed PFD and CP respectively.
Section 4 reports the measurement results. Section 5 draws conclusions.

II DESIGN OF THE PROPOSED SYSTEM


A Design of the proposed PFD:
Figure 2 shows the schematic of the proposed PFD. Suppose the rising edge of REF leads that of DIV, then UP
goes logic high. UP keeps high until the rising edge of DIV makes DN on high level. As UPB and DNB gologic
low, RST goes to logic high and resets the PFD into the initial state. Here the reset delay is used to avoid the effect
of dead zone that is one of the important non-idealities of the charge pump.
As shown in Figure 3 the output signals of proposed PFD have perfect symmetry because of the additional four
latches [2], which can improve the performance of CP and the entire loop. When the circuit powers on, the reset
delay may lead to the uncertain state of the DFF_TSPC, which will make the initial values of UP, DN uncertain.
Since the output signals of the PFD are also the input signals of the CP, the uncertain state may result in the
abnormal operation of CP, which can influence the locking time of the PLL. To eliminate this problem, two small
sizes PMOS transistors and two inverters are added to work as level recovery to avoid the uncertain state of PFD.
B Design of the proposed Charge Pump:
The high performance charge pump is another key block in the design of a PLL. The output current of the charge
pump connected to the loop filter develops the control voltage for the following VCO. There are many non-idealities
of conventional CP, such as current mismatch, charge share and charge injection, etc. Any mismatch between the
charging and discharging current can cause steady-state offset as well as dynamic jitter, known as reference spur in a
PLL[3]. Glitches in the output current will increase the level of reference spurs in a PLL. It will also increase the
level of jitter generation in clock and data recovery systems. Various circuit techniques to reduce current mismatch
have been reported in the literature [4], [5], but they remove current mismatch at the cost of reduced output dynamic
range. A wide dynamic range of the charge pump is desired for the wide operating range of the PLL. To reduce the
overall mismatch and the output current glitches significantly, differential charge pump has been reported in [6]. The
charge pump in [7] reports a PFD/CP linearization technique and a new charge pump circuit to enhance the
performance of a PLL, but the reference spur is increased (to -39 dBc) as a result of the offset operation. The
proposed CP circuit is depicted in Figure 4. It uses the feedback function of the OP amp to hold the voltages of Vctr
and Vo, so the charge sharing between them can be avoided. The voltage Vb will change with Vctr by inserting an
error amplifier which has the gain high enough, so that the current Imain will be the same as the current Iref when
UP, DN level is holding high. The proposed CP circuit greatly improves the circuit performance by enhancing the
current match and lessening the charge sharing with two OP amplifiers. Figure 5 shows the DC simulation result of
the proposed CP. The good match between the charging current and

Figure 4. The schematic of the proposed Charge Pump

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 30
NCRASEM 13 Paper ID:ECE02

Figure 5. Simulated output current of the Charge Pump

Figure 6. Comparison between conventional current pulse and proposed current pulse

the discharging current is achieved. However, the working ranges of output and common mode input voltage of OP
amp must cover from VDD to VSS. Two rail-to-rail OP amplifiers have to be designed, which increases the
complexity, area and power. Moreover, M11, M12, M13 and M14 are used to reduce the effect of charge injection
when the four switches M9, M10, M15, and M16 turn off or turn on. The sizes of the four transistors M9, M10,
M15, and M16 should be designed carefully. Big sizes of the four transistors will increase the output current glitch,
while small sizes will confine the dynamic range of CP. In particular, two small resistances R1 and R2 are added to
the CP circuit, which can suppress the output current glitches effectively. When the switch M15 (M9) is steady-
state, the voltage VD (VB) equals to the voltage VC (VA). The voltage VD (VB) will decrease as soon as the switch
M15 (M9) turns on. The voltage difference between stable voltage VC (VA) and VD (VB) will lead to the great
output current glitches. By using two resistors R1 and R2, the additional charging current flowing from VC (VA) to
VD (VB) can keep the VD (VB) constant and suppress the output current glitches significantly. Figure 6 shows the
simulation result of the charging current without glitch suppression and with glitch suppression. In addition, with the
two resistors R1 and R2, the designer can choose big sizes of the four transistors M9, M10, M15, M16, so that the
proposed CP circuit could have a wider dynamic range.

III. MEASURED RESULTS


A PLL adopting the proposed PFD and CP is fabricated in TSMC 0.13um 1.2V CMOS process. Figure 7 shows
the chip photo of the whole PLL. The frequency of the reference signal is 48MHz and the measured PLL output
frequency is 8448MHz. Figure 8 shows the PLL output phase noise from an Agilent Spectrum Analyzer E4440A
phase noise measurement setup. The phase noise measured at 1MHz offset is -100.29 dBc/Hz. The PLL reference
spur is also measured with an Agilent Spectrum Analyzer E4440A to be -56dBc at 48MHz offset as shown in Figure
9.
IV. CONCLUSION
Design considerations and measurement results of the PFD and CP as building blocks of the PLL in TSMC
0.13um 1.2V CMOS process are presented. The output signals of proposed PFD have perfect symmetry with the
additional four latches. To avoid the uncertain state of PFD when the circuit powers on, two small PMOS transistors
and two inverters are added. Especially, the novel charge pump circuit can not only suppress the output current
glitch significantly, but also have a wider dynamic range compared with the conventional CP circuit. Mismatch

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 31
NCRASEM 13 Paper ID:ECE02

suppression circuit is also incorporated into the proposed CP circuit with two rail-to-rail OP amplifiers so that the
output currents have perfect matching over a large output swing. Simulation and test results indicate that the propose
PFD and CP circuits can reduce the reference spur of the entire loop effectively.

Figure 7. Chip photo of the designed PLL

Figure 8. Measured PLL output phase noise

Figure 9. Measured PLL output spectrum

V.REFERENCES

[1] Behzad Razavi, RF Microelectronics, Pearson Education, Inc.1998.pp. 237-238.


[2] Zhenyu Yang, master degree paper of Fudan Univ. in 2007, pp.37
[3] Rhee, W.: Proc. ISCAS, Orlando, FL, USA, July 1999, Vol. 2, pp. 542548
[4] Xiangguang Xuan, Feng Ran, Meihua Xu, International Conference on ICEPT-HDP 2008, pp. 1-4
[5] Hwang, M.-S.; Kim, J.; Jeong, D.-K.; Electronics Letters, Volume: 45 , 2009, pp. 135-136
[6] Shanfeng Cheng, Haitao Tong, Silva-Martinez, J., Karsilayan, A.I., IEEE Transactions on Circuits and Systems II, Volume: 53,2006, pp.
843-847
[7] Ching-Lung Ti,Yao-Hong Liu, Tsung-Hsien Lin, Proc. ISCAS, 2008, pp. 1728-1731

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 32
NCRASEM 13 Paper ID:ECE03

Reduction Of Power Consumption In CMOS


Logic Circuits By Using Adiabatic Technique
Y.Krishna Chaitanya
ECE Department, Geethanjali Institute Of Science And Technology
E Mail : chaitanya.yanamala@gmail.com

P.Sindhu
ECE Department, Geethanjali Institute Of Science And Technology
E-Mail : sindhu.bindhu21@gmail.com

P.RaghavaReddy
Assoc.Prof , HOD (ECE), Geethanjali Institute Of Science And Technology
E-Mail : raghavareddypammu@gmail.com

Abstract The Energy dissipation in conventional CMOS circuits can be minimized through adiabatic technique. By
adiabatic technique dissipation in PMOS network can be minimized and some of energy stored at load capacitance can be
recycled instead of dissipated as heat. But the adiabatic technique is highly dependent on parameter variation. With the
help of TSPICE simulations, the energy consumption is analyzed by variation of parameter. In analysis, two logic
families, ECRL (Efficient Charge Recovery Logic) and PFAL (Positive Feedback Adiabatic Logic) are compared with
conventional CMOS logic for inverter and 2:1 multiplexer circuits. It is find that adiabatic technique is good choice for
low power application in specified frequency range.

Index Terms Adiabatic switching, energy dissipation, power clock, equivalent model.

I. INTRODUCTION
The term adiabatic describe the thermodynamic processes in which no energy exchange with the environment,
and therefore no dissipated energy loss. But in VLSI, the electric charge transfer between nodes of a circuit is
considered as the process and various techniques can be applied to minimize the energy loss during charge transfer
event [1, 2]. Fully adiabatic operation of a circuit is an ideal condition. It may be only achieved with very slow
switching speed. In practical cases, energy dissipation with a charge transfer event is composed of an adiabatic
component and a nonadiabatic component [1-5].
In conventional CMOS logic circuits (Fig.1), from 0 to VDD transition of the output node, the total output energy
is drawn from power supply. At the end of transition, only energy is stored at the
load capacitance. The half of drawn energy from power supply is dissipated in PMOS network (F). From VDD to 0
transition of the output node, energy stored in the load capacitance is dissipated in the NMOS network (/F) [1].
Adiabatic logic circuits reduce the energy dissipation during switching process, and reuse the some of energy by
recycling from the load capacitance [1, 2]. For recycling, the adiabatic circuits use the constant current source power
supply and for reduce dissipation it uses the trapezoidal [6] or sinusoidal power supply voltage [7].

II. DISSIPATION MECHANISMS IN ADIABATIC LOGIC CIRCUITS


Fig.2 shows, the equivalent circuit used to model the conventional CMOS circuits during charging process of the
output load capacitance. But here constant voltage source is replaced with the constant current source to charge and
discharge the output load capacitance. Here R is on resistance of the PMOS network, CL is the load capacitance [1].
Energy dissipation in resistance R is [1],

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 33
NCRASEM 13 Paper ID:ECE03

Since diss E depends upon R, so by reducing the on resistance of PMOS network the energy dissipation can be
minimized. The on resistance of the MOSFET is given by the first order approximation is [3-5],

Where is the mobility, COX is the specific oxide capacitance, VGS is the gate source voltage, W is the width, L is
the length and Vth is the threshold voltage. Ediss also depends upon the charging time T, If T>> 2RC then energy
dissipation will be smaller than the conventional CMOS [1].
The energy stored at output can be retrieved by the reversing the current source direction during discharging process
instead of dissipation in NMOS network. Hence adiabatic switching technique offers the less energy dissipation in
PMOS network and reuses the stored energy in the output load capacitance by reversing the current source direction
[1, 2].

Figure 1 Conventional CMOS logic circuit with pull-up (F) and pull-down (/F) networks.

Figure 2 Equivalent model during charging process in adiabatic circuits.

II. ADIABATIC LOGIC FAMILIES

There are the many adiabatic logic design technique [8-18] are given in literature but here two of them are chosen
ECRL [10] and PFAL [11], which shows the good improvement in energy dissipation and are mostly used as
reference in new logic families for less energy dissipation.
A. Efficient Charge Recovery Logic (ECRL)
The schematic and simulated waveform of the ECRL inverter gate is shown in Fig.3 and Fig.4 respectively.
Initially, input in is high and input /in is low. When power clock (pck) rises from zero to VDD, since F is on so
output out remains ground level. Output /out follows the pck. When pck reaches at VDD, outputs out and /out
hold logic value zero and VDD respectively. This output values can be used for the nnext stage as an inputs. Now
pck falls from VDD to zero, /out returns its energy to pck hence delivered charge is recovered. ECRL uses four
phase clocking rule to efficiently recover the charge delivered by pck. For detailed study follow the reference [10].

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 34
NCRASEM 13 Paper ID:ECE03

Figure 3 Schematic of ECRL inverter

Figure 4 Simulated waveform of the ECRL inverter gate

The schematic and simulated waveform of the ECRL 2:1 Multiplexer is shown in Fig.5 and Fig.6 respectively.
Initially, select input s is high and power clock (pck) rises from zero to VDD, output out will select the input b.
If select input s is low and power clock (pck) rises from zero to VDD, output out will select the input a. When
pck reaches at VDD, outputs out and /out hold logic values. This output values can be used for the next stage as
an inputs. Now pck falls from VDD to zero, high outputs return its energy to pck hence delivered charge is
recovered.

Figure 5 Schematic of ECRL 2:1 Multiplier

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 35
NCRASEM 13 Paper ID:ECE03

Figure 6 Simulated Waveform of the ECRL 2:1 Multiplexer

B. Positive Feedback Adiabatic Logic (PFAL)


The schematic and simulated waveform of the PFAL inverter gate is shown in Fig.7 and Fig.8 respectively.
Initially, input in is high and input /in is low. When power clock (pck) rises from zero to VDD, since F and m4
are on so output out remains ground level. Output /out follows the pck. When pck reaches at VDD, outputs out
and /out hold logic value zero and VDD respectively. This
output values can be used for the next stage as an inputs. Now pck falls from VDD to zero, /out returns its energy
to pck hence delivered charge is recovered. PFAL uses four phase clocking rule to efficiently recover the charge
delivered by pck. For detailed study follow the reference [11, 13].
The schematic and simulated waveform of the PFAL 2:1 Multiplexer is shown in Fig.9 and Fig.10 respectively.
Initially, select input s is high and power clock (pck) rises from zero to VDD, output out will select the input b.
If select input s is low and power clock (pck) rises from zero to VDD, output out will select the input a. When
pck reaches at VDD, outputs out and /out hold logic values. This output values can be used for the next stage as
an inputs. Now pck falls from VDD to zero, high outputs return its energy to pck hence delivered charge is
recovered.

Figure 7 Schematic of PFAL inverter

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 36
NCRASEM 13 Paper ID:ECE03

Figure 6 Simulated Waveform of the PFAL inverter gate

Figure 9 Schematic of PFAL 2:1 Multiplexer

Figure 10 Simulated Waveform of the PFAL 2:1 Multiplexer

IV. IMPACT OF PARAMETER VARIATIONS ON THE ENERGY CONSUMPTION

Energy consumption in adiabatic circuits strongly depend on the parameter variations [19-21]. The impact of
parameter variations on the energy consumption for the two logic families is investigated with respect of CMOS
logic circuit, by means of TSPICE simulations. Simulations are carried out at 250nm technology node. The W/L
ratio of the PMOS and

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 37
NCRASEM 13 Paper ID:ECE03

A. Transition Frequency Variation


Fig.11 shows the energy dissipation per cycle versus switching frequency of the two adiabatic logic families and
CMOS for the inverter logic. Fig.12 shows the energy dissipation per cycle versus switching frequency of the two
adiabatic logic families and CMOS for the 2:1 multiplexer. It is seen that for high frequency the behavior is no more
adiabatic and therefore the energy dissipation increases. At low frequencies the dissipation energy will increase for
both CMOS and adiabatic logic due to the leakage currents of the transistors. Thus the simulations are carried out
only at useful range of the frequencies to show better result with respect to CMOS.

Fig. 11 Energy consumption per cycle versus frequency for an inverter at VDD = 2.5V and load capacitance = 20fF.

Fig.12 Energy consumption per cycle versus frequency for a 2:1 multiplexer at VDD = 2.5V, load capacitance = 20fF.

B. Load Capacitance Variation


Fig.13 shows the energy dissipation per cycle versus load capacitance of the two adiabatic logic families and
CMOS for the inverter logic. Fig.14 shows the energy dissipation per cycle versus load capacitance of the two
adiabatic logic families and CMOS for the 2:1 multiplexer. The Figures show that adiabatic logic families having
better energy savings than CMOS logic over wide range of load capacitances. PFAL shows better energy shavings
than ECRL at high load capacitance.

Load capacitance [fF]


Fig.13 Energy consumption per cycle versus load capacitance for an inverter at VDD = 2.5V and freq = 100 MHz.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 38
NCRASEM 13 Paper ID:ECE03

Load capacitance [fF]

C. Supply Voltage Variation


Fig.15 shows the energy dissipation per cycle versus supply voltage of the two adiabatic logic families and CMOS
for the inverter logic. Fig. 16 shows the energy dissipation per cycle versus supply voltage of the two adiabatic logic
families and CMOS for the 2:1 multiplexer. It is seen that supply voltage decreases, the gap between CMOS and
logic families is reduced. But ECRL and PFAL still shows large energy savings over wide range of supply voltage.

Figure 15 Energy consumption per cycle versus supply voltage for an inverter at load capacitance = 20fF and Frequency=100 MHz.

Figure 16 Energy consumption per cycle versus supply voltage for a 2:1 multiplexer at load capacitance = 20fF and frequency = 100 MHz..

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 39
NCRASEM 13 Paper ID:ECE03

V. CONCLUSION

The different parameter variations against adiabatic logic families are investigated, which shows that adiabatic logic
families highly depend upon its. But less energy consumption in adiabatic logic families can be still achieved than
CMOS logic over the wide range of parameter variations. PFAL shows better energy shavings than ECRL at the
high frequency and high load capacitance. Hence adiabatic logic families can be used for low power application
over the wide range of parameter variations.

VI REFERENCES
[1] W. C. Athas, L.J. Svensson, J.G. Koller, N. Tzartzanis, and E. Chou, Low power digital systems based on adiabatic-switching principles,
IEEE Trans. VLSI Systems, vol. 2, no. 4, pp. 398-407, Dec.1994.
[2] J. S. Denker, A review of adiabatic computing, in IEEE Symp. On Low Power Electronics, pp. 94-97, 1994.
[3] A. P. Chandrakasan, S. Sheng, and R. W. Brodersen, Lowpower CMOS digital design, IEEE J. Solid-State Circ., vol. 27, no. 4,
pp.473-484, Apr. 1992.
[4] A. G. Dickinson and J. S. Denker, Adiabatic dynamic logic, IEEE J. Solid-State Circuits, vol. 30, pp. 311315, Mar. 1995.
[5] J. G. Koller and W. C. Athas, Adiabatic switching, low energy computing, and the physics of storing and erasing information, IEEE
Press, in Pmc. Workshop on Physics and Computation, PhysCmp 92. oct. 1992.
[6] T. Gabara, Pulsed Power Supply CMOS, Technical Digest IEEE Symposium Low Power Electronics, San Diego, pp. 98- 99, Oct.1994.
[7] B. Voss and M. Glesner, A low power sinusoidal clock, In Proc. Of the International Symposium on Circuits and Systems, pp.108
111,May200l.
[8] A. Kramer, J. S. Denker, S. C. Avery, A. G. Dickinson, and T. R. Wik, Adiabatic computing with the 2N-2N2D logic family, in IEEE
Symp. on VLSI Circuits Dig. of Tech. Papers, pp. 25-26, Jun. 1994.
[9] A. Kramer, J. Denker, B. Flower and J. Moroney, Second Order Adiabatic Computation with 2N-2P and 2N-2N2P Logic Circuits,
Proceedings of international symposium on low power design, pp. 191-196, 1995.
[10] Y. Moon and D.K. Jeong, An efficient charge recovery logic circuit, IEEE J. Solid-State Circuits, vol. 31, no. 4, pp. 514522, Apr.1996.
[11] A. Vetuli, S. Di Pascoli, and L. M. Reyneri, Positive feedback in adiabatic logic, Electron. Lett., vol. 32, pp. 18671869, Sept.1996.
[12] A. Blotti, S. D. Pascoli, R. Saletti, Sample Model for positive feedback adiabatic logic power consumption estimation, Electronics Letters,
Vol.36, No. 2, pp. 116-118, Jan. 2000.
[13] J. Fischer, E. Amirante, A. B. Stoffi, and D. S. Landsiedel,Improving the positive feedback adiabatic logic family, in Advances in Radio
Science, pp. 221225, 2004.
[14] C. K. Lo and P. C. H. Chan, An adiabatic differential logic for lowpower digital systems, IEEE Trans. Circuits Syst. II, vol. 46, pp.1245
1250, Sept. 1999.
[15] V.G. Oklobdzija, D. Maksimovic, L. Fengcheng, Passtransistor adiabatic logic using single power-clock supply, IEEE Trans.Circ.Syst. II,
Vol. 44, pp. 842-846, Oct. 1997.
[16] W. C. Athas and N. Tzartzanis, Energy Recovery for Low-Power CMOS, Chapel Hill Conf. on VLSI, pp. 415-429, Proc. 1995.
[17] W. C. Athas, J. G. Koller, and L. J. Svensson, An energyefficient CMOS line driver using adiabatic switching, Proc. Fourth Great Lakes
Symp. VLSI Design, pp. 196-199, Mar. 1994.
[18] T. Indermauer and M. Horowitz, Evaluation of Charge Recovery Circuits and Adiabatic Switching for Low Power Design,Technical
Digest IEEE Sym. Low Power Electronics, San Diego, pp. 102-103, Oct.2002.
[19] E. Amirante, A. B. Stoffi, J. Fischer, G. Iannaccone, and D.S. Landsiedel, Variations of the power dissipation in adiabatic logic gates, in
Proc. 11th Int. Workshop PATMOS, Yverdon-Les-Bains, Switzerland, pp. 9.1.110, Sept. 2001.
[20] M. Eisele, J. Berthold, D. S. Landsiedel, R. Mahnkopf, The Impact of Intra-Die Device Parameter Variations on Path Delays and on the
Design for Yield of Low Voltage Digital Circuits, IEEE Transactions on VLSI Systems, Vol. 5, No. 4, pp. 360-368, Dec. 1997.
[21] R. T. Hinman and M. F. Schlecht, Power dissipation measurements on recovered energy logic, in IEEE Symp. VLSI Circuits Dig. Tech.
Papers, pp. 1920, June 1994

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 40
NCRASEM 13 Paper ID:ECE04

Never Die Disaster Information Network

R. Suresh
Rajiv Gandhi College of Engineering and Technology,
Kirumampakkam,Puducherry-607402
E-mail: sur12esh2007@gmail.com
Ph: 09787740775

Abstract - Never Die Disaster Information Network is a combination of Cognitive Wireless Network (CWN) and Satellite
System (SS). It is considered for optimal transmission of data even during severe disaster. However, even if Disaster
Information Network consists of Cognitive Wireless Network, some of wireless node might be broken after severe disaster
is happened. Therefore, it is necessary to consider about additional functions which the system never die.
In this paper, we introduce four modules in the Disaster Information Network: (i) Disaster detection (ii) Route selection
(iii) Failure detection (iv) Reconfiguration system. For the optimal route selection in the transmission of data Ad-hoc On
Demand Multipath Distance Vector Routing (AOMDV) protocol is used. In the simulation, Network Simulator 2 (NS 2)
is used to obtain optimal transmission of data using AOMDV protocol and efficiency of data packets sent during disaster.

Keywords: AOMDV, CWN, SS

I. INTRODUCTION
In case of Disaster Information System such as the case for earthquake, there is a certain possibility that electric
power line is damaged and power energy cannot be supplied to those communication network devices, and
eventually those wireless LANs cannot be functioned. Those malfunctions may cause serious damages for human
life or lack of important information at the just after the occurrence of disaster. Therefore, Disaster Information
System needs a robust Never Die Network (NDN) which will be unaffected by any changes in environment after
severe disaster. Satellite Network System is considered to be one of efficient methods to realize NDN, because it is
unlikely influenced by such a severe disaster and can be covered wide area transmissions even if some of network
devices were broken down. However, Satellite Network has some problems for Quality of Service (QoS) like the
following; throughput is low, latency is large, sending and receiving data transmission is different, cost is expensive,
and so on. Thus, it is not suitable for the transfer of multimedia content and large volume of contents. On the other
hand, wireless network can be solved such a problems.
However, usual wireless communications consisted of single wireless network might have the following problem.
First, the physical characteristics of wireless frequency may cause lack of Quos. When radio is a high-frequency
band, high bandwidth communications like video contents are suitable for shorter communication distance. But it is
highly influenced by obstacles such as buildings and trees. On the other hand, low-frequency radio communication
is suitable for long distance communications and lower influence of obstacles such as trees. Disaster Information
System, wireless network is effective method because it is quickly reconstruct network than wired network.
However, usual wireless communications consisted of single wireless network might have the following problem.
First, the physical characteristics of wireless frequency may cause lack of QoS. When radio is a high-frequency
band, high bandwidth communications like video contents are suitable for shorter communication distance. But it is
highly influenced by obstacles such as buildings and trees. On the other hand, low-frequency radio communication
is suitable for long distance communications and lower influence of obstacles such as trees. But it is not suitable for
the transfer of multimedia content and large volume of contents. Also, because of the wireless LAN for rapid spread
in recent years, there are concerns about the interference on the same radio spectrum between users. IEEE802.11b/g
has spread to many houses, and these devices could be interfere to Emergent Communication System like Disaster
Information Network. Moreover, in the actual disaster case, there is certain possibility that electric power line is
damaged and power energy cannot be supplied to those communication network devices, eventually those wireless
LANs cannot be functioned. That is, Disaster Information System needs a robust Never Die Network (NDN) which
will be unaffected by any changes in environment after severe disaster. In order to solve this problem, we introduce
the Combination of Cognitive Wireless Network (CWN) and Satellite System for Disaster Information System.
CWN is consisted of combining with multiple LANs with different transmission characteristics such as
IEEE802.11b,g,j,n, IEEE802.16, and cellular network. These wireless links are selectively switched by the distance

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 41
NCRASEM 13 Paper ID:ECE04

between the wireless network nodes, power density, transmission frequency and their cover area, network
transmission speed, and so on. Also, suitable communication environment can be provided even though the
communication environment has been changed. Satellite System provides the function of checking wireless nodes
alive and their locations, reconstructing the topology, alternating data transmission if there is no possible activate
nodes, and so on.
II. MANET
The next generation of wireless communication systems, there will be a need for the rapid deployment of
independent mobile users. Significant examples include establishing survivable, efficient, dynamic communication
for emergency/rescue operations, disaster relief efforts, and military networks. Such network scenarios cannot rely
on centralized and organized connectivity, and can be conceived as applications of Mobile Ad Hoc Networks. A
MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained
wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time.
The network is decentralized, where all network activity including discovering the topology and delivering messages
must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes. The set
of applications for MANETs is diverse, ranging from small, static networks that are constrained by power sources,
to large-scale, mobile, highly dynamic networks. The design of network protocols for these networks is a complex
issue. Regardless of the application, MANETs need efficient distributed algorithms to determine network
organization, link scheduling, and routing. However, determining viable routing paths and delivering messages in a
decentralized environment where network topology fluctuates is not a well-defined problem. While the shortest path
(based on a given cost function) from a source to a destination in a static network is usually the optimal route, this
idea is not easily extended to MANETs. Factors such as variable wireless link quality, propagation path loss, fading,
multiuser interference, power expended, and topological changes, become relevant issues. The network should be
able to adaptively alter the routing paths to alleviate any of these effects. Moreover, in a military environment,
preservation of security, latency, reliability, intentional jamming, and recovery from failure are significant concerns.
Military networks are designed to maintain a low probability of intercept and/or a low probability of detection.
Hence, nodes prefer to radiate as little power as necessary and transmit as infrequently as possible, thus decreasing
the probability of detection or interception. A lapse in any of these requirements may degrade the performance and
dependability of the network.

III. EXISTING SYSTEM


Monitoring SHM in a large-scale wireless sensor networks (WSN) is very difficult, not only because it is large
and complex, ,much of difficulty comes from the lack of visual analysis tools. With the development of WSN, the
networks become larger and larger and with the increasingly wide range of its application, many customize
protocols are made. These factors make the monitoring of WSN become very difficult. There are some test and
analysis tools for WSN, but only for a certain kind of sensor network protocols or custom protocols, therefore
theres a lack of flexibility. Some of the tools are limited by the capability of data transmission, they are unable to
perform the monitoring of sensor network with large traffic, therefore the study of system with capability to monitor
and analyze larger sensor network is necessary and important. These wireless links are selectively switched by the
distance between the wireless network nodes, power density, transmission frequency and their cover area, network
transmission speed, and so on. Also, suitable communication environment can be provided even though the
communication environment has been changed. Satellite System provides the function of checking wireless nodes
alive and their locations, reconstructing the topology, alternating data transmission if there is no possible activate
nodes, and so on.
IV. PROPOSED SYSTEM
Network conditions or AHP results are transferred by Satellite System as communication link (link0). The
message of prefer link or route is sent through link0, and a reconfiguration procedure is acted at both sender and
receiver nodes. Location of every node is also collected by link 0. Secondly, wireless nodes are checked whether
nodes are destroyed or not after disaster through Satellite System. Also, the system makes alternative data
transmission if there is no route after disaster. Finally, alternative wireless network topology is committed for
reconstruction of network. Disaster Information Network needs to provide the minimal data connection at least even
if some network faculties would be broken and the network quality such as throughput or PER would become worse.
Therefore, data connectivity is the most important during this term while the other network factors such as data
amount are not so. When just after disaster happened, the communication network around the disaster area maybe
damaged and must be quickly recovered although the required network throughput is small while at stable and
recovery period, the required throughput will be increased as the time is elapsed. Thus, small throughput data
transfer by Satellite System is considered to possible alternative route if wireless nodes are damaged by disaster.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 42
NCRASEM 13 Paper ID:ECE04

Never Die Network with combination of Cognitive Wireless Network and Satellite System is proposed. In case of
our proposed Disaster Information System, this combination is supposed to be effective because data transmission
keeps even after severe disaster happened. Wireless links are selectively switched by user policy. Also, suitable
communication environment can be provided even though the communication environment has been changed. To
realize these functions, extend AHP with Min-Max method and extend AODV with GPS method are proposed for
wireless link and route selection in this paper. Also, we proposed that Satellite System provides the function of
checking wireless nodes alive and their locations, reconstructing the topology, and alternating data transmission if
there is no possible activate nodes. The overall block diagram of the proposed system is given below:

Figure 1: Block Diagram of Disaster Information Network

V. DISASTER DETECTION
When just after disaster happened, the communication network around the disaster area maybe damaged and must
be quickly recovered although the required network throughput is small while at stable and recovery period, the
required throughput will be increased as the time is elapsed. Thus, small throughput data transfer by Satellite System
is considered to possible alternative route if wireless nodes are damaged by disaster.
The initial goal of the disaster detection system project was to create a simulation environment capable of
simulating simple seismic activity and implementing software capable of detecting the seismic activity. The
environment was based upon a simple model of an ordinary living arrangement, such as an apartment complex or
dormitory building. The design consisted of a small-scale, two story building constructed of foam board. The
building was placed on a low-friction surface that allowed the building to be easily shaken and moved, providing
simulated earthquake signals that could be measured using a mote placed inside the house.
The earthquake detection software consists of two versions and was designed to read the accelerometer on the
Tmote Invent so that the data could be transmitted, processed, and displayed in a useful manner. The two versions of
the software are essentially identical, the only difference being the sensor used (x or y) and the corresponding state
variable

VI. CONCLUSIONS

We have discussed how it is possible to deal with the disconnection of the communication network system in the
case of another disaster on the scale of the Great East Japan Earthquake of March 2011. We have considered how
the rescue services and disaster affected areas could be greatly assisted by a robust network connectivity that could
form a new type of Disaster Information Network System. Paper proposes a Never Die Network that consists of
CWN and a Satellite Network. A proper wireless link and route are optimally selected by taking proper account of

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 43
NCRASEM 13 Paper ID:ECE04

network environment and the users particular requirement. In our proposed method, the cognition cycle will follow
these particular factors. Secondly, for the optimal link selection, an extended AHP method will consider the
respective change of network environment and user policy during a disaster. Then, if the network or user
environment is changed, another route selection method will be conducted by the extended AODV with Min-Max
AHP values. For the sake of evaluating our proposed methods, the simulation compares an ordinal single wireless
network system and a CWN in a hypothetical disaster situation. In this paper, mobile nodes such as 90Never Die
Network Uchida, Takahata, Shibata, and Shiratori wireless cars are also considered in the experiments as well as
xed nodes. Figures 17 and 18 show how our proposed methods create robust network connectivity and a quick
recovery in comparison with a single wireless network and a CWN. Therefore, we suggest that our proposed NDN is
more effective as a Disaster Information Network System than previous models.Now we are in the process of
constructing a eld experiment demonstrating how our proposed NDN could work in the coastal cities of Iwate
Prefecture. Then, the local test-bed is planned to connect up with the New Generation Network (JGN-X) in order to
simulate an additional experiment showing how a Software Dened Network (SDN) and an autonomous disaster
cloud computing system (no acronym exists at the moment) can be used in combination for a future study of the
proposed NDN.

VII. REFERENCES
[1] G. Sato, N. Uchida, D. Asahizawa, and Y. Shibata, Power saving radio LANs for disaster information system, in Proc. of the 12th
International Conference on Network-Based Information Systems (NBiS09), Indianapolis, Indiana, USA. IEEE, August 2009, pp. 592596.
[2] Y. Shibata, H. Yuze, T. Hoshikawa, K. Takahata, and N. Sawano, Large scale distributed disaster information system based on MANET and
overlay network, inProc. of the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW07), Toronto, Ontario,
Canada. IEEE, June 2007.
[3] W. Kuji, G. Satou, K. Koide, Y. Shibata, and N. Shiratori, Never-die network and disaster-control system, IPSJ SIG Notes, vol. 54, pp.
131135, June 2008.
[4] N. Uchida, K. Takahata, and Y. Shibata, Disaster information system from communication trafc analysis and connectivity (quick report
from Japan Earthquake and Tsunami on March 11th, 2011), in Proc. of the
14th International Conference on Network-Based Information Systems (NBIS11), Tirana, Albania. IEEE, September 2011, pp. 279285.
[5] Japan Police Department, The Great East Japan Disaster, http://www.npa.go.jp/archive/keibi/biki/index.htm.
[6] Japan Meteorological Agency, Past Reports of Earthquake and Tsunami,
http://www.seisvol.kishou.go.jp/eq/higai/higai-1995.html.
[7] N. Uchida, K. Takahata, and Y. Shibata, Network relief activity with cognitive wireless network for large scale disaster, in Proc. of the 4th
International Workshop on Disaster and Emergency Information Network Systems (IWDENS12), Fukuoka, Japan. IEEE, March 2012, pp.
10431047.
[8] Y. Shibata, N. Uchida, and Y. Ohhashi, Problem analysis and solutions of information network systems on East Japan Great Earthquake, in
Proc. of the 4th International Workshop on Disaster and Emergency Information Network Systems (IWDENS12), Fukuoka, Japan. IE EE, March
2012, pp. 10541059.
[9] D. Nakamura, N. Uchida, H. Asahi, K. Takahata, K. Hashimoto, and Y. Shibata, Wide area disaster information network and its resource
management system, in Proc. of the 17th International Conference on Advanced Information Networking and Applications (AINA03), Xian,
China. IEEE, March 2003, pp. 146150.
[10] N. Uchida, K. Takahata, Y. Shibata, and N. Shiratori, A large scale robust disaster information system based on never die network, in
Proc. of the 4th 26th IEEE International Conference on Advanced Information Networking and Applications (AINA12), Fukuoka, Japan. IEEE,
March 2012, pp. 8996.
[11] J. M. III and G. Q. Maguire, Cognitive radio: making software radios more personal, IEEE Personal Communications, vol. 6, no. 4, pp.
1318, August 1999.
[12] J. M. III, Cognitive Radio; An Integrated Agent Architecture for Software Dened Radio, Ph.D. dissertation, Royal Institute of
Technology (KTH), Sweden, May 2000. 91Never Die Network Uchida, Takahata, Shibata, and Shiratori
[13] N. Uchida, K. Takahata, and Y. Shibata, Proposal of never die network with the combination of cognitive wireless network and satellite
system, in Proc. of the 13th International Conference on Network-Based Information Systems (NBIS10), Takayama, Gifu, Japan. IEEE,
September 2010, pp. 365370.
[14] T. L. Saaty, How to make a decision: The analytic hierarchy process, European Journal of Operational Research, vol. 48, no. 1, pp. 9 26,
September 1990.
[15] T. Sugimoto, S. Yamaguchi, and K. Asatani, A proposal for system selection scheme using multiple handover triggers in heterogeneous
wireless networks, IEICE Technical Report, vol. 108, no. 457, pp. 8994, March 2009.
[16] T. Ahmed, K. Kyamakya, and M. Ludwig, Design and implementation of a context-aware decision algorithm for heterogeneous networks,
in Proc. of the 21st Annual ACM Symposium on Applied Computing (SAC06), Dijon, France. ACM, April 2006, pp. 11341138.
[17] N. Hu and P. Steenkiste, Estimating available bandwidth using packet pair probing, School of Computer Science, Carnegie Mellon
University, Pittsburgh, USA, Tech. Rep. CMU-CS-02-166, 2002.
[18] C. E. Perkins and E. M. Royer, Ad hoc on-demand distance vector routing, in Proc. of the 2nd IEEE Workshop on Mobile Computing
Systems and Applications (WMCSA99), New Orleans, Louisiana, USA. IEEE, February 1999, pp. 90100.
[19] I. D. Chakeres and E. M. Belding-Royer, AODV routing protocol implementation design, in Proc. of the 24th International Conference on
Distributed Computing Systems Workshops - W7: EC (ICDCSW04), New Orleans, Tokyo, Japan, vol. 7. IEEE, March 2004, pp. 698703.
[20] The network simulator - ns-2, http://www.isi.edu/nsnam/ns/.
[21] Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M. Torrent-Moreno, L. Delgrossi, and H. Hartenstein, Overhaul of ieee 802.11 modeling and
simulation in ns-2, in Proc. of the 10th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM07),
Chania, Crete Island, Greece. ACM, October 2007, pp. 159168.
[22] ns-users, http://www.isi.edu/nsnam/ns/.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 44
NCRASEM 13 Paper ID:EEE01

Power Quality Improvement using Hybrid


Power Flow Controller in Power System
Yellaiah Ponnam
Assistant Professor
SICET,Sheriguda,IBP,R.R.Dist
yallaiah.260@gmail.com

Palarapu Sravan kumar


Sr. Assistant Profess
ASTRA,Bandlaguda,hyd
sravangupta246@gmail.com

Abstract This paper discusses the applicability of Hybrid Power Flow Controller (HPFC) as an alternative to
Unified Power Flow Controller (UPFC) for improvement of power system performance. UPFC is a flexible AC
transmission system (FACTS) device containing two switching converters, one in series and one in shunt. To configure
the HPFC, one of the switching converters of the UPFC is replaced by thyristor controlled variable impedances, thus
reducing the cost. In this paper, the HPFC has been configured by multilevel Voltage Source Converter (VSC) used for
the shunt compensation branches and a thyristor controlled variable impedance used for series compensation.
It is shown that with suitable control the HPFC can inject a voltage of required magnitude in series with
the line at any desired angle, just like UPFC. This helps in providing compensation equivalent to UPFC and
improving the steady state stability limits of the power system.

Keywords Flexible AC Transmission Systems, Unified Power Flow Controller, Hybrid Power Flow Controller.

I. INTRODUCTION
The demand for electrical power is rising across the world. Setting up of new generating facilities and
building or upgrading the transmission system is constrained by economic and environmental factors. Flexible
AC Transmission System (FACTS) provides an avenue to utilize the existing system to its limits without
endangering the stability of the system, thus providing efficient utilization of the existing system.
FACTS devices can be broadly classified into two types, namely (a) Variable Impedance type devices, e.g.
Static Var Compensator (SVC) or Thyristor Controlled Series Capacitor (TCSC) and (b) Switching Converter
type devices which generally use Voltage Source Converters (VSCs), e.g. Static Synchronous Compensator
(STATCOM) or Unified Power Flow Controller (UPFC). The dynamic performance of VSC based FACTS
devices have been observed to be better than that of the variable impedance type FACTS devices [1]. Among the
VSC based FACTS devices, the UPFC [2, 3] is capable of controlling all the parameters that effect power flow in a
transmission line either simultaneously or selectively. But the main constraint in the use of the UPFC is its cost. The
VSC especially for the transmission voltage level comes at a very high cost. There are reportedly very few
installations of UPFC around the world [4], as compared to the number of installations of SVC and TCSC which are
comparatively cheaper.
In case it is imperative to install a UPFC in a particular line in a given system, the idea of the Hybrid Power
Flow Controller (HPFC) proposed in [5] can possibly be an alternative solution without significant reduction in
versatility. The HPFC is a blend of switching converter based FACTS devices along with variable impedance type
FACTS devices. The motivation behind the proposal of the HPFC is to provide possible alternative solutions to the
UPFC as far as economy is concerned, and to improve the dynamic performance of the Variable Impedance type
FACTS devices via coordination with VSC based FACTS devices. In order to conserve the properties of the
UPFC, and to configure the HPFC, the shunt converter in the UPFC is replaced by two half sized shunt converters
with their DC links connected back to back, so that the effective cost of the shunt converter remains comparable.
On the other hand, the series converter has been replaced by a thyristor controlled variable impedance type
FACTS device which reduces the cost of the series compensator considerably.
The steady state analysis of the HPFC has been presented in [5] with simplified models. This paper focuses on
the control structure and the comparison of the steady state performance of the HPFC with a model of the UPFCof
equivalent rating. In the configuration of the HPFC, the two shunt VSCs are multilevel converters to suit the higher
voltage level. A fixed capacitor with Thyristor Controlled Reactor (TCR) in parallel has been used as the series

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 45
NCRASEM 13 Paper ID:EEE01

compensator. A metal oxide varistor (MOV) is also connected in parallel to provide protection against over
voltages. The models of the HPFC and a UPFC of equivalent rating have been connected in a single machine
infinite bus (SMIB) system one at a time and the steady state performance have been compared. The complete
system has been simulated using PSCAD/EMTDC.

II. THE CONCEPT OF THE UPFC & THE HPFC


A. Unified Power Flow Controller
The UPFC is configured as shown in Fig. 1. It comprises two VSCs coupled through a common dc terminal.
VSC1 is connected in shunt with the line through a coupling transformer and VSC2 is inserted in series with
the transmission line through an interface transformer. The DC voltage for both converters is provided by a
common capacitor bank (CDC). The series converter is controlled to inject a voltage Vpq in series with the line,
which can be varied between 0 and Vpqmax. Moreover, the phase angle of the phasor Vpq can be varied
independently

Figure 1. Basic Configuration of the UPFC.


between 0o and 360o. In this process the series converter exchanges both real and reactive power with
the transmission line. While the reactive power is internally generated/absorbed by the series converter, the real
power generation/absorption is made feasible by the DC capacitor. VSC1 is mainly used to supply the real
power demand of VSC2, which it derives from the transmission line itself. The shunt converter maintains the dc
bus voltage constant. Thus the net real power drawn from the ac system is equal to the losses of the two
converters and their coupling transformers. In addition, the shunt converter functions like a STATCOM and to
regulate the terminal voltage of the interconnected bus independently, by generating/absorbing requisite
amount of reactive power.
B. Hybrid Power Flow Controller (HPFC)
The configuration of the HPFC followed in this paper is shown in Fig. 2. It comprises of two VSCs coupled
through a common DC circuit. The VSCs are connected in shunt with the transmission line through coupling
transformers, each on either side of the TCSC. Each VSC is half the rated capacity of the shunt VSC in the UPFC.
The proposed version of HPFC in [3] used Current Sourced Converters (CSC) in shunt. However, VSC has
been chosen in this paper due to the fact that VSCs offer better dynamic performance when compared to CSCs
and also VSCs use self commutated converters which offer better versatility when compared to the line
commutated converters used in CSCs. Also line commutated converters have the risk of having a commutation
failure which does not occur in self commutated converters.
Just like the UPFC, the HPFC injects a voltage in series with the transmission line voltage and by varying the
phase angle of this voltage vector, offers control of the real and reactive power flow through the line. The
magnitude of the injected series voltage can be varied by varying the impedance of the series compensator through
the firing angle of the thyristors. The phase angle of the injected series voltage can be controlled by controlling the
VAR outputs of the shunt compensators. Actually the injected voltage is the vector difference between the voltages
V1 and V2. Therefore the angle of the injected voltage can be varied by varying the magnitudes of V1
and V2. These magnitudes depend on the reactive power output of the shunt connected converters and hence
can be controlled. This can be explained using Fig. 3. Considering a constant bus voltage V2, and a particular
value of the magnitude of the injected voltage Vc, angle of Vc will vary along a circular locus depending on the
magnitude of bus voltage V1.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 46
NCRASEM 13 Paper ID:EEE01

Figure 2. Basic Configuration of the HPFC.

Figure 4. Multilevel Inverter (3-level)

Here VCmax and VCmin are determined by the limits of the variable impedance of the series compensator. The
shunt compensators draw a small amount of active power from the line in order to maintain the DC bus voltage
constant.
C. Voltage Source Converter (VSC)
A VSC is essentially a self commutated DC to AC converter, generating balanced three phase voltages. The
configuration shown in Fig. 4 is a basic diode clamped multilevel inverter. The switching device is Insulated Gate
Bipolar-junction Transistor (IGBT). Pulse Width Modulation (PWM) switching technique is used to get an output
voltage closer to sinusoid. In this paper, multilevel inverter [6, 7] has used so that the voltage stress on each switch
is reduced. Also the use of multilevel inverter reduces the harmonic content of the voltage generated by the
VSC.
III. CONTROL STRUCTURE OF THE UPFC & HPFC
A. The Shunt Compensator Control Strategy
Fig 5 shows the control structure of the shunt converter [8 - 11]. The main objective of this control is to
maintain required voltage at the point of common coupling (PCC) and to control of the DC link capacitor voltage
simultaneously. These two control actions take place in a decoupled manner by the use of Parks transformation. A
phase locked loop (PLL) synchronizes the positive sequence component of the three-phase terminal voltage at PCC.
The outer loop of the PCC voltage regulator compares the voltage reference (Etref) with the measured PCC
voltage and the error is fed to a PI controller which provides the reference current for the quadrature axis,
Iqref. In the inner loop, this Iqref is compared with the measured value of quadrature axis current (Iq) and the
error is fed to a second PI controller. As Iq is in quadrature with the terminal voltage, the reactive power
output of the converter (and in turn the PCC voltage) is controlled through this part of the controller.The outer
loop of the dc link voltage regulator compares the preset dc link voltage reference (VDCref) with the measured
dc link voltage and the error is fed to a PI controller which provides the reference current for the direct axis, Idref.
In the inner loop, this Idref is compared with the measured value of direct axis current (Id) and the error is
fed to a second PI controller. The direct axis current (Id) being in phase with the terminal voltage helps to

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 47
NCRASEM 13 Paper ID:EEE01

control the active power so as to either increase or decrease the DC link voltage (and to supply the active
power requirements of the series converter in the case of the UPFC). The current regulators (inner loop)
generates signals Esd and Esq. These are then transformed to a-b-c frame to get the reference waves for the
PWM. These signals are compared with the carrier waves (which are triangular waves whose peak to peak value is
either equal to or greater than the amplitude of the reference waves) in order to generate the PWM switching
pulses for the inverter.
B. The Series Compensator Control Strategy
As mentioned in section I, the series compensator of the HPFC consists of a fixed capacitor shunted
by a TCR. The control structure for this compensator [12] is shown in Fig. 6(b). The active power flow (P)
through the line containing the series compensator is taken as the control variable. The measured value of P is
compared with the reference value of active power flow (Pref) and the error is fed to a P-I controller. The output of
the P-I controller is the firing angle () of the thyristors of the TCR. This value of firing angle () is limited
between 1450 and 180 0 to keep the net impedance of the compensator within the capacitive operation zone ().
The output of the limiter is supplied to the firing circuit of the series compensator. In case of UPFC, the
series converter provides simultaneous control of real and reactive power flow in the transmission line. To
do so, the series converter injected voltage is decomposed into two components. One component of the series
injected voltage is in quadrature and the other in-phase with the line current i.

Figure 5. Control structure for the shunt converter for the UPFC as well as the HPFC.

Figure. 6. (a) Basic module of the series compensator. (b) Control structure

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 48
NCRASEM 13 Paper ID:EEE01

Figure. 7 Control structure for the series converter for the UPFC.

III. COMPARISON OF RESULTS OF COMPENSATION WITH HPFC AND UPFC


The HPFC and the UPFC have been tested in a Single Machine Infinite Bus (SMIB) system shown in Fig. 8. The
generator has been modeled as a voltage source behind the transient reactance (Classical model). Detailed data of
the SMIB system, the HPFC and the UPFC are given in the Appendix (Table A1 and Table A2). At first, with no
compensator connected in the system, 73 MW power flows through the transmission line from the alternator to
the infinite bus when the angle between the generator voltage and infinite bus voltage () is kept equal to
22. Now the HPFC is connected as shown in Fig.2. The PCC voltages for both the converters (V1 and V2)
are maintained at 230 kV and the angle is maintained at 22. This results in an increase in the power flow
through the line to 100 MW. A plot of the steady state power in the uncompensated and the compensated system
is shown in Fig. 9. This increase in power flow takes place because of the voltage injection by the HPFC.
The corresponding phasor diagram of V1, V2 and injected voltageVc is shown in Fig. 10. Next, the power flow
through the line is maintained at 100 MW and the angle is allowed to vary. The teady state values of for the
uncompensated system and the system compensated by HPFC are plotted in Fig. 11. It can be seen that the value
of for the uncompensated system is 0.54 radian which comes down to 0.39 radian when HPFC is connected to
the system. A decreased value of means more power can be transmitted through the line. Now if the UPFC is
connected to the system, the value of becomes 0.35 radian which is also shown in Fig. 11. Thus all these
results indicate that compensation with HPFC increases the power carrying capacity of a transmission line and
the effect of HPFC and UPFC in this regard are comparable.

Figure. 8 Power flow for uncompensated and HPFC compensated system

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 49
NCRASEM 13 Paper ID:EEE01

Figure. 9 PCC voltages of the shunt converters of the HPFC and the series voltage injected by the HPFC

Figure. 10 Value of for uncompensated and compensated system

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 50
NCRASEM 13 Paper ID:EEE01

Figure. 11. Comparison of the steady state reactive power generation: Case5.

Simulations have been performed for the UPFC and the HPFC in order to prove that, just like the UPFC, the
HPFC injects a voltage source of controllable magnitude and phase angle, in series with the transmission line. In
order to fulfill this particular objective, the following cases have been considered where the reference variables for
the UPFC and the HPFC have been adjusted in such a manner that the bus voltages V1 and V2 are maintained at:
Case 1: V1 = V2 = 230 KV (Line to line).
Case 2: V1 = 237 KV, V2 = 230 KV.
Case 3: V1 = 222 KV, V2 = 230 KV.
Case 4: V1 = 235 KV, V2 = 225 KV
Case 5: V1 = V2 = 237 KV.
Case 6: V1 = 225 KV, V2 = 235 KV

Figure. 13. Phasor diagrams showing the injected series voltage - cases 1, 2 and 3.

Fig. 14. Phasor diagrams showing the injected series voltage - case 5.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 51
NCRASEM 13 Paper ID:EEE01

TABLE I COMPARISON OF INJECTED SERIES VOLTAGES


HPFC UPFC
Phase angle of Phase angle
Voltage Voltage
the injected of
across the across the
series voltage the injected
series series
with respect to series voltage
branch branch
bus V2 with respect to
Case 1 18.05 KV -94.0474 0
19.12 KV V2 0
bus-94.5880
Case 2 17.35 KV -80.31950 18.60 KV -81.85860
Case 3 19.55 KV -108.03560 21.05 KV -107.72250
Case 4 18.36 KV -75.65630 19.64 KV -77.59800
Case 5 16.32 KV -93.65220 17.64 KV -94.17210
Case 6 18.95 KV -111.76280 20.35 KV -111.46310

TABLE II OPERATING CONDITIONS OF HPFC AND UPFC: CASE 5


HPFC UPFC
Active power of the VSC 1 -1.1891 MW
0.5990 MW
shunt branch VSC 2 -0.9768 MW
Active power of the
0.0315 MW -2.1685 MW
series branch
17.3178
VSC 1
Reactive power of MVAR 31.6142
the shunt branch 17.3190 MVAR
VSC 2
MVAR
Reactive power of 13.1143
11.8244 MVAR
the series branch MVAR
Voltage across the
16.32 KV 17.64 KV
series branch
Power flow through
100 MW 100 MW
the line

In all the cases, the synchronous machine has been treated as a constant voltage source with the sending end
voltage at 230 KV, both the UPFC and the HPFC try to maintain the power flow through the line constant at
100 MW. Fig. 12 compares the steady state operating condition of the HPFC and the UPFC for case 5. Fig 13 and14
show the phasor diagram of the injected series voltage of the UPFC and the HPFC for cases 1 to 4 as above. A
comparison of the magnitude and phase angle of HPFC with those for the UPFC is given in Table I. It can be seen
that the magnitude and angle of the voltage injected by the HPFC for all the five case are pretty close to those in
case of compensation by UPFC. Similarly, Table II shows a comparison of active and reactive power of the series
and shunt branch and line power flow for compensation with HPFC and UPFC.
It is clearly understood from Figures 11, 12, and table I, that the HPFC behaves just like the UPFC in its principle,
in other words, the HPFC injects a voltage source of controllable magnitude and phase angle, in series with the
transmission line, thus controlling the real and reactive power flow through the line. Also Fig 10 shows that the
reactive power generated by the VSCs is found to be almost the same. Hence the fact that two half sized VSCs
are used for the HPFC is justified.
V. CONCLUSION
In this paper, the steady state performance of the HPFC has been studied. The HPFC configuration used here has
two shunt connected VSCs around a series connected variable impedance type reactive compensator. The control
structure for the HPFC and the UPFC has been presented. The HPFC and the UPFC have been connected to an
SMIB system. It has been shown that the HPFC, similar to UPFC, can inject a voltage source of controllable
magnitude and phase angle in series with the line. Also HPFC, with proper control, is found to increase the power
flow through a line and reduce the value of the angle between the voltages at the two ends of the line. Thus, the
performance characteristics of the HPFC are similar to that of the UPFC without significant reduction in
versatility. Thus the HPFC can be regarded as a cost effective alternative to the UPFC.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 52
NCRASEM 13 Paper ID:EEE01

TABLE A2 PARAMETERS OF THE UPFC


Shunt Compensator Parameters
11/230 KV, Y/, 60 MVA.
Transformer Reactance = 0.1 pu (With respect to
transformer rating).
Filter Inductance Lf = 0.0001 H, Rf = 0.003
Filter Capacitor 400 F
DC link Capacitance 3 mF
Rated DC bus voltage 22 KV
Series Compensator Parameters
Number of 1 Phase Units = 3
Primary side rated voltage = 11 KV
Secondary side rated voltage = 33 KV
Transformer Primary side connection =
Rated capacity of each unit = 8 MVA
Reactance = 0.1 pu (With respect to the rating
of the individual unit)
Filter Inductance Lf = 0.0001 H, Rf = 0.003
Filter Capacitor 400 F
DC link Capacitance 3 mF
DC bus voltage 22 KV

VI. REFERENCES
[1]. Narain. G. Hingorani, Laszlo Gyugyi, Understanding FACTS., IEEE Press, First Indian Edition, Standard Publishers Distributors,
Delhi, 2001.
[2]. L. Gyugyi, Unified power-flow control concept for flexible AC
transmission systems., Generation, Transmission and Distribution, IEE Proceedings, Vol 139, No 4, pp 323 331, July 1992.
[3]. L. Gyugyi, C. D. Schauder, S. L. Williams, T. R. Reitman, D. R. Torgerson,
and A. Edris, The unified power flow controller: A new approach to power transmission control, IEEE Transactions on Power
Delivery, vol. 10, pp 1085
1097, April 1995.
[4]. B. A. Rem, A. Keri, A. S. Mehraban, C. Schauder, E. Stacey, L. Kovalsky,
L. Gyugyi, A. Edris, AEP Unified Power Flow Controller Performance., IEEE
transactions on power delivery, Vol 14, No 4, pp 1374 1381, October 1999.
[5]. Jovan Z. Bebic, Peter W. Lehn, M. R. Iravani, The Hybrid Power Flow Controller - A New Concept for Flexible AC
Transmission., IEEE Power Engineering Society General Meeting, pp 1 7, October 2006.
[6]. Giuseppe Carrara, Simone Gardella, Mario Marchesoni, Raffaele Salutari, Giuseppe Sciutto, A New Multilevel PWM Method: A
Theoretical Analysis., IEEE Transactions on Power Electronics, Vol. 7, No. 3, pp 497 505, July
1992.
[7]. Jih-Sheng Lai, Fang Zheng, Multilevel Converters - A New Breed of Power
Converters., IEEE Transactions on Industry Applications, Vol. 32, No. 3, pp
509 517, May/June 1996.
[8]. S. Kannan, S. Jayaram, M. M. A. Salama, Real and Reactive Power Coordination for a Unified Power Flow Controller.,
IEEE Transactions on Power Systems, Vol 19, No 3, pp 1454 1461, August 2004.
[9]. M. S. El-Moursi, A. M. Sharaf, Novel Controllers for the 48-Pulse VSC STATCOM and SSSC for Voltage Regulation
and Reactive Power Compensation., IEEE Transactions on Power Systems, Vol. 20, No. 4, pp 1985
1997, November 2005.
[10]. M. Saeedifard, R. Iravani, J. Pou, Control and DC-capacitor voltage balancing of a space vector-modulated five-level
STATCOM., IET journal on Power Electronics, Vol 2, No 4, pp 203 215, April 2009.
[11]. A. Yazdani, R. Iravani, Voltage Sourced Converters in Power Systems Modelling, Control and Applications., IEEE press, John
Wiley and Sons, Inc,.
2010.
[12]. Dheeman Chatterjee, Arindam Ghosh, TCSC control design for transient stability improvement of a multi-machine power
system using trajectory sensitivity., Electric Power Systems Research, Vol 77, No 5 6, pp 470 483, April 2007.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 53
NCRASEM 13 Paper ID:EEE02

POWER BALANCING UNDER TRANSIENT


AND STEADY STATE WITH SMES AND
PHEV CONTROL
Mr.M.VADIVEL
ANNA UNIVERSITY,CHENNAI,BIT CAMPUS TIRUCHIRAPPALLI.
mvadivel87@gmail.com

Abstract-This project presents super conducting magnetic energy storage (SMES) control system for the power
distribution grid which integrates renewable generation and electric vehicles (EVs) together. Based on a 33-bus 4-lateral
radial distribution system, coordinated control is developed. With the use of SMES, any transient unbalance caused by
wind power variation can be recovered so that the system frequency can be stabilized. Also, with the use of EVs, the
steady-state load demand can be redistributed to facilitate the adoption of wind power generation. Finally, simulation
results verify that the use of both SMES and EVs can effectively perform power balancing under both the transient and
steady states. The proposed method was developed by using MATLAB/ Simulink.

I.INTRODUCTION
Electric utilities and end users of electric power are becoming increasingly concerned about meeting the growing
energy demand. Seventy ve percent of total global energy demand is supplied by the burning of fossil fuels. But
increasing air pollution, global warming concerns, diminishing fossil fuels and their increasing cost have made it
necessary to look towards renewable sources as a future energy solution. Since the past decade, there has been an
enormous interest in many countries on renewable energy for power generation. The market liberalization and
governments incentives have further accelerated the renewable energy sector growth.
Renewable energy source (RES) integrated at distribution level is termed as distributed generation (DG). The
utility is concerned due to the high penetration level of intermittent RES in distribution systems as it may pose a
threat to network in terms of stability, voltage regulation and power-quality (PQ) issues. Therefore, the DG systems
are required to comply with strict technical and regulatory frameworks to ensure safe, reliable and efficient
operation of overall network. With the advancement in power electronics and digital control technology, the DG
systems can now be actively controlled to enhance the system operation with improved PQ at PCC. However, the
extensive use of power electronics based equipment and non-linear loads at PCC generate harmonic currents, which
may deteriorate the quality of power.
Global energy crisis and environmental pollution, renewable generation especially wind power is becoming
desirable to integrate into the existing power grid, while Electric Vehicles (EVs) especially the Plug-in Hybrid EVs
(PHEVs) are becoming attractive for green transportation. Because of the intermittent nature of wind power, it is a
challenge to maintain both transient and steady-state balances of the power grid. Recently, the superconducting
magnetic energy storage (SMES) has been introduced to alleviate the problem of power imbalance. With ever
increasing popularity of PHEVs, the vehicle- to-grid (V2G) operation provides an opportunity to utilize the energy
stored in vehicle batteries as distributed power plants. Namely, the PHEVs not only draw power from the grid to
charge batteries, but can also feed power back to the grid when necessary.
The control strategy for the SMES units has three main functions: namely, the frequency compensation control
which detects the frequency fluctuation of the load and generates the reference value for the converter; the converter
system control which regulates the power output of SMES; and the DC-DC chopper control which coordinates the
power transfer according to the reference power output.This project mainly include load levelling, dynamic stability,
transient stability, voltage stability, frequency regulation, transmission capability enhancement, power quality
improvement, automatic generation control, uninterruptible power supplies, etc.
A. Super conducting magnetic energy storage systems
Superconductivity, the total lack of resistance of conducting materials below critical temperatures, is one of the
most fascinating phenomena in nature. Although superconductivity was discovered in 1911 by Ones [Hasses83], it
was not until 1970s superconducting magnetic energy storage (SMES) was first proposed as a technology in power
systems. Energy is stored in the magnetic field generated by circulating the DC current through a superconducting

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 55
NCRASEM 13 Paper ID:EEE02

coil. SMES is a technology that has the potential to bring essential functional characteristics to the utility
transmission and distribution systems. A SMES system consists of a superconducting coil, the cryogenic system,
and the power conversion or conditioning system (PCS) with control and protection functions [Hasse89]. Its total
efficiency can be very high since it does not require energy conversion from one form to the other. Depending on its
power conversion units control loop and switching characteristics, the SMES system can respond very rapidly
(MWs/ mili-seconds). Because of its fast response and its efficiency, SMES systems have received considerable
attention from electric utilities and the government. SMES systems are reliable (no moving parts) and
environmentally benign. Compared to other storage technologies, the SMES technology has a unique advantage in
two types of application, power system transmission control and stabilization and power quality. Although SMES
systems may not be cost effective, at the present time, they have a positive cost and environmental impact by
reducing fuel consumption and emissions
SMES applications are becoming attractive as a tool to enhance transmission utilization in the process of
deregulation of power utilities. The deregulated environment is forcing new technologies and advancements adopted
to enhance the existing system conditions for more reliable secure and flexible systems. SMES can be configured to
provide energy storage for flexible ac transmission system (FACTS) controllers at the transmission level, or custom
power devices at the distribution level.
B. Design considerations
In the design stage of a coil, several factors are taken into account to achieve the possible best performance of a
SMES system at less cost. These factors may include coil configuration, energy capability, structure, operating
temperature. A compromise is made between each factor considering the parameters of energy/mass ratio, Lorentz
forces, stray magnetic field, and minimizing the losses for a reliable, stable and economic SMES system.
Table 1 DESIGN PARAMETER EXAMPLES FOR LOW TEMPERATURE SOLENOID SMES COILS
Parameters (1) (2) (3) (4) (5) (6)
Stored 5500 22 5000 30 1800
Energy MWh MWh MWh MJ MJ 25kJ
500 400 1000 10 31.5
Power Cap. MW MW MW MW MW 50 kW
Op. Current 50 200 5 10.8
(kA) 765 max max max max 0.115
Peak Voltage
(kV) 1.8 13.33 10 2.1 3.375 0.5
Peak Field
(T) 7 4.8 6.69 2.85 6.1 NA
Op. Temp.
(K) NA 1.8 NA 4.5 4.45 4.2
Inductance
(H) 68 61.2 990 2.4 NA 3.8
Coil Height
(m) 15 4.087 19 1.26 2.44 0.123
Mean
Diameter
(m) 1568 134 2000 2.58 7.57 0.128
Total Turns 112 416 556 920 1900 4500
No. of
Layers 1 4 4 24 NA 30
NbTi
SC material / Cu NbTi

C Plug-In Hybrid Electric Vehicle Energy Storage System


Plug-in hybrid electric vehicle technology holds much promise for reducing the demand for petroleum in the
transportation sector. Its potential impact is highly dependent on the system design and in particular, the energy
storage system. This paper discusses the design options including power, energy, and operating strategy as they
relate to the energy storage system. Expansion of the usable state-of-charge window will dramatically reduce cost
but will likely be limited by battery life requirements. Increasing the power capability of the battery provides the
ability to run all-electrically more often but increases the incremental cost. Increasing the energy capacity from 20-
40 miles of electric range capability provides an extra 15% reduction in fuel consumption but also nearly doubles
the incremental cost.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 56
NCRASEM 13 Paper ID:EEE02

Figure 1.ELECTRIC DRIVE SYSTEM


Hybrid electric vehicle (HEV) technology is an excellent way to reduce our petroleum consumption through
efficiency improvements. HEVs use energy storage technology to improve vehicle efficiency through engine
downsizing and by recapturing energy normally lost during braking events. A typical HEV will reduce gasoline
consumption by about 30% over a comparable conventional vehicle

Figure 2.INDEPENDENT SYSTEM OPERATOR (ISO) SYSTEM LOAD PROFILES IN VARIOUS PLUG-IN HYBRID ELECTRIC
VEHICLE (PHEV)

D. Potential benefits of phev


The potential for PHEVs to displace fleet petroleum consumption derives from several factors. First, PHEVs
are potentially well-matched to motorists driving habitsin particular, the distribution of distances travelled each
day. All-electric PHEV30 can displace petroleum consumption equivalent to 40% of VMT, (assuming the vehicle is
fully recharged each day). Similarly, an all-electric PHEV60 can displace about 60%. This low-daily-mileage
characteristic is why PHEVs have potential to displace a large fraction of per-vehicle petroleum consumption.
Beyond battery storage and motor power, there are various ways to combine the power from the electric motor and
the engine. The two main configurations are parallel and series. Some PHEVs use transmissions that allow them to
operate in either parallel or series configurations, switching between the two based on the drive profilethis is
called "blended mode" or "mixed mode."
Parallel hybrid operation connects the engine and the electric motor to the wheels through mechanical
coupling. Both the electric motor and the engine can drive the wheels directly.
Series plug-in hybrids use only the electric motor to drive the wheels. The internal combustion engine is used
to generate electricity for the motor.
E. Wind energy
Wind energy generation has been noted as the most rapidly growing technology; being one of the most cost-
effective and environmental friendly mean to generate electricity from renewable sources. The increasing
penetration level of wind energy can have a significant impact on grid, especially under abnormal conditions.
Wind turbines produce electricity by using the power of the wind to drive an electrical generator. Wind passes over
the blades, generating lift and exerting a turning force. The rotating blades turn a shaft inside the nacelle, which goes
into a gearbox. The gearbox increases the rotational speed to that which is appropriate for the generator, which uses
magnetic elds to convert the rotational energy into electrical energy.
F. Wind turbines
A wind turbine basically consists of rotor blades and generator. The rotor blades transform the linear kinetic wind
energy into rotational kinetic energy in a first step and finally the rotational kinetic energy is converted into
electrical energy with the help of generator. To determine the effectiveness of this energy conversion, the amount of
energy present in wind needs to be determined first. Actually, the small air particles having mass m and moving
velocity V acts as energy carrier in wind. Here the power coefficient Cp= f( ,) is a function of both parameters.
Consequently different wind speeds will require the optimal values of tip speed and pitch angle to achieve a high Cp
and therefore giving the highest power output at all available wind speeds.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 57
NCRASEM 13 Paper ID:EEE02

Figure 3.CP-TSR CURVE WITH ACTIVE PITCH CONTROL


The mentioned aspects make it very clear - to get maximum power out of the wind we need to have a wind
turbine that allows the change in rotor speed to reach optimal aerodynamic conditions. As every optimal C p optimal
has one optimal value of tip speed ratio optimal , therefore it is required to control the tip-speed ratio according to
the wind-speed.
This task is well known as Maximum Power Point Tracking (MPPT) and can be achieved by using power
co-efficient versus tip-speed ratio for different pitch angles of the turbine as shown in Fig. 4.4. The active pitch
control is used during high wind velocity to shed off the aerodynamic power. In active pitch control, the rotor blades
are turned away by some angle from the direction of striking wind and this angle is known as pitch angle. The
aerodynamic power captured by wind turbine is the cosine function of pitch angle. In the proposed system, the pitch
angle is kept zero, which is a valid assumption for lower to medium wind velocities.
G.Power Quality
Various sources give different and sometimes conflicting definitions of power quality. The Institute of
Electrical and Electronics Engineers (IEEE) dictionary [159, page 807] states that power quality is the concept of
powering and grounding sensitive equipment in a matter that is suitable to the operation of that equipment.One
could, for example, infer from this definition that harmonic current distortion is only a power quality issue if it
affects sensitive equipment.
The International Electro technical Commission (IEC) definition of power quality, as in IEC 61000-4-30 is as
follows: Characteristics of the electricity at a given point on an electrical system, evaluated against a set of
reference technical parameters. This definition of power quality is related not to the performance of equipment but
to the possibility of measuring and quantifying the performance of the power system.
Power quality is the combination of voltage quality and current quality. Voltage quality is concerned with deviations
of the actual voltage from the ideal voltage. Current quality is the equivalent definition for the current. A discussion
on what is ideal voltage could take many pages, a similar discussion on the current even more. A simple and
straightforward solution is to define the ideal voltage as a sinusoidal voltage waveform with constant amplitude and
constant frequency, where both amplitude and frequency are equal to their nominal value. The ideal current is also
of constant amplitude and frequency, but additionally the current frequency and phase are the same as the frequency
and phase of the voltage. Any deviation of voltage or current from the ideal is a power quality disturbance.

II.PROPOSED SYSTEM

Figure 4.PROPOSED DISTRIBUTED SYSTEMS

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 58
NCRASEM 13 Paper ID:EEE02

Figure 5. PROFILES OF BASE LOAD AND WIND POWER

III.CONCLUSION
To improve the power generation, by using the renewable sources as wind, wind energy is the major sources
for producing enormous power generation and also analyzing the maximum wind speed of the wind energy system
by using MATLAB/SIMLINK. Enhancing the fault clearance using SMES and PHEV.The grid interfacing inverter
can inject real power generated from RES to the grid and thus eliminates the power imbalance to improve the quality
of power. PQ enhancement can be achieved under three different scenarios: 1) PRES = 0 2) PRES < total load power
and 3) PRES > total load power. The performance of the system was analyzed using MATLAB/SIMULINK.

IV.REFERENCES

1) Mohd. Hasan Ali, Senior Member, IEEE, Bin Wu, Fellow, IEEE, and Roger A. Dougal, An Overview of SMES Applications in Power
and Energy Systems APRIL 2010 IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 1, NO. 1,PP.38-47
2) Risheng Li, Serhiy Bozhko, Member, IEEE, and Greg Asher, Frequency Control Design for Offshore Wind Farm Grid With LCC-HVDC
Link Connection MAY 2008 , IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 23, NO. 3, PP 1085-1092
3) Yazhou Lei, Alan Mullane, Gordon Lightbody, and Robert Yacamini Modeling of the Wind Turbine with a Doubly Fed Induction
Generator for Grid Integration Studies MARCH 2006, IEEE TRANSACTIONS ON ENERGY CONVERSION, VOL. 21, NO. 1,PP
257 264
4) Shinichi Nomura, Yoshihiro Ohata, Takushi Hagita, Hiroaki Tsutsui, Shunji Tsuji-Iio, and Ryuichi Shimada Wind Farms Linked by
SMES Systems JUNE 2005, IEEE TRANSACTIONS ON APPLIED SUPERCONDUCTIVITY, VOL. 15, NO. 2,PP :1951-1954
5) Kwa-Sur ,Tam Prem Kumar APPLICATION OF SUPER CONDUCTIVE MAGNETIC ENERGY STORAGE IN AN
ASYNCHRONOUS LINK BETWEEN POWER SYSTEMS, September 1990, IEEE Transactions on Energy Conversion, Vol. 5, No.
3,PP: 436 444.
6) R. Li, S. Bozhko, and G. Asher, Frequency control design for offshore wind farm grid with LCC-HVDC link connection, IEEE
Transactions Power Electron., May-2008, vol. 23, no. 2, pp. 10851092
7) N. M. Kirby, L. Xu, M. Luckett, and W. Siepmann, HVDC transmission for large offshore wind farms, Inst Elect. Eng. Power Eng. J.,
vol. 16, no. 3, pp. 135141, Jun. 2002.
8) S. Bozhko, R. Li, R. Blasco-Gimenez, G. M. Asher, J. C. Clare, L. Yao, and C. Sasse, STATCOM-controlled HVDC power transmission
for large offshore wind farms: Engineering issues, in IEEE Industrial Electronics, IECO8 200632nd Annual Conference on, 2006, pp.
42194224.
9) B. R. Andersen and L. Xu, Hybrid HVDC system for power transmission to island network, IEEE Transmissions Power Delivery., vol.
19, no. 4, pp. 18841890, Oct. 2004.
10) S. Nomura, N. Tanaka, K. Tsuboi, H. Tsutsui, S. Tsuji-Iio, and R. Shimada, Design considerations for SMES systems applied to HVDC
links, in 13th European Conference on Power Electronics and Applications EPE 09, Spain, Sep. 2009, vol. 810, pp. 110.
11) K. J. Faria, Doubly-Fed Induction Generator Based Wind Power Plant Models, Master graduation thesis, The University of Texas,
Austin,Dec.2009.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 59
NCRASEM 13 Paper ID:EEE03

An Hybrid Five-Level Inverter Topology with


Single-DC Supply fed Single Phase Induction
Motor
1
T.Srinivasan and 2 T.Govindaraj,
1. M.E., PED Scholar, Muthayammal Engineering College.
2. Professor and Head, Department of EEE, Muthayammal Engineering College.
srini070@gmail.com
AbstractIn this paper, a new single-phase, five-level inverter topology with a single-dc source is presented. The proposed
topology is obtained by cascading a three-level flying capacitor inverter with a flying H-bridge power cell. This topology has
redundant switching states for generating different pole voltages. By selecting appropriate switching states, the capacitor
voltages can be balanced instantaneously (as compared to the fundamental) in any direction of the current, irrespective of
the load power factor. Another important feature of this topology is that if any H-bridge fails, it can be bypassed and the
configuration can still operate as a three-level inverter at its full power rating. This feature improves the reliability of the
circuit. A induction motor is run with the proposed topology for the full modulation range. The effectiveness of the capacitor
balancing algorithm is tested for the full range of speed and during the sudden acceleration of the motor.

Index TermsFlying capacitor (FC), H-bridge, induction motor drive, multilevel inverter.

I. INTRODUCTION
Multilevel inverters have changed the face of medium- and high-voltage drives. The most popular
topologies of multilevel converters are the neutral point-clamped inverter (NPC), the flying capacitor inverter (FC) ,
and the cascaded H-bridge (CHB) inverter[1]. Each one of these inverters has its own merits and demerits. In the NPC
inverter, multiple dc sources are generated by splitting a single-dc bus voltage using capacitor banks. This configuration
has large number of clamping diodes and presents the problem of dc bus capacitor unbalance especially with high
number of voltage levels. An interesting work for balancing capacitor in NPC inverter that can be operated in
limited modulation range has been presented in . A pulse-width modulation (PWM) control scheme to balance the dc
link capacitor voltages of the NPC inverter, connected in cascade with a two level inverter to realize a five level
inverter structure for an open-end winding induction motor, is proposed. The concept of FC inverter was introduced first
in 1992[1]. In this configuration, multiple capacitors of different voltage magnitudes are used to generate multiple
voltage levels. The advantages include modularity, lack of clamping diodes, lack of problems like unbalance in the
split dc -link capacitors, etc. Also, as in the NPC case, single supply can be used to generate multiple pole voltage
levels. Many strategies for balancing the capacitor voltages have evolved over time. However, generating more
voltage levels in a FC inverter requires larger number of capacitors. Interesting derivatives of this configuration have
been presented and where more levels have been achieved by cross connecting the capacitors using additional
switches. Operation of FC inverter with improved reliability has been presented , where additional circuitry is provided to
bypass the faulty cell. However, in this scheme, the devices have to be sufficiently overrated to operate at full power level
when the faulty cell is bypassed. The operation of FC inverter with asymmetrical capacitor voltages to generate more
voltage levels has been presented[1].
The multilevel CHB inverter with isolated supplies presented in has many advantages compared to the NPC
and FC topologolies. The CHB configuration does not require clamping diodes and the input power is distributed among
different input sources that makes it more suitable for certain applications. One additional advantage of the CHB
converter is that if any device fails in the H-bridges, the inverter can still be operated at reduced power level and,
hence, this configuration is fault tolerant to some extent. The concept of using CHBs with capacitors and their
voltage balancing has been introduced . The advantages include more redundant states, better voltage balancing, lack of
diodes, and fault tolerant operational ability by bypassing the faulty H-bridge cells. This configuration is especially
suitable for applications like STATCOM. DC-voltage ratio control strategy for a CHB converter fed with a single-dc
source is presented. With this control strategy, a higher number of levels in output voltage waveform can be
achieved with capacitor voltage balancing in a limited range of load power factor. This scheme is very much suitable
for grid-connected applications. A multilevel configuration with improved reliability has been presented[1].

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 61
NCRASEM 13 Paper ID:EEE03

Many other multilevel inverter configurations have been developed based on the three conventional (NPC, FC,
and CHB) topologies. A configuration in which two-level inverter is cascaded with multiple H-bridges has been
presented , where more voltage levels can be generated. New multilevel inverter configurations for open-end winding
induction motor formed by cascading two-level inverters and capacitor-fed H-bridges. Five-level active neutral
point clamped (ANPC) inverter topology is another configuration.
This five-level ANPC converter is being commercialized by ABB as the ACS2000 (up to 1.6 MW).
Derivatives of CHB where different devices [Integrated Gate-Commutated Thyristor (IGCT) and insulated gate
bipolar transistor (IGBT)] are used in such a way that the IGCT would switch at fundamental frequency and IGBT
would switch at carrier frequency. The concept of a hybrid cascade converter topology with series-connected
symmetrical and asymmetrical diode-clamped H-bridge cells has been presented in [3]. The hybrid clamped
multilevel inverter topology is a hybrid of NPC topology and FC topology, which does not have neutral point
fluctuation.
The multilevel inverter proposed in this paper is a cascaded topology consisting of three-level FC inverters and
capacitor-fed H-bridges, in which balancing of the capacitor voltages are possible independently of the load power
factor.

Figure. 1. Proposed single-phase power circuit formed by connection of a single-phase flying capacitor inverter with H-brige in Series

II. PROPOSED POWER CIRCUIT


As shown in Fig. 1, the proposed topology has a five-level FC inverter with dc bus voltage of VDC and FC voltage
equal to VDC /2, which can generate voltages of 0, VDC /2, and VDC with respect to point 0. A capacitor-fed H-bridge is
cascaded to each phase of the inverter. The voltage across the H-bridge capacitor has to be maintained at VDC /4. This
combination can produce voltage levels of 0, VDC /2, VDC, -VDC /2, -VDC. Out of these, the voltages VDC /4 and
5VDC/4 are not used in the proposed inverter as they do not have redundant switching states to balance the capacitor
voltages. The switching states of the useful voltage levels and their effects on the capacitor voltages based on the
current direction are given in Table I.
The capacitor voltages remain unaffected while producing the voltages VDC and 0. The capacitors can
either be charged or discharged in any direction of the current for the voltages VDC /2 as shown in Fig.3,
respectively. In each phase, the switches AS1, AS2, AS3, AS4 and AS1 , AS2 , AS3 , AS4are operated in
complementary manner. The output voltage is based on the switching states that decide the path of the current flow.
By switching between these states the capacitors C1 and C2 can be charged or discharged for any direction of the
current. The voltage level of VDC /2 has two redundant states. By switching between them, C1 can be charged or

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 62
NCRASEM 13 Paper ID:EEE03

discharged based on the current direction. When VDC/2 is applied, the C2 is not affected. As the capacitors can be
either charged or discharged by switching between the redundant states, based on the current direction, quick capacitor
voltage balancing is possible, irrespective of the load power factor. To maintain the capacitor voltages at a fixed value,
the capacitor voltages are sampled at regular intervals and a ATmega8 microcontroller is used to switch between the
redundant states based on the current direction to balance the capacitor voltages.
The pole can generate one of the five voltage levels 0, VDC/2, VDC,-VDC /2, and -VDC. The effective voltage space
vector formed based on the single-phase pole voltages is given by

(1)
Where VSV is the voltage space vector and VAO are the pole voltage in the single phase A respectively. A PWM generation
based on the combination of the seven resulting switching vectors (0, A, B, C, A, B, C) is called Space Vector
Modulation. The amplitude and the orientation of the desired field are the inputs for the PWM generation. The inner
circle in the hexagon limits the maximum amplitude for a field with few harmonics. The area between the inner
circle and the hexagon is called over modulation area and adds harmonics in Fig. 2.

Figure. 2. Model space vector diagram


Space vector Modulation Technique has become the most popular and important PWM technique for Three Phase
Voltage Source Inverters for the control of AC Induction, Brushless DC, Switched Reluctance and Permanent
Magnet Synchronous Motors. But in this paper, we use single phase induction motor. First comparative analysis of
Space Vector PWM with conventional SPWM for a five level Inverter is carried out.
The Simulation study reveals that SVPWM gives 15% enhanced fundamental output with better quality i.e. lesser
THD compared to SPWM. PWM strategies viz. SPWM and SVPWM are implemented in MATLAB/SIMULINK
software and its performance is compared with conventional PWM techniques. Owing to their fixed carrier
frequencies fc in conventional PWM strategies, there are cluster harmonics around the multiples of carrier frequency.
PWM strategies viz. Sinusoidal PWM and SVPWM utilize a changing carrier frequency to spread the harmonics
continuously to a wideband area so that the peak harmonics are reduced greatly[7].

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 63
NCRASEM 13 Paper ID:EEE03

TABLE I VARIOUS VOLTAGE LEVELS AND CAPACITOR STATES BASED ON THE SWITCHING STATES

Fig.3. Switch transitions and current path for the redundant states of VD C /2 for a phase. (a) Current path for switch state of (1,0,0,0). (b) Current
path for switch state of (0,1,0,0).

III. SALIENT FEATURES


The proposed single-phase topology uses 4 switches of voltage rating VDC /2 and 4 switches of voltage rating
VDC /4 (total 8 switches), where VDC is the dc bus voltage. It has two capacitors per phase, one is rated at VDC/2 and
the other is rated at VDC /4. So in total, the proposed single-phase configuration requires only two capacitors, while
the conventional three-phase topology uses 12 switches of voltage rating VDC /2 and 12 switches of voltage rating VDC /4
(total 24 switches), where VDC is the dc bus voltage. It has two capacitors per phase, one is rated at VDC /2 and the

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 64
NCRASEM 13 Paper ID:EEE03

other is rated at VDC/4.while the conventional five-level FC inverter requires nine capacitors. The asymmetrical FC
configuration requires 12 switches of rating VDC /4, six switches of rating VDC /2, three capacitors of rating VDC/4, and
three capacitors of rating VDC /2 for a three-phase inverter. However, this configuration has limited range of power factor
for five-level operation. The conventional five-level CHB configuration uses six isolated power supplies of voltage
rating VDC/4 and 24 switches of voltage rating VDC/4.How ever, the proposed configuration uses just one dc source of
magnitude VDC. The five-level NPC inverter requires four capacitors of rating VDC /4, 36 clamping diodes of voltage
rating VDC /4 and 24 switches of rating VDC /4. However, the proposed topology does not require any clamping diode[1].
The five-level ANPC topology requires three capacitors of voltage rating VDC /4 for three phases and two
capacitors of voltage rating VDC /2. However, this configuration has neutral point fluctuation. The proposed
configuration does not have any such problem as it has FC front end. The hybrid clamped multilevel topology requires
more number of switches and clamping diodes as compared to the proposed configuration. Another important
advantage of the proposed scheme is that if one of the devices in the H bridge fails, the H-bridge can be bypassed
through a fast bypass switch or by routing the current through the devices in the complementary path and the inverter
can work in three-level mode at the full power rating. For example, if S3 or S4 fails then the current can be routed through
S3 and S4 by switching them ON and removing the gating signals to S3 and S4 or vice versa.
IV.SIMULATION DIAGRAM AND RESULTS

Fig.4. Simulation diagram for hybrid five-level inverter topology with single DC Supply fed Single phase induction motor

The proposed five-level inverter circuit has been tested on a 230V, 50Hz , induction motor drive with V/f control scheme
at a switching frequency of 1 kHz. This simulation diagram are drawn in MATLAB Software package. In this diagram,
IGBT Switches are connected in structure of Flying capacitor cascaded with H-bridge. SVPWM technique are used in this
project for controlling the inverter by giving gate pulse to IGBT Switches. The inverter dc-link voltage is set to 230 V. The
hysteresis limit for the capacitor is set at 5% of the respective capacitor voltage. The capacitors are sized suitably so that
the voltage of the capacitors would not cross the hysteresis limits in two switching cycles at full load current.
The capacitance C is determined by

(2)
Where VC is the capacitor voltage ripple, TS is the sampling time, and iL is the peak load current. The capacitor
voltages are sampled every switching cycle (1ms in this case). A capacitance value of 4400 F has been used for this
single phase. The motor is run at various modulation indexes (VSV/VDC) of 0.2, 0.4, 0.6, 0.8 at frequencies of
10,20,30,40Hz, respectively, at no load.
In this project, modulation index is 0.8 is used in pulse generator. In SVPWM, we use the sine wave as a

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 65
NCRASEM 13 Paper ID:EEE03

reference input and triangle wave also used for time delay to upper leg three switches. The negative value
gain is given to the lower leg switches. The gate pulses are given to inverter through the subsystem. From
subsystem the pulses are given to Goto and then Goto are linked with From blocks then pulses given to
switches. Then output current and output voltage is determined from the simulation results. The single phase
induction motor is connected in this circuit. The rotor speed and electromagnetic torque determined from this
simulation. The THD analysis of output current and output voltage are determined by the simulation. The
main advantages of this project is harmonics reduction. The THD percentage of output current is 7.80% and
THD percentage of the output voltage is 23.41%. When compare to other topology it has better harmonic
reduction properties.

Fig.5. (b)

Fig.5. (c)

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 66
NCRASEM 13 Paper ID:EEE03

Fig.5. (d)
Fig.5.Simulation results for (a) Output current, (b) Output voltage Vao, (c) Rotor speed, (d) Electromagnetic torque

Fig.6. Simulation diagram for THD analysis of (a) Output current (b) Output voltage of this project

V. CONCLUSION

In this paper, a new single-phase five-level inverter topology with a single-dc source has been proposed. This
configuration is formed by cascading a three-level FC inverter and capacitor-fed H-bridges. The key advantages of this

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 67
NCRASEM 13 Paper ID:EEE03

topology compared to the conventional topologies include reduced number of devices and simple control. An
important feature of this inverter is the ability to balance the capacitor voltages irrespective of load power factor.
Another advantage of this inverter is that if one of the H-bridge fails, it can operate as a three-level inverter at full
power rating by bypassing the H-bridge. This feature of the inverter improves the reliability of the system.The proposed
configuration has been analyzed and experimentally verified for various modulation indexes and frequencies by
running a single phase squirrel cage induction motor in V/f control mode, at no load. The working of the
capacitor balancing algorithm has been tested. The stable operation of the inverter for various modulation indexes
and stability of the inverter voltage levels during rapid acceleration have been validated experimentally.

VI. REFERENCES

[1] P. Roshankumar, Student Member, IEEE, P. P. Rajeevan, K.Mathew, Student Member, IEEE,K. Gopakumar, Fellow, IEEE, Jose I. Leon,
Member, IEEE, and Leopoldo G. Franquelo, Fellow, IEEE, A Five-Level Inverter Topology with Single-DC Supply by Cascading a Flying
capacitor Inverter and an H-Bridge, IEEE Trans. Power Electron., vol. 27, no.8, pp. 3505-3512, Aug.2012.
[2] P. P. Rajeevan, K. Sivakumar, C. Patel, R. Ramchand, and K. Gopakumar,A seven-level inverter topology for induction motor drive using two-
level inverters and floating capacitor fed H-bridges, IEEE Trans. Power Electron., vol. 26, no. 6, pp. 1733-1740, Jun. 2011.
[3] A. Nami, F. Zare, A. Ghosh, and F. Blaabjerg, A hybrid cascade converter topology with series-connected symmetrical and asymmetrical diode-
clamped H-bridge cells, IEEE Trans. Power Electron., vol. 26, no. 1,pp. 51-65, Jan. 2011.
[4] Farid Khoucha, Soumia Mouna Lagoun, Khoudir Marouani, Abdelaziz Kheloui, and Mohamed El Hachemi Benbouzid, Senior Member, IEEE,
Hybrid Cascaded H-Bridge Multilevel-Inverter Induction-Motor-Drive Direct Torque Control for Automotive Applications, IEEE
Trans. Ind. Electron., vol.57,no. 3, pp. 892-899, March. 2010.
[5] A. Lesnicar, and R. Marquardt, An Innovative Modular Multilevel Converter Topology Suitable for a Wide Power Range,IEEE Bologna
power tech conf, june 23th -26th ,Bologna, Italy.
[6] Pablo Lezana, Member, IEEE, Jos Rodrguez, Senior Member, IEEE, and Diego A. Oyarzn, Cascaded Multilevel Inverter With
Regeneration Capability and Reduced Number of Switches, IEEE Trans. Ind. Electron., vol.55,no. 3, pp. 1059-1066, March. 2008.
[7] K. Vinoth Kumar, Prawin Angel Michael, Joseph P. John and Dr. S. Suresh Kumar, Simulation and comparison of spwm and svpwm control for
three phase inverter, ARPN Journal of Engineering and Applied Sciences, vol. 5, no. 7, july 2010.
[8] Mohammad Golkhah and Mohammad Tavakoli Bina, Multilevel Converter Objectives: a Critical Evaluation and Combination of Available
Natural-Commuted Topologies with Restructured Iron Cores, Proceedings of the World Congress on Engineering and Computer Science 2008
WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
[9] Surin Khomfoi, Member, IEEE, Nattapat Praisuwanna, Student Member, IEEE, Leon M. Tolbert, Senior Member, IEEE , A Hybrid Cascaded
Multilevel Inverter Application for Renewable Energy Resources Including a Reconfiguration Technique,2010.
[10] John N. Chiasson, Burak zpineci, and Leon M. Tolbert, A Five-Level Three-Phase Hybrid Cascade Multilevel Inverter Using a Single DC
Source for a PM Synchronous Motor Drive, Electrical and Computer Engineering Faculty Publications and Presentations,2007.
[11] Do-Hyun Jang, Member, IEEE, and Duck-Yong Yoon, Space-Vector PWM Technique for Two-Phase Inverter-Fed Two-Phase Induction
Motors IEEE Trans. Industry Applications, Vol. 39, No. 2, March/April 2003.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 68
NCRASEM 13 Paper ID:EEE04

Enhancement of Power System Stability Using


Fuzzy Logic Controller
Tejaswita Khobaragade & Aparna Pachori
Abstract: This Dissertation includes work on face recognition using a novel technique based on Fishers
discriminate analysis and fuzzy rough set. Different challenges in face recognition are identified. FDA is used
to increase the distances between classes and reduces the distances within classes. That makes proposed
method more efficient.Anomalies due to different light conditions are normalized at pre-processing stage.
Histogram equalization is used to deal with huge light variation in individual image and then global
normalization is done. Features extracted by FDA are reduced by fuzzy rough set. Fuzzy rough set provides a
remarkable amount of reduction. These features are from different face images. So, we used Neural Network
with back-propagation for classification. Only one neural network is with N (number of classes) outputs is
used.UMIST and Yale face dataset are being used for testing purpose. UMIST dataset contains profile and
frontal face images with different poses and Yale dataset contains frontal images with huge light variation. 15
images are used to for training and other 15 images are used for testing. Good results are obtained on both
datasets. For UMIST recognition rate is 89.3% and for Yale dataset it is 86.6%.

Index Terms: Power System Stabilizer, Synchronous Machine, Single Machine Infinite Bus System, Fuzzy
Logic, Simulink.

I.INTRODUCTION
The electrical energy has become the major form of energy for end use consumption in todays world. There is
always a need of making electrical energy generation and transmission, both more economical reliable.The voltage
throughout the system are also controlled to be within _+ 5% of their rated values by automatic voltage regulators
acting on the gnertor field exciters, and by the sources of reactive power in the network. For proper operation, this
large integrated system requires a stable operating condition. The power system is a dynamic system. It is constantly
being subjected to small disturbances, which cause the generators relative angles to change. For the interconnected
system to be able to supply the load power demand when the transient s caused by disturbance die out, a newer
acceptable steady state operating condition is reached. That is, the power system must be stable. It is important that
these disturbances do not drive the system to an unstable condition.

II. POWER SYSTEM MODELING


A Parks Model:
A great simplification in the mathematical description of the synchronous machine is obtained if a certain
transformation of variable is performed. The transformation used is usually called Parks transformation. It defines a
new set of stator variables such as current, voltage, or flux linkages in terms of the actual winding variables on three
axes. One along the direct axis of the rotor field winding, called the direct axis; a second along the neutral axis of the
filed winding, called the quadrature axis; and the third on a secondary axis
The Parks transformation P is defined as
P=
The inverse may be computed to be
P-1=
Two Axis Model
In this model the axis d and orthogonal axis q are represented only. Usually one machine is chosen to be the
reference frame and a set of machine lineraized equation is used in simulation. The state variable may be chosen as
xt = [ Eq Ed Efd ]. A linearized system network equations must be provided in the form i = f ( Eq, Ed, ).
Hiffron- Phillips Model
A detailed exploration of the Hiffron-Phillips model is presented as follow:
B The Acceleration Equations
In the case of the classical generator model, the acceleration equations are

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 69
NCRASEM 13 Paper ID:EEE04

r=

=or

Where o = 2 fo elect rad/s. In the case, the rotor angle is the angle ( in elect rad) by which the q axis needs the
references EB. For the single machine connected to an infinite bus shown in fig (2.1.a) the rotor angle is the sum of
the internal angle i and the angle by which Et leads EB as in fig (2.1.b)

Fig (2.1.a) : Single machine connected to an infinite bus

Fig. (2.1.b): Vector diagram of single machine connected to an infinite bus

III. BASIC CONCEPTS


Unstable inter-area oscillations have been encountered in the last two decays by electrical power utilities throughout
the world. In general, the unstable oscillations are involved in power systems, or areas within a power system, which
are weakly interconnected. The following occurrence of the inter-area mode instability and their dates are
documented in published papers.
These occurrences are summarized as follows:
Mid content Area Power Pool (MAPP) 1972
Western U.S. (WSCC) 1978
Western Australia 1982
Taiwan 1984
Southern Brazil 1985
Ontario Hydra 1985
In this chapter the basic concept for analysis of the system state space model are explored with focusing on the
information useful in design of controllers for damping modes of oscillations.

A Eigen Values
A linear dynamic system can be modeled in state space in the form [19,20]
= Ax + Bu
y = Cx + Du
x= (sI-A)-1 [ x(0) +Bu] =

B Eigen Vectors
For each Eigen value i, there is a column vector ti which satisfies
Ati = i ti
The vector ti is called the right Eigenvector of A associated with i, Similarly, There exist a row vector vi which
satisfies
vi A = i vi

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 70
NCRASEM 13 Paper ID:EEE04

This vector vi is called the left Eigenvector of A associated with i Also, if A is symmetric, then
vi = tiT

C Diagonalization of A Matrix
Diagonalization of the state matrix A is possible if it has a set of distinct Eigen values. Also the set of state variables
can be transformed to another set of state variables via a linear transformation with the set of Eigen values being
invariant. These are two useful properties of the state space model for the definition of modes and to compute the
system response.

D Mode Controllability
If the magnitude of a particular made of the system is completely unaffected by a particular input, this system is
said to be uncontrollable. In the uncontrollable system at least one of the row vector b i , i.e., at least one row of the
matrix T-1 B is zero. This would imply for such modes zi (t) = eit zi (0)

E Mode Observability
In a similar way the measured output of a system may contain no contribution from a particular mode. The output is
given by
y(t) = C x(t) + D u(t)
In terms of the modes, using the output is
y(t) = C T Z(t) + D u(t)

F Participation Matrix
In controlling an unstable mode, it is essential to determine the states of the system, which strongly influence the
mode to be controlled. Although Eigenvectors give the disturbance of a mode through the system, they depend on
units and scaling of the state variable and cannot be used for comparison of states due to non-uniqueness and scaling
problems.
IV. METHOD OF DAMPING CONTROLLERS
A Conventional Controllers
Lead-lag or PID controllers are the result of conventional control theory (i.e. phase and gain margins, root locus.).
These controllers are used for the last three decades and still have the leading hand in the real world of PSSs. They
can be designed off-line tuned after the installation.
B Modern Control Theory
Optimal, adaptive and pole placement controllers are the resultant controls from modern control theory. They give
the desired stabilized response with the stability margin as required. Due to construction of power systems (i.e. the
distances, the extensive numbers of variables..) they always have problems in the real power system world, as
they depend on extensive number of feedback signals.
C Optimal control Theory
The principle for optimal control is to minimize saturate cost function which is called the performance index. The
design quadratic optimal controller based on such quadratic performance indexes boils down to the determination of
the elements of the matrix feedback gain matrix K
D Adaptive Controllers
The need of a controller with changes its parameters to give the desired performance while the operating condition
change is a goal for several decades. This will avoid the need of investigation of the exact mathematical model. The
self tuning controller is used to evaluate the matrices and viability of such a controller. A self tuning controller is a
digital adaptive controller which can change the controllers parameters continuously the operating condition in real
time and modified parameter accordingly.
E Pole Placement techniques
Let the system complex Eigen value is to be shifted to a new location in the s-plane o. The new location is chosen
to satisfy a specified damping ration. It also must satisfy the characteristic equation of the closed loop system, i.e.
H(o ) =
| H(o) | =
F Inter- Area Oscillations
The problem of Inter- Area is a result of power inters change between generating units in power system which are
interconnected by a relatively weak transition links. Inter- Area can be initiated by a small disturbance, such as a

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 71
NCRASEM 13 Paper ID:EEE04

change in load or in generation. These types of disturbance occur continuously in power system i.e., a power system
with an unstable in Inter- Area mode is impossible to operate.
V. FUZZY LOGIC CONTROLLER
A Fuzzy logic Theory
Fuzzy logic is a kind of logic is using graded and quantified statement rather than once that are strictly true or false.
The results of fuzzy reasoning are not definite as those derived by strict logic. The fuzzy sets allow objects to have
grades of membership from 0 to 1. These sets are represented by linguistic variables, which are ordinary language
terms. They are used to represent a particular fuzzy set in a given problem, such as large , medium and small.
B Fuzzy Set Definition
Let U be a collection of objects denoted generically by{u}, which could be discrete or continuous. U is called the
universe of discourse and u represents the generic elements of U.
A fuzzy set F in a universe of discourse U is characterized by a membership function r which takes values in the
interval [0,1]. A fuzzy set may be viewed as a generalization of the concept of an ordinary set that its membership
function only takes two values {0,1}. Thus, a fuzzy set F is U may be represent as a set of ordered pairs of a generic
elements u and its grade of membership function:
F= F (ui) /ui
C Fuzzification Operator
A Fuzzification Operator has the effect of transforming crisp data into fuzzy sets.
Symbolically, x = fuzzifier (xo)
where xo is a crisp input value from a process, x is a fuzzy set, and fuzzifier represent a fuzzification operator.
D Compositional Operator
To infer the output z from the given process states x,y and the fuzzy relation R. The sup-star compositional rule of
inference is applied z = y o ( x o R )
Where o is the sup-star composition
E Defuzzification Operator
The output of the inference process so far is a fuzzy set, specifying a possibility distribution of control action. In the
in-line control, a non-fuzzy (crisp) control action is usually required. Consequently, one most defuzzify the fuzzy
control action (output) inferred from the zo = defuzzifier (z)
Where zo is the non-fuzzy control output and defuzzifier is the defuzzification operator.
VI. PROPOSED CONTROLLER
A simple fuzzy controller based on the experience can damp only local modes. To damp both local and inter-area
modes of oscillation, the experience is difficult to be obtained. So, the design process needs a systematic method for
obtaining the rule base and the domain ranges. The proposed solution of this problem is that is a fuzzy controller is
to be developed based on the optimal control theory. This is capable to obtain a near optimal fuzzy controller that is
characterized by its systematic nature in design.
A Choice of Process State and Control Output
A first step is to choose the correct input signals to the fuzzy logic control stabilizer. For this controller a choice of
state variables representing the contents of the rule-antecedent (If-part of a rule) is selected amongst
1.Generator speed deviation signal.
2.Generator speed deviation change signal.
The control output signal (process input) variable represent the contents of the rule-consequent (then-part of the
rule) Fig. (6.2). This control output is denoted by Upss (The damping signal which is fed into the reference voltage
summing point).
B Normalization
Normalization performs a scale transformation and its also called input normalization. It maps the physical values of
the current process state variables into a normalized universe of discourse (normalized domain). It also maps the
normalized value of control output variable onto its physical domain (output demoralization). For this controller a
normalization is got by dividing each crisp input on the upper boundary value for the associated universe.

C Fuzzification
Fuzzification is related to the vagueness and imprecision in a natural language. It is a subjective valuation, which
transforms a measurement into a valuation of a subjective value. Hence, It could be defined as a mapping from an
observed input space to fuzzy sets in creation input universe of discourse. Fuzzification plays an important role in
dealing, with uncertain information, which might be objective or subjective in nature.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 72
NCRASEM 13 Paper ID:EEE04

D The generator speed deviation is classified into:


{negative big (w_nb); negative medium (w_nm); negative small (w_ns); zero (w_z);
Positive small (w_ps); positive medium (w_pm); positive big (w_pb)}.
The generator speed deviation change is classified into:
{negative big (dw_nb); negative medium (dw_nm); negative small (dw_ns); zero (dw_z);
Positive small (dw_ps); positive medium (dw_pm); positive big (dw_pb)}.
E The output of fuzzy controller is classified into:
{negative big (u_nb); negative medium (u_nm); negative small (u_ns); zero (u_z);
Positive small (u_ps); positive medium (u_pm); positive big (u_pb)}.
Change in

Normalization

Fuzzification

FLC Database

Defuzzification

Demoralization

Upss
Fig.(6.1): The stages of the proposed FLC

Fig.(6.2): Blocker diagram shows the exciter and the proposed

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 73
NCRASEM 13 Paper ID:EEE04

Fig.(6.3): Membership functions normalized in one common universe (nb: negative big, nm: negative medium, ns: negative small, z: zero, ps:
positive small, pm: potive medium, pb: positive big)

After this classification, the fuzzification module can be applied. By conversion of a point-wise (crisp) and current
value of a process state variable (generator speed deviation signal and generator speed deviation change signal) into
their associated fuzzy sets, this will make it compatible with the fuzzy set representation of the process state variable
in the rule-antecedents. Each crisp input (either generator speed deviation signal or generator or speed deviation
change signal) has seven tuples denoted by : {classed fuzzy set and its membership function value.}
For example if normalized generator speed deviation = -0.2 then it has seven tuples as follows:
(w_nb,0)
(w_nm,0)
(w_ns,0.8)
(w_z,0.2)
(w_ps,0)
(w_pm,0)
(w_pb,0)
Then each crisp input can be fuzzified to obtain its membership values through the associated seven classes
in the normalized universe of discourse.
F Fuzzy Controller Simulation
In this section the simulation algorithm of the proposed fuzzy controller is discussed. For each time step in the
system main simulation, a calculation of the generator speed deviation signal and generator speed deviation change
in signal is made. This is achieved by getting the value of the state variable in the state matrix A which equal to
the generator speed deviation. The value of generator speed deviation signal from the previous generator speed
deviation signal. The associated membership values for each normalization input are calculated. Then applying the
max-min method inference method to get the control output in fuzzy values. These fuzzy values can be converted to
a crisp value by COG method. The signal of the controller is the damping signal that is fed into the reference voltage
summing point to get the next state values.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 74
NCRASEM 13 Paper ID:EEE04

VII. BASE STUDY


For the integrated system both local modes and inter-area modes appear. Then, a simple fuzzy controller based on
the experience can only damp local modes. Therefore, the solution of this problem is that a fuzzy controller is to be
developed based on the optimal control theory. The optimal controller depends on feeding back signals from all
states of the system, to damp both local and inter-area modes. The resultant fuzzy controller should approach the
optimal as compared with the optimal controller results for damping small disturbance through many operating
conditions. So a near-optimal fuzzy stabilizer for damping both local modes and inter-area modes is developed.
A Fuzzy Logic Controller for Damping Oscillation in a Simple Power System
In this section, it is decided to apply a fuzzy logic controller for a synchronous machine to an infinite bus system.
The synchronous machine as represented in[1] is assumed to have a thyristor-type excitation system and connected
through a transformer and a transmission line to an infinite bus. To discuss the small signal stability problem, the
nonlinear equations representing the system must be linearized.
VIII. RESULT AND DISCUSSION
The performance of single machine infinite bus system with lead-lag PSS and fuzzy PSS has been studied in
SIMULINK environment. The fuzzy stabilizer has been modeled in fis editor of matlab. The SIMULINK model of
the system with fuzzy PSS. Corresponding to the system data specified in Appendix, the K-coefficients are
calculated as K1=0.7636, K2=0.8644, K3=0.3231, K4=1.4189, K5 =-0.1463, K6=0.4167. The scaling factors
associated with input and output variables are tuned and taken as Kin1=1.8, Kin2=29.58, Kout=1.05. For such
constants, which are in Fig. 7.1, the performance has been studied under different conditions. Although the stability
problem in practical power system is mainly due to poor damping, the constant K5 has important bearing on system
performance. Its value normally found to be negative for high reactance and high power output, a practical situation.
The K5 can have positive value for low reactance and low power output. Therefore, the performance is studied for
small 0.05 p.u. change in input for both K5 negative (-0.1463) and K5 positive (0.1463) and response characteristics.

Fig. 1: SIMULINK model with fuzzy logic based PSS

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 75
NCRASEM 13 Paper ID:EEE04

Fig. 2: SIMULINK model with Lead lag PSS

Fig. 3: Angular position for a 0.05pu change in mechanical input with K5 Positive

Fig. 4: Angular speed for a 0.05pu change in mechanical input with K5 Positive

As shown in Fig. 8.3 and Fig. 8.4 the oscillations are more pronounced in case of inputs and outputs having
trapezoidal membership functions for K5 positive and the system become stable after a long time of 9 seconds
approximately. With K5 negative, generally the practical case, the performance characteristics are shown in Fig. 8.3
and Fig. 8.4 The unstable behavior is resulted if the trapezoidal membership function is used with negative value of
K5. As evident from Fig. 8.3 and Fig. 8.4, the performance with trapezoidal membership functions is unsatisfactory
and thus this membership function is not suited for the PSS design. The performance of lead-lag PSS and PSS using
gaussian and triangular membership functions is comparable and the system becomes stable after in nearly 7
seconds

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 76
NCRASEM 13 Paper ID:EEE04

Fig 5 Angular position for a 0.05pu change in mechanical input with K5 negative.

Fig. 6: Angular speed for a 0.05pu change in mechanical input with K5 negative.

Fig.7: Angular speed for a 0.05pu change in mechanical input with K5 negative with the change in spread of Gaussian membership function

Fig. 8 Angular position for a 0.05pu change in mechanical input with K5 negative with the change in spread of Gaussian membership function.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 77
NCRASEM 13 Paper ID:EEE04

The response for different operating conditions using triangular membership functions is investigated for negative
value of K5 and the performance characteristics are shown in Fig. 11 for 10%, 20%, 30% and 45% change in
mechanical input. With triangular membership functions, the response is coming out to the stable in all the cases
with very less oscillations thus enhancing the stability of a system. The performance of FPSS with triangular
membership function is superior in comparison to the performance with other PSS.

Fig 9: FIS Editor

Fig 10: Rule Viewer

IX. CONCLUSION
A Summary of Results
The target of the developed work is the damping of oscillations related to power system using a controller based on
fuzzy logic theory. On two systems, single machine to infinite bus system and 4-machine test system, the purposed
controller provide a more robust control over a large excursion of the operating points various and optimal controller
and lead lag stabilizer most of the previous control method either are not working sufficiently under whole range of
operating condition or they need complicated calculation as they require the exact model methodology to site the
proposed controller doesnt depend on the Eigen analysis approach model analysis approach is the usually used
techniques for getting the controller result the methodology here is from the time response of the system due to
various operating condition are proposed and tested. The resulting of the proposed controller is the increased
damping and stability of both local and inter-area modes. The proposed controller showed its effectiveness through-
out a board range of the test system operating conditions.
B Conclusion
1) An effective controller based on fuzzy logic theory for the damping both local inter-area modes is
developed.
2) A systematic generation of fuzzy logic controller rule base and I/O domain range is investigated and tested.
3) No need to transfer measurements between areas as each controller has its input from its area.
4) Fuzzy logic controllers can be effective in large-scales systems.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 78
NCRASEM 13 Paper ID:EEE04

C Future Work
The future of this particular research topic has many different facts this include, using of different input signal for a
fuzzy logic controller and investigation about non-linear loading.
D Other PSS Input Signals
Current resource has focused on rotor speed as a control variable; a frequency-input controller (f) must be
investigated as-well. However, it has been found that frequency is highly sensitive to the strength of the transmission
system, that is, more sensitive when the system is weaker which may off-set the controller action of the electrical
torque of the machine other limitation include the presence of sudden phase shift following rapid transient and large
noise include by industrial loads. On the other hand, the frequency signal is more sensitive to inter-area oscillations
then the speed signal. Also, using of power-input signal (P) as the input to the fuzzy controller as well. However
this signal was prove to be more effective for damping the inter-area mode efficiently but the local modes the rotor
speed is efficient, so trade off may be appeared [2].
E Non-linear Loading
In this research, the simulations for the two systems are done by an assumption that is the loads are static. Then each
load can be represented by constant shunt impedance. However the future work may study the effect of non-linear
loading upon the power system modes and the controller.
X. REFERENCES
[1] A.Ghosh , G.Ledwich, O.P.Malik and G.S.Hope, Power System Stabilizer Based on Adaptive Control techniques- IEEE
Transaction on Power Apparatus and System, Vol. PAS- 103, No.8, August 1984.
[2] A M D Ferreira, J A L Barreiros and J R Brito-de-Souza, Fuzzy Power Pystem Stabilizer including a Fuzzy PI Controller,
UKACC International Conference on Control, IEE, Sept 1998.
[3] C.L.Chen and Y.Y.Hsu, Coordinated Synthesis of Multi Machine Power System Stabilizer using an Efficient
Decentralized Modal Control Algorithm-IEEE Transaction of Power System, Vol.2,No.3, August 1987.
[4] G.Kanniah, O.Q. Malik and G.S.Hope, Excitation Control of Synchronous Generator using Adaptive Regulators-part1:
Theory and Simulation Results- IEEE Transaction on Power Apparatus and System, Vol. PAS- 103, No.5, May 1984.
[5] G V Moodley, G D Jennings, R G Harley and M T Wishart, Fuzzy Logic Power System Stabilizer in Multi Machine
Stability Studies IEEE AFRICON, pp. 843-848, Sept. 1996.
[6] H.A.Moussa, Y.Yu, Optical Power System Stabilization Through Excitation and/or Governor Control- IEEE Transaction
on Power Apparatus and System, Vol. PAS- 91, pp1166-1174, 1972.
[7] H.Y.Altavlib, P.C. Krause, Dyanamic Equivalent by Combination of Reduced Order Models of System Components- -
IEEE Transaction on Power Apparatus and System, Vol. PAS- 95, No.5, Sept./Oct 1976.
[8] Jaun, L H Herron and A Kalam, Comparison of Fuzzy Logic Based and Rule Based Power System Stabilizer, IEEE
Conference on Control Application, pp.692- 697, sept.1992.
[9] P.Kundur, D.C.Lee, H.M.Zein EI-Din, Power System Stabilizer for Thermal Units: Analytical Techniques and on Side
Validation - IEEE Transaction on Power Apparatus and System, Vol. PAS- 100, No.1, Jan 1981.
[10] Q.H.Li, D.Z.Zhao and Y.Y.Yu, A New Pole Placement Method for Excitation Control Design to Damp SSR of Non
Identical Two Machine System- - IEEE Transaction on Power System, Vol.4, No.3, August 1989
[11] R Gupta, D K Sambariya and R Gunjan, Fuzzy Logic Based Robust Power System Stabilizer for a Multi-machine Power
System,IEEE ICIT, pp. 1037-1042, Dec 2006.
[12] R.J. Fleming and J. Sun, An Optimal Multi Variable Stabilizer for a Multi-Machine plant- IEEE Transection on energy
conversions, Vol.5, No.1, March 1990.
[13] R.V. Larsen and D.A. Suann, Appling Power System Stabilizer In three parts, IEEE Transaction on Power Apparatus
and System, Vol. PAS- 100, No.6, June 1981.
[14] S.Cheng, y.S.Chow, O.P.Malik and G.S.Hope, An Adaptive Synchronous Machine Stabilizer-IEEE Transaction on
Power Apparatus and System, Vol. PWRS- 1,No.3, August 1986.
[15] S Majid, H A Rahman and O B Jais, Study of Fuzzy Logic Power System Stabilizer,IEEE Student Conference on
Research and Development 2002, pp. 335- 339.
[16] Y.N. Yu and C.Siggers, Stabilization and Optimal Control Signal for a Power System- IEEE TP-531summer power
meeting and EHV conference, July 1970.
[17] V.Arcidiacono, E.Ferrari, R.Marconato, J.Dos Ghali, D.Grandez, Evaluation and Improvement of Electromechanical
Oscillation Damping by Means of Eigen value-Eigenvector Analysis & Practical result in the Central per unit Power
System- IEEE Transaction on Power Apparatus and System, Vol. PAS- 100, No.1, Jan 1981.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 79
NCRASEM 13 Paper ID:EEE05

ENHANCEMENT OF TRANSIENT
STABILITY FOR AN AC/DC
INTERCONNECTED TRANSMISSION
SYSTEM USING HVDC LIGHT
P.PRAVEENA
Assistant professor, Department of EEE
Turbo machinery Institute Of Technology & Sciences, Patancheru,
Praveena_pothapala@yahoo.co.in

M.RAMESH
Associate Professor,Department of EEE
Medak college of Engg.& Tech,Kondapak, Siddipet
marpuramesh223@gmail.com

Dr.A.JAYALAKSHMI
Professor,Department of EEE
Jawaharlal Nehru Technological University, Hyderabad

Abstract: A HVDC Light is a new technology composed of forced-commutated voltage source converters which can
control both active and reactive power independently without commutation failures in the inverter side. HVDC Light is a
novel power electronic device, which utilizes the technology of VSC converter. It doesnt require reactive power
compensators resulting much smaller equipment size. For AC/DC interconnected transmission systems, the introduction
of HVDC Light can enhance the voltage support and improve the system stability. An AC/DC parallel transmission
system and a three in-feed HVDC system are modeled using MATLAB.

KEY WORDS: HVDC Light; AC/DC transmission systems, power stability, commutation failure

I.INTRODUCTION
HVDC transmission is an economic way for long distance power delivery and interconnection of asynchronous
systems with different frequency. With the development of modern power system, HVDC system plays an important
role in power grids due to their huge capacity and capability of long distance transmission. Towards 2015 there will
be 7 Hvdc transmission systems constructed in china south power grids. Conventional hvdc system is based on line
commutated thyristor rectifier. With the advent of high voltage and high power turn-off thyristor (GTO), IGBT
and more recently IGCT, high power solid state switches have symmetrical turn-on and turn-off capabilities. They
have given a birth to a new generation of HVDC stations, HVDC Light which is also called as voltage source
converter.
Unlike conventional hvdc scheme that employs line commutated current source converters, hvdc light is a new
technology utilizing forced commutated voltage source converters. Hvdc light can control both active and reactive
powers independently without commutation failures in the inverter side. It does not require reactive power
compensators resulting much smaller size. For ac/dc interconnected systems, the introduction of hvdc light can
enhance the voltage support and improve the system stability.
II PRINCIPLE OF HVDC LIGHT
HVDC light is composed of transformer, filter, converters and dc capacitors, shown in figure1. Transformer is
used to step down the ac voltage to satisfy the demand of self-commutated solid state devices, such as series and
parallel of GTOs, IGBTs or IGCTs. high frequency components caused by the switches of valves are isolated
from power system by filters. The key part of hvdc light is converters, which can realize the conversion from AC to

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 81
NCRASEM 13 Paper ID:EEE05

DC bi directly. DC capacitors are used as the Dc voltage source in HVDC light, which need being charged and
recharged.

Figure1. HVDC Light Converter


The equivalent circuit diagram of converter is shown in fig.2. by pwm control the converter outputs fundamental
frequency voltage with different magnitude and phase angle through the high pass filters. The magnitude of the
phase angle decides the reactive power and active power exchange between ac and dc system respectively. The
power transmitted by HVDC light is given by
Sb=P+j Q = UF I*R = UF (UC-UF)
ZR
Where Sb is the apparent power of hvdc light; P is the active power and Q is the reactive power. UF is the voltage
of ac system; UC is the output voltage of converter; ZR is the equivalent impedance of the converter system including
the transformer and reactors.

Figure2.Equivalent Circuit diagram of HVDC Light converter

III. HVDC LIGHT CONTROL SYSTEM


A.RECTIFIER CONTROLLER:
The rectifier controller consists of four parts: power flow control loop,reactive power control loop,phase locked
loop,and pwm pulse firing. for active power control, the dc power p_dc can be calculated by multiplying of direct
current and direct voltage. after a time delay, the p_dc is compared with the desired dc power pdc_ref, and the
comparator out[puts the error signals to the power flow controller. the reactive power controller is a PI controller.
the measured reactive power and the desired reactive power Q_ref are the input of the controller. the outputs of
active and reactive power control loop are the inputs of PWM pulse generator.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 82
NCRASEM 13 Paper ID:EEE05

Figure3. The rectifier control system

B.INVERTER CONTROLLER:
The PWM pulse generator and PLL in inverter controller are the same as the rectifier controller. Besides the two
control loop, there are other AC Voltage control loop and DC voltage control loop. PI controllers are used for both
AC voltage control loop and DC control loop. the inverter controller can control the AC and DC voltage of the
receiver system in HVDC Light.

Figure.4.Inverter control system

IV. RESULTS
A.HVDC light in AC/DC hybrid transmission system:
HVAC/DC hybrid transmission systems are very common now a day. If ac transmission lines are parallel with
HVDC light, there will be more advantages. For the simulation purpose, a model of HVDC Light paralled with two
AC lines connecting two areas is built. The power source is a 300MW generator, which is equipped with exciter
controller and power system stabilizer (PSS). The nominal capacity of Hvdc light is 120MW. The solid-state devices
are IGBTs.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 83
NCRASEM 13 Paper ID:EEE05

Figure5. The shape of power angle when the system is stable


a) Without Hvdc light b) With Hvdc light

V. CONCLUSION
HVDC light is a novel power electronic device, which utilizes the technology of VSC converter. By pwm control
model, it can control the output of active power and reactive power independently. it is the major difference from
line commutated HVDC transmission system. In ac/dc interconnected transmitted system, the rotor angle stability of
power systems can be improved by the control of active power. The ac voltage in the inverter side can be supported
by the control of reactive power. In multi-infeed HVDC transmission system, system faults can cause commutation
failure in several Hvdc systems. With the capability of voltage voltage support from hvdc light, the ac voltage can be
supported to prevent the commutation failure in some HVDC Systems. as a conclusion Hvdc light is a novel
approach to improve the performance and stability of power system. It has bright future to be applied in power
systems in many fields.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 84
NCRASEM 13 Paper ID:EEE05

VI. REFERENCES

[1] B.R.Andersen, L.Xu, P.J.Horton, P.Cartwright, Topologies for HVDC VSC Transmission.IEEE Power Engineering Journal, June, 2006:142-
150
[2] Mao Xiao-ming: Zhang Yao: Guan Lin; Wu Xiao-chen. Coordinated control of interarea oscillation in the China Southern Power grid
[J].IEEE Trans.on power systems, 2006
[3] P.Kundur. Power system stability and control.McGraw-Hill, Companies, Inc, New York, 1994
[4] Z.Zhao, M.R.Iravani, application of GTO voltage source inverter in a Hybrid HVDC link.IEEE Trans on power delivery, 1994
[5] D.N.Kosterve, Modelling synchronous voltage source converters in Transmission System planning studies.
[6] Z.Huang, B.T Ooi,L.-A Dessaint,F.D.Galiana,Exploiting voltage support of Voltage-source HVDC.
[7] B.-M Han , S.-T. Baek,B.-Y, Bae J-Y Choi. Back to back HVDC System using a 36- step voltage source converter, IEEE Proc.-Gener.
Transm.distirb-2006

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 85
NCRASEM 13 Paper ID:EEE06

VOLTAGE CLAMPED DC-DC CONVERTER


WITH REDUCED REVERSE RECOVERY
CURRENT AND SWITCH VOLTAGE
STRESS
M.Sreerama
H.O.D-EEE,Turbomachinery Institute of Technology & Sciences,Indresam(v),Medak Dt.,Hyderabad

Dr. M. Surya Kalavathi


JSiddartha Institute of Engineering and technology, Ibrahimpatnam, Hyderabad, Andhra Pradesh, INDIA

Bhumanapally Ravindhranath Reddy.

K.Prakasam
Assoc.Prof, HOD of Dept of EEE, Siddhartha Institute of Engineering and Technology, Ibrahimpatnam, Hyderabad.

Abstract-Rectifier reverse-recovery problems cause a significant efficiency reduction as well as severe electromagnetic
interference (EMI) in continuous-current-mode (CCM) boost converters. To alleviate these problems, this project
presents a simple and effective solution that involves shifting the original rectifier current to a new branch, which consists
of a rectifier and a coupled winding of the boost inductor.
A high-efficiency clamped voltage dcdc converter with reduced reverse-recovery current and switch-voltage
stress. In the circuit topology, it is designed by way of the combination of inductor and transformer to increase the
corresponding voltage gain. Moreover, one additional inductor provides the reverse-current path of the transformer to
enhance the utility rate of magnetic core.
In addition, the voltage-clamped technology is used to reduce the switch-voltage stress so that it can select the
Schottky diode in the output terminal for alleviating the reverse-recovery current and decreasing the switching and
conduction losses. Thus, the proposed converter topology has a favorable voltage-clamped effect and superior conversion
efficiency. Key Words: Electromagnetic Interference (EMI), Continuous-Current Mode (CCM),Reverse Recovery
Current.

I.INTRODUCTION

In recent years, dcdc converters with steep voltage ratio are usually required in many industrial applications, e.g.,
the front-end stage for clean energy sources, the dc backup energy system for an uninterruptible power supply
(UPS), high intensity discharge (HID) lamps for automobile headlamps, and the telecommunication industry. The
conventional boost converters cannot provide such a high dc-voltage ratio due to the losses associated with the
inductor, filter capacitor, main switch, and output diode. Even for an extreme duty cycle, it will result in serious
reverse-recovery problems and increase the rating of the output diode. As a result, the conversion efficiency is
degraded, and the electromagnetic interference (EMI) problem is severe under this situation.
In order to increase the conversion efficiency and voltage gain, many modified boost-converter topologies have
been investigated in the past decade. Many applications powered by batteries call for high performance, high step-up
dcdc converters. As an example, for a high intensity discharge (HID) lamp ballast used in automotive headlamps in
which the start-up voltage is up to 400 V the dcdc converter needs to boost the 12 V of the battery voltage up to
100 V during steady-state operation. Fig. 1(a) shows the diagram of HID ballast. Another example of a high step-up
application is the front-end converter with dual inputs, as shown in Fig. 1(b). The convergence of computer and
telecommunications industries makes the well-defined 48V battery plant a good choice for offering hours of reserve
time during outages of the ac mains. Although both powered by the 48 V dc power plant, the dc-input converter is
more efficient and less complex than the uninterruptible power supply (UPS). The dc-input converter must boost the
48 V of the dc bus voltage to about 380400 V. Generally speaking, the high step-up dcdc converters for these
applications have the following common features.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 87
NCRASEM 13 Paper ID:EEE06

1) High step-up voltage gain. Generally, about a tenfold step-up gain is required.
2) High efficiency.
3) No isolation is required.
The aim of this study is to design a high-efficiency voltage clamped dcdc converter with reduced reverse-
recovery current and switch-voltage stress to provide a stable constant dc voltage. To achieve this goal, the
manipulation of inductor and transformer is adopted to increase the voltage gain and to enhance the utility rate of the
magnetic core. Moreover, the voltage-clamped technology is used for reducing the switch voltage stress and solving
the reverse-recovery problem. In addition, the closed-loop control methodology can be utilized in the proposed converter to
overcome the voltage-drift problem of power source under the variation of loads.

II. PROPOSED METHOD


A BOOST CONVERTER
Boost converter (step-up converter): is a power converter with an output dc voltage greater than its input dc voltage. It is a
class of switching-mode power supply (SMPS) containing at least two semiconductor switches (a diode and a transistor) and at
least one energy storage element. Filters made of inductor and capacitor combinations are often added to a converters output to
improve performance.
This is the basic schematic of a boost converter. The switch is typically a MOSFET, IGBT or BJT.

Figure1 Basic schematic of a boost converter

Figure 2 Boost converter schematic

Figure 3 Two distinct states of a Boost converter

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 88
NCRASEM 13 Paper ID:EEE06

B Operating principle
The basic principle of a Boost converter consists in 2 distinct states (figure ): in the On-state, the switch S is closed, resulting
in an increase in the inductor current; in the Off-state, the switch is open and the only path offered to inductor current is through
the diode D, the capacitor C and the load R. This, results in transferring the energy accumulated during the On-state into the
capacitor.
C Continuous mode
When a boost converter operates in continuous mode, the current through the inductor (IL) never falls to zero. Figure shows the
typical waveforms of currents and voltages in a converter operating in this mode. The output voltage can be calculated as follows,
in the case of an ideal converter (i.e. using components with an ideal behavior) operating in steady conditions:
Waveforms of current and voltage in a boost converter operating in continuous mode.
Waveforms of current and voltage in a boost converter operating in continuous mode.

Figure 4 wavefoems of Current & Voltage

During the On-state, the switch S is closed, causing the current in the inductor to increase at a rate given by:

At the end of the On-state, the increase of IL is therefore:

D is the duty cycle. It represents the fraction of the commutation period T during which the switch is on. Therefore
D ranges between 0 (S is never on) and 1 (S is always on).
During the Off-state, the switch S is open, so the inductor current flows through the load. If we consider zero voltage
drop in the diode, and a capacitor large enough for its voltage to remain constant, the evolution of IL is:

Therefore, the variation of IL during the Off-period is:

As we consider that the converter operates in steady-state conditions, the amount of energy stored in each of its
components has to be the same at the beginning and at the end of a commutation cycle. In particular, the energy
stored in the inductor is given by:

Therefore, it is obvious that the inductor current has to be the same at the beginning and the end of the commutation
cycle. This can be written as

Substituting and by their expressions yields:

This can be written as:

From the above expression it can be seen that the output voltage is always more than the input voltage (as the duty
cycle goes from 0 to 1), and that it increases with D, theoretically up to the infinite as D approaches 1. This is why
this converter is sometimes referred to as a step-up converter.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 89
NCRASEM 13 Paper ID:EEE06

D Discontinuous mode
In some cases, the amount of energy required by the load is small enough to be transferred in a time smaller than
the whole commutation period. In this case, the current through the inductor falls to zero during part of the period.
The only difference in the principle described above is that the inductor is completely discharged at the end of the
commutation cycle (see waveforms in figure). Although slight, the difference has a strong effect on the output
voltage equation. It can be calculated as follows:

Figure 5 Waveforms of current and voltage in a boost converter operating in discontinuous mode.

As the inductor current at the beginning of the cycle is zero, its maximum value (at t=D.T) is

During the off-period, IL falls to zero after .T:

Using the two previous equations, is:

The load current Io is equal to the average diode current (ID). As can be seen on figure 4, the diode current is equal
to the inductor current during the off-state. Therefore the output current can be written as:

Replacing ILmax and by their respective expressions yields:

Therefore, the output voltage gain can be written as:

Compared to the expression of the output voltage for the continuous mode, this expression is much more
complicated. Furthermore, in discontinuous operation, the output voltage not only depends on the duty cycle, but
also on the inductor value, the input voltage, and the output current.
Limit between continuous and discontinuous modes

Figure 6 Evolution of the Normalized output voltage of an ideal Boost converter with the normalized output current.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 90
NCRASEM 13 Paper ID:EEE06

E Evaluation Scheme
The converter operates in discontinuous mode when low current is drawn by the load, and in continuous
mode at higher load current levels. The limit between discontinuous and continuous modes is reached when the
inductor current falls to zero exactly at the end of the commutation cycle. With the notations of figure , this
corresponds to :

D+=1
In this case, the output current Iolim (output current at the limit between continuous and discontinuous modes) is
given by:

Replacing ILmax by the expression given in the discontinuous mode section yields:

As Iolim is the current at the limit between continuous and discontinuous modes of operations, it satisfies the
expressions of both modes. Therefore, using the expression of the output voltage in continuous mode, the previous
expression can be written as:

Let's now introduce two more notations:


The normalized voltage, defined by . It corresponds to the gain in voltage of the converter;
The normalized current, defined by . The term is equal to the maximum increase of the inductor current
during a cycle, i.e. the increase of the inductor current with a duty cycle D=1. So, in steady state operation of the
converter, this means that equals 0 for no output current, and 1 for the maximum current the converter can
deliver.
Using these notations, we have:
in continuous mode, ;
in discontinuous mode, ;

The current at the limit between continuous and discontinuous mode is .


Therefore, the locus of the limit between continuous and discontinuous mode is given by:
These expression have been plotted in figure . The difference in behavior between the continuous and discontinuous
modes can be seen clearly. This is important from a control point of view.
State Space Averaging Analysis

Figure 7 Evolution of the output voltage of a boost converter with the duty cycle of the switch.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 91
NCRASEM 13 Paper ID:EEE06

III. CONVERTER DESIGN AND ANALYSES


A newly designed converter topology is depicted in Fig, where it contains four parts including a dc-input
circuit, a primary-side circuit, a secondary-side circuit and a dc-output circuit. The major symbol representations are
summarized as follows. Vi and Ii denote the dc-input voltage and current, and Ci is the input filter capacitor in the
dc-input circuit. Lp represents the primary inductor of the transformer; L is the additional inductor in the primary-
side circuit; and S is the main switch. Ls denotes the secondary inductor of the transformer; Cs and Cc are the
balanced capacitor and clamped capacitor in the secondary-side circuit; and D1, D2, D3, and D4 are the rectifier
diodes. Vo and Io describe the output voltage and current; Ro is the output load; Do, and Co are the output diode and
filter capacitor in the output circuit, respectively. The equivalent circuit and state definition of the newly designed
converter is depicted in Fig, where the transformer is modeled as an ideal transformer with a secondary leakage
inductor (Lk). The turns ratio of this ideal transformer is defined as

n = N2/N1 ----------- (1)


where N1 and N2 are the primary and secondary winding turns.

Figure 8 System configuration of a high-efficiency voltage-clamped dcdc converter

Figure 9 Equivalent circuit.

The additional inductor (L) is located in parallel with the primary side of the transformer. Moreover, the rectifier
diodes (D1, D2, D3, and D4) are connected between the primary and secondary sides of the transformer. The voltages
across the additional inductor, the main switch, the ideal transformer primary and secondary winding, the secondary
leakage inductor, the balanced capacitor, and the output diode are vL, vDS, vLp, vLs, vLk, vCs, and vDo, respectively.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 92
NCRASEM 13 Paper ID:EEE06

The clamped capacitor Cc is assumed to be large enough to be viewed as a constant voltage source, VCc . The
conductive voltage drops of the main switch (S) and all diodes (D1, D2, D3, D4, and Do) are neglected to simplify the
circuit analyses. The characteristic waveforms of the proposed high efficiency converter are depicted in Fig.. In
addition, Fig. illustrates the operational modes in one switching cycle, and the detailed operation stages are
described as follows.

Mode 1 (t0 - t1) : At time t = t0, the main switch (S) is turned ON. At the same time, the diodes (D1 and D4)
become conducted, and other diodes (D2, D3, and Do) are reverse biased. The additional inductor (L) and clamped
capacitor (Cc) are linearly charged by the input-voltage source (Vi) through the transformer. Applying Kirchhoffs
law [4], the voltages of VL, vLp, vLs, and vLk during this period can be expressed as

vL = vLp = V ---------------(2)
vLs = n Vi ---------------(3)
vLk = VCc n Vi - vCs . ---------------(4)
The rate of change of the additional inductor current (iL), the primary-side current (iLp), and the secondary-side
current (iLs) of the transformer can be represented as
diL/dt = Vi/L ---------------(5)

diLp/dt = (VCc - nVi vCs)/Lk + Vi/Lp ---------------(6)

diLs/dt = (VCc - nVi vCs)/Lk ---------------(7)

Mode 2 (t1 - t2) :

At time t = t1, the main switch (S) is turned OFF. At this time, the diodes (D2, D3, and Do) become forward
biased to start conducting, and other diodes (D1 and D4) are reverse biased. The stored energy of the additional
inductor (L) and clamped capacitor (Cc) in Mode 1 is released to output loads. Moreover, the transformer can be

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 93
NCRASEM 13 Paper ID:EEE06

operated at four quadrants to enhance the utility rate of the magnetic core and to keep the clamped voltage (VCc),
since the additional inductor (L) supplies energy to the output terminal by way of the transformer. Applying
Kirchhoffs law [4], the voltage and current relations of each element during this mode can be described by
VL = vLp = Vi + VCc - Vo -----------------(8)
VLs = n (Vi + VCc - Vo) -----------------(9)
VLk = - VCc - vCs n (Vi + VCc - Vo) -----------------(10)
vDS = Vi - VL = Vo - VCc < Vo -----------------(11)
iDo = iL + iLp = iCc - iLs -----------------(12)
where iDo is the current of the output diode Do; iCc is the current of the clamped capacitor Cc. According to (11), the
cutoff voltage of the main switch (S) is clamped at Vo - VCc. Moreover, the main switch (S) with low-voltage-rated
capacity can be selected since the switch-voltage stress (vDS) is smaller than the output voltage (Vo). The selection of
a low-voltage rated device with lower RDS(ON) is useful for improving the conversion efficiency. Referring to (8)
(10), the rate of change of iL, iLp and iLs is given by
diL/dt = (Vi + VCc Vo) / L ------------(13)
diLp/dt = [-VCc - vCs - n(Vi + VCc - Vo) / Lk ] + (Vi + VCc Vo) / Lp ------------(14)
diLs/dt = [-VCc - vCs - n(Vi + VCc - Vo)] / Lk ------------(15)
Similarly other two modes can be taken as same.

Figure 10 Characteristic waveforms.

IV. DESIGN OF COMPONENTS


A. Transformer Design
Area product:
The high frequency transformers are largely used in inverter and converter applications. The Switched
Mode Power Supplies require high frequency transformers, if it has to maintain a significant power/unit volume
advantage over the Linear Power Supplies. Here we shall mainly deal with transformer designs for SMPS, through
the general principles hold good designing high frequency transformer for any application.
The size of a power transformer is generally designed by a parameter is called area product, Ap, as given by
the following equation,
Ap = cross sectional area of the core (Ac) * window area (Aw)
Primary and secondary turns are given by
N1 = and N2 = -------------- (1)
Current can be expressed in terms of current density as follows:
I = J awire -------------- (2)
Where J = current density

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 94
NCRASEM 13 Paper ID:EEE06

awire = area of the conductor cross section through which current is flowing.
As N1 turns of the primary has a cross section area of a 1 and N2 turns of the secondary has a cross section
area of a2, the total copper area that is to be made available for winding is N1a1+N2a2.
This theoretically should fit in the window area Aw. However, in practice the window area has to be
accommodated not only the bare ware, but the wire insulation, coil former, insulation paper used between windings
etc. if Kw denotes this factor called window utilization factor, then,
KwAw = N1a1 + N2a2 ---------------- (3)
Substituting for awire using eq.(2), we have
KwAwJ = N1I1 + N2I2 ---------------- (4)
Where I1 and I2 are primary and secondary currents.
Substituting for N1 and N2 from eq.(1) in eq.(4) , we get
KwAwJ = i.e. Ap = AcAw =
For the sine wave, the secondary VA, Po2, is given by
Po2 = E2I2 --------------- (5)
Where E2 is the (rms) secondary induced voltage and the primary VA, Po1 is given by

Po1 = E1I1 = --------------- (6)


Where E1 is the rms primary induced voltage and is the efficiency of the transformer.
Thus,
= AcAw = --------------- (7)
Where
Po2 = secondary VA
Kf = form factor (1 for square wave, 1.1 for sine wave)
Bm = allowed maximum flux density in Tesla
J = current density in A/m2
Kw = window utilization factor
f = frequency of the operation in Hz

V. DESIGN CALCULATIONS
This converter is fundamentally a single-ended boost converter. The power components in the core converter
consist of a power transformer, power switch, inductor and output capacitor.
The design of the boost converter will progress in the order below.
A.Design Specifications:
Output voltage V0 = 200V
Output ripple 1% of V0
Output current, I0 = 1.65A
Switching frequency fs = 100KHZ
Supply voltage, Vin = 30V 10% (Normal Mode)
Therefore, Vinmin = 27V, Vinmax = 33V
Before, we going to design, we shall look into the choice of some design parameters which will affect the design of
the transformers. The following discussion will be valid for all the design examples in this chapter.
The converter diodes in the secondary of the transformer will show a significant drop as they are carrying high
currents. The diode drops may be as high as 1.5V for fast recovery diodes. It is safe to design for the worst case of
VD = 1.5V.
Another practical problem is the drops due to the winding resistances of the inductor and transformer. It has been
found that Vrl=10% of V0 is a safe choice generally.
At high frequencies, usually the core material choice is ferrite. It has a saturating flux density, B m of 0.3 T, so the
maximum allowable flux density in the core should be 0.2 T or less (Bm= 0.2 T).
Another important design parameter is the current density J. If the current density J is chosen very low, then for a
given current a very large conductor cross section is required (thereby demanding a large window area), which
means that the resistance presented to the current flow will be low. One should not thereby choose a very low
current density with the idea of reducing the conductor resistance because at high frequencies the skin effect comes

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 95
NCRASEM 13 Paper ID:EEE06

into picture and whatever be the thickness of the gauge, there is no significant change in the conductor resistance. A
current density between 2 and 5 A/mm 2 is found to be a good compromise between conductor resistance and
window area. We shall use a value of J = 3 A/mm2 in this project.
The maximum duty cycle in isolated converters should not exceed 50% to avoid core saturation. So we shall
design for Dmax = 0.45 i.e. 45%.The window utilization factor
K w= 0.4 and the efficiency of the transformer, , is taken to be 0.8
B. Duty Ratio:
The maximum duty cycle in isolated converters should not exceed 50% to avoid core saturation. So we shall
design for Dmax = 0.45 i.e. 45%.
Area product
= 7734 mm4
Choose the suitable core which has an Ap greater than the value calculated above.
ETD 34/17/11 core is a proper choice (Ac = 91.6 mm2, Ap = 11175.2 mm4)

C. Number of turns:
The equations for calculating the primary and secondary number of turns are given by
N1 =
N2 =
Substituting the values for the variables, we have
N1 = 4.5 (say 5) and N2 = 27.29 (say 28)

D. Wire gauge selection:


The rms values of the currents are given by
I2 = Io and
I1 = (N2/N1) I2
Substituting the values for the variables, we have
I2 = 1.1068A
I1 = 5.98A
The wire cross sectional area can now be calculated by,
a1 = I1/J and a2 = I2/J
Substituting the values, we have
a1 = 1.99mm2
Choose a wire gauge whose cross section is greater than that calculated above.
Instead of taking single large gauze wire bundled two SWG 18 wires in to one is a proper choice which nullify skin
effect.
And a2 = 0.3689mm2
Choose a wire gauge whose cross section is greater than that calculated above.
SWG 22 is the proper choice for the secondary.

E. PULSE WIDTH MODULATOR (3525)


The SG3525A, SG3527A pulse width modulator control circuits offer improved performance and lower
external parts count when implemented for controlling all types of switching power supplies. The onchip +5.1 V
reference is trimmed to 1% and the error amplifier has an input commonmode voltage range that includes the
reference voltage, thus eliminating the need for external divider resistors. A sync input to the oscillator enables
multiple units to be slaved or a single unit to be synchronized to an external system clock. A wide range of dead
time can be programmed by a single resistor connected between the CT and Discharge pins. These devices also
feature builtin softstart circuitry, requiring only an external timing capacitor. A shutdown pin controls both the
softstart circuitry and the output stages, providing instantaneous turn off through the PWM latch with pulsed
shutdown, as well as softstart recycle with longer shutdown commands. The under voltage lockout inhibits the
outputs and the changing of the softstart capacitor when VCC is below nominal. The output stages are totempole
design capable of sinking and sourcing in excess of 200 mA. The output stage of the SG3525A features NOR logic
resulting in a low output for an offstate while the SG3527A utilized OR logic which gives a high output when off.
8.0 V to 35 V Operations

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 96
NCRASEM 13 Paper ID:EEE06

5.1 V 1.0% Trimmed Reference


100 Hz to 400 kHz Oscillator Range
Separate Oscillator Sync Pin
Adjustable Dead time Control
Input Under voltage Lockout
Latching PWM to Prevent Multiple Pulses
PulsebyPulse Shutdown
Dual Source/Sink Outputs: 400 mA Peak

Figure 11 Block diagram.

Figure 12 Pin Diagram.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 97
NCRASEM 13 Paper ID:EEE06

Figure 13 Open Loop Control Of A Flyback Converter

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 98
NCRASEM 13 Paper ID:EEE06

F. APPLICATION INFORMATION

Shutdown Options
Since both the compensation and softstart terminals (Pins 9 and 8) have current source pullups, either can
readily accept a pulldown signal which only has to sink a maximum of 100 mA to turn off the outputs. This is
subject to the added requirement of discharging whatever external capacitance may be attached to these pins. An
alternate approach is the use of the shutdown circuitry of Pin 10 which has been improved to enhance the available
shutdown options. Activating this circuit by applying a positive signal on Pin 10 performs two functions: the PWM
latch is immediately set providing the fastest turnoff signal to the outputs; and a 150 mA current sink begins to
discharge the external softstart capacitor. If the shutdown command is short, the PWM signal is terminated without
significant discharge of the softstart capacitor, thus, allowing, for example, a convenient implementation of pulse
bypulse current limiting. Holding Pin 10 high for a longer duration, however, will ultimately discharge this external
capacitor, recycling slow turnon upon release. Pin 10 should not be left floating as noise pickup could conceivably
interrupt normal operation.

VI. CIRCUIT AND WAVEFORMS

A. SIMULATION CIRCUIT:

K K1
K_Linear
R2 R3 COUPLING = 0.999

0.0001 0.001

L Lp Ls Cs
5.9u 4.7u 118.5u 27.2u

Vi
10V Ci
3300u

D1 D2 Do

MUR860 MUR860 MUR860

C5 D3 D4 Ro
M1
1000n Co 50
MUR860 MUR860
V1 = 0
14.1u
Vpulse
V2 = 10 IRF540 Cc
TD = 1n R4
TR = 1n 100 D6
TF = 1n
PW = 4.5u 28.2u
PER = 10u MUR860

B . Experimental Circuit:

A prototype of the converter circuit has been built with input voltage Vi = 10 V and a switching frequency of 100
kHz. Maximum output power at VO = 60V is 80W. The converter always operates in the continuous conduction
mode. The following components are used:
Component Rating
Balanced capacitor, Cs 4 6.8 F
Clamped capacitor, Cc 6 4.7 F
Input filter capacitor, Ci 31500 F

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 99
NCRASEM 13 Paper ID:EEE06

Output filter capacitor, Co 3 4.7 F


Main switch, S IRF540N 100V, (RDS(ON) = 44 m)
Snubber resistance 47, 5W
Snubber capacitance 224nF
Output diode Do:
Schottky diode MBR20100CT 100 V, 20 A
Rectifier diodes D1, D2, D3, D4:
Schottky diode MBR20200 200 V, 20 A

C. Comparison of Simulation and Experimental Results

OUTPUT VOLTAGE:

OUTPUT CURRENT:

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 100
NCRASEM 13 Paper ID:EEE06

INPUT CURRENT:

VOLTAGE ACROSS MOSFET:

VOLTAGE ACROSS OUTPUT DIODE

VII. CONCLUSION

This Paper has developed a voltage-clamped dcdc converter with reduced reverse recovery current and switch-
voltage stress, with a power quality of low voltage and high current. The newly designed converter circuit has the
following improvements compared to the previous work.

1) It can select the main switch with lower sustainable voltage for alleviating the switch conduction loss due to the
utilization of voltage-clamped technique.
2) All diodes in this circuit topology are Schottky diodes with the reduction of switching and conduction losses.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 101
NCRASEM 13 Paper ID:EEE06

3) The additional inductor is used for providing the reverse current path of the transformer to raise the utility rate of
the magnetic core.
4) Additional snubber circuits for absorbing the voltage spikes in the diodes are not required to further cut down the
manufacture cost.
This new converter topology provides designers with an alternative choice to convert renewable energy
efficiently, and it also can be extended easily to other power-conversion systems for satisfying high-voltage
demands.

VIII. REFERENCES

[1] N. Mohan, T. M. Undeland, and W. P. Robbins, Power Electronics: Converters, Applications, and Design. New York: Wiley, 1995.
[2] M. M. Jovanovich and Y. Jang, A new soft-switched boost converter with isolated active snubber, IEEE Trans. Ind. Appl., vol. 35, no. 2,
pp. 496502, Mar./Apr. 1999.
[3] C. M. C. Duarte and I. Barbi, An improved family of ZVS-PWM active-clamping DC-to-DC converters, IEEE Trans. Power Electron., vol.
17, no. 1, pp. 17, Jan. 2002.
[4] E. S. da Silva, L. dos Reis Barbosa, J. B. Vieira, L. C. de Freitas, and V. J. Farias, An impr oved boost PWM soft-single-switched converter
with low voltage and current stresses, IEEE Trans. Ind. Electron., vol. 48, no. 6, pp. 11741179, Dec. 2001.
[5] C. W. Roh, S. H. Han, and M. J. Youn, Dual coupled inductor fed
isolated boost converter for low input voltage applications, Electron.
Lett., vol. 35, no. 21, pp. 17911792, Oct. 1999.
[6] Q. Zhao and F. C. Lee, High-efficiency, high step-up dcdc converters,
IEEE Trans. Power Electron., vol. 18, no. 1, pp. 6573, Jan. 2003.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 102
NCRASEM 13 Paper ID:EEE07

IDENTIFICATION AND CLASSIFICATION


OF FAULTS IN HIGH VOLTAGE RADIAL
UG CABLES BY WAVELET TRANSFORM
1.D.Prabhavathi,1 2.K.Prakasam Dr. M.Surya Kalavathi3 Dr.B.Raveendranath Reddy4
1,2
JSiddartha Institute of Engineering and technology, Ibrahimpatnam, Hyderabad, Andhra Pradesh, INDIA
3,42
Jawaharlal Nehru Technological University, Kukatpally, Hyderabad, Andhra Pradesh, INDIA
E-mail: D.Prabhavathi10@gmail.com,2gvitgem@gmail.com,3munagala12@yahoo.co.in,4bumanapalli_brreddy@yahoo.co.in
1

Abstract: This paper deals with the identification and classification of faults in high voltage radial UG cables by wavelet
transform. It presents the use of wavelet as a pattern classifier to perform the tasks of different fault identification and
classification .In this work the cable model is taken and the different faults in the cable were identified and classified by
wavelet and are compared. The under ground system is very important for distribution systems especially in metropolitan
cities, air port and defense service The UG system provides a large capacity in transmission and no harm from visual
harassment. How ever, it is difficult than those of over head transmission systems. In ordered to minimize such defectives
of the faulted UG systems, the design and construction should be optimized In that fault detection, classification and also
location to become easy and reliable. This wavelet analysis reduces the effect of system variables such as fault resistance,
fault type and fault inception angle. The result show that the proposed technique is able to offer high accuracy in fault
classification tasks
I INTRODUCTION
This paper deals with the identification and classification of faults in high voltage radial UG cables by wavelet
transform. It presents the use of wavelet as a pattern classifier to perform the tasks of different fault identification
and classification .In this work the cable model is taken and the different faults in the cable were identified and
classified by wavelet and are compared. The under ground system is very important for distribution systems
especially in metropolitan cities, air port and defense service The UG system provides a large capacity in
transmission and no harm from visual harassment. How ever, it is difficult than those of over head transmission
systems. In ordered to minimize such defectives of the faulted UG systems, the design and construction should be
optimized In that fault detection, classification and also location to become easy and reliable. This wavelet analysis
reduces the effect of system variables such as fault resistance, fault type and fault inception angle. The result show
that the proposed technique is able to offer high accuracy in fault classification tasks

II THEORY OF WAVELET ANALYSIS

The Wavelet Transform (WT) is a digital signal processing (DSP) technique based on translation and dilation of a
window, named the mother wavelet [8]. The technique allows high frequency events location with a greater time
resolution. The DFT yields frequency coefficients of a signal, which represents the projection of orthogonal Sine
and Cosine basic functions. Such transforms have been successfully applied to stationary signals where the
frequencies of the signals do not vary with time. However, for non-stationary signals, any abrupt change may spread
all over the frequency axis. Under this situation, the Fourier techniques are less efficient in tracking the signal
dynamics, therefore, an analysis adaptable to non- stationary signals [8] is required instead of Fourier based
methods. Consequently, the Short Time Fourier Transform uses a (time-frequency) window to localize in time -
sharp transitions for non- stationary signals. The STFT uses a fixed time frequency window, which is inadequate for
the practical power system faults encountering change in frequencies. The Wavelet Transform (WT) technique,
recently proposed in literature as a new tool for monitoring power quality problems [3-7], has received considerable
interests in field of power system signal processing [8-9]. The WT is well suited to wide band signals that may not
be periodic and may contain both sinusoidal and non sinusoidal components. This is due to the ability of wavelets to

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 103
NCRASEM 13 Paper ID:EEE07

focus on short time intervals for high frequency components and long time intervals for low frequency components.
In this paper the output line voltages at load terminals are used as the medium for fault detection. A line to ground
fault is defined as a single connection between a phase and the ships hull. MATLAB-SIMULINK is used to
generate the line to line voltage data for the various faulted conditions. A Wavelet analysis using Daubechies
Wavelets is then applied to line voltages. The coefficients of the detailed scales are examined to determine the line
on which ground fault has occurred in balanced load or unbalanced load conditions. This paper is organized as
follows. Section-2 presents Wavelet transform and Multi-resolution analysis. Section-3 concerns with the proposed
Wavelet based fault detection method for balanced and unbalanced ungrounded power system. Section-4 deals with
MATLAB-SIMULINK model used for generation of line to line voltage data for fault conditions in Naval typical
integrated power system and implementation of the developed algorithm to demonstrate the efficiency and
effectiveness of the proposed method. Numerical findings are presented in the form of graphs and tables.
Wavelets are functions that satisfy certain requirements. The very name wa6elet comes from the requirement that
they should integrate to zero, waving above and below the x-axis. The diminutive connotation of wa6elet suggests
the function has to be well localized. Other requirements are technical and needed mostly to insure quick and easy
calculation of the direct and inverse wavelet transform. Compared with traditional Fourier method, there are some
important differences between them. First Fourier basis functions are localized in frequency but not in time while
wavelets are localized in both frequency (viadilation) and time (via translation). Moreover, wavelets can provide
multiple resolution in time and frequency. Second, many classes of functions can be represented by wavelets in
more compact way. For example, functions with discontinuities and functions with sharp spikes usually take
substantially fewer wavelet basis functions than sine-cosine basis functions to achieve a comparable approximation.
There are many types of wavelets [9,10], such as Harr, Daubechies 4, Daubechies 8, Coiflet 3, Symmlet 8
and so on. One can choose between them depending on a particular application. As with the discrete Fourier
transform, the wavelet transform has a digitally implementable counterpart, the discrete wavelet transform (DWT).
If the discrete analysis is pursuing on the discrete time, the DWT is defined as

where, s(n) is the signal to be analyzed and gj,k(n) is discrete wavelet function, which is defined by

Select a0 and b0 carefully, the family of scaled and shifted mother wavelets constitute an orthonormal basis of l2(Z)
(set of signals of finite energy). When simply choose a0 = 2and b0=1, a dyadic-orthonormal wavelet transform is
obtained. With this choice, there exists an elegant algorithm, the multi resolution signal decomposition (MSD)
technique [11], which can decompose a signal into levels with different time and frequency resolution. At each level
j, approximation and detail signals Aj, Dj can be built. The wordsapproximation and detail are justified by the
fact that Aj is an approximation of Aj_1 taking into account the low frequency of Aj_1, whereas the detail Dj
corresponds to the high frequency correction. The original signal can be considered as the approximation at level
0.
The coefficients C ( j,k) generated by the DWT are something like the resemblance indexes between the
signal and the wavelet. If the index is large, the resemblance is strong, otherwise it is slight. The signal then can be
represented by its DWT coefficients as

When fix j and sum on k, a detail Dj is defined as

Then sum on j,the signal is the sum of all the details

Take a reference level called J, there are two sorts


of details. Those associated with indices j5J correspond to the scales 2j52J, which are the fine details. The others,
which correspond to j\J, are the coarser details. If these latter details are grouped into

which defines an approximation of the signals. Connect the details and an approximation, the equality

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 104
NCRASEM 13 Paper ID:EEE07

which signifies that s is the sum of its approximation AJ and of its fine details. The coefficients produced by DWT,
therefore, can be divided into two categories: one is detail coefficient, the other is approximation coefficient. To
obtain them, MSD provides an efficient algorithm known as a two channel sub-band coder using quadrature mirror
filters [12]. Then the detail part is still represented by wavelets, which can be regarded as series of band-pass filters,
whereas the approximation is represented by the dilation and translation of a scaling function, which can be regarded
as a low-pass filter.

Fig 1-Thee Phase cable Model

III WAVELET ANALYSIS OF FAULT TRANSIENTS


A Transients analysis:
In the Discrete Wavelet Transform (DWT) calculation process, signal decimation occurs. The analyzed signal passes
through the filters (wavelets), decreasing the maximum frequency of the sampled signal and also the wavelet
coefficients total number after the signals transformation. In the case that this decimation doesnt occur, the DWT is
called stationary, or Stationary Wavelet Transform (SWT). In the SWT the signal is not decimated. The SWTs
great advantage is its time invariance characteristic, which doesnt occur with the DWT. This means that even in a
periodic signal, the DWT of a translated signal x[n] is not necessarily equal to the translated DWT of the signal x[n].
For singularity detection applications, the use of SWT is highly recommended, and, therefore, used in this paper.
The wavelet transform is a recently developed mathematical tool that provides a decomposition of data or signal,
into different frequency components, and makes it possible to study each component with a resolution matched to its
scale [10]. It is often used in the analysis of transient signals because of its ability to extract both time and frequency
information simultaneously, from such signals. The comparison of the WT with the Fourier transforms (FT) and
why it is preferred to the FT has been documented in [11]. Multi-Resolution Analysis (MRA) is an alternative
approach used to analyze signals to overcome the time and frequency resolution problems, since these problems
persist regardless of the transform employed.
By using wavelets analysis, sub-band information can be extracted from the simulated transients, which contain
useful fault features. By analyzing these features of the detail signals, different types of fault can be detected and
classified. As mentioned earlier, the choice of analyzing wavelets plays a significant role in fault detec ion and
identification. Since Daubechies 8 is localized, i.e. compactly supported, in time, it is good for short and fast
transients analysis. After examinations of several types of wavelet, Daubechies 8 is chosen in this scheme.

Fig -2Configuration of a 400 kV cable system.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 105
NCRASEM 13 Paper ID:EEE07

The wavelet levels to be selected must best reflect the fault characteristics under various system and
fault conditions. In this respect, according to the analyses of different wavelet levels of current waveform
and the level 4 (D4) and level 7 (D7) details, are utilized to extract some useful features. This is because
the level 4 details generally reflect the dominant non-frequency transient generated by faults. Since level7
details contain most of the fundamental harmonic, which is of 50 Hz in this system, the sum of three
phase of them (D9a, D9b, and D9c) have similar characteristics of zero component which can be used to
differ phase-to-ground fault and phase-phase fault, two-phase to ground fault and three-phase fault Figs.
68 present wavelet analysis results of other types of fault, which are two-phase fault, two phase to
ground fault and three phase fault, respectively.
B Scheme of Fault detection and classification
The proposed fault detection subroutine is composed of 5 distinct processes:
- Base characteristics extraction: In this subroutines part,[16] the analyzed signals base characteristics are
extracted;
- Online characteristics extraction: In this process, online characteristics are extracted, using the SWT;
- Fault detection: Utilizing data from both processes previously mentioned, it is determined the fault
existence;
- Fault inception identification: This process determines the exact time in which the fault occurred;
- Fault classification: After the fault detection and the fault instant identification, this part of the
subroutine classifies the fault type. In the following, each process of the fault detection subroutine is
explained.Where, i =1, 2 I is resolution level found to be n is number of samples in signal
to be analyzed and K is the length of the filter vector, after down sampling by two [17]. The signal
decomposition process can be done iteratively with successive approximations being decomposed in turn,
so that one signal is broken down into many to get required resolution components. Figure.1 [18]
illustrates a multiple level decomposition procedure for a signal x[n].

Fig. 3 A three level multiresolution decomposition.

IV MATLAB SIMULINK MODEL

The typical Integrated Power System [1, 21-22], consists of an ungrounded 3-phase generator,
ungrounded 3-phase transformer, 3-phase rectifier, buck converter, 3-phase inverter and ungrounded load
as shown in figure 2(a). In this paper typical integrated power system of navy ships is modeled in
MATLAB SIMULINK.For testing the proposed method, in the above model fault is created between line
and ship hull at load terminals as shown in figure 3.1(a). The line voltages, VAB,VBC,VCA at load
terminals are used to detect the faults. In order to test the proposed technique, the method was
implemented in Matlab and two underground distribution systems were simulated in ATP-EMTP. Figs. 6
show the one-line diagrams of the CEEE test systems. The feeder shown in the Fig. 6, AL-1PL, is an
underground system with 3363 m of extension, with 3 main laterals. The system uses aluminum
750MCM and 4/0 AWG tape-shielded cables. The UDS, AL-1PW, has 2046 m of extension, with one
main derivation. AL- 1PW uses only 750MCM tape-shielded cables. In order to correctly model the two

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 106
NCRASEM 13 Paper ID:EEE07

systems, Carson equations together with the Krons reduction method were used. The impedance matrixes
of these systems were also obtained from this process.

Fig4: Test Underground Distribution System(AL-1PL)

5.1 Balanced load condition Without faultHere our aim is to detect the absence of fault by proposed
method for ungrounded power system with balanced load. In this method line voltages VAB, VBC and
VCA at load terminals shown in figure 3 (a) are used for the purpose. The order of signal x[n] (VAB,
VBC and VCA) is 40961 and Daubachies wavelet coefficient matrix of order 40984096 are used to get
the detailed coefficients, CAB , CBC and CCA of VAB, VBC and VCA respectively ,at fourth level of
resolution. By observation all the coefficients are zeros. Also by calculation CAB=0,CBC=0,CCA=0
since CBC minimum, therefore the fault does not exist between any of the lines and ship hull.With fault
This subroutines process utilizes the values of the SWT coefficients to determine the instant of fault
occurrence. Fig. 3. illustrates the process

Fig 5:fault detection

Fig6(a):line voltages at load terminals

After analyzing numerous fault transients simulated by using wavelet transform, several fault
related features have been identified. Based on these information, a novel fault detection and
classification scheme as shown in fig 3.1 3.7 is presented, which has been summarized as the following

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 107
NCRASEM 13 Paper ID:EEE07

Fig 3.1 Fault current by LG fault

Fig 3.2Fault current by LG fault By Wavelet

The fault analysis on a high voltage UG cable is carried by simulink and wavelet techniqueat a
distance of 4 km from the supply system and the results are shown from Fig 3.1 to 3.7.The simulation
results are plotted with time Vs magnitude of fault current system

Fig 3.3 Fault current through Phase A(LG-Fault)

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 108
NCRASEM 13 Paper ID:EEE07

Fig 3.4Fault current by LLG Fault

Fig 3.5 Fault current by LLG Fault By wavelet

Fig 3.6 Fault current by LLLG

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 109
NCRASEM 13 Paper ID:EEE07

Fig 3.7 Fault current by LLLG by wavelet AT 2km distance

Fig 4.1 fault current for LG fault

Fig 4.2 LG fault current By wavelet

Fig 4.3Fault current for LLG fault

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 110
NCRASEM 13 Paper ID:EEE07

Fig 4.4 Fault current for LLG fault By wavelet

Fig 4.5 Fault current for three phase fault-(LLLG)

Fig 4.6Fault current for LLLG fault By wavelet


The fault analysis on a high voltage UG cable is carried by both simulink and wavelet technique at a distance of 2
km from the supply system and the results are shown in fig from 4.1 to 4.6.The simulation results are plotted with
time Vs magnitude of fault current.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 111
NCRASEM 13 Paper ID:EEE07

V. CONCLUSIONS

The first subroutine uses as input data the current signals measured at the substation while the second subroutine
uses, besides the same current signals, the voltage signals measured at the substation as well.Wavelet transform is a
powerful tool for non-stationary signals analysis. It provides time localization of the signal that will have a
resolution that depends on the level in which they appear. Therefore, it is a good candidate for detection and
localization of short time disturbances. In this paper the Daubechies wavelets (DB4) discrete wavelet transform
based method is applied to the shipboard integrated power system for the detection of faults in a balanced and
unbalanced ungrounded power system. It has been shown that wavelet analysis can be used to detect line to ground
(ship hull) faults
This paper proposes a novel fault detection and classification of fault transients in high voltage UG cable by the
wavelet technique wavelet The property of multy resolution analysis in time and frequency provided by wavelets
allows an accurate time location of fault transients It is necessary to fully evaluate the proposed techniques a part of
protection under wide range of system. These are investigating

VI. REFERENCES

[1]Takagi, T. T. et al.: Development of a New Type Fault Locator Using the One-Terminal Voltage and Current Data. IEEE Transactions on
Power Apparatus and Systems, Vol. PAS-101, USA (1982) 28922898
[2]. Lee, S. J. et al.: An Intelligent and Efficient Fault Location and Diagnosis Scheme forRadial Distribution Systems. IEEE Transactions on
Power Delivery, Vol. 19, n. 2, USA (2004) 524532
[3]. Xinzhou, D., Yaozhong, G., Bingyin, X.: Fault Position Relay Based on Current Traveling Waves and Wavelets. IEEE Power Engineering
Society Winter Meeting, Proceedings. Power Engineering Society Winter Meeting, Singapore (2000)
[4]. Matlab Users Guide Version 3: Math works Inc. (2000) [1]
Doerry, H. Norbert and J. C. Davis, Integrated Power System for Marine Applications, Naval Engineers Journal, volume 106(3),
May(1994),77-90.
[5] Petry, R. Chester, and W. Jay, Rumberg, Zonal Electrical Distribution Systems: An Aaffordable Architecture for the Futur e, Naval
Engineers Journal, volume 105(3), (1993), 45- 51.
[6] R. Polikar, Wavelet Transform: An advanced tool for analyzing non-stationary harmonic Distortions in power system, IEEE Int. Conf. on
Harmonics in Power Systems (ICHPS), volume 6, Bologna, Italy, (1994), 21-23.
[7] P. Pillay, A. Bhattachariee, Application of Wavelets to Model Short Term Power System Disturbances, IEEE Trans. On Power System,
volume.11(4), (1996), 20312037.
[8] D. C. Robertson, O. I. Camps, J. S. Mayer, W. B. Gish, Wavelets and Electromagnetic Power System Transients, IEEE Trans. on Power
Deliv. volume 11(2), (1996), 10501057.
[9] W. A. Wilkinson and M. D. Cox, Discrete Wavelet Analysis of Power System Transients, IEEE Trans. On Power System, volume 11( 4),
(1996), 20382044.
[10] S. Huang, C. Hsieh, C. Huang, Application of Morlet Wavelets to Supervise Power System Disturbances, IEEE Trans. on Power
Deliv.Volume.14(1),(1999),235-243.
[11] Shyh-Jier Huang, Cheng-Tao Hsieh and Ching-Lien Huang , Application of Wavelets to Classify Power system Disturbances, Electric
Power Systems Research, Volume 47(2), 15 October (1998), 87-93.
[12] S. Santoso, E. J. Powers and W. M. Grady, Power Quality Assessment via Wavelet Transforms Analysis, IEEE Trans. on Pow er Deliv.
Volume11(2), (1996), 924-930.
[13] W. Zhao, Y. H. Song and Y. Min. Wavelet Analysis Based Scheme for Fault Detection and Classification in Underground Power Cable
Systems, Electric Power Systems Research, Volume 53(1), 5 January (2000), Pages 23-30.
[14] R. Polikar, The Wavelet Tutorial, 1994. Retrieved on April 14, 2008 from
http://engineering.rown.edu/~polikar/Wavelets/Wttutorial.html.
[15] S. Mallat, A Wavelet Tour of Signal Processing, IEEE SP. Magazine, October (1991), 14- 38.
[16] C.H. Kim and R. Aggarwal, Wavelets Transforms in Power Systems, Power Engineering Journal, Volume 15(4),(2001),193-202.
[17] M. Vetterli, and J. Kovaevi, Wavelets and Subband Coding, Prentice Hall-PTR, Englewood Cliffs, New Jersey, (1995), 1- 488.
[18] M.F. Akorede, and H. Hizam,Wavelet Transforms: Practical Applications in Power Systems, Journal of Electrical and Technology,
volume 4(2), (2009) 168-174.
[19] N. M. Bujurke, S. C. Shiralashetti and C. S. Salimath, An Application of Single Term Haar Wavelet Series in the Solution of Non-Linear
Oscillator Equations, Journal of Computational and App. Math., volume 227 (2), May(2009),234-244.
[20] N. M. Bujurke, C. S. Salimath and S. C. Shiralashetti, Numerical Solution of Stiff Systems from Non-Linear Dynamics using Single Term
Haar Wavelet Series Int. J. of Nonlinear Dynamics, volume 51(4),(2008), 595- 605

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 112
NCRASEM 13 Paper ID:EEE08

ANALYSIS OF VERY FAST TRANSIENT


OVER VOLTAGES IN TRANSFORMER BY
WAVELET
1K.Prakasam,1 2.D.Prabhavathi Dr. M.Surya Kalavathi3 Dr.B.Raveendranath Reddy4
1,2
JSiddartha Institute of Engineering and technology, Ibrahimpatnam, Hyderabad, Andhra Pradesh, INDIA
3,42
Jawaharlal Nehru Technological University, Kukatpally, Hyderabad, Andhra Pradesh, INDIA
Abstract: In a GIS, Very Fast Transient Over voltages (VFTO) are generated mainly due to switching operations. The
switching operation may be of a disconnector switch or a circuit breaker or an earthing switch. These switching
overvoltage levels are possible up to 3.0 p.u, depending on switching configuration .This paper deals with analysis of vftos
in transformer, transformer model is considered and the vftos generated are analyzed by Wavelet.

Keywords: VFTO,, GIS,Transformer,Wavelet,Transients,DWT,

I INTRODUCTION
This paper deals to investigate feasible methods for mitigation of the overvoltage magnitude of VFTOs and
suppression of the resonant frequencies amplitude at the power transformer. The proposed method utilizes terminal
and capacitance components to suppress VFTOs in GIS. Its advantages are their simplicity and low cost of
implementation along with producing minimal changes in the installed GIS. The effectiveness of the proposed
method to mitigate overvoltage magnitude and resonant frequencies amplitude of VFTO is presented via simulation.
The three pase two winding transformer model is designed and subjected to various switchind conditions the
simulation work is carried in MATLAB software . The results obtaned and are compared between with and without
wavelet transform. The result show that the proposed technique is able to offer high accuracy.Application of
Wavelet Transform and MLP Neural Network for Ferroresonance Identification.ISTURBANCE due to
ferroresonance is a common phenomenon in electric power distribution system operation. Depending on circuit
conditions, its effect may be a random over voltage that could be either a short transient for few cycles, a continuous
over voltage or even a jump resonance. It causes both phase-to-phase and phaseto- ground high sustained oscillating
over voltages and over currents with sustained levels of distortion to the current and voltage waveforms, leading to
transformer heating together with excessively loud noise due to magnetostriction, electrical equipment damage,
thermal or insulation breakdown and mal-operation of the protective devices. An additional, very important
advantage of gas insulated substations in comparison with the air insulated ones is safety. The safety of gas insulated
substations is to be observed exclusively from the environmental protection aspect. In the closed pressure system
design of the substation gas leaking is reduced to the standardized rate of 1% per year, while the other design (a
hermetically closed system) does not require gas filling. The safety of people exposed to the substation, due to the
fact that substations are located in inhabited areas, represents the second type of safety. Beside its unquestionable
advantages, GIS also has its disadvantages. One of the main negative phenomena in gas insulated substations is the
occurrence of very fast transients VFT, whereat we differ between the so-called internal and external overvoltages

II. THEORY OF WAVELET ANALYSIS


Wavelets are functions that satisfy certain requirements. The very name wa6elet comes from the requirement that
they should integrate to zero, waving above and below the x-axis. The diminutive connotation of wa6elet suggests
the function has to be well localized. Other requirements are technical and needed mostly to insure quick and easy
calculation of the direct and inverse wavelet transform. Compared with traditional Fourier method, there are some
important differences between them. First Fourier basis functions are localized in frequency but not in time while
wavelets are localized in both frequency (viadilation) and time (via translation). Moreover, wavelets can provide
multiple resolution in time and frequency. Second, many classes of functions can be represented by wavelets in
more compact way. For example, functions with discontinuities and functions with sharp spikes usually take
substantially fewer wavelet basis functions than sine-cosine basis functions to achieve a comparable approximation.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 113
NCRASEM 13 Paper ID:EEE08

There are many types of wavelets [9,10], such as Harr, Daubechies 4, Daubechies 8, Coiflet 3, Symmlet 8
and so on. One can choose between them depending on a particular application. As with the discrete Fourier
transform, the wavelet transform has a digitally implement able counterpart, the discrete wavelet transform (DWT).
If the discrete analysis is pursuing on the discrete time, the DWT is defined as

where, s(n) is the signal to be analyzed and gj,k(n) is discrete wavelet function, which is defined by

Select a0 and b0 carefully, the family of scaled and shifted mother wavelets constitute an orthonormal basis of l2(Z)
(set of signals of finite energy). When simply choose a0 = 2and b0=1, a dyadic-orthonormal wavelet transform is
obtained. With this choice, there exists an elegant algorithm, the multi resolution signal decomposition (MSD)
technique [11], which can decompose a signal into levels with different time and frequency resolution. At each level
j, approximation and detail signals Aj, Dj can be built. The words approximation and detail are justified by the
fact that Aj is an approximation of Aj_1 taking into account the low frequency of Aj_1, whereas the detail Dj
corresponds to the high frequency correction. The original signal can be considered as the approximation at level
0.
The coefficients C ( j,k) generated by the DWT are something like the resemblance indexes between the
signal and the wavelet. If the index is large, the resemblance is strong, otherwise it is slight. The signal then can be
represented by its DWT coefficients as

When fix j and sum on k, a detail Dj is defined as

Then sum on j,the signal is the sum of all the details

Take a reference level called J, there are two sorts


of details. Those associated with indices j5J correspond to the scales 2j52J, which are the fine details. The others,
which correspond to j\J, are the coarser details. If these latter details are grouped into

which defines an approximation of the signals. Connect the details and an approximation, the equality

which signifies that s is the sum of its approximation AJ and of its fine details. The coefficients produced by DWT,
therefore, can be divided into two categories: one is detail coefficient, the other is approximation coefficient. To
obtain them, MSD provides an efficient algorithm known as a two channel sub-band coder using quadrature mirror
filters [12]. Then the detail part is still represented by wavelets, which can be regarded as series of band-pass filters,
whereas the approximation is represented by the dilation and translation of a scaling function, which can be regarded
as a low pass filter. 400 KV GIS transformer
Discrete ,
Ts = 5e -005 s
po w ergui

Pulse
Generator

L6

com
a R L L1
A a
C 13 C 14 C7
125 pf 65 pf
C1 C 65pf
125 pf
A A
R1 L5 L4
B L7 B b
b 65 pf
C C5 65pf 2
C2 C6 125 pf 65 pf
B 125 pf
Three -Phase So urce
R2 L2 L3
C 11 C 12
C c

c C3 C4 125 pf
C
125 pf vab
L8 Three -Phase
Transfo rmer To W orkspace
(Tw o Windings )
Three -Phase Breaker

vbc
C9 C 10 C8 +
- v To W orkspace 1
Scope
Vo ltage Measurement
+
- v vca
Vo ltage Measurement 1 Scope 1
To W orkspace 2
+
- v

Vo ltage Measurement 2 Scope 3


Scope 2

Figure1.-Matlab simulink modeling ofTransformer

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 114
NCRASEM 13 Paper ID:EEE08

III VOLTAGE TRANSIENTCHARACTERISTICS


A TRANSIENTS IN GENERAL:
Voltage transients in power systems are caused by switching actions, lightning and faults in the system.
Different phenomena create different types of transients. Oscillatory transients are caused mainly by switching
phenomena in the network. The most common switching action is capacitor bank switching. The most severe
transients are caused by capacitor energizing while capacitor de-energizing only causes a minor transient none
synchronized energizing of capacitors is worse than synchronized. Oscillatory transients are characterized by
duration, Magnitude and spectral content There are subclasses of oscillatory transients depending on the dominant
frequency .Impulsive transients are caused mainly by lightning strikes. The worst impulsive transients are created
when the lightning strikes directly on the power line. However the majority of direct strikes lead to a fault, which
shows up as voltage dip at the equipment (monitor or end-user equipment) terminals. Voltage dips are not treated in
this paper. Impulsive transients are characterized by rise and decay time. The impulsive transients are divided into
subclasses according to their duration Transients in general are rapidly damped when they propagate due to the
resistive part of the system. Therefore transients in general are a local phenomenon.Exceptions are transients of
relatively low frequency that originate in the transmission or transformer

Figure 2 Shell form Transformer winding

Figure.3 Equivalent circuit of transformer

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 115
NCRASEM 13 Paper ID:EEE08

The wavelet levels to be selected must best reflect the fault characteristics under various system and fault
conditions. In this respect, according to the analyses of different wavelet levels of current waveform and the level 4
(D4) and level 7 (D7) details, are utilized to extract some useful features. This is because the level 4 details
generally reflect the dominant non-frequency transient generated by faults. Since level7 details contain most of the
fundamental harmonic, which is of 50 Hz in this system, the sum of three phase of them (D9a, D9b, and D9c) have
similar characteristics of zero component which can be used to differ phase-to-ground fault and phase-phase fault,
two-phase to ground fault and three-phase fault resent wavelet analysis results of other types of fault, which are two-
phase fault, two phase to ground fault and three phase fault, respectively

IV. SCHEME OF EVALUATION


A transformer model is considered and simulink model is prepared in MATLAB and is simulated for short circuit
and open circuit conditions .The simulations are made for different time of operations as t = 0.1cycle,1 cycle and 2
cycles .The results are formulated in the figs from 4.1 to 4.3.The same is done by wavelet technique and the results
are shown in fig from4.4 to 4.6

5
x 10
6

2
vab

-2

-4

-6
0 500 1000 1500 2000 2500
time

Figure 4.1oltage response at t = 2 cycle


5
x 10
8

2
Vbc

-2

-4

-6

-8
0 500 1000 1500 2000 2500
time

Fig ure4.2Responses voltage, Breaker current, for t = 0.1s

Fig ure4.4Responce of voltage at t= 1cycle

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 116
NCRASEM 13 Paper ID:EEE08

5
x 10
8

Vca
0

-2

-4

-6

-8
0 500 1000 1500 2000 2500
time

Figure 4.3Voltage at t= 0.1s

Figure 4.5Voltage at t= 2 cycles

Figure 4.6Responce of voltage at t = 2 cycles

The analysis of transformer is done by simulink and wavelet technique for different conditions and the resultant of
fast transient over voltages are formulated in figures from 4.1 to 4.6.Fg 41 to 4.3 represents the resultant fast
transient over voltage obtained by simulink model and from 4.4 to 4.6 represents the resultant fast transient over
voltages obtained by wavelet technique. The VFTO is calculated at the primary side of the power transformer, Vtr,
and at the open end, Voc. The level and waveshapes of the generated VFTO is shown in Figure3. It is observed that
the peak magnitude of the generated VFTO at the primary side of the power transformer is about 2.06 P.u, while it is
about 2.63 P.u. at the open end. The trapped charge, which is in the floating section, depends on switch type and
load side. For a normal slow speed disconnector with the maximum trapped charge, it can be about 0.5pu. In the
high speed disconnector the maximum trapped charge could be reach to 1.0 pu [3]. The effect of trapped Charge on
the VFTO Levels is shown in table 2. It is noticed that the VFTO at the power transformer terminal increases from
about 2.06 to about 4.12 Pu with increasing the trapped charge from 0 to 1pu, respectively. In the same time the
VFTO at the open end increases from about 2.36 to about 5.26 Pu with increasing the trapped charge from 0 to 1pu,
respectively.table2 indicates effect of trapped charge on VFTO

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 117
NCRASEM 13 Paper ID:EEE08

V. CONCLUSION
The using R-C filter is effectively reduced the VFTO at the transformer, but it has no effect at the open end. When
using the resistor switching the peak value of the generated VFTO at transformer is decreased by about 37.9%,
while at open end it decreases by about 53.2%. With using the ferrite rings the peak values of the VFTO at
transformer is decreased by about 35%, while at the open end it decreased by about 49%. The ferrite rings at any
instant can be saturated, due to high frequency and high magnitudes of the VFTO, hence it has no effect on VFTO.
With using R-C filter the peak value of the VFTO is reduced by about 37.9%. This method has a problem that it is
protect the transformer only. Due to its complexity (waveform phenomena), GIS modeling for observing specific
phenomena is extremely complex. By analyzing simulation results, it can be concluded that such models and
simulations allow a more detailed insight into an observed phenomenon. By means of such simulation models it is
possible to investigate the influence of individual phenomena on the potential rise of the GIS enclosure. Based on
the results of such simulations, further measures for decreasing the potential rise of the GIS enclosure may be
suggested. For further investigations of these phenomena, more simulations in programs dealing with
electromagnetic fields are to be deployed. This paper presents the analysis of very fast transient over voltages in
transformer by wavelet for different operating times of switching conditions. The transformer is modeled in Matlab
similink with switching conditions.At different cyales the simulation is carried and the resulatant voltage responces
are shown.
VI. REFERENCES

[1] M. Mohana Rao, M. Joy Thomas, and B. P. Singh Frequency characteristics of Very Fast Transient Currents in a 245-kV GIS, IEEE
Transaction on Power Delivery, Vol. 20, No. 4, October 2005.
[2] J.A. Martinez (Chairman), P. Chowdhuri, R. Iravani, A. Keri, D. Povh Modeling guidelines for Very Fast Transients in Gas Insulated
Substations,Report Prepared by the Very FastTransients Task Force of the IEEE Working Group on Modeling and Analysis of System Transients.
[1] K. Cornick, et al., Distribution of very fast transient overvoltages in transformer windings, CIGRE Report, 12-204, 1992.
[2] Y. Shibuya, et al., Analysis of very fast transient overvoltage in transformer winding, IEE Proceedings-Generation Transmission and
Distribution, vol.144, No.5, 1997, pp.461-468
[3] Y. Shibuya, et al., Analysis of Very Fast Transients in Transformer, to be published in IEE Proceedings-Generation Transmission and
Distribution.
[4] Y. Shibuya, et al., Effects of very fast transient overvoltages on transformer, IEE Proceedings-Generation Transmission and Distribution,
vol.146, No.5, 1999, pp.459-464.
[5] S. Fujita, et al., Voltage oscillation in transformer Windings affected by very fast transient surges, Transactions of IEE Japan, Vol.120-B,
No.5, 2000, pp.766-772.
[6] J. BAK-JENSEN, B.BAK-JENSEN, S.D. MIKKELSEN: Detection of Faults and Aging Phenomena in Transformers by Transfer
FunctionsIEEE Transactions on Power Delivery, Vol. 10, No. 1, Jan. 1995, pp. 308-314
[7] S. M. ISLAM, G. LEDWICH: Locating TransformerFaults through Sensitivity Analysis of High Frequency Modeling Using Transfer Function
Approach, IEEE Int. Symp. on Electrical Insulation, Montral, 1996, Conference Record pp. 38-41

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 118
NCRASEM 13 Paper ID:HSC01

Green Synthesis of Silver Nano size particles


with Pine Leaf
A.Chandrashekhara chary 1
Dept of Chemistry, Priyadarshini Institute of Science and Technology, Patancheru, Hyderabad,
Email id : 22chary89@gmail.com

N.N.V.Pandu ranga rao 2 ,


Dept of Chemistry, Priyadarshini Institute of Science and Technology, Patancheru, Hyderabad,
Email id : pandurangarao.nill24@gmail.com

Abstract: A green, low-cost, and replicate Pine leafnegotiated synthesis of silver nano size particles is reported. X-ray
and transmission electron microscopy (TEM) analyses are performed to ascertain the formation of Ag nano size particles.
Nano size particles almost cylindrical in shape having the size of 1-2 nm are found. Reveal analysis to the X-ray data
(XRD) indicated that Ag nano size particles have FCC unit cell structure. Ultra violet (UV)-visible study revealed the
surface Plasmon resonance at 449 nm. An effort has been made to understand the possible involved mechanism for the
biosynthesis of Ag nano size particles. Present procedure offers the benefit of eco-friendliness and agreeability for large-
scale production through scaling up. Synthesis of metallic and/or oxide nano size particle staking assistance of plant
extracts has attained an upsurge in the immediate past. Although s a lot of works have been done in biologically assisted
synthesis of metal and oxide.

Keywords: Transmission electron microscopy (TEM), biosynthesis, green synthesis, nano biotechnology, nano size
particle, silver, Pine leaf.

I. INTRODUCTION
Phytodiversity have not only been silent participants of the exponential process of evolution, rather have indeed
survived the extremities of environmental rigors themselves by the prodigally reassuring different valued
metabolites. Pine which belongs to the family Cycadaceae. Along with fatty acids like palmitic, stearic, oleic. They
are rich in flavonoids broadly belonging to the class of phenolic compounds. in fines 10 classes of flavonoids are
recognized but they are mainly hydrophilic compound and are present in all vascular plants and have been found to
contain Amentiflavone ( (C30H18O10) and Hinokiflavone (C30H18O10) as characteristic bi flavonyls.[1-3] Synthesis of
metallic and oxide nano size particles taking assistance of plant extracts has attained an increase in the immediate
past.[2-4] The present investigation is an effort in this direction. In this work, pine discuss synthesis of silver nano
size particles (silver and oxide NSPs). An effort has been also been made to understand the possible involved
mechanism for the biosynthesis of silver nano size particles.

II. MATERIALS AND METHOD


Synthesis of Silver Nano size particles Using pine leaf Broth Known weight ( 10 g) of freshly collected,
taxonomically authenticated healthy leaves of pine were taken and washed thoroughly in flush of tap water in the
laboratory for 10 min in order to remove the dust particles, cut into small pieces, and rinsed briefly in sterile distilled
water. Then the sample was placed in a 250-mL beaker containing 200 m L 50% ethanol (Et OH) and was placed on
boiling steam bath for 15 to 20 min until the color of the solvent changes to light brown. This solution was not
treated with activated charcoal in order to avoid adsorption of the probable candidate flavonoid pigments along with
chlorophylls and their congeners. The extract was cooled to room temperature, pressed, and filtered firstly through
sterile serene cloth. This solution was treated as source extract and was utilized in subsequent procedures. Next, 40
m L of the source extract was doubled in volume by adding 40 m L of sterile distilled water. The extract solution
was treated with 20 m L of 0.25 M AgNO3 solution and warmed again on the steam bath for 10min until the color
of the solution changes to reddish brown and was allowed to cool and incubate in the laboratory ambience.
Concurrently, ultraviolet-visible (UV-vis) spectrophotometric study was pursued in which 50% Et OH extract of
pine was taken as blank. The deposition gets distinctly visible in the flask within 10 min, which was left for 4 hours
and subsequently filtered.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 119
NCRASEM 13 Paper ID:HSC01

III. CHARACTERIZATION
The formation of single-phase compound was checked by X-ray diffraction (XRD) technique Transmission
electron microscopy (TEM) analysis of Ag NPs was performed with Hitachi H-7500, operated at 80 kV. The
specimen was suspended in distilled water, dispersed ultrasonically to separate individual particles, and two drops of
the suspension. Was deposited onto holey-carboncoated copper grids and dried under infrared lamp. The
absorption spectra of the sample were measured by UV-visible spectrophotometer. An effort has been also been
made to understand the possible involved mechanism for the biosynthesis of Ag NPs.

IV. RESULTS
Figure (1) shows the TEM image recorded from drop-coated film of Ag NPs synthesized by treating AgNO3
solution with pine leaf broth for 4 hours. The micrograph clearly shows individual nano size particles, almost
cylindrical in shape with diameters in the range of 1-2 nm .The measurement of size was performed along the largest
diameter of the particles. Confirming Nano crystalline nature of Ag NPs as observed in the TEM image (Figure 1).
The particle size histogram of Ag NPs (Figure 1a) shows the distribution of particle sizes.

Figure (1) TEM photograph Figure (1 a) particle size distribution of Ag NPs.

Table 1. The crystal data and refinement factors of Ag NPs obtained from X-ray powder Diffraction data
Parameters Results Description of parameters
Crystal system fcc Rp (profile factor) = 100[_|y
Space group Fm 3m the calculated intensity at the ith step.
a ( A) 4.0913 Rwp (weighted profile factor) = 100[_i|y
V ( A3) 68.4808 Rexp (expected weighted profile factor) =
100[(n p)/_i(y 100[(n p)/_i(yi)2]1/2, where n and p are
i)2]1/2, where n and p are the number of profi le points and refined
parameters, respectively parameters, respectively

To ascertain the crystal structure of Ag NPs, XRD study was carried out .Riveted refinements on the XRD data of
Ag NPs were done, selecting the space group Fm 3m., calculated, and difference XRD profiles for Ag NPs after
final cycle of refinement. It can be seen that the profiles for observed and calculated ones are perfectly matching,
which is well supported by the value of 2 (= 2.18). The profile fitting procedure adopted was minimizing the 2
function.[5] The XRD analyses indicated that Ag NPs has a face-centered cubic (fcc) unit cell having the sets of
lattice planes (111), (200),(220), (311), and (222). The crystal data and refinement factors of Ag NPs obtained from
XRD data are summarized in Table 1. The lattice parameter as obtained for Ag NPs is in good agreement with the
literature report.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 120
NCRASEM 13 Paper ID:HSC01

Figure 2: Riveted refined pattern of Ag NPs in the space group Fm 3m. Symbols represent theobserved data points and the solid lines their
Riveted fit. Williamson-Hall plot for Ag NPs.

Figure 3: UV-vis spectra for Ag NPs recorded as function of time of reaction of 0.25 M aqueous solution of AgNO3 with pine leaf .In earlier
studies on synthesis of silver nano size particles employing bacteria, fungi, or plant extract] the time required for completion (i.e., complete
reduction of Ag ions) ranged from 12 to 120, and are rather slow.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 121
NCRASEM 13 Paper ID:HSC01

Figure 4: Mechanism for the biosynthesis of Ag NPs using pine leaf broth.

V. DISCUSSION
Salt/metal ion, as well as drought, chilling and extreme temperatures, increase the levels of reactive oxygen species (ROS)..
Mechanisms of metal detoxification by bio molecules proceeds as cascade of events, such as induction of proteins such as
metallothionein, phytochelatins, and ferritin, transferring; or by triggering antioxidant enzymes such as superoxide dismutas e,
catalyses, glutathione, and peroxides. Glutathione functions as a precursor of phytochelatin synthesis. Metal-induced
phytochelatin production decreases cellular levels of glutathione. Glutathione and its homologues, viz. homoglutathione and
hydroxylmethylglutathione, are the abundant low-molecular-weight thiols in plants. Glutathione was implicated to play a major
role in plants exposed to metal stress. Antioxidant action of phenolic compounds is due to their high tendency to chelate met als.
Phenolics possess hydroxyl and carboxyl groups, able to bind particularly iron and copper. Reduction is accomplished due to
photochemical such as flavonoids or other any other polyphenolsor phyotchelatins/glutathione/n metallothioneins present in pi ne
leaves. the process of nano-transformation might have resulted due to redox activities of ascorbic/ dehydroascorbic acid and
amenti/hinoki flavones and involvement of ascorbates/ glutathiones/metallothioneins , leading to the reduction of silver ions
present in the solution Therefore, compared to bacteria or fungi, plant cells are much suitable candidates for the synthesis of
metallic nano size particles. The significant reduction in reaction time with pine leaf is an important result and will enable nano
size particle biosynthesis methods to compete with other plant-assisted biosynthesis routes for the formation of silver
nanoparticles that are currently much more rapid and reproducible.

VI. CONCLUSION
In conclusion, the present biotechnological method is capable of producing Ag nanoparticles. Also, it is a green, high-yield, fast,
and low cost approach. Reduction is accomplished probably due to photochemical such as polyphenols, glutathiones,
metallothioneins, and ascorbates, which may help in the production of Ag NSPs as a result of the detoxification procedure.

VII. REFERENCES

1.Goodwin, T.W., Ed. Chemistry and Biochemistry of Plant Pigments: Functions of Flavonoids in Plants; Academic Press: New York, 1976, p.
736.
2. Jae, Y. S.; Beom, S. K. Bioprocess Biosyst. Eng. 2009, 32, 7984.
3. Jha, A. K.; Prasad, K.; Kumar, V.; Prasad, K. Biotechnol. Prog 2009, 25, 1476.
4. Chopra, R. N.; Nayar, S. L.; Chopra, I. C. Glossary of Indian Medicinal Plants; CSIR Publication: New Delhi, 1956,
5.Harborne J. B.; Mabry, T. J.; Mabry, H., Eds. The Flavonoids: Biflavonoids; Chapman and Hall: London, 1975, p. 693.
6. McCusker, L. B.; Von Dreele, R.B.; Cox, D.E.;Louer, D.; Scardi, P. J. Appl. Cyst. 1999, 32, 36.
7. Klaus, T.; Joerger, R.; Olsson, E.; Granqvist, C. G.Proc. Natl. Acad. Sci. U.S.A. 1999, 96, 13611.
8. B. Nair, T. Pradeep. Crest. Growth Des. 2002, 2,293.
9. Mukherjee, P.; Ahmad, A.;Mandal, D.; Senapati, S.;Sankar, S. R.; Khan, M. I.; Parischa, R.; Ajaykumar,
10. Amako, K.; Ushimaru, T. Nutr. Nat. Resour. 2009,4, 13.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 122
NCRASEM 13 Paper ID:HSC02

Ferrocene Carboxaldehyde Arylhydrazones and


their Pd (II) complexes
N.N.V.Panduranga rao
Dept of Chemistry, Priyadarshini Institute of Science and Technology, Patancheru, Hyderabad.
Mail ID: pandurangarao.nill24@gmail.com

A.Chandrashekhera chary
Dept of Chemistry, Priyadarshini Institute of Science and Technology, Patancheru, Hyderabad.
Mail ID: 22chary89@gmail.com

Abstract- Reactions of Li2PdCl4 with 1-ferrocene carboxaldehyde 4-R-benzoylhydrazones [H2Ln; n = 13 for R = OMe,
NH2, COOH respectively] and CH3COONa3H2O in tertiary amine produce three new palladium (II) complexes. The
complexes have been studied with the help of spectroscopic (infrared, electronic and NMR) measurements.

I. INTRODUCTION
Cyclometallated complexes are of enormous contemporary interest primarily because of their applications
in a variety of research areas such as organic synthesis, biological and pharmaceutical chemistry, catalysis and
materials. Cyclometallated complexes have been studied extensively, most widely studied systems are those having
the activation site [C(sp2, aryl), C(sp3, benzyl, aliphatic)]. One of the great developments in this area was the
synthesis and characterization of ferrocene cyclometallated derivatives. Cyclopalladated complexes of ferrocene
imines attract a great interest because of their application as catalysts in Mizoroki-Heck reaction, Cyclopalladated
complexes with ferrocenyl imines of bidentate [C, N] donor type are extensively studied because of its potential
applications in various fields. tridentate [Cferrocene,N,X] donor type are less explored.
In this work we are reporting the synthesis and characteriastion of some Pd(II) complexes of ferrocene
carboxaldehyde aroylhydrazones. These Schiff bases can act as tridentate CNO donor ligands.

II. EXPERIMENTAL
A Materials
Purification of solvents was performed by standard methods. All the chemicals used in this work were of
analytical grade available commercially and were used without further purification.
B Physical measurements
A Shimadzu LCMS 2010 liquid chromatography- mass spectrometry was used for the purity verification. Infrared
spectra were recorded on a Jasco-5300 FT-IR spectrophotometer by using KBr pellets. A PerkinElmer Lambda 35
UV/vis spectrophotometer was used to collect the electronic spectra. The proton NMR spectra were recorded with
the help of a Bruker 400 MHz NMR spectrometer.
C Synthesis of Schiff bases H2Ln
To an isopropylamine solution of 4-R-benzoylhydrazine (3 mmol) and ferrocene carboxaldehyde (3 mmol) a few
drops of acetic acid was added. The mixture was refluxed for 3 h and then cooled to room temperature.
The Schiff base (H2L1) separated as red solid was collected through filtration and washed with ethanol and dried in
air. Yield: 758 mg (70%)
The other two Schiff bases namely (H2L2) and (H2L3) were synthesized as red solids using the corresponding
hydrazines with ferrocene carboxaldehyde in 8090% yields.
D Synthesis of [Pd (HL1) Cl] (1)
A mixture of PdCl2 (89 mg, 0.5 mmol) and LiCl (43 mg, 1 mmol) was taken in 15 ml of dry tertiary amine and
refluxed with stirring for 1 h. It was then cooled to room temperature and filtered. H2L1 (181 mg, 0.5 mmol) and
CH3COONa.3H2O (68 mg, 0.5 mmol) were added to the filtrate and the mixture was stirred at room temperature for
24 h. The complex separated as a red solid was collected by filtration, washed with cold tertiary amine and finally
dried in air.Yield: 160 mg (69.5%)
The other two complexes [Pd(HL2)Cl] (2, R = NH2) and [Pd(HL3)Cl] (3, R =COOH) were synthesized
from PdCl2, LiCl, the corresponding Schiff base (H2Ln) and CH3COONa.3H2O in 50-65% yields by following
procedures very similar to that described above for 1 (R = OMe).

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 123
NCRASEM 13 Paper ID:HSC02

III. RESULTS AND DISCUSSION


a) Synthesis and characterization
The reaction pathway and the expected complexes are shown in Scheme 1. Schiff bases H2Ln were synthesized in
good yields (70-90%) by the condensation of 1-ferrocene carboxaldehyde and 4-R-benzoylhyrazines (n = 1-3, for R
= OMe, NH2and NO2 respectively) in presence of few drops of acetic acid in isopropy amine. The Shiff bases were
characterized by spectroscopic (IR, 1H NMR and mass) measurements. Reactions of H2Ln and CH3COONa3H2O
with Li2PdCl4 in tertiary amine produces the complexes with general formula [Pd(HLn)Cl] where R = OMe (1), R =
NH2 (2) and R =COOH (3) in 50-75% yield. The complexes 13 are sparingly soluble in common polar organic
solvent such as acetone. However, they are highly soluble in the halogenated solvents dichloromethane and
chloroform.
b) Spectroscopic properties
Infrared spectra (Figs. 1-6) of all the compounds have been recorded using KBr pellets. The free Schiff bases
show the medium intensity band in the frequency range 3215 3371cm-1 corresponding to N H stretch and two
strong bands in the frequency ranges 1633 1657 and 1601 1612 cm-1 due to the C=O and C=N stretches .In the
spectra of complexes 13 the C=O and C=N stretches observed in the frequency ranges 1601 1606 and 1531 1587
cm-1 are lower than the corresponding C=O and C=N stretches displayed by free Schiff bases. Appearance of both
C=O and C=N stretches at lower wave numbers indicates that the ligand (HLn) coordinates to the metal centre
through the azomethine N-atom and the protonated amide functionality O-atom forming a five-membered chelate
ring.
The proton NMR spectra were recorded in chloroform-d. Spectra are shown in Fig. 7 Fig. 12. The signals
corresponding to the NH proton in free Schiff bases H2L1H2L3 are observed at 8.87, 8.87 and 8.90 ppm
respectively. These signals are shifted to down field on complexation these are observed in the range 9.969.98 ppm
for complexes 13. The signals corresponding to methoxy and Amine groups in free Schiff bases H2L1 and H2L2 are
observed at 3.87 and 2.42 ppm respectively and at 3.85 and 2.45 for complexes 1 and 2 respectively.
In free Schiff bases H2L1H2L3 the signal corresponding to the protons H(6)H(10) of Cp ring are observed as a
singlet in the range 4.214.24 ppm. The signals corresponding to the protons H(3) and H(4) is observed as a singlet
in the range 4.404.41 ppm and signals corresponding to the protons H(2) and H(5) are observed as a singlet in the
range 4.684.72 ppm. The signals corresponding to the ortho protons H(14) and H(18) are observed as singlet at
7.82 ppm, doublet at 7.74 ppm and doublet at 8.32 ppm for free Schiff bases H2L1, H2L2 and H2L3 respectively.
Among the three Schiff bases, signal corresponding H2L2 is observed at slightly up field and signal corresponding
H2L3 is at down field due to the electron donating and withdrawing nature of the Amine and acid groups. The
spectra corresponding to the free Schiff bases are clear, but the spectra corresponding to the complexes are not clear,
for this reason the aromatic protons in 1-3 could not be assigned.
The electronic spectra of complexes 13 and Schiff bases H2L1H2L3 were collected in dichloromethane. The
spectral data are listed in Table 1. Similar spectral pattern was observed for the both Schiff bases and the complexes.
Thus coordination to Pd(II) does not affect transitions in the free Schiff base

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 124
NCRASEM 13 Paper ID:HSC02

Table 1 Electronic spectroscopica data for H2Ln and [Pd(HLn)Cl]


4 1 1
Compound max (nm) (10 x (M cm ))
H2L1 233.5 (1.9)b, 263.5 (2.7), 302 (3.2), 371.5 (2.7)b, 463.5 (0.11)
H2L2 237 (2.3), 261 (1.99)b, 300.5 (2.4), 368.5 (4.1)b, 463 (2.2)
H2L3 253 (2.8), 295 (2.4), 471 (2.2)
Pd(HL1)Cl 234.5 (3.4), 295.5 (2.1)b, 337 (1.8), 489.54 (3.5)
Pd(HL2)Cl 236.5 (4.8), 274.5 (3.4)b, 345 (2.5), 489 (5.3)
Pd(HL3)Cl 236 (1.5), 293 (1.3), 360 (7.3)b, 494.5 (3.2)

SUPPLYMENTARY DATA
1. Fig. 1. Infrared spectrum of H2L1
2. Fig. 2. Infrared spectrum of H2L2
3. Fig. 3. Infrared spectrum of H2L3
4. Fig. 4. Infrared spectrum of Pd(HL1)Cl
5. Fig. 5. Infrared spectrum of Pd(HL2)Cl
6. Fig. 6. Infrared spectrum of Pd(HL3)Cl
7. Fig. 7. 1H NMR spectrum of H2L1
8. Fig. 8. 1H NMR spectrum of H2L2
9. Fig. 8. 1H NMR spectrum of H2L3
10. Fig. 9. 1H NMR spectrum of Pd(HL1)Cl
11. Fig. 10. 1H NMR spectrum of Pd(HL2)Cl
12. Fig. 11. 1H NMR spectrum of Pd(HL3)Cl
13. Fig. 12. Electronic spectrum of H2L1
14. Fig. 13. Electronic spectrum of H2L2
15. Fig. 14. Electronic spectrum of H2L3
16. Fig. 15. Electronic spectrum of Pd(HL1)Cl
17. Fig. 16. Electronic spectrum of Pd(HL2)Cl
18. Fig. 17. Electronic spectrum of Pd(HL3)Cl
19. Fig. 18. LCMS of H2L1
20. Fig. 19. LCMS of H2L2
21. Fig. 20. LCMS of H2L3
IV. CONCLUSION
In conclusion, we have synthesized and characterized three cyclometallated Pd(II) complexes with Schiff
bases ferrocene carboxaldehyde 4-R-benzoylhydrazones (H2Ln, R = OMe, NH2and COOH). We have studied all the
complexes using spectroscopic techniques IR, UV-vis and NMR. The NMR spectra of the complexes are not clear
and hence the further purification of the complexes has to be done. The attempts to get the single crystals of the
complexes are not successful. Thus whether the complexes 13 are cyclopalladated species (as shown in Scheme-1)
or not could not be confirmed.

V. REFERENCES
[1] V.V. Dunina, O.A. Zalevskaya, V.M. Potapaov, Russ. Chem. Rev. 57 (1988) 250269.
[2] A.D. Ryabov, Chem. Rev. 90 (1990) 403424.
[3] G. Jaouen, A. Vessiers, I.S.Butler, Acc. Chem. Res. 26 (1993) 361369.
[4] A.E. Shilov, G.B. Shulpin, Chem. Rev. 97 (1997) 28792932.
[5] F. Kakiuchi, S. Murai, Acc. Chem. Res. 35 (2002) 826834.
[6] V.V. Dunina, O.N. Gorunova, Russ. Chem. Rev. 73 (2004) 309350.
[7] J. Dupont, C.S. Consorti, J. Spencer, Chem. Rev. 105 (2005) 25272572.
[8] I. Omae, Appl. Organomet. Chem. 21 (2007) 318344.
[9] J. Vicente, I. Saura-Llamas, Comm. Inorg. Chem. 28 (2007) 3972.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 125
NCRASEM 13 Paper ID:HSC03

Plastico Mechanoluminescence of SrAl2O4: Eu


Nanophosphor
Dr. M. K. Prajapati
Associate Professor
Department of Physics
Dr. C. V. Raman University, Kota Bilaspur, Chhatisgarh, India
Email- manojprajapati99@gmail.com

Nitin Kumar
Department of Physics
V.G.M.P.G.College, Dibiyapur, Uttar Pradesh, India
Email- nitin9kush@gmail.com

Abstract- In this paper we present a theoretical model of plasticomechanoluminescence (PML) of, SrAl2O4: Eu
nanophosphor. These nanophosphor give more emission under high stress and high strain rate. Another quantum
mechanical approach showed that the associated electric field generated when a piezoelectric crystal was sinusoidally
stressed could couple acoustic phonon into excitation on the photoluminescence of the molecule.

Keywords Plastico Mechanoluminescence(PML), SrAl2O4: Eu Nanophosphor,

I. INTRODUCTION
Measurement of stress distribution is of great importance for solids in order to improve their reliability and extend
their applications. A lot of effort has been made to sense stress and fracture of structural ceramics and composites by
use of electrical signal [1-3]. It is known that many materials emit light during applied mechanical stress which has
been named as mechanoluminescence (ML). In general ML can be divided into fractoluminescence and deformation
luminescence (DL), which correspond to luminescence induced by mechanical deformation solides. The DL can be
further divided into elasticoluminescence and plasticoluminescence (PL)[4]. DL has already been reported for many
materials such as coloured alkali halides[5-6], quartz[7], II-VI semiconductor[4,8], polymer crystals [7] and rubbers
[9].
Only a few materials have been studied under conditions that distinguished fracture and deformation, although
plastico ML has been far more intensively studied than elastico ML. In accord with current usage, plastic
deformation can include micro-fracture events. A variety of materials whose stress- strain curves showed multiple
sharp drops in stress indicating localized failure events during plastic deformation [10]. Dickinson et al. have
measured emission during plastic deformation of polymers and simple salts. Although they found pulses of emission
during deformation from micro-fractures (crazing), emission persisted during periods with no evidence of fracture
[11], have also shown extensive emission during plastic deformation. Thus while micro- fractures are common, they
are not required for ML under plastic deformation. When the dislocations pass through the material, the energetic
electrons they carry combine with holes (ET) where ET stands for electron trapping or transfer energy to a
luminescent species (EB) where EB stands for electron bombardment, causing the light emission (Fig.1). These
same dislocations carry electrons to the surface and release them [12]. Electron emissions has been observed in
plastic deformation for a variety of samples. The release of electrons may be responsible for the gas discharge
luminescence during plastic deformation [13]. Certainly the emission of electrons during plastic deformation makes
EB of the atmosphere a viable option. Although normally one would conclude that fracture was responsible for the
observation of lightning, lightning could be produced across micro fractures and grain boundaries or by coronal
discharge on a surface that has been altered by dislocation pop out.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 127
NCRASEM 13 Paper ID:HSC03

Fig.1 Block diagram of the emission of photoluminescence during plastic deformation of solids

Plastic deformation is seldom a continuous process, but occurs in lurches, with micro fractures, so the voltage in
piezoelectric materials will occasionally change abruptly during plastic deformation. It is unlikely that these abrupt
changes provide an oscillation at a high enough frequency to excite molecules and ions electronically, as the
frequency will be determined by the mechanical oscillations of the molecules and crystal. As the crystal planes slip,
the planes facing each other may have opposite charges or contain oppositely charged defects. The field could
become great enough that a discharge could occur across the gap through air or molecular fragments [12]. Even
without the electron multiplying effect of a discharge, electron bombardment of the host material during the slip
phase of plastic deformation could excite its photoluminescence.
Another set of complex doped materials was examined by many workers [14]. Aluminates and aluminosilicates
were doped with lanthanides, powdered, reduced and embedded in epoxy. The relative intensities of the spectral
lines produced by plastic deformation were different from that produced by heating (thermoluminescence). The
mechanism or energy of excitation for the two processes was different. These materials are no doubt riddled with
defects from the reduction and micro fractures and grain boundaries from the processing [15]. It is also possible that
the luminescent sites are not distributed evenly between grain boundary surfaces and the grain cores so that the
discharges ML excite the surface selectively, which is unlike thermoluminescence. Thus, the ML may result from a
combination of ET by defects and excitation of the luminescent ions by EB.
II. THEORY
The PML appear in SrAl2O4:Eu crystals even when they are deformed after the cessation of phosphorescence . This
fact indicates that the traps of higher trap-depth are responsible for the PML. The PML appear only in the crystals
doped with suitable activators. This result shows that local regions near the activators are responsible for the PML
emissions. As the mechanical energy is not able to cause PML by direct conversion of mechanical energy into light
energy, it seems that the PML have electrical origin. In this connection, the local piezoelectric field near the defects
seems to be responsible for the PML emissions.
If there is exponential distribution of traps near the defects in the crystals, then the number of traps N(E) of energy E
can be expressed as.
N (E) = Z'N0 exp(- Z'E) (1)
Where Z' is the distribution coefficient and No is the total number of traps in the crystallites in the effective volume
of the sample
Using Eq. (1) the total number from o to E can be expressed as

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 128
NCRASEM 13 Paper ID:HSC03

E
Nd Z ' N 0 exp( Z ' E )dE = N 0 [{1 exp( Z ' E )]] (2)
0

When an external pressure is applied, then the piezoelectric field F is produced. If is the decrease in the trap-depth
per unit electric field, then the decrease in trap-depth for the field will be F. Due to the decrease in trap-depth
detrapping of traps will take place and the value of N will decrease. If N 1 is the total number of traps after change
in the trap-depth F, then from Eq. (2) it is given by.

Nd N 0 [{1 exp( Z ' F )}] (3)

From Eq. (3), we get

dN d
N 0 Z ' exp( Z ' F )} (4)
dF
If F is the rate of increase of F with time, then we have
F Ft
dF
or, F (5)
dt
Thus, from Eqs. (4) & (5), we get

dN d
N 0 Z ' exp( Z ' Ft ) (6)
dF
As the detrapped electrons are transferred to the conduction band, then the rate of generating of electrons in
the conduction band is given by

dN d
g N 0 Z ' exp( Z ' Ft ) (7)
dF
If is the lifetime of electrons in the conduction band, then the change in the number of electrons in the
conduction band, that is, charge carrier density, can be expressed as

n g N 0 Z F exp( Z Ft ) (8)

Using (8) the current j following in the crystal can be written as

j nqvd N 0 Z ' F exp( Z ' Ft )qvd (9)

Where q is the electronic charge and vd is the drift velocity


If is the mobility of electrons in the crystals, then vd = F, and Eq. (9) can be expressed as

j N 0 Z exp( Z ' Ft )q F (10)

Thus the rate of flow of electrons in the conduction band of the crystal is given by
j
r N 0 Z ' exp( Z ' Ft ) F (11)
q
If is the capture cross section of the energy state for the excited Eu 2+ ions, and n e is the concentration of
2+
Eu ions, whose excited states capture the electrons moving in the conduction band, then the rate of capture of

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 129
NCRASEM 13 Paper ID:HSC03

electrons moving in the conduction band by the energy state of the excited Eu2+ ions or the rate of generation of
excited Eu2+ ions can be expressed as

R ne r ne N 0 Z ' exp( Z ' Ft ) F (12)

It is the efficiency for the radiative decay of excited Eu2+ ions then the ML intensity can be expressed as

I R ne r ne N 0 Z ' F exp( Z ' Ft ) (13)

We know that N0 = NcNlNt, thus, Eq. (13) can be written as

I ne N c N l N t Z ' F exp( Z ' Ft ) (14)

If B is the correlating factor between F and Q, then F = BQ. For the piezoelectric constant to near the
localized piezoelectric region in the crystal and the applied pressure P, and the pressing rate P , F BQ BP d 0 ,
and F BQ BQ FBd 0 P t .Thus, Eq. (14) can be written as

I ne r N c N l N t Z ' B 2 P 2 d 02 t exp( Z ' BP d 0 t ) (15)

As P t P , Eq. (15) can be written as


I ne r N c N l N t Z ' BP d 02 P exp( Z ' Bd 0 P ) (16)

(a) Rise of ML intensity


For t << 1, Eq. (15) can be written as

I ne r N c N l N t Z ' B 2 P 2 d 02 t[1 Z ' BP d 0 t )

or, Ir ne r N c N l N t Z ' B 2 P 2 d 02 t (17)


Equation (17) indicates that, initially the PML intensity should increase linearly with time and for larger
value of time, a nonlinearly will occur in the rise of ML intensity with time.
(b) Fast Decay of PML Intensity
The fast decay of PML intensity can also be expressed as
I I m exp[( )(t t m )] (18)

Where Im is the PML intensity at t = tm, at which the power to the cross head is off and 1 , is the time-
m
constant for stopping the cross-head.
(ii) Slow decay of PML Intensity
The slow decay of PML intensity can also be expressed as

(t t c )
I ds I os exp I os exp[ (t t c ) (19)
c

Where I os is the PML intensity at t = tc, at which the PML due to the deformation becomes negligible and
1/ s , is the lifetime of electrons in the shallow traps lying in the normal piezoelectric region of the crystals.

(c) Estimation of Im
If a crystal is compressed at a fixed rate for a time t m, where the pressure is Pm, then from Eqs. (16), the
maximum PML intensity Im can be expressed as

Im ne r N c N l N t Z ' B 2 P d 02 I m exp( Z ' Bd 0 Pm ) (20)

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 130
NCRASEM 13 Paper ID:HSC03

Equation (20) indicates that for low value of P m, Im should increase linearly with Pm, but for higher value of
Pm, Im should increase non - linearly with Pm.
(d) Estimation of ITD
From Eq. (16), the total PML intensity in the deformation region can be expressed as
tm

I TD Idt
tth

Pm

or, I TD ne r N c N l N t Z ' B 2 d 02 P exp( Z ' Bd 0 P)dP


Pth

or, I TD ne N c N l N t Z ' B 2 d 02 P[1 Z ' Bd 0 P]dP

Pm Pm

or, I TD ne N c N l N t Z ' B 2 d 02 PdP Z ' Bd 0 P 2 dP


Pth Pth

Pm2 Pth2 Z ' Bd 0 ( Pm3 Pth3 )


or, I TD ne N c N l N t Z ' B 2 d 02
2 2 3

ne N c N l N t Z ' B 2 d 02 Pm2 1 2Z ' Bd 0 Pm


or, I TD (21)
2 3
Equation (21) indicates that for low value of P m, ITD should increase quadratically with Pm, for higher
values of Pm, ITD should increase non - linearly with Pm.
Using Eq. (20) the value of total PML intensity in the post-deformation region, from time tm to is given
by

I TPD I m exp[ (t t m )]dt

Im
or, I TPD

or, I TPD ne N c N l N t Z ' B 2 P d 02 Pm m exp( Z ' Bd 0 Pm ) (22)

Thus, Eqs. (21) and (22), the total PML intensity can be expressed as
IT I TD I TPD
or,
ne N c N l N t Z ' B 2 d 02 Pm2 1 2Z ' Bd 0 Pm
IT ne N c N l N t Z ' B 2 P d 02 Pm m exp( Z ' Bd 0 Pm )
2 3
1 2Z ' Bd 0 Pm 2 m
or, I T ne N c N l N t Z ' B 2 P d 02 Pm2 exp( Z ' Bd 0 Pm )
3 Pm
(23)
Equation (23) indicates that for higher values of Pm, IT should increase nonlinearly with Pm.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 131
NCRASEM 13 Paper ID:HSC03

III. EXPERIMENTAL SUPPORT TO THEORY


Fig. 2, shows the photoluminescence (PL) and plasticomechanoluminescence (PML) spectra from SrAl2O4: Eu
nanophosphor which is characterized by broadband emission with the peak wavelength of nearly 520 nm for both
PL and PML . This employs that that PML was emitted from the same emission center of Eu ions as PL; both are
produced by the transition of Eu ions between 4f7and 4f6 5d1[16-17].

Fig. 2, Plasticomechanoluminescence (PML) spectrum from stress stimulated SrAl 2O4: Eu and photolumineance (PL) spectrum from SrAl2O4:
Eu excited by light of 365 nm.
Fig. 3 shows that during deformation the movement of dislocation (D) excited the filled traps (T +) to release hole to
the valence band. Holes then excited Eu+ to produce Eu2+*, which then returns to the ground state by emitting a
green light around 520 nm. These processes can be represented as follows:-
Transition 1 : T+ + D = T + D + h +
Transition 2 : h+ + Eu+ Eu2+*
Transition 1 : Eu2+* Eu2+ + h

Fig. 3 Mechanoluminescence kinetic model for SrAl2O4: Eu

IV.CONCLUSION
It is clear from the foregoing discussion that initially the PML intensity increases linearly with time and for larger
value of time a non linearity will occur in the rise of PML intensity with time. For low value of pressure, the total
PML intensity IT increases linearly with P2 and for higher value of P , IT increases non linearly with P2 .

V. REFERENCE

[1] M.Shiwa, N.Takeda, and T. Kishi, J. Compos. Mater. Soc. Jpn. 20 , 108(1994).
[2] M.Nakamura, K.Sotoh, M.Ikeyama, T.Koxuka, and I.Shigematsu, J.Ceram.Soc.Jpn. 101, 139 (1992).
[3] H.Yanagita, Ferroelectrics, 102, 251(1990); M. Mitomo and T. Ikegami, Bull.Ceram. Soc. Jpn.28, 554 (1993).
[4] B.P.Chandra, Radiat. Eff. Defects Solids 138, 119 (1996).

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 132
NCRASEM 13 Paper ID:HSC03

[5] N. A. Atari and R. Ramant, Phys. Status Solidi A 97, 446 (1986).
[6] C.T.Butler, Phys. Rev. 141, 750 (1966).
[7] G. T. Reynolds, J.Lumin. 75, 295 (1997).
[8] K. Meryer and D.Obrilcat, Krist. Tech, 5 , 5 (1997).
[9] I. Brabec, Nondersr, Test. 7, 258 (1975).
[10] B.P.Chandra, A.K. Bagari, V.K.Chandra: J.Lum. 130, 2010.
[11] J.T. Dickinson, J.T.Jensen,L.C..Jensen, S.C. Langford, D.L.Blanchard , Phys. Chem. Minerals 18, 320 (1991).
[12] J.S.Kim, H.J.Koh, W.D..Lee, N.Shin, J.G.Kim, K.S.Lee and K.S.Sohn, Metals. Materials International, 14, 165 (2008).
[13] B.P.Chandra, Luminescence of Solids, Edited by D.R.Vij, Plenum ( In press, New York), pp 361-389, (1998).
[14] M.Akiyama, C.N. Xu, K.Nonaka and T.Watanabe, Appl. Phys. Lett. 73, 3046, (1998).
[15] M.Akiyama, C.N. Xu, K.Nonaka, Appl. Phys. Lett. 81, 457, (2002).
[16] V.Avvrustcato, J.Electrochem. Soc.118, 930(1971).
[17] T. Matuszawa, Y.Aoki, N. Takeuchi, and Y. Murayama, , J.Electrochem. Soc.143, 2670 (1996).

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 133
NCRASEM 13 Paper ID:HSE01

Discussion on Classroom Teaching to Improve


English Language Skills of Engineering
Students
G.Sivashankari
Dept of English, Priyadarshini Institute of Science and Technology, Patancheru, Hyderabad.

Abstract : This paper explores the best teaching method out of many and the role of a language teacher , in order to
improve English language skills of engineering students, which will be used as one suitable and useful solution to different
problems of graduates, they face. The teaching content should be built in the following sentences, i.e., developing
particular document for the base text, taking active part in teaching steps for the core, and making lively practices in
speaking and writing for the addition. The teaching method should be developed aiming the communication ability of
engineering students, and giving instruction in English medium .The reform of teaching method and contents of
specialized English to engineering students will improve the overall quality ever to succeed in future completion of job-
search and further development.

Key words: English ability, engineering student, teaching method, teaching content

I INTRODUCTION
The current proficiency level of English of our students is far below what is expected when they enter
higher education and engineering colleges, due to their social and cultural backgrounds. Of course they are taught
English in their previous levels, but they are taught English only for the sake of examinations. Hence a teacher of
English faces a lot of problems while teaching English as a second language to students especially to the students,
who come from rural background. The first and the most important reason is that most of the students have no
knowledge of even basic English although they are taught English in schools. It sounds that the language skills of
future engineers will not have improved considerably by the time they leave engineering colleges. In view of the
current general trends of increased internationalization and number of student exchange programmes on the one
hand, and the apparent need for improved English language skills on the other,. As I am primarily a practitioner, the
ways to improve English language skills, suggested in this paper are based on experiences from the teaching of
English to engineering students for the past 8 years. In the introductory chapter to Technical Writing and
Professional Communication For Nonnative Speakers of English [1] Thomas N. Huckin and Leslie A. Olsen, rightly
said that Scientists and engineers may be technically brilliant and creative, but unless they can convince co-
workers, clients, and supervisors of their worth, their technical skills will be unnoticed, unappreciated, and unused.
In a word, if technical people cannot communicate to others what they are doing and why it is important, it is they
and their excellent technical skills that will be superfluous. From this perspective, communication skills are not just
handy; they are critical tools for success, even survival, in real world environments.(1). The truth in this
statement becomes even more vital in view of the current increasing internationalization of trade, commerce and
industry. As English has become the lingua franca of international relations, tomorrows engineers will need English
language skills that are far above the skills that most engineering graduates have today. We no longer need to ask if
the English language skills of our future engineers must be improved. The question is rather how we should go
about in improving these skills. This is primarily a question of didactics.
A Background of the students:
The EFL teaching is always affected by socio cultural factors. Many students, attending the EFL classes, dont show
interest in learning the language except in gaining marks somehow. They spend their valuable years in schools &
colleges without learning anything of English language. But when they come to university or take admission into
professional courses like medical, nursing, engineering etc, they need English language because they have to study
everything in English. At this stage English becomes a problem for them. Teaching English as a second language is
tricky .But it can be taught effectively with patience and hard labor with the help of self-invented methodologies
suitable for one's students. For this a teacher has to, first of all, study the problems and difficulties faced by his
students in the course of learning English. Once the problems and difficulties are found out, the task of teaching

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 135
NCRASEM 13 Paper ID:HSE01

becomes easy for a smart teacher. . He frames a Curriculum suitable, for his students, selects reading materials for
them creating suitable environment.
B Identifying Areas of Difficulty
While learning a second Language, a student faces a many fold problems like socio-cultural problems, unfamiliarity
with the subject, different style of writing from his/her native language, problem of pronunciation etc. The socio-
cultural background of a student plays a very important role in learning the second language. This ignorance of the
culture confuses the student. Once the problems and difficulties are found out, the task of teaching becomes easy for
the teacher.
C Methods of Teaching
While teaching EFL a teacher uses a lot of methods, techniques and styles. This usage of different techniques is
called methodology. Methodology means the way of teaching. There are many methods of teaching which are used
by the teacher according to the need of students. Students of different levels need different methods. Beginners need
different methods of teaching from those students who have been learning EFL for a long time. Those who need the
language as a medium of instruction have to be taught differently from those who only need as a subject. The
teaching of English, perhaps, has the largest number of different methodologies. Moreover, methodologies have also
kept changing over the years. Some methods have become fashionable, whereas others have become out dated. Out
of the largest number of different methods of teaching English language, there are three universally recognized
methods:
1. GrammarTranslation Method.
2. The Communicative Method.
3. Direct Method.
The above mentioned methods are widely used to teach four skills listening speaking reading, writing
D Adopting a Method
As shown above there are many different methods to teach the four skills of English language. Which method out of
the many, which skill, out of the four, is the most important- depends on the purpose of the learners. But from the
technical point of view, reading and writing skills are the most important skills. So the emphasis should be on
reading and writing. If a student learns how to read words or sentences, he would automatically become able to write
and speak English. A class room is a heterogeneous group. In fact a teacher should be free in adopting a style of
teaching in the class-room. Every teacher has a different style of teaching in the class-room. If a student fails in
learning or improving his or her linguistic knowledge, it does not mean that his teacher is not good or incompetent.
We can, utmost, blame his style of teaching, not the teacher. Whatever the method the teacher follows, the main aim
should be to develop the linguistic knowledge of his students. To achieve this goal, a teacher has to take the
following steps:
E. 10 steps for teachers:
A teacher should encourage students to learn frequently used vocabulary and should make them use the
words in their conversations regularly.
Ask them to maintain a separate notes to note down the new words, phrasal verbs, one word substitutes etc,
they find in the text book and to prepare sentences on their own using them .
The teacher should let them know that a dictionary can be used not only for meanings but also to learn
idioms, phrasal verbs to make language beautiful.
The language teacher should give them some sentences to translate into English, explaining them the
structure patterns.
Small stories are given in news papers every day, ask them to read and translate the stories in to English. It
doesnt mean that they are very good at English and can translate any story, but they at least try to search
for vocabulary, in the process they learn new expressions. For this language teacher can suggest Telugu to
English dictionary if the student is of Telugu background. In the beginning student do number of mistakes
.The language teacher has to be patient enough to correct these assignments.
Translation method can be accepted in the beginning .But after some times this method should be discarded
and direct method should be applied.
Teachers should respond frequently to the students work and their response should be implemented
pedagogically.
Oral presentations and discussions in meetings and negotiations are adequate activities for developing the
students oral skills.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 136
NCRASEM 13 Paper ID:HSE01

Let the learners work in pairs or groups for role play, information sharing, or other assignments given
Similarly, students may be asked to respond or comment on their peers work. (2), so that they observe the
mistakes done by their classmates and they try to avoid such, in their presentations.

F Challenges to be the most demanding


. Motivating all students
. Increasing the cognitive skills of resource-deprived students
. Sustaining students commitment
. Addressing students preconceptions
At present, teachers around the world prefer some form of communicative teaching and learning rather than
the audio-lingual method and its derivatives. However, we must remember that a successful teacher is not
necessarily biased in favor of one method or the other. She should be first of all competent in and comfortable with
the methods she wants to use. She should be able to select from different strategies and methods to suit the needs of
the students and the class room situation.
II.CONCLUSION
As discussed above , regarding class room teaching to improve English language skills of Engineering students
, it is found that the methods that are followed in teaching English should be flexible and the methods should be
kept on changing by the teacher to suit the ever-changing needs of the students. At the same time the main spirit of
the teacher is to inculcate the ability among the students to express their thoughts in the target language in a lucid
way. Although this paper has suggested an integrated module to teach communicative module that includes various
approaches and skills to facilitate easy learning of English, it cannot be said that nothing lies beyond this so far as
the tips and techniques of communicative English are concerned. There are hundreds of techniques and methods
which can be adopted and used by the innovative teachers of English. Thus, it is concluded that if the appropriate
method is chosen and implemented effectively, the result will be fantastic.

III REFERENCES
. [1] Huckin, Thomas N. and Olsen, Leslie A., Technical Writing and Professional Communication for Nonnative Speakers of English,
McGraw-Hill International Editions, 1991, page 3.
[2] Blakeslee, Ann M., Bridging the Workplace and the academy: Teaching Professional Genres through Classroom-Workplace
Collaborations, in Technical Communication Quarterly, Spring 2001, Vol.10, No 2 (pp: 169-192).
3) Approaches and Methods in Language Teaching (1,2) Jack Richards and Theodre .S. Rodgers. Cambridge
University Press, 1986

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 137
NCRASEM 13 Paper ID:HSM01

THE CONCEPT OF INFINITY IN MODERN


EXPANDING UNIVERSE THEORY
Raju Pappala
Asst. Professor,Dept. Of Mathematics,Priyadarshini Inst. Of Science & Technology,Chinnakanjarla(v),
Hyderabad. E-mail: rajupappala@gmail.com

Thulluri Sudha
Asst. Professor,Dept. Of Mathematics, Turbomachinery Inst. Of Tech & Science, Indresham(v),
Hyderabad. E-mail: sudhasudhee@yahoo.co.in

Aswani Kumar Bathina


Associate Professor, Dept. Of CSE, JBIT, HYD.
E-mail: kumarb.16@gmail.com.

Abstract : The aim of this paper is not only to deal with the concept of infinity, but also to develop some considerations
about the epistemological status of cosmology. These problems are connected because from an epistemological point of
view, cosmology, meant as the study of the universe as a whole, is not purely a physical (or empirical) science. On the
contrary it has an unavoidable metaphysical character which can be found in questions like why is there this universe
(or a universe at all)?. As a consequence, questions concerning the infinity of the universe in space and time can correctly
arise only taking into account this metaphysical character of cosmology. Accordingly, in the following paper it will be
shown that two different concepts of physical infinity of the universe (the relativistic one and the inflationary one) rely on
two different ways of solution of a metaphysical problem. The difference between these concepts cannot be analysed using
the classical distinctions between actual/potential infinity or numerable/continuum infinity, but the introduction of a new
modal distinction will be necessary. Finally, it will be illustrated the role of a philosophical concept of infinity of the
universe.

I.INTRODUCTION
From a historical point of view, cosmology is mainly a philosophical subject. From Greek mythology to
thought in Kants Critique of Pure Reason, the problem of the cosmos was placed to the limit, or more often out, of
scientific research. This is due to the fact that the aim of cosmology has a clear philosophical sound: the study of
universe as a whole. The problem on infinity, which was the one that kept Kant in check, is still open. In the
following, we will try to clarify the status of the problem of infinity in cosmology and we will try to show the root of
this problem is in an epistemological question placed in foundations of cosmology itself.
A. Epistemological status of cosmology
As it was said, cosmology is a particular subject, which has a deep philosophical root, but, in the meantime,
which was subjected to accurate physical studies, especially starting from the last century. These premises given, it
is no wonder that cosmology enjoys a certain epistemological specificity, which distinguishes it essentially from
physics. The epistemological specificity is divided into two levels. First, cosmological observations are slightly
different from the physical ones. As cosmology has to study the properties of the universe meant as a whole, only
the observations independent from who make them can be cosmological observations. Looking well, this
requirement is nothing but a generalisation of the Copernican principle which states a preferred position in the
universe does not exist.
Second, the subject cosmology has a character which distinguishes it from empirical sciences like physics. Indeed,
in the latter, the socalled arbitrariness of the initial conditions principle holds. The prototype of physical law is a
differential equation that allows as to pass from the description of a generic state x at the time t to another state y at
successive (or previous) time t . The essential point is that such a law describes the manner of this passage,
regardless the initial and final states The initial conditions (within specified broad conditions) are totally arbitrary in
order to make a physical law valid. It is really unthinkable from the point of view of physical methodology that a
law changes its form depending on initial conditions, if the general conditions are respected. However, in cosmology
the initial conditions are given and they cannot be changed. We have to define the evolutionary laws of the universe

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 139
NCRASEM 13 Paper ID:HSM01

as a whole with fixed initial conditions and, actually, we have no guarantee that these laws do not essentially depend
on the conditions themselves. But, from an epistemological standpoint, this fact has even deeper consequences.
A First of all, we have a experimental consequence:
In cosmology, experiments to test cosmological laws cannot be made. We do not have at our disposal another
universe to check the behaviour of our models under conditions different from the actual and we cannot change the
conditions themselves as we like. Secondly, we have a theoretical consequence too. In fact, if the arbitrariness of the
initial conditions principle (and the model of physical law described above) does not hold, then nomological
explanation, that is the kind of explanation able to claim a counterfactual conditional, cannot be given. Now, we
will try to define these conditions. Physics, as an empirical science, is based on two fundamental requirements: the
empirical data as a starting point and the validity of the arbitrariness of the initial conditions principle. From the first
point the following condition derives:
Condition [1]. A certain universe exists, characterised by some values of fundamental quantities as the electron
charge, Plancks constant, the speed of light and so on. But from the second requirement another condition follows:
Condition [2]. In principle, many universes are possible because all the fundamental constants defining our universe
have arbitrary values.
B. Two ways for a solution.
The initial conditions problem has two sides: a philosophical one and a physical one. Thus, we can expect that
the two possible ways resolving it, can be distinguished from this very point of view: in other words, there is a more
philosophical and a more physical way. However, dealing with two sides of the same problem, we can expect that a
solution has consequences for the other side too.
A first way for solving the fundamental inference from condition [1] to condition [2] is the following. A
particular, very general characteristic of our universe is considered and it is raised to the rank of a necessary, namely
metaphysical principle.
The second way consists in privileging the physical side of the initial conditions problem. Thus, this
problem attempts to be solved from the physical point of view. Indeed, the fundamental inference can be justified
stating that the passage from the state of affairs described by condition [2] to the one described by condition [1]
takes place by means of a physical process represented by a suitable theory. Condition [2] works as a
epistemological prerequirement for this theory, while condition [1] works as the result of the process itself and the
theory allows passing from one to another.
The difference between these two ways is the following. According to the first way the standard
cosmological model, which describes our universe, is as necessary as the universe itself. accordingly, any question,
included that of infinity, has sense in this model only. Indeed, any problem concerning the universe as a whole refers
to our universe and it is understandable by means of the theory describing our universe only. The second way
assumes the theory which justifies the fundamental inference as necessary, namely provided of a metaphysical
meaning, then the question of infinity has to arise within this theory and in a context wider than that of our universe.
Therefore a complete analysis of the concept of infinity in cosmology requires the inquiry of the meaning of this
concept in relativistic cosmology, foundations of the standard cosmological model, and in the inflationary model.
C. Relativistic Cosmology.
The relativistic cosmology relies on two fundamental a priori assumptions. We call them a priori, because they
do not derive directly from experience, not being an experience able to confirm or to refute them, but they are
assumed for theoretical reasons. First of all, the existence of cosmic time is assumed, namely a unique time for any
observer. This fact greatly simplifies the definition of metric because it permits anything without taking into account
many difficulties of general relativity. Passing, it is interesting to note that such a notion of time has much more to
do with the time of history, the time within which the facts happen, than the time of physics.
The second fundamental assumption is the socalled cosmological principle which has already been spoken
about. It consists in the hypothesis of homogeneity and isotropy of the universe. This hypothesis is rather well
confirmed on a cosmic scale, however not definitively. Yet again, the cosmological principle has not only a physical
value, but also a philosophical one. In fact, it works as a very uniformity of nature principle. Not only does it
simplify by far the cosmological formulae, but it authorises one to think that the universe always behaves according
to the present laws, and this for a simply physical reason. We know that the universe expands itself according to a
law which links the speed of departure of a point from another v to the distance between them r:

1) v Hr ,
where H is Hubbles constant, a universal constant varying with time. Accordingly, if a universe as a sphere of
radius R, filled of matter M is considered, its density changes in time according to the law:

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 140
NCRASEM 13 Paper ID:HSM01

d 3M dR
2) 3H .
dt 4 dt
R4
3
Thus, the variation of density is independent on spatial coordinates, being linked only with the universal
constant H. As a consequence, if the universe is homogeneous and isotropic at a certain time, it is so for all the time
previous and next as well. Therefore, if the cosmological laws depend on the cosmological principle, the principle
itself makes us sure that they always was been (and will be) essentially the same.
As we have mentioned above, in cosmology the relativistic metric is simplified. In relativity theory, the
generic distance between two points in the spacetime is given by:

3) ds 2 g ij dx i dx j ,

where gij, (i, j = 0, 1, 2, 3) is the usual metric tensor and dxi are the coordinates of the points. In cosmology, the
equation (3) becomes:

dr 2
4) ds 2 c 2 dt 2 a 2 (t ) r2 d 2
sen 2 d 2
,
1 Kr 2

where t is the cosmic time, r, , are the commoving polar coordinates and a is the expansion parameter. The
parameter K can assume three possible values (1, 0, 1) correspondingly to the possible curvatures of the space. The
equation (4) represents the socalled RobertsonWalker metric. The structure and the evolution of the universe can
be known in detail using the general relativity equations for the gravitational field:

1 8 G
5) Rij g ij R Tij ,
2 c4
where Rij is the Riemanns tensor, R the scalar curvature, and Tij the stressenergy tensor. With suitable assumption,
a satisfying form of the tensor Tij can be determined while the metric tensor is given by the RobertsonWalker
metric. By defining the Riemanns tensor and deriving the scalar curvature, two equations expressing the temporal
evolution of expansion parameter a(t) describing the global temporal behaviour of the universe can be obtained.
These equations are called Friedmans cosmological equations:

d 2a 4 G p
6) 3 a,
dt 2 3 c2
2
da 8
7) Kc 2 G a2 ,
dt 3

where p represents the pressure and G the constant of gravitation. The equation (6) can be derived from the (7) if the
state equation connecting p to is given, but, as a more important consequence, from the equation (7) derives a
more general expression for the curvature of the universe:

2
K 1 da
8) 1 ,
a2 c 2 dt c

where c is the already mentioned critic density, whose value is:

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 141
NCRASEM 13 Paper ID:HSM01

3H
9) c .
8 G
The cosmological equations (6) and (7) yield us some important information about the infinity of the
universe in space (geometry) and in time (evolution). From (8) we can note the following. If > c the curvature is
positive. This means that the geometry of the universe is spherical and the universe is spatially finite but unlimited
because on a sphere a limit cannot be found. On the contrary, if < c the curvature is negative, the geometry of the
universe is hyperbolic and the universe is spatially infinite and unlimited. If = c the geometry is the usual
Euclidean geometry.
On the other hand, the cosmological equation (10) can be written in the following manner:

2
1 da a0
10) H 02 1 ,
a 0 dt a

where a0 e H0 represent the present value of the expansion parameter and the Hubble constant respectively. By
means of (10) the evolution of the universe can be completely described depending on the ratio between total
density and critical density expressed by the parameter . If > 1 the universe is said closed. It has a starting point
in time (bigbang). Moreover, it contains enough matter in order to stop the expansion, where the meaning of
enough is quantitatively established by the value of c. As a consequence, this universe will expand up to a certain
time, after that the expansion will be inverted by the gravitational attraction of the matter and the universe will be
brought to a final collapse (bigcrunch). On the contrary, if one has < 1, then there is not in the universe enough
matter to invert the expansion. In this case, the universe has a starting point in time too, but contrarily to the
previous case, it will continue its expansion forever.

D. The infinity in cosmology.


In order to characterise the notion of infinity, three fundamental kinds of distinction can be essentially used. It
can be distinguished among an actual infinity, namely an infinity given in a complete and immediate way, a
potential infinity, meant as something can be always carried on, continued and completed. This is a qualitative
distinction of the infinity concept. Likewise, a quantitative distinction can be developed as well. The set theory
taught us that some kind of infinity can be, lets say, more infinite than other, and that a numerable set, even
though infinite, contains less element than a continuous set. Finally also a modal distinction of the infinity concept
can be used. Actually, the infinity can be thought as a infinite repetition of a finite number of possibility, or rather as
a realisation of infinite possibilities. The first sense has something to do with the idea of infinity as repetition of the
identical, exemplified in the conception of history as eternal return. Whereas, the second one concerns the infinite
diversity, something very close to the idea of linear and open development of history.

II.CONCLUSION
As a conclusion, we take into account again a consideration made in the second paragraph: any genuine
cosmological problem always has a physical and a philosophical side, and the infinity problem is not an exception.
Accordingly, there will be also a philosophical infinity in cosmology, besides the physical one. The philosophical
meaning of infinity in cosmology has to do with the concept of universe. As we have seen, cosmology requires a
metaphysical frame allowing to assume the point of view of the whole, necessary in order to deal cosmologically
with the universe. Therefore, the philosophical concept of universe means a point of view summarising all the
possible points of view. Such a concept is infinite, in the sense that it cannot be limited or overcome. The point of
view of the whole assumed with the metaphysical concept of universe is the highest reachable level of abstraction.
The analogy with historiography is useful yet again. Indeed, the concept of universe is quite similar to the one of
history, meant as point of view summarising all the particular points of view founding into it. The manifold of
things happening in history, are unified and meaningful in the concept of history only, exactly in case of for the
concept of the universe. Moreover, as the concept of history justifies within itself the use of such different theories
(we can speak of economical, political, military, cultural history), so the concept of universe justifies the
cosmological use of relativity, quantum mechanics, thermodynamics, and so on, to an identical object, even though
they are theories whose ambit must be carefully divided. The phenomena these theories dealt with are unified by the
philosophical concept of universe.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 142
NCRASEM 13 Paper ID:HSM01

III.REFERENCES
[1] Agazzi, E. (1991) The Universe as a Scientific and Philosophical Problem, in: E. Agazzi, A. Cordero (Eds) Philosophy and the
Origin and Evolution of the Universe (Boston, Kluwer).
[2] Barrows J.D., Tipler, F.J. The Anthropic Cosmological Principle (Oxford, Oxford University Press)
Bergia, S. (1998) Problemi fondazionali e metodologici in cosmologia, in: G. Boniolo (Ed.) Filosofia della fisica (Milano, Mondadori).
[3] Bertotti, B. (1990) (Ed.) Modern Cosmology in Retrospect (Cambridge, Cambridge University Press).
Bondi, H., Whitrow, G.J. (1954) Is Physical Cosmology a Science?, British Journal for the Philosophy of Science, 4, pp. 271283.
[4] Guth, A.H. (1981) Inflationary Universe: a possible solution of the horizon and flatness problems, Physical Review, D23, pp. 347356.
[5] Grnbaum, A. (1961) Geometry, Chronometry and Empiricism, in: H. Feigl, G. Maxwell (Eds) Minnesota Studies in the Philosophy of
Science. III Scientific Explanation, Space and Time (Minneapolis, University of Minnesota Press).
[6] MerleauPonty, J. (1965), Cosmologie du XX Siecle (Paris, Gallimard).
Peebles, P. J. E. (1993) Principles of Physical Cosmology (Princeton, Princeton University Press).

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 143
NCRASEM 13 Paper ID:MBA01

RURAL MARKETING
WITH REFERENCE TO HERITAGE FOODS
(INDIA) LIMITED- AN EMPIRICAL STUDY
S.SREEKANTH, Asst.Professor,
School of Management Studies, Sreenidhi Institute of Science and Technology, Ghatkesar, Hyderabad,
Andhrapradesh, Email : sreekanth.sri@gmail.com, Mobile No : 9966235399

CH.R.S.CH.MURTHY, Asst.Professor,
School of Management Studies, Sreenidhi Institute of Science and Technology, Ghatkesar, Hyderabad,
Andhrapradesh, Email : chodisetty.b4u@gmail.com, Mobile No : 7396957328, 9989199668.

Abstract- Promotion of brands in rural markets requires the special measures. Due to the social and backward condition the personal selling efforts
have a challenging role to play in this regard. The word of mouths an important message carrier in rural areas. Infect the opinion leaders are the most
influencing part of promotion strategy of rural promotion efforts. The experience of agricultural input industry can acts a guideline for the marketing
efforts of consumer durable and non-durable companies. Relevance of Mass Media is also a very important factor. The Indian established Industries
have the advantages, which MNC don't enjoy in this regard. The strong Indian brands have strong brand equity, consumer demand-pull and efficient
and dedicated dealer network which have been created over a period of time. The rural market has a grip of strong country shops, which affect the sale
of various products in rural market. The companies are trying to trigger growth in rural areas. They are identifying the fact that rural people are now
in the better position with disposable income. The low rate finance availability has also increased the affordability of purchasing the costly products by
the rural people. Marketer should understand the price sensitivity of a consumer in a rural area. This paper is therefore an attempt to promote the
brand image in the rural market . The Project attempts to bring to focus the role of rural marketing in bridging the widening
disparity between rural and urban economies in India. The suggested reconceptualization of rural marketing highlights
the need for a dual perspective producers empowerment and strategic marketing, and broad basing its domain to
cover variety of market relationships which are part of growing rural-urban linkages. This difficult and complex task can
be achieved by helping rural producers to effectively compete in the marketplace based on competitive/comparative
advantage through consolidation of agriculture and rural enterprises. More specifically, agriculture and rural enterprises
need to be linked to rural and/or urban markets through minimizing market resistance to rural products and
maximizing market orientation of rural enterprises.

Keywords: Promoting brands in rural areas, Mouth publicity, Agricultural products.

I. INTRODUCTION
Broadly rural marketing incorporates the marketing of agricultural products, rural industries products and services
of many kind. The trade channels for different types of commodities available in rural areas areas private,
cooperatives, processors, regulated markets and state agencies. In no sense, a social cluster or village economy as at
whole can, be developed without effective and efficient rural marketing. Very little attention has been paid in the
planning era towards the development of rural marketing. In fact marketing is a dynamic state of affairs and is part
and parcel of the whole economy. Thus production and marketing are the two facets of a coin. Rural marketing
constitutes the nerve centre of rural development activities. Rural marketing is a two way marketing process. The
content now encompasses not only marketing of products which flow to rural areas, but also products which flow to
urban areas from rural areas. So a broad definition of rural marketing is concerned with the flow of goods and
services from urban to rural arid vice-versa. In addition, it also include the marketing in the rural areas. As the rural
marketing is a two-way process, this article attempts to highlight both the aspects. It examines the marketing aspects
of rural produce with special reference to agriculture while on, the other hand it covers and suggests .strategies for
promoting marketing within the rural areas.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 145
NCRASEM 13 Paper ID:MBA01

II. SCOPE OF THE STUDY


The study has a wider scope covering the RURAL MARKETING, the people who are using Heritage products
and it also emphasizes on the parameters like customer awareness, customer perception branding value and image. It
also throws a light on the customer awareness of the retail industry with attention to HERITAGE. The project covers
the entire branding features on their impact on customer.

III. NEED FOR THE STUDY


The Topic Selected For Study RURAL MARKETING, As There Is Greater Importance of Customer Perception in
the Organization Due To Impact of Growing Customer impact on The Business Environment. Change Is Here To
Stay, And We Need To Understand That All The Practices That Are Working Today May Not Necessarily Work
Tomorrow. Customers Expectations, Market Changes and Strategic Decisions Will Highly Influence the
Customers Perception towards a Particular Brand.

IV. OBJECTIVES OF THE STUDY


To Conduct a Research on Rural marketing in retail industry.
To know the customer perception on HERITAGE retail products.
To know the customer satisfaction on HERITAE retail products.
To estimate the factors influencing the buying behavior of the customer
To know the brand image among the customers.
To know the brand awareness among the customers
,
V. METHODOLOGY
A Research Design
A research designs is a specific action of the method and procedures for a acquiring the information needed to
structure or solve the problems. It is an overall operational framework project has stipulates what procedures. The
research design ensures that the information obtained is relevant to the study. A research design might be described
as a series of advances .Decisions that have taken together from a special master plan or a model for the conduct of
investigations. These are different types of research designs used applied for different or suitable conditions for this
project at the time of pallet survey more information was collected about Hero Honda products.
B Research Instrument
The questionnaire is fully structured. The field work was carries for a period of 2 months. The approximate time
taken to fill a questionnaire is two to three days. To study the opinion of the respondents towards engagement in
organizational policies, a five-point scale (Strongly agree, Agree, Neither agree or nor disagree, Disagree, Strongly
disagree) is adopted to study the relationship and variation of respondents.
C Statistical Techniques Used For Analysis
The data is analyzed by using Mean, Standard Deviation, Coefficient of Variation and Coefficient of correlation.
The methodology adopted for collecting the primary data is through questionnaire method. Questionnaire is
designed using objective type questions mostly of multiple choices, keeping in view the time availability at the
disposal of the decision maker. Questions designed are simple and specific, to generate response according to the
objectives. Questionnaire is arranged in a logical order, logical to the respondent and proper care has been taken to
avoid ambiguity in responses and at the Same time enabling the respondents to answer the questions easily and
quickly with the time available at their disposal.
SAMPLING DESIGN

SAMPLE UNIT: The sampling unit is customers who are using HERITAGE retail
products, Hyderabad rural area.
SAMPLE SIZE: The sample size is 100 customers in Hyderabad rural area.
SAMPLING METHOD: Random Sampling

VI. LIMITATIONS OF THE STUDY


The time period of project is 45 days.
Though the customers wanted to give information they could not give as it wastes their business time.
The accuracy of the answers depends upon the mode of interest of respondents.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 146
NCRASEM 13 Paper ID:MBA01

Though the customers wanted to give information they could not, as they felt it takes away their business
time.
VIII. RESULTS AND DISCUSSIONS
1. Name Of The Brand People Think First In The Rural Retail Industry.
A) HERITAGE B) Big Bazaar
C) More D) Reliance Fresh
E) Metro
Brand No Of
Respondents
HERITAGE 21 No Of Respondents
Big Bazaar 39
More 18 100
Reliance Fresh 12 80
Metro 10 60
40
Total 100 20
0 No Of

Metro
More
HERITAGE

Total
Reliance Fresh
Big Bazaar
Respondents

21% of the respondents are think HERITAGE brand first in the industry
18% of the respondents are think more brand first in the industry
18% of the respondents are think Reliance Fresh brand first in the industry
10% of the respondents are think Metro brand first in the industry

2. If Yes, Which Rural Retails Do You Know?


A. HERITAGE B). More
C. Big Bazaar D). Reliance Fresh E. others

Options No Of Respondents
HERITAGE 25
More 12 No Of
Big Bazaar 10
Reliance Fresh 08
Respondents
Others 15
Total 100 100

No Of
50 Responden
ts

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 147
NCRASEM 13 Paper ID:MBA01

INTERPRETATION: From the above table it is clear that


25% of the people owned HERITAGE
15% of the people owned Other
12% of the people owned More
10% of the people owned Big Bazaar
08% of the people owned Reliance Fresh

1. What Are The Reasons For Buying In Heritage?

A. Brand B. Pricing
C. Quality D. Packing E. Design
Options No Of Respondents
Brand 22
Pricing 16 No Of
Quality 31
Packing 17 Respondents
Design 14
Total 100 100
No Of
50 Respondent
s

INTERPRETATION:
From the above table it is clear that
25% of the people owned HERITAGE
15% of the people owned other
12% of the people owned more
10% of the people owned Big Bazaar
08% of the people owned Reliance Fresh
4. How is the Price of HERITAGE comparing to others.
a. High b. Low c. Same

Options Respondents
High 33
Low 13
Same 54
Total 100

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 148
NCRASEM 13 Paper ID:MBA01

TOTAL
100
90
80
70 SAME
60 HIGH
50 HIGH LOW
40 SAME
30 LOW TOTAL
20
10
0
Respondents
INTERPRETATION:
54% of the people feeling that Price of Heritage Foods India Ltd is same comparing to others
33% of the people feeling that Price of Heritage Foods India Ltd is high comparing to others
13% of the people feeling that Price of Heritage Foods India Ltd is low comparing to others

IX. FINDINGS
Most of the respondents are think Big Bazaar first in the Rural Retail industry and second is our Heritage
Foods India Ltd.
From the above research it is clear that 70% of the respondents are in Heritage
The drive of HERITAGE is t taken by 61% of respondents
Majority of respondents is 63% of the people satisfied with performance of the Heritage Foods India Ltd.
40% of the people rated that service of the Heritage Foods India Ltd is Average and they are t satisfied with
after sales of Products due to huge rush at Outlet centres.
54% of the people feeling that Price of Heritage Foods India Ltd is same comparing to others

X. CONCLUSION
Among the communication options about customer awareness there is significance difference.
HERITAGE is maintaining a good position in the market among its competitors.
Almost customers preferring brand and price in buying FMCG.
Among the customer perceptions about HERITAGE is significance difference. Most of the customers feel
happy and satisfied with it.
Most of the customers satisfied with HERITAGE Outlet service also.
Most of the customers rated the service is Above average
Most of the respondents are feeling comfort and convenient.

XI REFERENCES
Principles of Marketing : Philip Kotler & Gary Armstrong
Marketing Research : G.C.Beri
Consumer Behavior : Leon G. Shiftman
Services Marketing : Adlarian Palmer
Journals : ICFAI General of Marketing
: Retail Marketing

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 149
NCRASEM 13 Paper ID:MBA02

BRAND IMAGE OF TOYOTA


TOWARDS DOBRO TOYOTA
CH.R.S.CH.MURTHY, Asst.Professor,
School of Management Studies, Sreenidhi Institute of Science and Technology, Ghatkesar, Hyderabad,
Andhrapradesh, Email : chodisetty.b4u@gmail.com, Mobile No : 7396957328, 9989199668.
K SREENIVASA CHARYULU, Asst.Professor,
School of Management Studies, Sreenidhi Institute of Science and Technology, Ghatkesar, Hyderabad,
Andhrapradesh, Email: asksreenivas84@gmail.com, Mobile No: 7386570304.

Abstract: Marketing is one of the most important assets of the organization, which brings success to the organization. In
marketing so many attributes involved, but BRAND NAME of a product is valuable attribute. Brand represents
customers perceptions and feelings about a product and its performance. This study is undertaken to the customer
requirement of Toyota group which was gained immersed confidence of its customer. Toyotas Moto is Putting
Customer is First. The objective of this study is to know the level of BRAND IMAGE of Toyota cars and why the
customers prefer to the Toyota. And the questionnaire is used as a source to gather information about Toyota from the
respondents. However this project is subject to some limitations like the time, it is limited to during 45 days only, and the
study was restricted to Hyderabad & Secunderabad only. The study has able to find that most of the people aware of
Toyota brand, most of the people satisfied with the service provided by Toyota showrooms; they are very much interested
in purchasing their vehicle from Toyota motors. Looking at which it has been suggested that the Toyota company to
introduce a new model of car which has low price and attracts middle class people. In this competitive world DOBRO
TOYOTA should provide new offers and new discounts to the customer to increase their market share. This project
concludes that the Toyota motor should not loose their existing customers, increase their customers with providing upto
date information about the products of Toyota. Invite to new model launches, provide various model price lists, and
should maintain good relationship with customers.

Keywords: Separation, impact on organizational climate Morale.

I.INTRODUCTION
Branding helps buyers in many ways. Brand names help consumers identify products that might benefit them.
Brands also tell the buyer something about product quality. Buyers who always buy the same brand know that they
will get the same features, benefits, And quality each time they buy. Branding also gives the seller several
advantages; the brand name becomes the basis on which a whole story can be built about a product special qualities.
Building and managing bands is perhaps the marketer most important task. Will discuss branding strategy in more
details I the below.
DEFINITION OF BRAND:
A name, term, sign, symbol or design or a combination of this intended to identify the goods are services of one
seller or group of sellers and to differentiate them from those of competitors.
BRANDING STRATEGY:
Some analysts see brands as the major enduring asset of a company, outlasting the companys specific products
and facilities. John Stewart, co founder of Quaker oats, once said, If this business were spilt up , I would give you
the land and bricks and mortar, and I would keep the brands and trade marks, and I would fare better than you.
Brands are more than just names and symbols, brands represents consumers perceptions and feeling about a product
and its performance-- everything that the product or service means to consumers. As one branding expert suggests,
Ultimately, brands reside in the minds of consumers. A powerful brand as high brand equity. Brand equity is the
positive differentials affect that knowing the brand name as on consumer response to the product or service. A
measure of a brands equity is the extent to which customers are willing to pay more for the brand. A brand with
strong brand equity is a very valuable asset. Brand valuation is the process of estimating the total financial value of
brand. High brand equity provides a many competitive advantages. A powerful brand enjoys a high level of
consumer brand awareness and loyalty. Because consumers expect stores top carry the brand, the company has more
leverage in bargaining with resellers.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 151
NCRASEM 13 Paper ID:MBA02

BUILDING STRONG BRANDS


Building poses challenging decisions to the marketer. Figures shows that the major brand stagy decisions
involve brand positioning, brand name selection, brand sponsorship and brand development.

Brand Positioning Brand name selection Brand sponsorship Brand development

Line Extensions
Manufactures Brand
Attributes Selection Brand Extensions
Private Brand
Benefits Protection Multi Brands
Licensing
Beliefs and values
New Brands
Co branding

MANAGING BRANDS:
Companies must carefully manage their brands. First, the brands positioning must be continuously communicated
to consumers. Major brand marketers often spend huge amounts on advertising to create brand awareness and to
build preference and loyalty.
II. LIMITATIONS

As the time given for the completion of the project was limited.

The survey was restricted to Hyderabad and Secunderabad only.

They may be few opinions which might have been missed out.

III. OBJECTIVES OF THE STUDY

To study about the four wheelers.

To study about the TOYOTA products.

To know about the brand image of TOYOTA.

To know about the valuable attributes of four wheeler.

To know the performance level of TOYOTA products.

To know about why the customer like this car.

Are they happy with the service?

To know about what customer needs and what the company is providing.

IV. HYPOTHESIS

The following hypotheses have been chosen to achieve the stated objectives of the research.

1. Null Hypothesis (o): There is positive effect on Organizational climate


At Infosys Software Services.
2. Alternative Hypothesis (1): There is negative effect on Organizational climate
At Infosys Software Services

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 152
NCRASEM 13 Paper ID:MBA02

V. METHODOLOGY

Research methodology is the specification of the method of acquiring the information needed to the structure or to
solve the problem at hand. It is the pattern of the framework of the project that stipulates what information is to be
collected, from which source and by what method.
PRIMARY SOURCE DATA:
A questionnaire was prepared helped in gaining an insight view of the factors effecting the customer needs and
related issues. The addresses of various customers were given and with the help of the questionnaire prepared, I
need to find out the first hand information regarding the share of the Toyota in every segment in the market and the
satisfaction level of each customer. Further I need to find out the future plans of the customer regarding the purchase
of the Toyota products. Each day I met 5 customers for 4 weeks the sample size of 100 respondents was decided
upon. Any problem and issues were noted and were informed to out guide later.

SECONDARY DATA:
Secondary data is the annual report of the company and the official.
RESEARCH INSTRUMENT:
The questionnaire is fully structured. The field work was carries for a period of 2 months. The approximate time
taken to fill a questionnaire is two to three days. To study the opinion of the respondents towards engagement in
organizational policies, a five-point scale (Strongly agree, Agree, Neither agree or nor disagree, Disagree, Strongly
disagree) is adopted to study the relationship and variation of respondents.
Statistical Techniques used for Analysis
The data is analyzed by using Mean, Standard Deviation, Coefficient of Variation and Coefficient of correlation.
The methodology adopted for collecting the primary data is through questionnaire method. Questionnaire is
designed using objective type questions mostly of multiple choices, keeping in view the time availability at the
disposal of the decision maker. Questions designed are simple and specific, to generate response according to the
objectives. Questionnaire is arranged in a logical order, logical to the respondent and proper care has been taken to
avoid ambiguity in responses and at the same time enabling the respondents to answer the questions easily and
quickly with the time available at their disposal.

SAMPLING
SAMPLING PROCEDURE: The sampling technique use here was Quota Sampling, which is one of the most
commonly used non-probability sample design.
SAMPLING UNIT: The target population from which the sample is chosen is owners of all brands of cars.
SAMPLE SIZE: The sample of 100 from the target population was chosen.
ANALYSIS: The data collected in form of questionnaires was tabulated and analyzed using basic Statistical method
percentages.
VI. RESULTS AND DISCUSSIONS

1. What are the valuable attributes you normally look while purchasing a Four Wheeler?

Attributes Percentage of preference of


attribute
Design 10
Quality 15
Price 8
Brand Name 40
Comfort 12
Service 10
Performance 5

INTERPRETATION:

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 153
NCRASEM 13 Paper ID:MBA02

From above pie chart it can be stated that people give preference 40% to brand name,15% to quality,8% to
price,10% to design, 12% to comfort,10% to service,5% to performance.

2. You heard about the Toyota vehicle through?

source percentage Heard about Toyota


1
Friends 40 2 0 4
0 % 0 FRIEN
Advertisements 24 % % D

Tele call 6 6
% 2
Event 20 4
%
Consultant 10

INTERPRETATION:
From the above we can state that 40% people heard about the Toyota vehicle through friends, 24% through
advertisements, 6% through tele call, 20% through event and 10% through consultant.
3. When did you intend to purchase your next car in Toyota?

Duration Percentage of people


6 months 30
1 year 40
1-2 years 20
No plan 10

INTERPRETATION:
From above pie chart it can be stated that the percentage of people who are planned to purchase their next car in
Toyota with in 6 months is 30%, with in one year is 40%, with in one or two years is 20%. And 10% of people not
yet planned.

VII. FINDINGS

From the survey about the people who have own cars I found that 50% of the people having Toyota
cars,10% of the people having Honda cars,12% of the people having Hyundai,13% of the people having
Maruthi Suzuki and 15 % of the people having other cars. Hence, we can say that most of the people
having Toyota cars.
From the survey I found that most of the people giving preference to brand name of the company then they
look for quality and service. And giving least preference to price.
From the survey about the people who having Toyota cars, most of the people having Innova because it can
be used for multi purposes. Then Qualis and Corolla. But less people having Camry cars.

VIII. CONCLUSION

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 154
NCRASEM 13 Paper ID:MBA02

This project concludes that the Toyota motor should provide lowest price of cars for the sake of increasing sales &
increasing Toyota motor market. In Andrapradesh, there are two types of Toyota showrooms in Hyderabad. These
are Dobro Toyota & Harsha Toyota. Compare to Dobro showroom Harsha Toyota provide special offers to the
customers to increase their market position in the competitive world. Toyota Kirloskar motor company ready give
another dealership in Hyderabad. Thats why Dobro Toyota showroom tries to attract new customer to give new
offers & better discounts to them. Dobro Toyota gives advertisements using electronic media& print media to
increase their sales. And also provide new events & better after sales service to the existing customers. Already
Dobro Toyota is having well brand image in the automobile market.

IX.REFERENCES

MAGZINES:

Financial express

Business line

Economic times

WEBSITES:

www.google.com

www.toyotaindia.com

www.dobrotoyota.com

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 155
NCRASEM 13 Paper ID:MBA03

IMPACT OF ADVERTISEMENTS ON
CHILDREN
E.DIVYA MADHURI
DEPARTMENT OF MANAGEMENT IN BUSINESS ADMINISTRATION
RISHI UBR PG COLLEGE FOR WOMEN (Nizampet,Hyd)
EMAIL ID:divyamadhury@gmail.com
Mobile No: 9030567043

Abstract: Todays children are unique in many ways from previous generations, but perhaps the most influencing on our
young children today is Television advertisements. "In 1997, the nations estimated 34 million children age 12 and under
will have spent or influenced spending of a record $500 billion" (Horovitz 1997). There is obviously a great deal of
interest in this subject, many books have been written, and many studies and reports done on the effects of TV
advertising on children. In the following paragraphs we will look at some of the reasons why we advertise to children,
some different positive and negative effects of TV advertisement on children, how people can cut through the hype of TV
ads and pick good things for their children.

I .INTRODUCTION
NEED OF ADVERTISING:
The ad-filmmakers are formulating fresh ways of enticing the consumers to buy their products. If an advertisement
for a product attracts the consumers, they tend to purchase it frequently or at least give it a try. If a company has to
survive in this competitive world, it has to project the image of its products in such a way that, they pick up the
maximum sales, when they hit the stores. The best way to persuade the consumer to buy the product of a particular
brand, out of the numerous choices available in the market, is attractive advertisement. These advertisements
familiarize kids with the latest products in the market and inculcate some good habits in them, such as, the ones
related to dental hygiene. However, the ad-filmmakers should remember that the commercials can also have
negative impact on people, especially the young children. In this article, we have presented some of the most visible
effects of advertising on children, positive as well as negative.
WHY DO WE ADVERTISE TO CHILDREN?
Today, everywhere we go we see some type of advertising. A sale at the supermarket or a billboard for a radio
station, are two of the many forms of advertisement. Currently, advertisements that target children are very
controversial. Marketers choose children because they can easily lure them in. Advertisers spent $105.97 billion in
1980. This number more than doubled in 2001 when it reached $230 billion (Laws, 2003). In the year 2000, the
Census reported 105 million househ0olds in America, meaning advertisers spend an average of $2,190 on one
household per year. Advertisers spend this much money because of television. The average child sees an estimate of
more than 20,000 commercials every year - that works out to at least 55 commercials per day (Laws, 2003).
Children will insist their parents purchase what they see or hear on television. In the 1960's, children had an
influence on about $5 billion of their parents purchases. That figure increased to $50 billion in 1984 and tripled to
$188 billion in 1997. James McNeal, a kids marketing expert, estimates children twelve and under will influence
$500 billion of family purchases by the year 2000 (Laws, 2003). Children don't just have their parents buy their
toys, but they make purchases of their own. Children's spending has roughly doubled every ten years for the past
three decades, and has tripled in the 1990's. Kids ages 4 to 12 spent $2.2 billion in 1968 and $4.2 billion in 1984. By
1994, the figure climbed to $17.1 billion and by 2002, their spending exceeded $40 billion. Kids direct buying
power is expected to exceed $51.8 billion by 2006 (Laws, 2003). No matter how you look at it, advertisers choose
children because they are the most easily influenced and will spend their money if they find something interesting.
Only Good Things Happen When You Advertise to Kids:
There are not many people in the world today that would disagree with the fact that children are our future. Children
are the ones that must carry on family traditions, continue to build and develop new public projects, and continue to
learn and expand the knowledge of the human race. With that said it is important to understand that children are also
future consumers. They are the engines that will drive the economy for the next generation, for advertisers the future
is now. Advertising to children has long been a very successful way to build a solid consumer base that will win the

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 157
NCRASEM 13 Paper ID:MBA03

minds of children in order to secure a lifetime of consumer purchasing. It may sound heartless but the fact is it
works, and advertising to children is big business. people must understand that the advertisers motive is to sell a
product. It is easy to see how directly advertising to children can generate huge profits for companies, there by
helping our economy. It is not permitted to one country, it is a global business strategy, the European Union
estimates to generate between $620 to $930 million a year in revenue from marketing products to children. NAG
FACTOR:
Advertising to children does not only bring in funds from the children but more importantly, it generates what
experts call The Nag Factor. The Nag Factor is when a child sees an ad for a product then cries and complains
to a parent until the parent purchases the item. Over half of all families have reported to agree with a childs request
just to avoid an argument. Over the last five years, theres been a substantial increase in the amount of influence kids
have on durable goodscars, boats, big-ticket items.
II.IMPACTS OF ADVERTISEMENT
Positive Effects of Advertisement on Kids:
Advertising makes the kids aware of the new products available in the market. It increases their
knowledge about the latest innovations in the field of technology.
Convincing advertisements, which center around healthy food products, can help improve the diet of a
child, if they are attractive enough.
Certain advertisements, with strong messages motivate the kids in chasing their future prospects such as
becoming a doctor, scientist or an engineer. They generate the passion in children, regarding their future
and makes them realize the importance of education.
Some advertisements inculcate good habits in children, as all the toothpaste companies create strong
awareness regarding dental hygiene in kids.
Negative Effects of Advertisement on Kids:
Advertisements encourage the children to persuade their parents to purchase the products shown in the
commercials, whether useful or not. The little ones tend to get adamant to buy the product.
Children often tend to misinterpret the messages conveyed in commercials. They overlook the positive
side and concentrate more on the negatives.
Many advertisements in the present times include dangerous stunts, which can be performed only by
experts. Even though, the commercials broadcast the statutory warnings with the advertisement, the kids
often try to imitate the stunts at home, with fatal results.
The flashy advertisement broadcast in television generates impulse shopping in children.
Children, after watching the glitter of commercials, often lose the ability to live a life without materialistic
joy. Gradually, they get used to a lifestyle which is reflected in television and other media.
The kids usually get more attracted towards the costly branded products, such as jeans and accessories.
They disregard the inexpensive, but useful, ones that are not shown in the commercials.
Advertisements have an indirect effect on the behavior of children. They might develop temperamental
tantrums, when deprived of the latest toys and clothes that are shown in the commercials.
The personal preferences in clothing, toys, food and luxuries of children are altered by the advertisements,
to a great extent.
Junk foods, such as pizzas, burgers and soft drinks, are heavily promoted during children's programs. This
develops a craving for fatty, sugary and fast foods in kids, thereby affecting their health adversely. These
unhealthy eating habits lead to diseases, such as obesity. It even influences the way the kids think about
the actual taste of food.
The advertisements shown in the television are sometimes related to the use of tobacco, alcohol which
adversely affects the kids. It makes the perception that, drinking beer makes you a cool person. The
vulnerability of the kids towards these advertisements is a major concern.
Advertising may affect the self-esteem of kids, as they feel inferior to others if they do not possess an
endless array of products which are shown in the television.
Some of the advertisements portray women as sex objects through flashy images, which creates a bad
impact on the children.
Almost all the advertisements do not convey the message clearly or children fail to comprehend the
complete information. This can have an adverse effect on the children.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 158
NCRASEM 13 Paper ID:MBA03

As more and more commercials are becoming animated, there seems to be hardly any difference between
the real life and TV advertisements. As a result, children are unable to understand the difference between
real world and fantasy. Thus, these advertisements distort the sense of reality of kids.
Studies have shown that, those kids who watch fast-paced television advertisements find it difficult to do
tasks that take a much longer time, such as solving puzzles and reading.
The more time children spend glued to television commercials, the less time they get to socialize, play, read and
exercise, which are essential for the overall development of the kids.

III.MEDIA VIOLENCE AFFECTS CHILDREN


Over the years there has been an increasing amount of violence in media directed towards children. There have
also been an increasing number of violent acts directed toward children and the high degree of these acts that
children see on television, in movies, computer games, videotapes, and the large number of violent toys. It
increasing the number of violence endangers children from growing up in a mentally stable way.
I came up with three consistent problems when children watch television violence:
Children will notice others pain less, they may become scared of things in the world they live in, and they are
more likely to show aggressive behavior towards other people. When children see violence all around them in
media, they will feel that violence is the answer when they are angry or disturbed. We have to start putting limits on
the amount of violence put on television during the time when children will most likely be watching. They also
would like to limit the amount of advertising on television during these times, so that kids can tell the
advertisements and the television show apart. Teachers and parents can help get rid of the amount of violence that is
shown to children. Teachers can help teach children that television is not real and that violence should not be the
answer to solve problems. Parents can regulate the television shows that they are allowing their children to watch
and make sure they are not watching shows that teach them violence.
The problem of violence shown to children in the media will not be solved easily. This violence doesnt only show
how violent our society is, but it helps make our society more violent. If we continue to allow the violence on
television that is consistently shown to our children, then our future nation will have a large quantity of angry adults
and criminals.
HOW ARE YOU SUPPOSED TO CHOOSE GOOD CHILDREN TOYS?
There are so many toys out there for children to play with, but how do you decide if it is a good toy or a bad toy?
You can always read the box and try to get some idea what the toy does before giving it to your child, but how do
you know if that will be enough? There are a lot of ways you can look at this, but when it comes down to it there are
more and more toys being made everyday that can influence the way your children think or even act. Toys is an
object for children to play with. But today a child can play with anything from a piece of paper to a computer. How
are we supposed to decide what would be best for them? I feel that homemade toys are the best for children because
they feel it increases creativity among children under the age of five. Also you can observe your child playing with
and making the toy. This way you know exactly what is in the toy and that nothing harmful can come from the
product they produce. Personally, I feel that you should use your best judgment on something good for your
child. A toy can only be safe if you make it safe and provide the right kind of teaching for your child to understand
how the toy is used. There is not a really a right or wrong answer, but just to use your best judgment and know that
you taught your child how to play correctly.
IV.CONCLUSION
In the preceding paragraphs, we have seen some of the reasons why we advertise to children, some different positive
and negative effects of TV advertisement on children, how people can cut through the hype of TV ads and pick good
things for their children. Infants, toddlers, and preschoolers are spending far more time watching DVDs and clicking
remote controls and computer mice than reading books.The effect of such high-intensity media exposure is unclear,
researchers said, but what is clear is that the under-6 set is becoming far more media savvy than anyone expected.
The children are our future and an important part of the present as well. We must understand the importance of a
childs role in todays world and todays economy. Advertising to children has long been a part of the free market
form of society and must be embraced as another part of a complex economic engine that runs day and night to
provide a better life style for us all. Advertising to children generates jobs, injects money into the economy, and
instills in children at a young age the importance of the freedom of choice. It also develops a childs ability to
understand the value of a dollar and teaches them that individuals can achieve anything if they are willing to pay the
price.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 159
NCRASEM 13 Paper ID:MBA03

V.REFERENCES

National Association for the Education of Young


Children.(2003), Available online: http://www.naeyc.org

Kilbourne, Jean. (2003) Own this Child Available online:


www4.cord.edu/english/stevier/ho--feb17_sample_essay3_draft_outline.htm

Wesolowsky, Tuck (2003)Advertisements target young children Available online:


www.rferl.com/nca/features/2000/03/F.RU.000316151205.html

Horovitz, Bruce. (December 18, 1997). "Cashing in on kids Retailers in search of customers for life," USA Today, PA 1A.

Dumont, Pascaline. Temptation-free Television for Children? UNESCO Courier 54. 9 (2001) : 44

McDonald, Marci and Lavelle, Marianne. Call it Kid-fluence. U.S. News & World Report 131. 4 (2001) : 32

Pine, Karen J and Nash, Avril. Dear Santa: The Effects of Television Advertising on Young Children. International Journal of Behavioral
Development 26. 6 (2002) : 529

Children and TV advertising: Nowhere to run, nowhere to hide. Journal of Developmental & Behavioral Pediatrics, 22, 185. Education Digest
(2000, January).Junk-food marketing goes elementary

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 160
NCRASEM 13 Paper ID:MBA04

LEADERSHIP
K.LAXMI PRIYANKA
Department of management in business adminstration
Rishi ubr p.g college for women
Priyanka.kottur@gmail.com
8466887703

M.HIMA BINDU
Department of management in business adminstration
Rishi ubr p.g college for women
Bindu.marri@gmail.com
9000199504

Abstarct: The Leadership Abstracts series began in 1988 with the intention of providing brief, useful articles focused on
the needs of community college leaders. Advice on performing essential leadership tasks, solutions to common problems,
descriptions of model programs, and applications of leadership theory are the general thrust for the pieces, with an edge
given to high-value, cutting-edge material presented in a clear and organized format. While there are many ways to
approach the task of preparing a manuscript for Leadership Abstracts, what follows are some suggestions that should
help prospective authors.
I.INTRODUCTION
The purpose of the Introduction to Leadership Skills for Crews course is to teach crew members with leadership
positions about their new roles and how to most effectively reach success in that role. It is intended to help Ventures
in leadership positions within their crew understand their responsibilities and to equip them with organizational and
leadership skills to fulfill those responsibilities. Introduction to Leadership Skills for Crews is the first course in the
series of leadership training offered to Ventures and is a replacement for the Venturing Leadership Skills Course.

DEFINITION: "Leadership is a function of knowing yourself, having a vision that is well communicated, building
trust among colleagues, and taking effective action to realize your own leadership potential." - Warren Bennie
Innovation distinguishes between a leader and a follower Peter North defines leadership as a process whereby an
Individual influences a group of individuals to achieve a common goal. Leadership is lifting of mans vision to
higher rights, the raising of mans performance to higher standards ,the building of mans personality beyond its
normal limitations. These definitions suggest several components central to the phenomenon of leadership some has
follows:
Leadership is a process
leadership involves influencing others
leadership happens within the context of a group
leadership involves goal attainment &
These goals are shared by leaders and their followers.

II.OBJECTIVES OF LEADERSHIP
Leadership is the process of leading individuals as a group to achieve a common objective. The objectives of
leadership are geared toward bringing out out the best in employees by communicating effectively about what needs
to be done and why it matters.

Pursuing a Common Goal: Organizing employees depends on clearly communicating both the big
picture objective, such as growing a business, as well as the concrete, immediate goal such as meeting
a sales goal for a particular item or service.
Organizational cohesiveness: Effective leaders pursue the objective of making an organization into a
cohesive whole aimed at achieving its short and long-term objectives. In addition to presenting these
objectives clearly to employees, effective leaders also evaluate their organizations' policies and image
to ensure that they effectively embody its mission and its message. Everything from the physical signs

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 161
NCRASEM 13 Paper ID:MBA04

communicating company identity to the speed at which the business pays its bills should be consistent
with the overall mission.
Motivating employees: Motivating employees is a key leadership objective. A successful leader will
get to know his workers and learn what it takes to bring out the best in each individual. This involves
the interpersonal process of making employees want to apply themselves completely, and also
understanding individual learning styles and giving individuals the tools and the guidance they need to
acquire necessary

THE GREAT LEADERS OF OUR COUNTRY

HOW LEADERSHIP INFLUENCE ORGANISATIONAL CULTURE?


A leader can have a major impact on an organization's success. Employees look to the leader for guidance, and the
public sees the leader as the visible face of the organization. Thus, a leader's behavior can positively or negatively
impact the organization, from employee performance to the organization's reputation.

HOW LEADERSHIP IS ENFORCED IN GOOGLE COMPANY?

STRUCTURE OF LEADERSHIP IN COMPANY

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 162
NCRASEM 13 Paper ID:MBA04

LEADERSHIP AT GOOGLE:
Google has, for a long time, had the world-wide reputation for being a great place to work. The in-work benefits,
conditions of service and perks have become legendary in the world of human resource management, with
innovative approaches to creativity, reward and the working environment. As the organization grew however, the
traditional problems of managing a large organization began to creep in and Google appeared to be losing its
Competitive advantage in attracting and retaining top talent. So they decided to do something about it, starting
with the wealth of resource that they already had their own data.
Re-visiting thousands of appraisal documents, feedback surveys, recruitment records and exit interviews, Google
identified that the biggest single issue it had to face in terms of talent management and retention was............? You
guessed it - their own managers and leaders. The company discovered that the single biggest reason for employees
leaving the company was the quality of their managers. Google was able to establish That poor managers were
directly and negatively affecting employee performance and satisfaction, whilst good managers had better
performing, Happier and more stable teams. With an enormous amount of data to analyze, the company set about
interpreting statistical and written information to try to trend where managers were going wrong, or doing right. The
name they gave to this enormous project was Project Oxygen a reflection of their recognition of the need to
refresh their managerial stale blood. The findings of Project Oxygen were turned into a framework for coaching
And supporting managers within Google. The eight-point framework for Leadership qualities, devised from the
internally generated data and used with

All managers are simple in its concepts:

Be a good coach by providing specific feedback and solutions, balancing negative and positive.
Dont micromanage but give your team challenging assignments and freedom in completing them.
Show interest in their general wellbeing.
Be productive and results-oriented by using your position to help your team achieve what they want.
Communicate and listen to everyone concerns.
Help your team-members with career development.
Have a clear vision and strategy.
Have the technical skills to help the team when necessary.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 163
NCRASEM 13 Paper ID:MBA04

III.CONCULSION

Googles Leadership Development and Compensation Committee keep the compensation of managers in check and
broadly work to entice and retain good employees (Google, 2008).However, right now the top management has
already taken the proactive step.

IV.REFERENCES

Big Dog & Little Dog's Performance Juxtaposition: Concepts of Leadership


Leadership by Objectives: 12 Steps to Organizational Transformation
Psychology Today: 7 Things Successful Leaders do Differently
Abrams, M. (1985). New Perspectives 17(2), 15-18.
Anderson, S.E. (1992). Building collegiality: Innovation vs. school improvement approach. The Canadian School Executive, 12 (1), 3-
8.
Anderson, J. R., Redder, L. M., & Simon, H. A. (1996). Situated learning and education. Educational Researcher, 25(4), 5-11.
Atkinson, T. S. (1998). Were not just whistling Dixie: Policymakers perspectives on state education reform. Education. Greensboro,
University of North Carolina.
Baker, E. (2002). Validity issues for accountability systems. University of California, Los Angeles.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 164
NCRASEM 13 Paper ID:MBA06

ROLE OF WOMEN IN ADVERTISEMENTS IN


MODERN ERA
M.LAVANYA, Asst.Professor,
Department of Management Studies, Turbomachinery Institute of Technology and Sciences, Indresham,
Patancheru, Hyderabad, Andhrapradesh, Email : lavanya_1125@yahoo.com, Mobile No : 8121784219

Y.SANTOSHI, Asst.Professor,
Department of Management Studies, Turbomachinery Institute of Technology and Sciences, Indresham,
Patancheru, Hyderabad, Andhrapradesh, Email : y.santoshi21@gmail.com, Mobile No : 9948998864

Abstract: Many scholars have given their various opinions about women in advertisements. In India from 1970s women
in advertisements has increased tremendously. Since then it is argued that women are displayed in advertisements as
stereo type, dependent, hardworking home maker and as sex objects for boosting the sales. But off late Indian advertising
has witnessed a drastic transformation in advertising as many commercial and non commercial advertisements portrays
women in positive way i.e., independent, assertive, enjoying life and career women. Now women are considered as an
important element in purchase behavior. This article emphasis on depicting the role of women in advertisements with
emerging status of women in Indian society.

I.INTRODUCTION
Advertising bridges the communication gap between the producer and the prospective buyer. It as multi dimensions,
serving as a form of mass communication, a powerful marketing tool, a component of the economic system, a means
of financing the mass media, a social institution, an art form, a field of employment and a profession.(
Chunawall.S.A,sethia.K.C,1997) However, the mere transmission of an advertising message by an advertiser does
not signify that the advertiser has communicated with his audience. His audience must see the advertisement; they
must pay some attention to it. They must also understand and comprehend what is being conveyed; and lastly the
purchase behavior of the target audience should get influenced and shaped in favour of the advertised offer. Only
when these requirements are met, the advertiser succeeds in his communication mission. Therefore, an advertiser
has to necessarily know the intricacies of buyer behavior and what type of media will carry his message successfully
and economically to wide sections of his target audience.
Advertising, it is said is as old as the Christian era. One of the first known methods was outdoor signs
(painted on walls and eye catching). Even signs in the ruins of Rome and Pompeii have been found by the
archaeologists that advertised travelers to go to a tavern situated in another town. Around 1440s, printing press was
invented which was moveable type of advertising. In the 16th century, some organizations had a trademark with 2 or
3 dimensional picture or sign. Mail order and pamphlets appeared around 1870s. During late 19th century, many US
firms began to market packaged goods under brand names. The first product that had brand names was soap. In
1880s, a few brands in USA came out and they were Ivory, Pears, Kirks American Family and packers. It was once
said, the person who saves money by not advertising is like the man who stops the clock to save time. Advertising
is one of the most important and the most expensive functions of marketing. According to Mike T Bendixen (1993),
advertising represents an important means by which organizations communicate with their customers, both current
and potential. It is meant that advertising helps the companies to send message regarding the product to the target
market. Mass Communication media in India, like every modern and advanced country, comprises of the radio, the
film, the television, the press, publications and advertising besides traditional media. The magic persuasiveness of its
visual presentation and its admitted superiority over other media for propagation of social and economic objectives
have together placed the television in India with great priority. Besides the Prasar Bharti owned Doordarshan, now
we have around one hundred T.V. Channels which provide news, music, films, serials, sports, religious preaching,
and education and so on. During the phases of economic liberalization in last one and half decade, the overall
scenario of media in India has changed tremendously. The depiction of Women in Indian media, be it films,
television serials, news, media, visual advertisement, or modernized traditional media, is indeed an area of great
concern for people having interest in social science research and studies..

II.REVIEW OF LITERATURE

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 165
NCRASEM 13 Paper ID:MBA06

Over the years, a very extensive volume of literature has taken shape on the subject of advertising. In last four
decades, the expansion in literature on the subject has been so tremendous that advertising has evolved into a
separate full-ledged field of study. Research shows that during 1900-1990, around 500 books on the subject have
been written covering various dimensions of advertising such as social, economic and psychological ones. These
books also examine the communication task involved in advertising as well as ethics of advertising. People engaged
in different disciplines wrote on the subject. Works on advertising, treating it exclusively as a commercial or
management subject started rather recently, perhaps from 1950s onwards. Authors like Neil Borden, Martin
Marshall, Boyd and Newman, and Aaker and Myers, treated the subject essentially as management and marketing
tool. Advertising, it is said is as old as the Christian era. One of the first known methods was outdoor signs (painted
on walls and eye catching). Even signs in the ruins of Rome and Pompeii have been found by the archaeologists that
advertised travelers to go to a tavern situated in another town. Around 1440s, printing press was invented which was
moveable type of advertising. In the 16th century, some organizations had a trademark with 2 or 3 dimensional
picture or sign. Mail order and pamphlets appeared around 1870s. During late 19th century, many US firms began to
market packaged goods under brand names. The first product that had brand names was soap. In 1880s, a few brands
in USA came out and they were Ivory, Pears, Kirks American Family and packers. It was once said, the person
who saves money by not advertising is like the man who stops the clock to save time. Advertising is one of the
most important and the most expensive functions of marketing. According to Mike T Bendixen (1993), advertising
represents an important means by which organizations communicate with their customers, both current and
potential. It is meant that advertising helps the companies to send message regarding the product to the target
market.
OBJECTIVES OF THE STUDY:
To study the changing role in Indian advertisements
To study how the women are depicted in present scenario.
To study whether women role is considered important in purchasing decision or not.
To study the impact of advertisement on respondents.
To study how women should be depicted in future advertisements.
To study whether changes are necessary in Indian advertisements
To study the role of ASCI in preventing the misleading the advertisements and whether more reforms have
to be made by ASCI.
III.METHODOLOGY
Research Methodology is a way to systematically solve the research problem involving a study of various steps that
are adopted by the researcher in studying his/her research problem. Two methods have been and will be used to
collect data. 1. Primary data 2. secondary data.
Primary data:
There are several methods of collecting Primary data. These are given below.
1. Observation method
2. Interview method/Interaction Questionnaires when an investigator uses the data that has been already collected by
others is called Secondary Data.
The secondary adapt could be collected from Journals, Reports and various publications, web sites. The advantages
of the secondary data can be- it is economical, both in terms of money and time spent. Secondary Data Sources are
Websites/Internet, Business Magazines, and Newspaper Articles

IV.HIERARCHY OF EFECTS MODEL


Lavidge and Steiner created a model to measure advertising effectiveness based on a classic psychological model
that classifies behaviour into three categories-
a. The cognitive component is the intellectual, mental or rational states .
b. The affective component is emotional or feeling states.
c. The motivational component is the striving status, relating to the tendency to treat objects as positive or negative
goals.
The cognitive component involves both aspects of awareness and perceptions relative to the dimensions of recall,
information, believability, and comprehension. The affective component deals with consumers feelings toward a
product. The motivational component relates to consumers convictions and buying intentions.

The realm of emotions Ads change attitudes and feelings

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 166
NCRASEM 13 Paper ID:MBA06

Cognitive The realm of


Awareness
Stages thoughts
Knowledge
ads provide
information

The realm
Liking Affective
of emotion
Preference stage
ads changes
Conviction
attitudes &
feelings

The realm
Behavioural of motives
Purchase stage ads stimulate
or direct desire

Adapted from: George E Belch & Michael A Belch, 2001


Advertisement is a powerful medium designed to sell products, aspirations and communicate concepts of acceptable
behavior and gender roles. The repetition of Television commercials day after day, though boring to the adults
leaves All advertisements by and large (mainly on T.V)depicts sports, work situations as mans existence and as a
womans world hardly is a woman shown as an equal partner who is employed and a person of her own will. The
question of womens portrayal on T.V has been a matter of debate for considerable time now, hence the present
study entitled perception of adolescents regarding the portrayal of women in commercial advertisements on T.V
was conducted with the objectives, to ascertain the responses of the adolescents regarding the image of women in
advertisements on T.V and study the impact of commercial advertisements on adolescents with special reference to
the images and role portrayal of women. The results of the study revealed that advertisements left an impact on both
the genders. It affected the consumption pattern of both the respondents. The presence of female model in the
advertisement also influenced the liking of a particular product. Fashion statement of girls was also influenced by
advertisements whereas boys felt that whenever a beautiful model is screened in an advertisement, it stays on their
mind for long period of time. Presence of film personality influenced the liking of both boys attention to that
particular advertisement. Regarding the views of the respondents about stereotype image of women in
advertisements, majority of both girls and boys felt that advertisement depicts women in stereotype roles and that
the advertisements are not representing the personality of Indian women. After having an informal discussion with
the respondents, it was found that the respondents wanted to see women in different kind of roles in the future
advertisements. They were of the opinion that advertisements should be more educative, informative and product
oriented, it should be family oriented and should contain a bit of humor in it. Respondents suggested that women
should be presented in different roles; she should not be projected only as product user but also as product maker. In
advertisement portrayal of women should not be vulgar and the product should be given more emphasis than the
female model. Majority of girls wanted women to be shown as confident, independent and empowered individuals
in future advertisement, whereas, boys felt that women should be projected in fashionable and glamorous roles.

Depiction of Indian women role in advertisement since 1970 to today Women in 1970s:-
Often as dependents requiring men to solve their problem with no individuality of their own.
Women in 1980s:

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 167
NCRASEM 13 Paper ID:MBA06

This was new beginning in advertising add like Lalita ji (surf add) bring women as independent individual. Women
in 1980s consider as independent individuals for example Lalita ji.
Women Of 1990s:
Women in the 1990s were shown in following ways
In place of washing clothes with their hands and brush they were shown soaking clothes. Women stepping out of
the house and beyond. They were seen more bold ( This could be because of the controversy arose when super
model Melinda So man posed nude with madhu Sapre, This was turning point in the history of Indian advertising.
Women of Today :
Women now plays different role in advertising like, Decorative role, Recreational role, Independent Career role, Self
Involved role, carefree role, family role. Even Ads like Amul macho, Aviva life insurance, Honda Pleasure.etc
showing women empowerment.
Let us have a glimpse on some of the advertisements being shown on Indian Television.
1. HERO HONDA PLEASURE (Why should boys have all the fun)- This advertisement advocates women
empowerment. Here a flock of girls is shown which epitomizes group will and freedom of movement. Today women
have stepped out, realizing their potential in fulfilling their dreams and for them, driving a vehicle is one of the
symbols of liberty and fun. This ad completely breaks the notion that outdoor fun is only a domain of men.
2. ICICI PRUDENTIAL LIFE INSURANCE (Jeetey Raho)- In this advertisement, a young couple is seen where a
wife asks husband to sign the life insurance papers. In the next frame, she cleverly and logically explains the
benefits of taking insurance. This advertisement projects a progressive change in our society where the woman is
accepted as the chief catalyst in taking financial decisions.
3. ARIEL DETERGENT (Ariel ki safai do khusboo mein aaye)- This ad uses the slice of life concept where has
returned home from work and comes across a message from his wife that she would be late from work. He then
prepares dinner and drops some curry on his shirt and washes it himself. This advertisement has broken the myth
that only women are supposed to do household work.
4. ASMI DIAMOND JEWELLERY (I believe in me)- Kajol is viewed as a woman who is traditional yet fully
capable of participating in the modern world. Her modernity does not necessarily mean divorce from traditional
ethos. She is the brand ambassador of Asmi and provides assurance to the target audience that wants to do things
differently without breaking from the past. Here she says she does not believe in stars, talking parrots and crystal
balls but believes in herself.
5. FEMINA (Believe)- I am dark, fair, 14, fat, 40, I love If we go through this advertisement, an emphatic I is
revealed. Todays woman is confident and comfortable with what she is and is unapologetic about carrying the
weight of her self. This ad makes minimum use of visual imagery-just the face of protagonist infusing confidence
and warmth.
There are some advertisements, which depict the changing face of women in Indian advertising. There are many
more ads and everyday one new ad is surfacing which clearly depict the increasing influence of women in Indian
Television and society.

DEPICTION OF WOMEN AND LAW :


The Indecent Representation of Women (Prohibition) Act 1986 provides for the regulation of representation of
women in India and prohibits the indecent representation of women through advertisements, books, writings,
paintings, and figures or in any other manner. Section 4 of the Act prohibits the production, sale, hire, distribution,
circulation, sending by post any book, pamphlet, slide, film writing, drawing, painting etc which contains indecent
representation of women in any form. The depiction in any manner of the figure of a woman, her form, her body or
any part thereof would amount to indecent or derogatory representation if it has-
(a) The tendency to present a woman as a sexual object; or
(b) The tendency to present a woman as a sexual commodity for mans pleasure; or
(c) The tendency to glorify womans subordination to man as an attribute to womanhood; or
(d) The tendency to glorify ignoble servility to man as an attribute to womanhood; or
(e) The effect of being indecent or being derogatory to, or denigrating women; or
(f) It is likely to deprave, corrupt or injure the public morality or morals.

However, in spite of law, women portrayal in media sometimes is of great concern that needs to be addressed.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 168
NCRASEM 13 Paper ID:MBA06

FINDINGS AND SUGGESTIONS:


There is magnificent transformation of women in advertisement in consumption patterns,pre purchase and post
purchase behavior .In present Indian advertisements scenario the marketers and ad agencies are interested to depict
women as independent ,assertive, enjoying life and self reliable.Ex:Honda pleasurer,Nirma,Social awareness ads.
Advertisements became part of life as we come across hundreds of indoor and outdoor advertisements. Every
section of human life is get in touch with them every day.
In late 1990s the women are depicted as dependent, stereo type and as an object to push the sales, they havent
considered the Indian Values and Culture. There is a need for the Indian Government involvement, social workers,
to prevent indecent representation of women in advertisements.
The efforts Of ASCI has reaped the greater significance and there faster Redressal of the complaints as they connote
a negative perception of Indian Values and Culture.

V.CONCLUSION
Women in India are increasingly exposed to education and participate in workforce; gender demarcations are
undergoing rapid change. They have now greater physical, cultural and social mobility than what their mothers and
grandmothers used to have. Todays woman has the freedom to explore new ways of living, peer bonding, handling
relationships, and so on. Since they are getting monetarily independent, their value at home is also increasing. This
has reduced the commodity status of women and their portrayal as sex objects in advertisements has witnessed a
key change. However, there are some programmes where still stereotypical image is being shown. Television can be
used as a forum for advocacy, challenging stereotypes, information dissemination that will enable in taking
necessary legal action, enactment of appropriate laws, sensitizing the authorities and creating public dialogue. A
multi pronged strategy for awareness and mobilization of public opinion is needed for developing a positive image
of women in media. It is also necessary to draw a fine line as to what constitutes morality and what is obscenity. In
advertising, there has been a sea change in the depiction of women in India during past two decades. They have kept
pace with the changes in the society.

VI. REFERENCES

Principles of Marketing : Philip Kotler & Gary Armstrong


Consumer Behavior : Leon G. Shiftman
Journals ICFAI General of Marketing , Indian Journal of Marketing
International Journal of Transformations in Business Management http://www.ijtbm.com (IJTBM) 2011, Vol. No. 1, Issue No.1, Ja nuary-
MarchWells, W; Moriarty S, and Burnett, J; Advertising- Principles and Practice- 7th Edition, Prentice hall, New Delhi
Mathur, U C, Advertising Management, 2002, New Age International Publishers, New Delhi Ogilvy David, Ogilvy on Advertising, 1983,
Vintage Books, New York
Kazmi, S H H & batra, Satish k; Advertising and Sales Promotion, 3rd Edition, Excel Books, New Delhi
Chunawala, S A & Sethia K C; Foundations of Advertising-Theory and Practice, 7th Edition, Himalaya Publishing House, Mumbai
Kotler, P (2000) Marketing management, USA, Prentice hall, Inc Srivastava M K & Kochar, Bani, Women in Indian Advertising -From Lalita to
Lolita, Marketing Mastermind, Vol IX, Issue 7, July 2009, IUP, Hyderabad
BN Ahuja & Shakti Batra Mass Communications with Special Reference to Indian Conditions, Varma Brothers, New Delhi, 1978,pp.2 59-273.
David Faust &Richa Nagar Politics of Development in Post Colonial India-,

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 169
NCRASEM 13 Paper ID:MBA07

A Study to Assess Knowledge Management


Practices by Enabling Taxonomy in Software
Firms in India
Anjali Rai
Assistant Professor, Department of Management, ABES Engineering College Ghaziabad
anjali.abes@gmail.com

K.Venkata Rao
Director, Reachout Business Analytical Services, Hyderabad,
venkat@robaservices.com,

S.V.Rama Krishna
Associate Professor, Department of Science and Humanities, Turbomachinery Institute of Technology and Sciences,
Hyderabad
sv_rama@yahoo.com

B. Aswani Kumar
Associate Professor, Department of Computer Science and Engineering, St. Peters Engineering College
kumarb.16@gmail.com

Abstract-The purpose of the study is to investigate the role of taxonomies within a knowledge management framework.
This research paper is exploring the concept of taxonomies for organizational content. Knowledge can be defined as a
fluid mix of framed experience, values, contextual information and expert insight that provides a framework for
evaluating and incorporating new experiences and information (Davenport & Prusak 1998). Taxonomy is a hierarchy of
categories which classify documents and other information. The corporate taxonomy is a way of representing the
information available within an organization (Woods 2004).The research questions and hypotheses were developed on
review of the literature. The research was carried out on 250 employees of a software firms in North India. A multivariate
technique has been used to analyze the data. Taxonomies, as a tool, focus on improving access, retrieval of information
and knowledge by providing structured information. Structured information helps to prevent overload information &
provide identification, retrieval of critical information and knowledge resources within the organization. The research
was carried out only on 250 employees.

Key words: Organizational Taxonomy, Knowledge Management, Knowledge Organization System, Information
Technology & Content Management System.

I. INTRODUCTION

The word taxonomy derived from the Greek word taxis, which means arrangement or order, and nomos, meaning
law or science. For present day information management, the term taxonomy is used both narrow and broader sense.
In the narrow sense, taxonomy referred as a hierarchical classification or categorization system. In the broader sense,
taxonomy may also be referred to as a knowledge organization system or knowledge organization structure. The
term knowledge organization system or structure is intended to enable all types of schemes for organizing
information and promoting knowledge management. Knowledge organization systems include classification
schemes that organize materials at a general level (such as books on a shelf), subject headings that provide more
detailed access, and authority files that control variant versions of key information (such as geographic names and
personal names).Man has an innate need to organize information (Taylor, 1999). This need of organize information
lead to the development of various organizational tools like classification schemes, catalogues, indexes, etc. The
idea behind developing these several organizational tools for storing information was to help users in easy access
and quick retrieval of relevant documents in the library. There has been a rapid change in the way information is
generated, stored and accessed in the last decade. Internet allows information to be generated and accessed in the
digital form. Though likened to a library, the information available on the Internet is overwhelming, about
200,000,000 web pages (Bradley, 1999). And it is growing by the second. To find relevant information within this

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 171
NCRASEM 13 Paper ID:MBA07

huge amount is not an easy task. Attempts are on to classify and catalogue the Internet resources to bring about some
order to improve access and retrieval efficiency. Taylor defines classification as the "...the process of determining
where an information package fits into a given hierarchy and then assigning the notation associated with the
appropriate level of the hierarchy." In practical terms, classification is about clustering information objects to make
them easier for the user to find, and to gather together similar objects.

II. OBJECTIVES
Understanding the concepts of organisational taxonomy (knowledge management) and organisational performance.
To determine the impact of organizational taxonomy on organizational performance in an organization.
To determine the relationship between organizational taxonomy (knowledge management) and performance
management system.

III. ORGANIZATIONAL TAXONOMY FACTORS

Any enterprise taxonomy development effort should address four components, as shown in the figure below.
Together they form the foundation for effective, ongoing content and information management on an enterprise
level.
Factors- Each of the components includes a number of key elements, as listed below:
A Structure
Hierarchy the classification that shows the relationships of how information is used within an organization,
represented by a tree-like diagram
Metadata attributes literally, data that describes data; the tags given to documents and records,
corresponding to key characteristics (such as Author, Title, Document Type, Subject) that are attached to each
document in the ECM repository, typically assigned to the document at the time the item is saved in the
repository
Content inventory the itemized list of an organizations content sources
Thesaurus inter-departmental cross-reference that lists the approved terms, with clear definitions of what
the terms mean and when the terms should be used
B Development Process
Design principles a detailed description of the overall taxonomy development approach; for example, should
the taxonomy be primarily structured around business processes or by organizational structure or when is it
necessary to break a single taxonomy node into multiple nodes, etc.
Maintenance model a framework of defined policies, procedures, and staffing to manage and maintain the
taxonomy over time and to enforce the use of the taxonomy throughout the organization
Standards the documented specifications to be used in assigning documents and records to the structure of the
taxonomy
Measurement the ability to assess the impact the taxonomy has on business metrics, as well as the ability to
measure the value of the taxonomy itself (which can manifest as user satisfaction, fewer searches to find
information, etc.)
C Data Mapping Model
Attribute linking connecting the key characteristics of documents (such as Title, Creator, Subject,
Description) in order to carry forward relationships that exist in the business use of the document
Attribute translation ability to map attributes and metadata in one system to attributes and metadata in a
different system or repository in order to provide seamless information integration between the two systems
Schema conversion providing the capability to map one schema to another in order to facilitate data transfer
(import or export of data between two systems, usually using XML)
D Management Tools and Infrastructure
Integrated development development tools and/or development environments that allow people to create,
maintain, test, update, and deploy taxonomic artifacts and information
Auto classification the ability to classify content by analyzing its text and then automatically assigning it to a
pre-defined class
Batch conversion a program that can leverage taxonomic information to mass-load content from one file
format or repository into another without user interaction Indexing assigning standard, pre-defined metadata
to documents prior to storing them in the repository, such that the metadata can then be used as search terms for
retrieving documents from the repository

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 172
NCRASEM 13 Paper ID:MBA07

All four components are critical to the implementation of enterprise taxonomy. Furthermore, addressing each of
the components requires the participation of both IT and the business units. While the taxonomy bridges all the
document-based systems and content repositories of an organization, ultimately, it must serve the needs of the users.
In many case, taxonomy is a hybrid of how documents are stored from a database perspective, with business
hierarchy placed upon it.

IV. MEASURES OF ORGANIZATIONAL PERFORMANCE

Performance is the execution or accomplishment of work, tasks or goals to a certain level of desired satisfaction.
In this study, however, organizational performance is defined in terms of the ability of an organization to satisfy the
desired expectations of three main stakeholders comprising of owners, employees and customers. This is measured
in terms of the following parameters:
(i) Owners satisfaction with financial returns or profits from organizational operations.
(ii) Employees satisfaction with the conditions of work, such as wages and remuneration, style of supervision, rapid
promotion and the ability of the organization to guarantee job security.
(iii) Employees expressed a desire to stay with the organization, i.e., the ability of the organization to retain its
workforce.
(iv) Customers expressed satisfaction with the quality of the products of the organization.

V. HYPOTHESIS

H1: Organizational taxonomy is positively associated with organizational performance.


H2: Organizational taxonomy will significantly predict organizational performance.

VI. METHODOLOGY

A. Research Design: The survey research design method was used in this study. It involves using a self-designed
questionnaire in collecting data from the respondents. Sample sizes for the study were 250 employee of Software
Company in North India. Convenience sampling method is used. The convenience sampling is a basic sampling
design, which allows equal representation and selection of samples. The research instrument used in this study is a
close-ended questionnaire
B. Procedure: The subjects were given the questionnaire in their place of work. Instruction on how to fill the
questionnaire was given. Confidential treatment of information was assured. Questions were ranged from 7-1 point
scale in the following pattern. Strongly agree 7 & Disagree 1

VII. CORRELATION ANALYSIS

H1: Organizational taxonomy is positively associated with organizational performance.


Pearson correlation table has developed for finding association and testing first hypothesis of taxonomy as
independent variables and organization performance as dependent variables, the below table is stating Owners
satisfaction with financial returns: variable verses taxonomy variables Structure have correlation (R)= 38%,
Development Process R= 63%, and Management Tools & Infrastructure R = 31% positive Correlation is significant
at the 0.01 , Data Mapping Model have 60 % negative correlation with 0.01 level. Employees satisfaction with
the conditions of work: structure R = 14 with 0.05 level, Development Process is 86% , Management Tools &
Infrastructure has 87% positive correlation with 0.01 level and Data Mapping Model having negative correlation
with 93 at 0.01 level . Employees expressed a desire to stay with the organization all variables are having more that
50% correlation at 0.01 level. Employees expressed a desire to stay with the organization: Management Tools
& Infrastructure , Development Process have negative correlation Structure , Data Mapping Model having positive
correlation. Customers expressed satisfaction with the quality : except Structure all variables are having strong
correlation more than 77% . Data Mapping Model (r= 95) have negative correlation remaining Development
Process , Management Tools & Infrastructure positive correlation as per the given below table. Majority of the
variables are having positively significant in that cases H1 can accepted.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 173
NCRASEM 13 Paper ID:MBA07

Table 1 Inter correlations for the study variables


Correlations
Owners Employees Employees
Taxonomy satisfaction with satisfaction with expressed a desire Customers expressed
financial returns the conditions of to stay with the satisfaction with the
work organization quality
Structure
.380** -.143* .500** .074
Development Process
.631** .864** -.522** .864**
Data Mapping Model
-.605** -.938** .651** -.951**
Management Tools & Infrastructure
.313** .875** -.871** .771**
**. Correlation is significant at the 0.01 level (2-tailed), *. Correlation is significant at the 0.05 level (2-tailed).

VIII. REGRESSION ANALYSIS

H2: Organizational taxonomy will significantly predict organizational performance.


For fulfilling second Hypothesis, below Regression analysis is generated. We have done regression analysis using
SPSS 20 version and applied enter method for proving the second Hypothesis. Majority of the independent
variables are having good estimating indications while we are comparing with Owners satisfaction with financial
returns has correlation of 78% and R Square is 61. If R Square exceeds 50%, it indicates that there is good
predictor. All Dependent variables are having strong Associations, that is correlation, R square, and Adjust R square
strongly recommends that maximum independent variables are good predictors for estimating Dependent variables.
We can considered below Regression Model Equitation as per the Multiple Regression Analysis.

Table 2. Multiple regression analysis

Taxonomy Independent Variables


Data Mapping

Infrastructure
Development

Management
Tools and
Structure
Constant

Dependent Variables
Process

Model

R Adjusted
R square R square
(%) (%) (%)
Owners satisfaction -12.67 3.45*** 0.35* -0.61*** -0.32* 78 61 60
with financial returns
Employees satisfaction 4.51 -0.04 .41** -.43*** 0.37*** 96 93 93
with the conditions of work
Employees expressed a -7.87 3.51*** 0.04 0.01 1.70*** 89 80 79
desire to stay with the
organization
Customers expressed 1.37 1.23*** 0.12* -0.79*** 0.12* 96 92 92
satisfaction with the quality
Note: P value 0.000 ***, 0.001**, 0.05*

Regression Model Equitation :

Y= Constant (a) +B1* Structure +B2*Development Process+B3Data Mapping Model+B4* Management Tools and
Infrastructure

IX. CONCLUSIONS
Taxonomies are a fundamental part of any modern information architecture. Any organisation that needs to make
significant volumes of information available in an efficient and consistent way to its customers, partners or
employees needs to understand the value of a serious approach to taxonomy design and management. However,
many organisations are unfamiliar with taxonomy development and management. At its simplest, a taxonomy is a

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 174
NCRASEM 13 Paper ID:MBA07

hierarchical organisation of categories used for classification purposes. Such a simple definition hides the many
challenges to be faced in building and maintaining an effective and usable taxonomy for organisation. For
organisations, making use of taxonomy is an effective means of reducing development time and supplementing a
lack of in-house skills. Classifying data helps to fulfill one of the major objectives of organization to eliminate
redundancy and promote the re-use of data in systems. The initial investment in documenting data elements pales in
comparison to the long-term benefits derived from the effort. This research paper represents the relationship
between organizational performance and organizational taxonomy.

X. REFERENCES

Ackoff, R.L. (1967) Management Misinformation Systems, Management Science, 11 (4), pp. 147-156.
Akscyn, R.M. et al (1988) KMS: A Distributed Hypermedia System for Managing Knowledge in Organizations, Communications of
the ACM, Vol. 31, No, 7, pp. 820-835.
Altenkrueger, D.E (1990) KBMS: Aspects, Theory and Implementation, Information Systems, Vol. 15, No 1, pp. 1-7.
Applegate, L. (1991) Technology Support for Cooperative Work: A Framework for Studying Introduction and Assimilation in
Organizations, Journal of Organizational Computing, Vol. 1, No 1, pp. 11-39.
Blanning, R. (1993) Model Management Systems: An Overview, Decision Support Systems, Vol. 9, No. 3-4, pp. 9-18.
DeSanctis, G. and R.B Gallupe (1987) A Foundation for the Study of Group Decision
Support Systems, Management Science, Vol. 33, pp. 589-606.
Edwards, J.S. (1992) Expert Systems in Management and Administration - Are they really different from Decision Support Systems?,
European Journal of Operational Research, Vol. 61, pp. 114-121.
George, J.F. (1991) The Conceptualization and Development of Organizational Decision Support Systems, Journal of Management
Information Systems, 8 (3), pp. 109-125.
George, J.F., J.F. Nunamaker and J. Valacich (1992) ODSS: Information Technology for Organizational Change, Decision Support
Systems, pp. 307-315.
Holsapple, C. and A.B. Winston (1989) Knowledge Representation and Processing in Economics and Management, Computer Science
in Economics and Management, Vol. 2, No 1, pp. 37-48.
Kraemer, K.L. and J.L. King (1988) Computer-based Systems for Cooperative Work and Group Decision Making, ACM Computing
Surveys, 20 (2), pp. 115-146.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 175
NCRASEM 13 Paper ID:ME02

INVESTIGATION ANALYSIS OF SURFACE


MODIFIED BUSHED BEARING WITH
MoS2 COATING.
V.Jeevabharathi. M.E
Research scholar

Dr.Karuppusamy
Dean, Karpagam University

Abstract - We are now close to the new millennium and on the threshold of an era of rapid change. Limitations to the
further advance of manufacturing industry in the 21st century are most likely to be surface-related. Many mechanical
systems will operate under ever more severe application conditions, such as intensive loads, high speeds and harsh
environments, in order to achieve high productivity, high power efficiency and low energy consumption. MoS2 is a
remarkable solid lubricant. It produces some of the lowest friction coefficients ever measured , and it can be used to
lubricate sliding contacts at high contact stresses . In addition, thin coatings of MoS2 can withstand hundreds of
thousands of sliding cycles, having overall wear rates <<1 nm/cycle. Although some of its behavior in terms of the bulk
mechanical properties of MoS2 (e.g. low friction coefficient in terms of the plasticity/shear strength), will have the high
endurance. Solid lubricants are typically composed of a solid, a binder, and additives such as corrosion inhibitors or
solvents. MoS2 is a popular solid lubricant used widely in machinery equipment to release various wear damages,
especially in an environment where lubricating oil or grease is not play the lubricating role. The studies conducted on
MoS2 shows the extreme application potential on advanced precision equipment and micro machinery This paper will
provide a overview of recent developments in solid lubricant coatings and will expand on the lubrication mechanisms of
both traditional and new solid lubricants. Special emphasis will be placed on modern practices that are aimed at
enhancing the properties of these coatings and expanding their uses in practical applications.

I. INTRODUCTION
Friction can be good in so many areas of life. Without it we could not easily stop and start our motion, or change
direction. But in moving machinery, friction causes considerable loss of energy, poorer performance. The soft anti-
friction coating will improve the lifetime and lubricating property, if it is deposited on a substrate . In addition, the
difference in surface roughness of the substrate induced by different pre-treatment may result in different adhesion
strength of the coatings deposited.. Solid lubricants are used where it is important for the lubricant to stay in place.
Therefore, it is an urgent topic to get more understanding of coating deposited on substrate with different surface
and mechanical properties. MoS2 is a popular solid lubricant used widely in machinery equipment to release various
wear damages, especially in an environment where lubricating oil or grease is not play the lubricating role. The
MoS2 low friction coating remains superior at higher temperatures, with oxidation rates remaining relatively low at
temperatures up to 600 degrees Fahrenheit.. In this paper the tribiological characteristic of MoS2 coating deposited
on pre-treated connecting rod big end bearing is being analyzed deeply and systematically.

II. ENERGY DISTRIBUTION AND LOSSES

Figure 1. Energy of the fuel distribution

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 177
NCRASEM 13 Paper ID:ME02

The fig.1 shows the broadest sense manner the energy of the fuel is distributed . Only about 25% of the energy of
the fuel is distributed as brake power . About 30% of the energy is wasted in exhaust pipe, about 30% is dissipated
in the form of cylinder cooling from the engine surfaces and about 15% of the energy is wasted as mechanical
transmission losses.

A Distribution Of Mechanical Losses:

Figure. 2 Mechanical losses distribution in an internal combustion engine


Mechanical actions may account for a further frictional loss of 15% of the original energy in terms of power. In a
similar spirit, Fig. 2 describes the breakdown of the mechanical losses in the engine with the piston assembly being
responsible for the lions share of 80% friction loss. The distribution of friction loss will be about 45% towards
piston assembly, about 10% towards valve train, and about 25% of friction loss is being towards bearings.It will be
noted that the other losses associated with accessories and pumping will be 20% of the mechanical losses.. After
establishing MoS2 surface coated of connecting rod big end bearing the energy distribution and mechanical loss
distribution will vary with engine type and operating conditions.

B Major causes of premature bearing failure:


Dirt ......................................... 45.4%
Misassembly .......................... 12.8%
Misalignment .......................... 12.6%
Insufficient Lubrication ........... .11.4%
Overloading .............................. 8.1%
Corrosion ................................ . 3.7%
Improper Journal Finish ............ 3.2%
Other ....................................... . 2.8%
C. Bearing Failure Analysis

(a) (b) (c)


Figure.3. Bearing failures (a) Trenches (b) Pitting (c) Hot spot

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 178
NCRASEM 13 Paper ID:ME02

Normal wear exhibits "Smooth" finish. Accelerated wear may be caused by fine abrasives left in from extended oil
change intervals not monitored by analysis. Bearing surfaces which reveal scratches or "Trenches" are typical of
particle wear. The oil filter element should reveal the culprit. Particles, sandwiched between bearing and bore, can
create distortion and a "Hot Spot". Particle may be embedded and visible. (see arrow) "Oil Starvation" can be
attributed to a number of causes. Wiping, Blue Discoloration and "Adhesion" wear to shaft or pin are common
indicators. Water and/or antifreeze in the engine oil create milky, grey edging and possible black corrosion on the
lining. Pitting and Flaking are progressive damage. Worn, Pitted surfaces with dark green coloration indicate fuel
dilution of lube oil. This corrosive action may also pit crankshaft. "Shiny" indicators on the back of the bearing
insert are signs of movement. Bore Geometry and surface dimension must be checked. This is "Cavitation Erosion",
on the unloaded half of insert. "Entrained" air bubbles in oil may cause additional lubrication problems. Cavitation
Erosion (round flaked portion) caused by entrained air bubbles, along with embedded hard debris, can require a
close examination for failure analysis. Lack of lubrication can be attributed to engine oil dilution, breakdown or
elevataed temperature. Causes must be investigated, too prevent further occurrences.
D Elasto-Hydrodynamic Layer
The film layer that exists between the rolling element and the bearing race is the Elasto-Hydrodynamic Layer
(EHL). This lubricant layer supports extremely high stresses and is subjected to both physical and chemical attacks
that could break down the lubricant that serves as the primary protection of the bearing surfaces. Lubricants range
from high viscosity greases with EP additives for high load applications to low viscosity oils with preservatives for
chemical protection, from synthetics for reduced viscosity breakdown or resistance to evaporative loss, to natural or
organic for low friction characteristics or compatibility considerations. Special lubricants are designed for noise
damping, or to withstand oxygen-rich environments or extreme temperature conditions
E Wear of Rolling Contact Elements
While rolling contact elements do not wear as much as sliding contact bearings, there is wear on a micro-scale. In
bearings with significant osculation geometry, there is a difference in the relative tangential surface velocity
between the rolling element and the bearing race. The surfaces are effectively not traveling at the same speed. This
differential can result in shearing of the lubricant that would break down the viscosity of the lubricant film and the
EHL that would lead to premature failure. Depending on the loads and environmental conditions, this would mean
higher frequency re-lubrication cycles may be required.

III. BASICS OF MOS2 SURFACE COATING


From the review for automotive application especially connecting rods, MoS2 is an EP (extreme pressure)
molybdenum disulphide for rolling-element and sliding-contact bearings subject to extreme mechanical loads,
The aim is the deposition of a hard self-lubricating coating
This is obtained by co-deposition of a hard layer and lubricating MoS2 nano-particles
During wear of the layer, MoS2 is released, providing in situ lubrication, without environmentally
dangerous liquid lubricants
Co-deposition will be obtained by CVD.

A MoS2 nano particle formation

FIG.3. MOS2 PARTICLE FORMATION BY SHOT PEENING

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 179
NCRASEM 13 Paper ID:ME02

The solid lubricants are coated with a binder on the workpiece by spraying or coating, with their original solid-
lubricating abilities. The powder shooting method based on a principle of shot peening can coat solid lubricants
directly on the substrate with pressurized gas, which is a binderless process. Additionally this method modified the
surface due to a collision of powder into the substrate: remelting and recrystallization, and surface hardening. By
applying this method to the surface modification of connecting rod big end bearing. improved lubricating ability can
be expected. The microstructure and friction properties of MoS2 are examined.This equipment comprises an
injection nozzle and air compressor, a chamber, a powder supplier and classifier, power recovery unit, and pressure
piping. The solid lubricant used in this process was MoS2 powder with commercial purity of >98.5% and a mean
particle size of 11 m. The MoS2 powder was directly coated onto the substrate for 30 s without binder with air
pressurized at 1.0MPa. After the surface modification, the surface-modified layer of substrate was investigated.
B surface-modified layer of substrate

FIg.4.Cross section of MoS2 substrate


The coefficient of friction can be remarkably improved by using the MoS2 shot compared to the non-lubricated,
which is in the range of 0.951.4.The MoS2 shot has the lower coefficient of friction, 0.48 in average.

C. Comparison of coefficient of friction of coatings

0.6

2 micron
0.5 6 micron
8 micron
10 micron
uncoating
0.4
Coefficient of friction

0.3

0.2

0.1

0
5

10

40

60

100

400

600

800

1000

4000

6000

8500

10000

60000

90000

100000

No of cycle

Figure 5. The variation of friction coefficient of coating with number of cycles at normal load, 300 N

The adhesion strength of MoS2 coatings and surface roughness of substrate were measured by Scratching Testing
and Profilometer respectively. The morphologies and composition of the fretting wear scar of MoS2 coatings were
analyzed by scanning the MoS2 coatings deposited on the substrate. Fig. 3 . indicates clearly that the damage
tendency of MoS2 coating decreased with the lesser thickness , while increased with thicker coatings.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 180
NCRASEM 13 Paper ID:ME02

D Face morphologies:

Fig. 6. Surface morphologies of the films observed. (a) Mo film, (b) MoS2 film.
Fig. 1(a) and (b) are the surface morphologies of the Mo and MoS2 film by AFM. In Fig. 1(a), the compact and
orderly columnar grains were shown on the surface of the Mo film, revealing the Mo film grew up as the direction
of perpendicularity and the shape of columnar. The size of grains on the film surface was over 100 nm. In Fig. 1(b),
the obvious sharp-island shape was present. The size of each grain was under 100 nm. This is because of the
influence of low temperature ion sulfuration. In the earlier stage of sulfuration, the cathode, namely the Mo film,
was heated by the bombard of ions. The Mo film was continuously bombed by lots of ammonia ions, and then the
surface of the Mo film became gradually sharp-island shape from columnar shape. Fig. 2(a) is the cross-section
morphology of the MoS2 film by SEM; (scanning electron microscopy) showing the thickness was 3 mm. The
bonding between the film and substrate was compact and there is no transition layer at the interface. Fig. 2(b) is the
enlarged image of Fig. 2(a), in which the line distribution to the elements of oxygen, iron, molybdenum and sulfur
are labeled. In the whole film, the content of molybdenum is highest. The content of sulfur is very high in the
surface, and decreased gradually from surface to inside. It can be seen that near the interface between the film and
substrate, there was a little element transfer between iron and molybdenum.

IV. CONCLUSION
The importance of the tribological design of the frictional components of the automotive engine has been
emphasized from the point of importance of improved modeling of lubricant behavior and to the enormous prospect
for optimized design based on surface profiles and surface finish considerations. The field of automotive engine
tribology represents a rich and varied environment for researcher and practitioner, with potentially significant
influence upon wealth creation and quality of life. The investigation on the surface modified sliding contact bearings
with MoS2 coating will help in transferring tribology knowledge to industry to carryout tribological design at the
start of a design. .
.
V. REFERENCES

[1] Roger rsbb,1996, fatigue failure of a connecting rod ,engineering failure analysis, vol.3, pp.no. 13-28.
[2] Fantino,2002,connecting rod made composite connecting rod, .
[3] Jean-perre maumas,1992,connecting rod made of composite materials,patent no.us154,098.
[4] Person et al,2005,use of a transmission component of metal matrix composite(MMC) material
[5] Janas rasback, metal matrix composite in engines, MX composites ,AB,www.mxcomposites.com
[6] Folger,1987 design, fabrication and performance of fiber FP/metal matrix composite connecting rods,SAE.Inc.
[7] Berthed ,1998,optimized connecting rod to enable higher engine performance and cost reduction,SAE.Inc,
[8] Quintelier, J. (2008) Self-lubricating and self-protecting properties of polymer composites for wear and friction applications. Polymer
Composites [CrossRef]
[9] Singer, I. L. (2003) Role of third bodies in friction and wear of protective coatings. Journal of Vacuum Science & Technology A Vacuum
Surfaces and Films 21(5)[CrossRef]
[10] Dvorak, S. D. (2007) In Situ Analysis of Third Body Contributions to Sliding Friction of a PbMoS Coating
in Dry and Humid Air. Tribology Letters[CrossRef]

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 181
NCRASEM 13 Paper ID:ME03

Total Quality Management Technique Kaizen


Mr.Sandeep K. Rajapure.
Student M E (MECH-PROD)
KIT College Of Engineering Kolhapur
Guide :Prof .Naik G R
srajson@gmail.com

Abstract: Focused (Continuous) improvement is an essential requirement for sustaining and gaining a competitive
advantage for the organizations. A successful continuous improvement program is one where in the operational defects
are eliminated at the root cause level and are prevented fromreoccurring. Total productive maintenance (TPM)
methodology is a proven approach to increase overall equipment effectiveness (OEE) of equipment. It consists of eight
pillars, focused improvement and autonomous maintenance are two important pillars amongst them to enhance overall
equipment performance. These pillars aim to educate the participants in the concepts and philosophy of equipment
maintenance and give them an opportunity to develop their skills and confidence. In the present work an attempt is made
to identify the areas of improvement in equipment, kaizen and poka-yoke are implemented to enhance its overall
performance to increase the productivity. Why-why method of root cause analysis is used to eliminate the causes. The
OEE of the equipment is increased from 49.9% to 74.68%. The improved OEE resulted increase in availability, better
utilization of resources, high quality products and also raised employee morale and confidence.

I.INTRODUCTION

In this competitive world total elimination of waste is necessary for the survival of the organization. The wastes
generated due to the failure shutdown of facilities that have been built, with huge investment and also waste such as
defective products should be absolutely eliminated. In a manufacturing scenario, the desirable productivity, cost,
inventory, quality and delivery all depend on the efficient functioning of the companys facilities. The philosophies
like, total quality management (TQM), just in time (JIT), flexible manufacturing systems (FMS),etc have led to a
comprehensive maintenance technique known as total productive maintenance (TPM) [1]. Hartman defines TPM as
Total Productive Maintenance permanently improves the overall effectiveness of equipment with the active
involvement of operators [2]. The aim of TPM to reduce the six major equipment losses, to zero, has been
recognized as necessary for corporate survival. TPM is a unique Japanese system of plant management, developed
from preventive maintenance concept. This approach emphasizes the role of teamwork, small group activities, and
the participation of all employees to accomplish equipment improvement objectives[3]. It challenges a sense of joint
responsibility between operators and maintenance workers, not only to keep the machines running smoothly, but
also to extend and optimize their overall performance [4]. It is also defined as, bringing both functions (production
and maintenance) together by a combination of good working practices, team working, and continuous improvement
[5]. TPM is intended to bring both functions (production and maintenance) together by a combination of good
working practices, team working and continuous improvement [6]. This paper presents a case study of implementing
TPM concepts to a shot-peening machine. Overall equipment effectiveness (OEE) is used to measure the overall
performance of the equipment and suitable data is considered for the analysis. The areas of equipment improvement
are identified and why-why method of root cause analysis (RCA) is used for elimination of equipment problems.
Kaizen and Poka-yoke are used to enhance the overall equipment performance and one-point lessons are used to
raise the knowledge and confidence level of the participants.

II OEE AND SIX MAJOR LOSSES


The literature reveals that no standard exists for calculation of OEE. The OEE calculation is quite general and can be
applied to any manufacturing organization .OEE is a measurement used to determine how efficiently a machine is
running. Though the definition implies that OEE is the measure of a particular machine, but it can also be used to
measure efficiency of product lines, sections of aplant or even the entire plant. Philip Godfrey notes that the
effective operation of individual pieces of production equipment, assembly lines or whole factory is dependent onthe
three factors of OEE . OEE is the most effective measure for driving plant improvement. It continuously focuses the
plant on the concept of zero-waste . Unless careful monitoring occurs, the reduced capacity goes unnoticed or is
accepted as normal. OEE can be considered to combine the operation, maintenance and management of

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 183
NCRASEM 13 Paper ID:ME03

manufacturing equipment and resources [2]. The losses are divided into six major categories, which affect the
overall performance of the equipment namely
1. Equipment failures/breakdown losses, are the time losses and quantity losses caused by defective products.
2. Set-up and adjustment losses are defined as time losses resulting from downtime and defective products that
occur when production of one item ends and the equipment is adjusted to meet the requirements of another item.
3. Idling and minor stop losses occur when the production is interrupted by a temporary malfunction or when a
machine is idling.
4. Reduced speed losses refer to the difference between equipment design speed and actual operating speed.
5. Reduced yield losses occur during the early stages of production from machine start up to stabilization.
6. Quality defects and reworks are losses in quality caused by malfunctioning of production equipment.
The first two losses are known as down time loss and are used to calculate availability of a machine. The third and
fourth are speed losses that determine the performance efficiency and the final two losses are considered to be losses
due to defects in the products. OEE is measured in terms of these six losses, refer figure 1, which are function of
availability, performance rate and quality rate of the machine, production line or factory .
III. PROPOSED METHOD TO ENHANCE
EQUIPMENT PERFORMANCE
Companies practicing TPM invariably achieve startling results, particularly in reducing equipment break downs,
minimizing idling and minor stops, reducing quality defects and claims, increasing productivity, reducing costs,
shrinks inventory, decreasing accidents and promoting employee involvement . Suzuki cites Productivity, Quality,
Costs, Delivery, Safety and Morale (PQCDSM), improvement for early TPM implementation . The overall
performance of equipments can be enhanced by identifying and eliminating the root causes. OEE is used as a tool to
measure the effectiveness of equipments to know the current condition. It helps to identify the areas of improvement
required in terms of availability, performance efficiency and quality rate of products classifying them into six major
losses, as identified by Nakajima in the OEE model . These six major losses are overcome by the Focused
Equipment Improvement (FEI) and Autonomous Maintenance (AM) activities of TPM, (Refer fig.). These activities
will be more effective if carried, in small groups or teams, which are more active, dynamic, self-motivated and also
increasing ones-self confidence of participants.

A Autonomous Maintenance (Jishu Hozen)


Japanese name of autonomous maintenance is JISHUHOZEN. This activity is geared towards developing operators
to be able to take care of small maintenance tasks, thus freeing up the skilled maintenance people to spend time on
more value added activity and technical repairs. The operators are responsible for upkeep of their equipment to
prevent it from deteriorating. Autonomous maintenance includes any activity performed by the production
department that has a maintenance function and is intended to keep the plant operating efficiently and stable in order
to meet production plans [1]. Autonomous maintenance is closely linked with focused improvement in that both
support equipment restoration and sustaining basic equipment conditions.

B Focused Improvement (Kobetsu Kaizen):

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 184
NCRASEM 13 Paper ID:ME03

Focused improvement includes all activities that maximize the overall effectiveness of equipment, processes and
plants through elimination of losses. It includes identification, quantification and elimination of losses that affect
productivity, quality, performance, etc. OEE is a key metric of focused improvement. Focused improvement is
characterized by a drive for zero losses meaning continuous improvement effort to eliminate any effectiveness
losses. Kaizen is a Japanese word for improvement. According to Kaizen, it is a fact that every employee of the
company is capable of improving his work and the method of working. Kaizen forms an essential part of TPM.

IV. APPROACH ENHANCE OVERALL EQUIPMENT PERFORMANCE


The following steps were used for the implementation of TPM activities,
Initial cleaning
Listing and classification of abnormalities
Why-Why Analysis
Kaizen
Poka Yoke
One point lessons
Safety
A Initial Cleaning:
Initial cleaning is aimed at exposing and eliminating hidden defects [18]. Thorough one time cleaning emphasizes
on the following activities resulting into clean and tidy machine.
Eliminate dust, dirt, grime, oil, leakage etc., from main body and ancillary equipment.
Open cover/lids and remove all dirt
Tighten loosed nuts, bolts, screws and replace damaged ones.
Get operators in touch with their machine and make them more familiar.
Cleaning is inspection, find abnormalities and fix defect tags- Red and White tags.
Try and identify areas which are
- Hard to clean
- Hard to lubricate
- Hard to inspect
- Hard to tighten
B Listing and Classification of Abnormalities:
It is a systematic method to organize, order, clean and standardize a work place and keep it that way. In this activity
two different color tags (red and white) were used to classify the abnormalities. A common methodology used
during the initial Sort phase of 5Ss is the Red-Tag Inspection. The tagging process allows operators to identify the
items that are required for production use at the workstation and provides an action path for appropriate storage or
disposal of items not required at the workstation. Items that are not required immediately for production at the
workstation are red tagged for disposition. The red-tagged items are then sent to the red tag holding area for further
evaluation.
C Counter Measure for Forced Deterioration:
Counter measure for the cause of forced deterioration helps to eliminate accelerated deterioration and also reduces
cleaning time.Table 1, shows an example of why-why method used for root cause elimination.
Eliminate source of contamination.
Convert hard to clean, lubricate, inspect and tighten areas, into easy to clean, lubricate, inspect and tighten.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 185
NCRASEM 13 Paper ID:ME03

Repair and remove pending red / white tags. Grow buds of Kaizen through Why?

D Kaizen:
Kaizen, basically translates to 'continuous improvement' or 'change to become good', is a management concept
originated by the Japanese in order to continuously effect incremental changes for the better, involving everybody
within the organization from workers to managers. Kaizen is aimed at producing more and more value with less and
less wastes (higher efficiency), attaining better working environment, and developing stable processes by
standardization. Table 3, shows the kaizens implemented to the shot-peening machine.
E Poka Yoke:
There are slogans in most factories stating defect reduction targets, but the ultimate aim should always be zero
defects. "POKA-YOKE" is a vital factor in eliminating defects. Table shows the poka-yoke implemented to the
shotpeening machine.

F One-Point Lesson:
One point lesson is considered to be one of most powerful tools for transferring skills [1]. A one-point lesson is a 5
to 10-minute self-study lesson drawn up by team members and covering a single aspect of equipment or machine
structure, functioning or method of inspection. Regarding education of operators, in many cases sufficient time
cannot be secured for the purpose of education at one n time or operators cannot acquire such learning unless it is
repeated through daily practice. Therefore, study during daily work, such as during morning meetings or other time,
is highly effective. One-point lesson is a learning method frequently used during autonomous maintenance. The one
point lesson is also referred to as the single point lesson(SPL).
Tools to convey information related to equipment operation or maintenance knowledge and skills.
Designed to enhance knowledge and skills in a short period of time
A tool to upgrade the proficiency of the entire team.

G Safety and Environment:


The TPM safety and environment is equally, important if not more than others. TPM program is meaningful without
district focus on safety and environmental concerns. Shirose describes safety as maintenance of peace of mind. It
creates systems to ensure zero accidents and environmental safety. An emergency switch is provided in front of the
main door as well as on control panel to switch off the machine in case of emergencies. Proper illumination
arranged around the machine and also dust collector is provided to maintain the environment clean.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 186
NCRASEM 13 Paper ID:ME03

IX. RESULTS & DISCUSSIONS


Focused improvement and autonomous maintenance concepts of TPM were implemented to shot peening machine
successfully. These concepts helped to increase the availability along with increase in quality and performance of
the shot peening machine by controlling the losses that affected the production. The number of breakdown hours
(Refer fig.) was reduced considerably. This resulted in turn decrease of throughput time, better quality products and
reduction in rejection costs. OEE of the machine is increased from 49.9 % to 74.68 % (Refer fig). The management
has decided to extend these concepts of TPM implementation all over the plant.

VI. CONCLUSION

If the world-class performance of 85% OEE (Refer table) is to be achieved then efficient maintenance is necessary,
in order to establish autonomous maintenance teams, better communication and team work must be promoted. It is
essential that the company devices an efficient data recording systems, so that up to date and accurate information
will be available to the management. OEE gives complete details of the overall equipment efficiency. Analysis of
this leads to identification of focused improvements required to enhance the overall equipment performance. This
method does not interfere with routine maintenance, in turn helps to improve with systematic approach towards
eliminating the accelerated deterioration. It also gives an opportunity to the operators to raise their skills and know-
how to foster improvement suggestions. The OEE of the equipment was increased from 49.9% to 74.68%, resulting
increase in availability, better utilization of resources, reduction in defects and increased morale and confidence of
employees.

VII. REFERENCES

[1] Robinson. C.J, Ginder. A.P, Implementing TPM: The North American Experience, Portland,

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 187
NCRASEM 13 Paper ID:ME03

[2] Hartman. E, Successfully Installing TPM in a Non- Japanese Plant, Pittsburgh, PA, TPM Press, Inc,
[3] Bamber, C. J, Sharp, J. M, Hides. M. T, Factors affecting Successful Implementation of
TotalProductive Maintenance: A UK Manufacturing
[4] Bulent Dal, Phil Tugwell, and Richard Greatbanks, Overall equipment effectiveness as a measure of
operational improvement A practical analysis, International Journal of Operations & Production Management,
[5] Debadyuti Das. in operations system A case study, Industrial Engineering Journal
[6] Cooke, F. L., Implementing TPM in plant maintenance: some organizational barriers, International Journal of Quality and Reliability
Management,

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 188
NCRASEM 13 Paper ID:ME04

Buckling analysis of Carbon Fiber Reinforced


Polymer Composite Rectangular Plates
S.Madhu
Department of Mechanical Engineering
Turbomachinery Institute of Technology & Sciences, Hyderabad
salumari@gmail.com,

P.Pramod Kumar
Department of Mechanical Engineering
Turbomachinery Institute of Technology & Sciences, Hyderabad
pramod.330@gmail.com

Abstract- Composite plates have been used increasingly in aeronautical, automobile and marine industries due to their
high stiffness and strength-to-weight ratios, long fatigue life, resistance to electrochemical corrosion and other superior
properties of composites. The plate problem is often idealization of portions of built-up structure of an aircraft wing or a
ship or a multistoried building. In this present study, the buckling behavior under uni-axial compression of specially-
orthotropic, symmetric, carbon fiber reinforced polymer rectangular plates are investigated. The effect of plate aspect
ratio, fiber volume fraction and modulus ratio is investigated for eight layered composite laminated rectangular plates for
various stacking sequences.

Keywords: Composite plate, Buckling, aspect ratio, simply supported plate, classical laminate plate theory

I. INTRODUCTION
Advanced carbon fiber reinforce polymer composites have gained increasing attention in the recent years due to
their widespread use in modern aerospace transportation system and in other areas of high performance. A true
understanding of their structural behavior is required, such as the deflections, buckling loads and modal
characteristics, the through thickness distributions of stresses and strains, the large deflection behavior are of
extreme importance for obtaining strong, reliable multi-layered structures [1]. The material under this study is AS4
carbon fibers in polypropylene matrix.
II. MICROMECHANICAL MODEL
In the micromechanical model the AS4 carbon fibers are considered to be solid fibers with isotropic material
properties like as youngs modulus 231 Gpa, Poissons ratio 0.2 [2] and polypropylene to be the matrix material
with youngs modulus 1.9 Gpa and Poissons ratio 0.3. The micromechanical elastic properties of CFRP are
calculated by using rule of mixtures.
a) Longitudinal Modulus

(1)

b) Transverse Modulus

(2)

c) Poissons ratio
(3)

(4)

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 189
NCRASEM 13 Paper ID:ME04

d) Shear Modulus
(5)

Where
Ef Youngs modulus of fibers
Em Youngs modulus of matrix
f Poissons ratio of fibers
m Poissons ratio of matrix
Gf Rigidity modulus of fibers
Gm Rigidity modulus of matrix
The properties thus obtained from micromechanical model are used to find the reduced stiffness matrix elements.
III. BASIC EQUATIONS
The buckling behavior of a simply supported carbon fiber reinforced polymer laminated plate subjected to uni-axial
compression as shown in figure 1 is studied.

Figure 1: Buckling of a plate under uni-axial compression.

The basic relations for laminated plate under bending loads are taken from J N Reddy [3] as

(6)

The smallest value of N0 occurs for any m, when n=1.

(7)

The following plots (Fig 2 to 7) contain Non-dimensionalised buckling load versus plate aspect ratio
for various stacking sequences.
IV. RESULTS AND DISCUSSIONS
35

Nondimensionalised Buckling Load Vs Aspect Ratio for Cr=0.1 and stacking sequence [90/45/-45/0]s

30
m=1
m=2
m=3
25 m=4
Non Dimensionalised Buckling Load

20

15

10

0
0 2 4 6 8 10 12
Plate Aspect Ratio (a/b)

Fig 2: Non dimensionalised buckling load versus plate aspect ratio (a/b) for the stacking sequence [90/45/-45/0]s.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 190
NCRASEM 13 Paper ID:ME04

The above plot indicates as the plate aspect ratio increases the plate buckles into more and more half waves in the x-
direction. The intersection of two consecutive modes correspond to certain aspect ratios. Thus for each of these
aspect ratios there are two possible buckled mode shapes. The same trend is observed for the stacking sequences as
shown below.
50
m=1
NOndimensionalised buckling load vs Aspect ratio for cr=0.1, stacking sequence [90/0/-90/0]s m=2
45
m=3
m=4
40

35
Nondimensionalised buckling load

30

25

20

15

10

0
0 2 4 6 8 10 12
Plate Aspect Ratio (a/b)

Fig 3: Non dimensionalised buckling load versus plate aspect ratio (a/b) for the stacking sequence [90/0/-90/0]s.

35
m=1
m=2
m=3
30
m=4

25
Nondimensionalised buckling load

20

15

10

5
Nondimensionalised Buckling load vs Aspect Ratio for cr=0.1 stacking sequence [0/45/-45/90]s

0
0 2 4 6 8 10 12
Plate Aspect Ratio (a/b)

Fig 4: Non dimensionalised buckling load versus plate aspect ratio (a/b) for the stacking sequence [0/45/-45/90]s.

35
m=1
m=2
m=3
30 m=4

25
Nondimensionalised buckling load

20

15

10

Nondimensionalised Buckling Load Vs Aspect Ratio for Cr=0.1 and stacking sequence [45/0/-45/90]s
5

0
0 2 4 6 8 10 12
Plate Aspect Ratio (a/b)

Fig 5: Non dimensionalised buckling load versus plate aspect ratio (a/b) for the stacking sequence [45/0/-45/90]s.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 191
NCRASEM 13 Paper ID:ME04

35
Nondimensionalised Buckling load Vs Plate Aspect Ratio for cr=0.1 stacking sequence [0/90/090]s m=1
m=2
m=3
30 m=4

25
Nondimensionalised Buckling Load

20

15

10

0
0 2 4 6 8 10 12
Plate Aspect Rato (a/b)

Fig 6: Non dimensionalised buckling load versus plate aspect ratio (a/b) for the stacking sequence [0/90/0/90]s.

35
m=1
m=2
m=3
30 m=4

25
Nondimensionalised Buckling Load

20

15

10

5 Nondimensionalised buckling load vs Aspect Ratio for cr=0.1 stacking sequence [45/-45/45/-45]s

0
0 2 4 6 8 10 12
Plate Aspect Ratio (a/b)

Fig 7: Non dimensionalised buckling load versus plate aspect ratio (a/b) for the stacking sequence [45/-45/45/-45]s.

35
[90/45/-45/0]
[45/0/-45/90]s
[90/0/-90/0]s
30 [0/45/-45/90]s
[0/90/0/90]s
[45/-45/45/-45]s

25
Nondimensionalised Buckling Load

20

15

10

Nondimensionalised buckling load vs plate aspect ratio for cr=0.1, m=1 & various stacking
sequences
5

0
0 2 4 6 8 10 12
Plate Aspect Ratio (a/b)

Fig 8: Non dimensionalised buckling load versus plate aspect ratio (a/b) for Cr=0.1 , m=1 & all stacking sequences.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 192
NCRASEM 13 Paper ID:ME04

Figure 8 indicates the effect of plate aspect ratio on nondimensionalised buckling loads for all stacking sequences
for a single mode (m=1). It is observed that the stacking sequence [45/-45/45/-45]s has got highest critical bucling
load and the stacking sequence [90/0/-90/0]s has the lowest.
10
Nondimensionalised buckling load vs fiber volume fraction for various aspect ratios, m=1 and stacking sequence [90/45/-45/0]s

(a/b)=1
9
(a/b)=1.5
(a/b)=2
(a/b)=2.5
8
Nondimensionalised buckling load

2
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Fiber volume fraction (Cr)

Fig 9: Non dimensionalised buckling load versus fiber volume fraction for the stacking sequence [90/45/-45/0]s.

From the above figure it is noted, as the plate aspect ratio increases the non-dimensionalised buckling load increases
for the same fiber volume fraction. It is also observed that for all the stacking sequences when the fiber volume
fraction is less than 0.5 the non-dimensionalised buckling load decreases, and when grater than 0.5, it increases,
although it is not phenomenal.

350
Buckling Load Vs Modulus Ratio for aspect ratio 1.5 and various stackling sequence

300 [90/45/-45/0]s
[45/0/-45/90]s
[90/0/-90/0]s
250 [0/45/-45/90]s
[0/90/090]s
[45/-45/45/-45]s
Buckling Load

200

150

100

50

0
5 10 15 20 25 30 35
Modulus ratio(E1/E2)
Fig 10:
Buckling load versus modulus ratio for aspect ratio 1.5 & various stacking sequences.

A study of buckling load versus modulus ratio reveals that the buckling load increases as the modulus ratio increases
for various stacking sequences as shown in figure 10.
V. CONCLUSION
A simply supported carbon fiber reinforced polymer composite plate subjected to uni-axial compression is
investigated. It can be concluded that, for two consecutive modes there exist an intersection point which corresponds
to a particular aspect ratio for which there are two possible buckled mode shapes. A comparison of all the stacking
sequences for a single mode indicates that there exist a stacking sequence with the highest and the lowest non-
dimensionalised buckling loads. Finally, from the above study it can also be concluded that, as the modulus ratio
increases there is an increase in the buckling load for all stacking sequences.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 193
NCRASEM 13 Paper ID:ME04

VI. REFERENCES
[1] Zhang .Y.X, Yang.C.H, Recent developments in finite element analysis for laminated composite plates 2009; Compos Struct; 88; 147-157.
[2] I.Maqueda S.Pellegrinoy American Institute of aeronautics austronauts Characterization of a High Strain Composite Material
[3] Reddy J. N. (2007). Theory and analysis of laminated composite plates and shells. CRC PRESS Talor and Francis, USA.
[4] B. Baharlou, A.W. Leissa Vibration and buckling of generally laminated composite plates with arbitrary edge conditions International
Journal of Mechanical Sciences Volume 29, Issue 8, 1987, Pages 545555.
[5] Daniel B. Miracle and Steven L. Donaldson, Introduction to Composites, Air Force Research Laboratory.
[6] Jones, R.M., Mechanics of Composite Materials, McGraw-Hill, New York, 1975.
[7] Powell, P.C, Engineering with Polymers, Chapman and Hall, London, 1983.
[8] Carl Zweben, Composite Materials and Mechanical Design, Mechanical EngineersHandbook, 2nd ed., Myer
Kutz,Ed.,JohnWiley&Sons,Inc.,NewYork, 1998.

Responsibility of contents of this paper rests upon the author and not upon the Publisher,Programme Chair and TITS 194

Potrebbero piacerti anche