Concrete is largest produced material in the construction industry and as per WHO concrete is the largest consumed material by human beings after food and water. About 75% of the concrete is composed of aggregates and because of huge demand of concrete all over the world, availability of natural aggregates is becoming scarce. Civil engineers have always been looking for an alternative for the use of more eco-friendly and easily available materials as a replacement to conventional constituents in concrete. Concrete industry has always welcomed the use of various industrial waste materials as a replacement to these constituents since, otherwise such industrial waste need to be disposed in the form of landfills causing enormous amount of land pollution. This project presents the experimental investigation carried out to evaluate the effect of partial replacement of fine aggregate in concrete by steel slag which is waste product generated during the production of steel. The use of steel slag reduces the need of natural rock as constructional material, hence preserving our natural rock resources besides provides an environmental friendly option of concrete production. Steel slag mainly consists of calcium carbonate and is produced as a by-product of oxidation process in steel industry. The primary aim of this study is to evaluate the various properties of a concrete, obtained by partial replacement of fine aggregate by steel slag. In this research, apart from cement, fly ash and metakoalin (as a partial replacement to cement) were used as binding material. Five sample mixes were taken whose compression tests, tensile tests, sorptivity and water absorption tests were conducted. The mixes were obtained with 0, 30 and 40 percent replacement of fine aggregate by steel slag besides using different percentage replacements (25% of cement by fly ash in three trials, 15% and 10% cement by fly ash and metakoalin respectively in other two trials) of cement by pozzalonas. The experimental results were plotted and compared. It was observed that compressive and tensile strength increased with the increase in steel slag percentage upto to certain limit (30%). Increasing the percentage to 40% there was a sharp decline in magnitude of strength parameters and furthermore increasing metakoalin content had an effect of increasing strength. Capillary rise and water absorption increased with addition of steel slag and decreased with increase in metaloalin content.
{"title":"Utilization of Steel Slag in Concrete as a Partial Replacement to Fine Aggregate","authors":"Shriver Padha, Ravi Kumar","doi":"10.18535/IJSRE/V4I07.02","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I07.02","url":null,"abstract":"Concrete is largest produced material in the construction industry and as per WHO concrete is the largest consumed material by human beings after food and water. About 75% of the concrete is composed of aggregates and because of huge demand of concrete all over the world, availability of natural aggregates is becoming scarce. Civil engineers have always been looking for an alternative for the use of more eco-friendly and easily available materials as a replacement to conventional constituents in concrete. Concrete industry has always welcomed the use of various industrial waste materials as a replacement to these constituents since, otherwise such industrial waste need to be disposed in the form of landfills causing enormous amount of land pollution. This project presents the experimental investigation carried out to evaluate the effect of partial replacement of fine aggregate in concrete by steel slag which is waste product generated during the production of steel. The use of steel slag reduces the need of natural rock as constructional material, hence preserving our natural rock resources besides provides an environmental friendly option of concrete production. Steel slag mainly consists of calcium carbonate and is produced as a by-product of oxidation process in steel industry. The primary aim of this study is to evaluate the various properties of a concrete, obtained by partial replacement of fine aggregate by steel slag. In this research, apart from cement, fly ash and metakoalin (as a partial replacement to cement) were used as binding material. Five sample mixes were taken whose compression tests, tensile tests, sorptivity and water absorption tests were conducted. The mixes were obtained with 0, 30 and 40 percent replacement of fine aggregate by steel slag besides using different percentage replacements (25% of cement by fly ash in three trials, 15% and 10% cement by fly ash and metakoalin respectively in other two trials) of cement by pozzalonas. The experimental results were plotted and compared. It was observed that compressive and tensile strength increased with the increase in steel slag percentage upto to certain limit (30%). Increasing the percentage to 40% there was a sharp decline in magnitude of strength parameters and furthermore increasing metakoalin content had an effect of increasing strength. Capillary rise and water absorption increased with addition of steel slag and decreased with increase in metaloalin content.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89782864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The present paper deals with the application of Homotopy Analysis Method (HAM) to solve Riccati type nonlinear fractional differential equation. After the applications of various analytical methods in different forms to solve many linear and nonlinear problems (see Ref.: Liao and Shijun, Homotopy Analysis Method in Nonlinear Differential Equations. Springer-Verlag Berlin, 2012), a new method known as HAM which has a convergence control parameter introduced in the deformation equation to reach the corresponding series solution in a much easier way. The present analysis is accompanied by numerical examples to justify its validity and efficiency. The solution obtained by this method has been compared with those obtained by Power Series Method (PSM) and Adomian Decomposition Method (ADM). The algorithm described in this paper is expected to be further employed to solve similar nonlinear problems in fractional calculus. The graphical representations of the solutions obtained by different methods are also presented for comparison of the solutions.
本文讨论了同伦分析法在求解Riccati型非线性分数阶微分方程中的应用。之后应用各种不同形式的解析方法解决了许多线性和非线性问题(参见参考文献:Liao and Shijun,《非线性微分方程中的同伦分析方法》)。Springer-Verlag Berlin, 2012),在变形方程中引入了一种新的方法HAM,该方法具有收敛控制参数,可以更容易地得到相应的级数解。通过数值算例验证了分析的有效性和有效性。并与幂级数法(PSM)和阿多米亚分解法(ADM)的解进行了比较。本文所描述的算法有望进一步用于解决分数阶微积分中类似的非线性问题。文中还给出了用不同方法求得的解的图形表示,以便对解进行比较。
{"title":"Solution of Riccati Type Nonlinear Fractional Differential Equation by Homotopy Analysis Method","authors":"D. Das, P. C. Ray, R. Bera","doi":"10.18535/IJSRE/V4I06.15","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I06.15","url":null,"abstract":"The present paper deals with the application of Homotopy Analysis Method (HAM) to solve Riccati type nonlinear fractional differential equation. After the applications of various analytical methods in different forms to solve many linear and nonlinear problems (see Ref.: Liao and Shijun, Homotopy Analysis Method in Nonlinear Differential Equations. Springer-Verlag Berlin, 2012), a new method known as HAM which has a convergence control parameter introduced in the deformation equation to reach the corresponding series solution in a much easier way. The present analysis is accompanied by numerical examples to justify its validity and efficiency. The solution obtained by this method has been compared with those obtained by Power Series Method (PSM) and Adomian Decomposition Method (ADM). The algorithm described in this paper is expected to be further employed to solve similar nonlinear problems in fractional calculus. The graphical representations of the solutions obtained by different methods are also presented for comparison of the solutions.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81137938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Banupriya, P. Kavitha, T. Ashok, M. LogeshKumarNChandrasekar
The aim of this paper is to implement smart ATM card. Now-a-days we use ATM card frequently for shopping , cash withdrawal etc..A single user may have different bank accounts, so the user obviously have many ATM cards .For user friendly access , instead of many ATM cards we compact all into a single ATM card with enhanced security by providing OTP. We also avoid the problem of skimming. The enhanced security of money transaction in ATM system is carried out by RFID. After getting entry customer has to place ATM smart card in ATM machine. Then ATM machine will automatically generates a 4-digit code i.e. OTP. And that code will be message to the customer’s registered mobile number through GSM modem which is connected to ARM 7. Here customer has to enter this code. After entering OTP, System will check whether entered code is a valid one or not. And if it is valid, a list of bank displays, select a bank and it will ask for 4-digit ATM pin, which is fixed. If that 4-digit code match with the entered pin code then system is allowed for further accessing. ATM will show options like cash withdrawal, cash deposit etc..
{"title":"Smart ATM Access and Security System using RFID and GSM Technology","authors":"R. Banupriya, P. Kavitha, T. Ashok, M. LogeshKumarNChandrasekar","doi":"10.18535/IJSRE/V4I06.13","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I06.13","url":null,"abstract":"The aim of this paper is to implement smart ATM card. Now-a-days we use ATM card frequently for shopping , cash withdrawal etc..A single user may have different bank accounts, so the user obviously have many ATM cards .For user friendly access , instead of many ATM cards we compact all into a single ATM card with enhanced security by providing OTP. We also avoid the problem of skimming. The enhanced security of money transaction in ATM system is carried out by RFID. After getting entry customer has to place ATM smart card in ATM machine. Then ATM machine will automatically generates a 4-digit code i.e. OTP. And that code will be message to the customer’s registered mobile number through GSM modem which is connected to ARM 7. Here customer has to enter this code. After entering OTP, System will check whether entered code is a valid one or not. And if it is valid, a list of bank displays, select a bank and it will ask for 4-digit ATM pin, which is fixed. If that 4-digit code match with the entered pin code then system is allowed for further accessing. ATM will show options like cash withdrawal, cash deposit etc..","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80924942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thermoelectric generator [TEG] devices are advantageous technique to extract the waste heat. This works based on the principle of See-beck effect, where an electromotive force will be generated when the junction of two dissimilar metals are experience a temperature difference. The overall efficiency of these modules are low, but advantages of being small, lightweight and this is easy to maintenance free, make it an attractive addition to applications where energy per unit weight or size is a primary factor. Among the key problems is obtaining a consistent voltage to power devices which depend on a consistent voltage more than maximum power. The open circuit voltage (Voc) based on MPPT algorithm is proposed here and this is well suitable for the linear electrical characteristic of the TEGs model. This experiment goal is to evaluate the thermoelectric (TEG) modules performance when connected to a non-inverting synchronizes buck- boost convertor, taking into account of this: input and output voltage, current and power, as well as convertor efficiency against various temperature differences. The experimental trial rig is using TEG module connected in series to a 0.4-5V to 5V buck-boost convertor. The hot side of the TEG module are heated via a heating blocks while the cold side are cooled by using water cooling blocks respectively. The experimental Testing is showed that at a temperature difference of 72˚c, the input voltage and current of 1.78V and 0.79A are increased and reduced respectively to 4.16V and 0.16A. At a temperature variance of 145˚c, the input voltage and current of 3.09V and 0.79A are raised and reduced respectively to 5.15V and 0.67A. From this test is also noted that the overall efficiency of the proposed converter increases along with temperature variance, ranging from 64% at 72˚c to 98% at 145˚c. The conversion procedure is also more efficient in case of the input voltage is near to the preferred output voltage.
{"title":"Open Circuit Voltage Based MPPT Tracing For Thermoelectric Generator Fed Non-Inverting Synchronous Buck-Boost Derived Converter – Part II (Hardware Studies)","authors":"M. Rajbhushan., S. Nalini","doi":"10.18535/ijsre/v4i06.14","DOIUrl":"https://doi.org/10.18535/ijsre/v4i06.14","url":null,"abstract":"Thermoelectric generator [TEG] devices are advantageous technique to extract the waste heat. This works based on the principle of See-beck effect, where an electromotive force will be generated when the junction of two dissimilar metals are experience a temperature difference. The overall efficiency of these modules are low, but advantages of being small, lightweight and this is easy to maintenance free, make it an attractive addition to applications where energy per unit weight or size is a primary factor. Among the key problems is obtaining a consistent voltage to power devices which depend on a consistent voltage more than maximum power. The open circuit voltage (Voc) based on MPPT algorithm is proposed here and this is well suitable for the linear electrical characteristic of the TEGs model. This experiment goal is to evaluate the thermoelectric (TEG) modules performance when connected to a non-inverting synchronizes buck- boost convertor, taking into account of this: input and output voltage, current and power, as well as convertor efficiency against various temperature differences. The experimental trial rig is using TEG module connected in series to a 0.4-5V to 5V buck-boost convertor. The hot side of the TEG module are heated via a heating blocks while the cold side are cooled by using water cooling blocks respectively. The experimental Testing is showed that at a temperature difference of 72˚c, the input voltage and current of 1.78V and 0.79A are increased and reduced respectively to 4.16V and 0.16A. At a temperature variance of 145˚c, the input voltage and current of 3.09V and 0.79A are raised and reduced respectively to 5.15V and 0.67A. From this test is also noted that the overall efficiency of the proposed converter increases along with temperature variance, ranging from 64% at 72˚c to 98% at 145˚c. The conversion procedure is also more efficient in case of the input voltage is near to the preferred output voltage.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86021617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lots of Applications are developed to track a Smart phone but still it is not that comfort in finding the exactly. We have to manually report to the customer of the Mobile to block the IMEI Number of the Phone. Android Application is deployed with initial registration of Alternative Mobile number. If the phone is stolen, Original user will send SMS through a Normal phone or through an Application deployed in another Android phone to Track and verify the location of the theft Mobile. If the Thief changes the SIM card immediately Location details are sent to the alternative Phone number of the original User. Both the logic of tracking the Theft Phone with SIM Card & Theft Phone with changed SIM Card is tracked continuously. Thief Photo is captured by automatic Camera Initiation and Voice is recorded and uploaded in the server. Both the Location and Voice are sent as SMS Alert to the Alternative Mobile number of the Original User.
{"title":"PDA Theft Detection & Continous Tracking With User Profile Recording Using Android","authors":"K. Vijayanand, K. Ravikumar","doi":"10.18535/IJSRE/V4I06.11","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I06.11","url":null,"abstract":"Lots of Applications are developed to track a Smart phone but still it is not that comfort in finding the exactly. We have to manually report to the customer of the Mobile to block the IMEI Number of the Phone. Android Application is deployed with initial registration of Alternative Mobile number. If the phone is stolen, Original user will send SMS through a Normal phone or through an Application deployed in another Android phone to Track and verify the location of the theft Mobile. If the Thief changes the SIM card immediately Location details are sent to the alternative Phone number of the original User. Both the logic of tracking the Theft Phone with SIM Card & Theft Phone with changed SIM Card is tracked continuously. Thief Photo is captured by automatic Camera Initiation and Voice is recorded and uploaded in the server. Both the Location and Voice are sent as SMS Alert to the Alternative Mobile number of the Original User.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80835617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web is used as a tool for presenting ideas, information and knowledge. Various users are a part of this web, if they be simple uses, influential users or non-influential users. There are a number of users on the web but a few users amongst these incorporate a relationship of faith and trust with the other users on the web. These users have a unique way in their activities and the quality of their comments and in this way they attract the other users on the web. Due to this uniqueness these users receive a special and significant attention amongst the many other users on the web. Such users play a dominating role in the community. Best example of this is a Blog, where an influential user leads and the others follow. By identifying such influential users we can measure the impact they have on the other users, the community, the neighbourhood as a whole. This paper presents a survey of various tools, algorithms, methods used and the different techniques applied to identify and rank the web forum users. Basically, Page Rank algorithm is used which gives a better and quick result followed by other techniques like User Rank and greedy algorithms. Keywords- web mining, influential users, blogs, PageRank
{"title":"Framework for Ranking of Web Forum Users","authors":"Saneeya Nasheed Maghrabi, V. A. Losarwar","doi":"10.18535/IJSRE/V4I06.9","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I06.9","url":null,"abstract":"Web is used as a tool for presenting ideas, information and knowledge. Various users are a part of this web, if they be simple uses, influential users or non-influential users. There are a number of users on the web but a few users amongst these incorporate a relationship of faith and trust with the other users on the web. These users have a unique way in their activities and the quality of their comments and in this way they attract the other users on the web. Due to this uniqueness these users receive a special and significant attention amongst the many other users on the web. Such users play a dominating role in the community. Best example of this is a Blog, where an influential user leads and the others follow. By identifying such influential users we can measure the impact they have on the other users, the community, the neighbourhood as a whole. This paper presents a survey of various tools, algorithms, methods used and the different techniques applied to identify and rank the web forum users. Basically, Page Rank algorithm is used which gives a better and quick result followed by other techniques like User Rank and greedy algorithms. Keywords- web mining, influential users, blogs, PageRank","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"174 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76647610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sargar, D. J. Sathe, P. Chate, Z. D. Sandi, S. Kite
{"title":"Studies on Characterization of MoS2 Thin Films Deposited in Method by Chemical Bath Deposition","authors":"S. Sargar, D. J. Sathe, P. Chate, Z. D. Sandi, S. Kite","doi":"10.18535/IJSRE/V4I06.04","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I06.04","url":null,"abstract":"","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90246477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 1991, Molodstov [9] introduced the concept of soft set theory to deal with uncertainty. Modern topology depends strongly on the ideas of soft set theory. This prompted us to introduce and study soft g*s closed set, soft g*s open set in soft topological spaces also some related properties concerning these sets are obtained.
{"title":"Soft g*s Closed Sets in Soft Topological Spaces","authors":"M. Begum, M. John","doi":"10.18535/IJSRE/V4I06.6","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I06.6","url":null,"abstract":"In 1991, Molodstov [9] introduced the concept of soft set theory to deal with uncertainty. Modern topology depends strongly on the ideas of soft set theory. This prompted us to introduce and study soft g*s closed set, soft g*s open set in soft topological spaces also some related properties concerning these sets are obtained.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"110 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79605092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Care of critically ill patient, requires spontaneous & accurate decisions so that life protecting & life saving therapy can be properly applied. Statistics reveal that every minute a human is losing his/her life across the globe. More close in India, everyday many lives are affected by heart attacks and more importantly because the patients did not get timely and proper help .This paper is based on monitoring of patients. We have designed and developed a reliable, energy efficient patient monitoring system. It is able to send parameters of patient in real time. It enables the doctors to monitor patient health parameters in real time. Here the parameters of patient are measured continuously and wirelessly transmitted using Zigbee. The project provides a solution for enhancing the reliability and flexibility by improving the performance and patient monitoring system. In the current proposed system the patient health is continuously monitored and the acquired data is analyzed at a centralized system. If a particular patient health parameter falls below the threshold value, an automated SMS is sent to the prefigured mobile number using a standard GSM module interfaced to the System. Here, we are using Zigbee for wireless transmission. The Doctor can get are cord of a particular information by just accessing the database of the patient on his PC which is continuously updated through Zigbee receiver module.
{"title":"Health Monitoring System Using Zigbee Based wearable Devices","authors":"Vijay Bondre, Nikita Umare, S. Honale","doi":"10.18535/IJSRE/V4I05.7","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I05.7","url":null,"abstract":"Care of critically ill patient, requires spontaneous & accurate decisions so that life protecting & life saving therapy can be properly applied. Statistics reveal that every minute a human is losing his/her life across the globe. More close in India, everyday many lives are affected by heart attacks and more importantly because the patients did not get timely and proper help .This paper is based on monitoring of patients. We have designed and developed a reliable, energy efficient patient monitoring system. It is able to send parameters of patient in real time. It enables the doctors to monitor patient health parameters in real time. Here the parameters of patient are measured continuously and wirelessly transmitted using Zigbee. The project provides a solution for enhancing the reliability and flexibility by improving the performance and patient monitoring system. In the current proposed system the patient health is continuously monitored and the acquired data is analyzed at a centralized system. If a particular patient health parameter falls below the threshold value, an automated SMS is sent to the prefigured mobile number using a standard GSM module interfaced to the System. Here, we are using Zigbee for wireless transmission. The Doctor can get are cord of a particular information by just accessing the database of the patient on his PC which is continuously updated through Zigbee receiver module.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80051781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ravishankar Tularam Zanzad, Nikita Umare, S. Honale
In normal ways all the Industrial or Electrical machineries are controlled by the manual operation. Hence there is step by step progress but most of the time there is not actually instant co-operation between system and operator in case of emergency or fault type situation .Therefore we are designing a system where there exits communication between system and operator. For this we are using Transformer, microcontroller, analog to digital converter.. As we know Distribution transformer is a major component of power system and its correct functioning is vital to system operations. To reduce the risk of unexpected failure and the ensuing unscheduled outage, on-line monitoring has become the common practice to assess continuously the condition of the transformer with. This paper presents design and implementation of a system to monitor and record key operation of a distribution transformer like overvoltage, over current, temperatures, rise or fall of oil level. This based on Wireless protocol. Sensors, including a Temperature Detector and a Liquid level sensor performs according to manufacturers’ specifications are calibrated and tested By power distribution monitoring offices. The system is installed at the distribution transformer site and by measuring above parameters it will help the utilities to optimally utilize transformers and identify problems before any catastrophic failure.
{"title":"Supervisory Model for Predictive Transformer Protection And Maintenance Using Wireless Sensor Network","authors":"Ravishankar Tularam Zanzad, Nikita Umare, S. Honale","doi":"10.18535/IJSRE/V4I06.8","DOIUrl":"https://doi.org/10.18535/IJSRE/V4I06.8","url":null,"abstract":"In normal ways all the Industrial or Electrical machineries are controlled by the manual operation. Hence there is step by step progress but most of the time there is not actually instant co-operation between system and operator in case of emergency or fault type situation .Therefore we are designing a system where there exits communication between system and operator. For this we are using Transformer, microcontroller, analog to digital converter.. As we know Distribution transformer is a major component of power system and its correct functioning is vital to system operations. To reduce the risk of unexpected failure and the ensuing unscheduled outage, on-line monitoring has become the common practice to assess continuously the condition of the transformer with. This paper presents design and implementation of a system to monitor and record key operation of a distribution transformer like overvoltage, over current, temperatures, rise or fall of oil level. This based on Wireless protocol. Sensors, including a Temperature Detector and a Liquid level sensor performs according to manufacturers’ specifications are calibrated and tested By power distribution monitoring offices. The system is installed at the distribution transformer site and by measuring above parameters it will help the utilities to optimally utilize transformers and identify problems before any catastrophic failure.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79133625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}