Pub Date : 2021-06-30DOI: 10.35940/ijitee.g8972.0610821
W. Akpan, A. Okon, E. J. Awaka-Ama
This research investigates the problem of cumulative degradation and random shocks a system like a centrifugal pump may experience during normal and adverse operating conditions. An accelerated life testing method was employed to determine the degradation of the pump under cumulative damage degradation and random shocks conditions. An age- Based policy was used to determine the optimum time interval that will minimize the total expected cost of the system. The random shock increases the number of failures and hence reduces the reliability of the system. The total expected preventive maintenance cost obtained varies from N1700.00 (One thousand seven hundred naira) to N16,000.00 (sixteen thousand naira), depending on the shock and shock duration. The methodology presented is useful and thus recommended for use to study cumulative damage degradation and random shocks for similar systems.
{"title":"Optimal Age-Based Preventive Maintenance Policy for a System Subject to Cumulative Damage Degradation and Random Shocks","authors":"W. Akpan, A. Okon, E. J. Awaka-Ama","doi":"10.35940/ijitee.g8972.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.g8972.0610821","url":null,"abstract":"This research investigates the problem of cumulative degradation and random shocks a system like a centrifugal pump may experience during normal and adverse operating conditions. An accelerated life testing method was employed to determine the degradation of the pump under cumulative damage degradation and random shocks conditions. An age- Based policy was used to determine the optimum time interval that will minimize the total expected cost of the system. The random shock increases the number of failures and hence reduces the reliability of the system. The total expected preventive maintenance cost obtained varies from N1700.00 (One thousand seven hundred naira) to N16,000.00 (sixteen thousand naira), depending on the shock and shock duration. The methodology presented is useful and thus recommended for use to study cumulative damage degradation and random shocks for similar systems.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"78 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85479001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/ijitee.h9235.0610821
Anisur Rehman Nasir, S. N. Ahmad
A novel current-mode multifunction inverse filter configuration using single current feedback amplifier (CFA) is presented. The proposed filter employs only one CFA and few passive components. The proposed circuit realizes inverse lowpass, inverse bandpass and inverse highpass filter functions with proper admittances. The characteristics of proposed multifunction inverse filter configuration are- current-mode realization; use of only one CFA; use of grounded passive components except one virtually grounded and realizing all three basic inverse filters. The proposed current-mode inverse filter circuit has been tested by TINA PRO simulation program and results justified the theoretical analysis.
{"title":"A Novel Current-Mode Multifunction Inverse Filter using Single CFA","authors":"Anisur Rehman Nasir, S. N. Ahmad","doi":"10.35940/ijitee.h9235.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9235.0610821","url":null,"abstract":"A novel current-mode multifunction inverse filter configuration using single current feedback amplifier (CFA) is presented. The proposed filter employs only one CFA and few passive components. The proposed circuit realizes inverse lowpass, inverse bandpass and inverse highpass filter functions with proper admittances. The characteristics of proposed multifunction inverse filter configuration are- current-mode realization; use of only one CFA; use of grounded passive components except one virtually grounded and realizing all three basic inverse filters. The proposed current-mode inverse filter circuit has been tested by TINA PRO simulation program and results justified the theoretical analysis.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87141220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/ijeat.e2670.0610521
Shobana Mahalingam, Meka Sai Deep, K. Krishna
Since most countries have an extensive forest resources, there are often, if not constantly, fires that erupt in these countries from these causes. The majority of vulnerable areas are found in warm climates. Since its highest elevation is a hundred and theta, this piece of infrastructure enables substantial vegetation, but since summers are hot and arid, the risks an overload. When global warming gets more intense, these types of disasters will become more frequent and worse. Much more land in the seasonal forest fires have been lost each year due to a destructive cutting practises, the old forestry, as well as assets, such as private residences and other structures. Additionally, it puts firefighters and the general public at risk, who on an equal scale suffer from a lot of death and illness each year. this sensor, microprocessor, and network technology] developed greatly expanded our] so we are now able to reliably detect the current spread of forest fires and begin to respond quickly to their progression. After natural timberland fires are set, which are frequent in remote regions where trees have not been selectively logged, they burn down into tinder, then new trees grow from seeds in their ashes, the older ones' fuel die and that spread. These pieces are particularly susceptible to being set on fire, which is an excellent location for matches and pyrotechnics. Although many a midsummer's day can cause a flame to erupt, the wick to expand, it can also be stoked by the normal process of human activities like smoking or using a heat source. Start running the process just as soon as the components are ready to go up in the flame. As the breeze expands the flame, the basic element of the vapour gets built up.
{"title":"Wireless Sensor Based Forest Fire Early Detection with Online Remote Monitoring","authors":"Shobana Mahalingam, Meka Sai Deep, K. Krishna","doi":"10.35940/ijeat.e2670.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.e2670.0610521","url":null,"abstract":"Since most countries have an extensive forest\u0000resources, there are often, if not constantly, fires that erupt in these\u0000countries from these causes. The majority of vulnerable areas are\u0000found in warm climates. Since its highest elevation is a hundred\u0000and theta, this piece of infrastructure enables substantial\u0000vegetation, but since summers are hot and arid, the risks an\u0000overload. When global warming gets more intense, these types of\u0000disasters will become more frequent and worse. Much more land in\u0000the seasonal forest fires have been lost each year due to a\u0000destructive cutting practises, the old forestry, as well as assets, such\u0000as private residences and other structures. Additionally, it puts\u0000firefighters and the general public at risk, who on an equal scale\u0000suffer from a lot of death and illness each year. this sensor,\u0000microprocessor, and network technology] developed greatly\u0000expanded our] so we are now able to reliably detect the current\u0000spread of forest fires and begin to respond quickly to their\u0000progression. After natural timberland fires are set, which are\u0000frequent in remote regions where trees have not been selectively\u0000logged, they burn down into tinder, then new trees grow from seeds\u0000in their ashes, the older ones' fuel die and that spread. These pieces\u0000are particularly susceptible to being set on fire, which is an\u0000excellent location for matches and pyrotechnics. Although many a\u0000midsummer's day can cause a flame to erupt, the wick to expand, it\u0000can also be stoked by the normal process of human activities like\u0000smoking or using a heat source. Start running the process just as\u0000soon as the components are ready to go up in the flame. As the\u0000breeze expands the flame, the basic element of the vapour gets built\u0000up.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79411024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/ijitee.h9264.0610821
Raveena Jokim Crastha Ms., M. Roopa
The automotive manufacturers are working towards enhancing sophisticated designs and technologies that enable better vehicle-user connectivity by integrating all the control units to one infotainment system. This key feature with high-level intelligence and competency plays an important role with an increase in demand in the production process of the automotive industry. This paper proposes a unique design of USB smart charger module that is designed in a way to fit into limited space in a front panel of the vehicle. The specific design methodology of the DC-DC SMPS buck converter with the protection circuits which serves as the important section of the smart charger is explained. The module is designed with both single and double port that are identical to each other. Each of these models provides effective connectivity of devices in the vehicle network with secured over-current, over-voltage and short circuit protection circuitry. The configuration of controllers and connectors used is implemented in Altium. The functionality of the system designed is examined and verified in TINA-TI tool.
{"title":"Design of SMPS Buck Converter with Protection Circuits for Automotive Charger","authors":"Raveena Jokim Crastha Ms., M. Roopa","doi":"10.35940/ijitee.h9264.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9264.0610821","url":null,"abstract":"The automotive manufacturers are working towards enhancing sophisticated designs and technologies that enable better vehicle-user connectivity by integrating all the control units to one infotainment system. This key feature with high-level intelligence and competency plays an important role with an increase in demand in the production process of the automotive industry. This paper proposes a unique design of USB smart charger module that is designed in a way to fit into limited space in a front panel of the vehicle. The specific design methodology of the DC-DC SMPS buck converter with the protection circuits which serves as the important section of the smart charger is explained. The module is designed with both single and double port that are identical to each other. Each of these models provides effective connectivity of devices in the vehicle network with secured over-current, over-voltage and short circuit protection circuitry. The configuration of controllers and connectors used is implemented in Altium. The functionality of the system designed is examined and verified in TINA-TI tool.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88998863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/ijitee.h9266.0610821
Annie Syrien, M. Hanumanthappa, K. Ravikumar
The phenomenal development of the World Wide Web has resulted in enormous social networking sites producing tremendous data on web 2.0. Social networking sites have widened to a higher degree of use, in which any field of information can be sort by researchers. Data obtained from social media has strategized from many new machine learning algorithms and natural language processing. The data is unstructured; mining the data leads to finding important sentiments about various entities via appropriate classification techniques. In this paper, tweets’ opinions are analyzed through machine learning algorithms such as naive Bayes and support vector machines using R programming; results are computed and compared. The SVM model manifests the higher precision, and naïve Bayes provides higher accuracy for sentiment analysis on the Bengaluru traffic data.
{"title":"Evaluation of Supervised Classification Techniques on Twitter Data using R","authors":"Annie Syrien, M. Hanumanthappa, K. Ravikumar","doi":"10.35940/ijitee.h9266.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9266.0610821","url":null,"abstract":"The phenomenal development of the World Wide Web has resulted in enormous social networking sites producing tremendous data on web 2.0. Social networking sites have widened to a higher degree of use, in which any field of information can be sort by researchers. Data obtained from social media has strategized from many new machine learning algorithms and natural language processing. The data is unstructured; mining the data leads to finding important sentiments about various entities via appropriate classification techniques. In this paper, tweets’ opinions are analyzed through machine learning algorithms such as naive Bayes and support vector machines using R programming; results are computed and compared. The SVM model manifests the higher precision, and naïve Bayes provides higher accuracy for sentiment analysis on the Bengaluru traffic data.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87436352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/ijeat.e2767.0610521
Priyanka Bhardwaj, A. Srivastava, A. Pandey, A. Singh, B. Tripathi
Agriculture is the worldwide one of the most important occupation of human being, nearly about 64% of total available land on earth is occupied by the agriculture sector, which results in comsuming 85% of fresh water. This percentage of water consumption increases every year due to globalization and fulfilling human needs. Every country face challenge to sustain the fresh food requirement and reducing the farm water consumption. Сurrently, the fаrmers look over at irrigаtiоn methоds mаnuаlly аnd irrigаte their аreа on a constant routine рeriоd. These process acquire large аmоunt оf wаter and as a result water is wasted. Therefоre, Raspberry Pi соmmuniсаtiоn system is preferred beсаuse оf its easy operation, mаintenаnсe аnd cost. This prototype is automated which will irrigate the crop by detecting the moisture content and also will keep an eye on the soil quality.
{"title":"IoT Based Smart Agriculture Aid System using Raspberry Pi","authors":"Priyanka Bhardwaj, A. Srivastava, A. Pandey, A. Singh, B. Tripathi","doi":"10.35940/ijeat.e2767.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.e2767.0610521","url":null,"abstract":"Agriculture is the worldwide one of the most\u0000important occupation of human being, nearly about 64% of total\u0000available land on earth is occupied by the agriculture sector,\u0000which results in comsuming 85% of fresh water. This percentage\u0000of water consumption increases every year due to globalization\u0000and fulfilling human needs. Every country face challenge to\u0000sustain the fresh food requirement and reducing the farm water\u0000consumption. Сurrently, the fаrmers look over at irrigаtiоn\u0000methоds mаnuаlly аnd irrigаte their аreа on a constant\u0000routine рeriоd. These process acquire large аmоunt оf wаter\u0000and as a result water is wasted. Therefоre, Raspberry Pi\u0000соmmuniсаtiоn system is preferred beсаuse оf its easy\u0000operation, mаintenаnсe аnd cost. This prototype is automated\u0000which will irrigate the crop by detecting the moisture content and\u0000also will keep an eye on the soil quality.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82238939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/IJEAT.E2816.0610521
S. Tejaswini, Azra Nasreen
Technological dependence is growing in leaps and bounds as days progress. As a result, software applications are required to be up and running at all times without fail. The health and safety of these applications need to be monitored regularly by theuse of constant logging of any faults that occur at their runtime executions. Log analysis techniques are applied to recorded logsto obtain a better overview of how to handle failures and health deterioration. Before these algorithms can be utilized in practice, the raw unstructured logs need to be converted into structured log events. This process is performed by log parsers, which are accessible in two different modes – offline and online. While offline log parsers have a predefined knowledge base containing templates and conversion rules, online log parsers learn new templates on the job. This paper focuses on surveying and creating a comparative study on online log parses by analysing the type of technique used, efficiency and accuracy of the parser on a given dataset, time complexity, and their effectiveness in motivating applications.
{"title":"Survey on Online Log Parsers","authors":"S. Tejaswini, Azra Nasreen","doi":"10.35940/IJEAT.E2816.0610521","DOIUrl":"https://doi.org/10.35940/IJEAT.E2816.0610521","url":null,"abstract":"Technological dependence is growing in leaps and\u0000bounds as days progress. As a result, software applications are\u0000required to be up and running at all times without fail. The\u0000health and safety of these applications need to be monitored\u0000regularly by theuse of constant logging of any faults that occur\u0000at their runtime executions. Log analysis techniques are\u0000applied to recorded logsto obtain a better overview of how to\u0000handle failures and health deterioration. Before these\u0000algorithms can be utilized in practice, the raw unstructured logs\u0000need to be converted into structured log events. This process is\u0000performed by log parsers, which are accessible in two different\u0000modes – offline and online. While offline log parsers have a predefined knowledge base containing templates and conversion\u0000rules, online log parsers learn new templates on the job. This\u0000paper focuses on surveying and creating a comparative study on\u0000online log parses by analysing the type of technique used,\u0000efficiency and accuracy of the parser on a given dataset, time\u0000complexity, and their effectiveness in motivating applications.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84809085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/ijitee.h9186.0610821
Chandra Pal Kushwah, Kuruna Markam
Bidirectional in recent years, Deep learning performance in natural scene image processing has improved its use in remote sensing image analysis. In this paper, we used the semantic segmentation of remote sensing images for deep neural networks (DNN). To make it ideal for multi-target semantic segmentation of remote sensing image systems, we boost the Seg Net encoder-decoder CNN structures with index pooling & U-net. The findings reveal that the segmentation of various objects has its benefits and drawbacks for both models. Furthermore, we provide an integrated algorithm that incorporates two models. The test results indicate that the integrated algorithm proposed will take advantage of all multi-target segmentation models and obtain improved segmentation relative to two models.
{"title":"Semantic Segmentation of Satellite Images using Deep Learning","authors":"Chandra Pal Kushwah, Kuruna Markam","doi":"10.35940/ijitee.h9186.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9186.0610821","url":null,"abstract":"Bidirectional in recent years, Deep learning performance in natural scene image processing has improved its use in remote sensing image analysis. In this paper, we used the semantic segmentation of remote sensing images for deep neural networks (DNN). To make it ideal for multi-target semantic segmentation of remote sensing image systems, we boost the Seg Net encoder-decoder CNN structures with index pooling & U-net. The findings reveal that the segmentation of various objects has its benefits and drawbacks for both models. Furthermore, we provide an integrated algorithm that incorporates two models. The test results indicate that the integrated algorithm proposed will take advantage of all multi-target segmentation models and obtain improved segmentation relative to two models.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88696291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noise in the communication channel is well established to be a threat to digital bit transmission, resulting in many mistakes at the bit level. Different modulation methods are studied in terms of BER, probability of error and SNR to better comprehend this. In the presence of specific levels of noise in the communication channel, this analysis yields an interesting conclusion that advises the employment of particular modulation methods. A comprehensive analysis of several modulation schemes has been considered. Those include On-Off Key modulation (OOK), Binary Phase Shift Key (BPSK), Quadrature Phase Shift Key (QPSK), Pulse Amplitude Modulation (PAM) and 8-Phase Shift Key (8-PSK). This analysis can aid in the selection of a modulation approach based on the channel condition.
{"title":"BER of Various Modulation Techniques Under Atmospheric Turbulences","authors":"Priyanka Bhardwaj, Aadi Jain, Manveen, Richita Kamal, Rishab Chittlangia","doi":"10.35940/ijeat.e2797.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.e2797.0610521","url":null,"abstract":"Noise in the communication channel is well\u0000established to be a threat to digital bit transmission, resulting in\u0000many mistakes at the bit level. Different modulation methods are\u0000studied in terms of BER, probability of error and SNR to better\u0000comprehend this. In the presence of specific levels of noise in the\u0000communication channel, this analysis yields an interesting\u0000conclusion that advises the employment of particular modulation\u0000methods. A comprehensive analysis of several modulation\u0000schemes has been considered. Those include On-Off Key\u0000modulation (OOK), Binary Phase Shift Key (BPSK), Quadrature\u0000Phase Shift Key (QPSK), Pulse Amplitude Modulation (PAM) and\u00008-Phase Shift Key (8-PSK). This analysis can aid in the selection\u0000of a modulation approach based on the channel condition.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85202363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.35940/ijitee.h9223.0610821
M. Patel, K. Dave
This research paper deals with the characterization of friction stir welding aluminium 7108 with twin stir technology. The coupons of the above metal were friction stir welded using a cylindrical pin with counter-rotating twin stir technology using at constant speed 900, 1200, 1500,1800 with four different feed rates of 30,50,70,90 mm/min. Microstructure examination showed the variation of each zone and their influence on the mechanical properties. Also, tensile strength and hardness measurements were done as a part of the mechanical characterization and correlation between mechanical and metallurgical properties and deduced at the speed of 1500 rpm. Friction stir welding process parameters such as tool rotational speed (rpm), tool feed (mm/min) were considered to find their influence on the tensile strength (MPa) and hardness (HRB). A genetic algorithm (GA) was employed by taking the fitness function as a combined objective function to optimize the friction welding process parameters to predict the maximum value of the tensile strength and hardness. The confirmation test also revealed good closeness to the genetic algorithm predicted results and the optimized value of process parameters for different weights of the tensile and hardness have been predicted in the model.
{"title":"Genetic Algorithm-Based Optimization of Friction Stir Welding Process Parameters on Aa7108","authors":"M. Patel, K. Dave","doi":"10.35940/ijitee.h9223.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9223.0610821","url":null,"abstract":"This research paper deals with the characterization of friction stir welding aluminium 7108 with twin stir technology. The coupons of the above metal were friction stir welded using a cylindrical pin with counter-rotating twin stir technology using at constant speed 900, 1200, 1500,1800 with four different feed rates of 30,50,70,90 mm/min. Microstructure examination showed the variation of each zone and their influence on the mechanical properties. Also, tensile strength and hardness measurements were done as a part of the mechanical characterization and correlation between mechanical and metallurgical properties and deduced at the speed of 1500 rpm. Friction stir welding process parameters such as tool rotational speed (rpm), tool feed (mm/min) were considered to find their influence on the tensile strength (MPa) and hardness (HRB). A genetic algorithm (GA) was employed by taking the fitness function as a combined objective function to optimize the friction welding process parameters to predict the maximum value of the tensile strength and hardness. The confirmation test also revealed good closeness to the genetic algorithm predicted results and the optimized value of process parameters for different weights of the tensile and hardness have been predicted in the model.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73094743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}