Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342423
Sai Satish Inala, P. Pushpalatha
As technology will increase as quality of circuits additionally will increase that tends face reliableness challenges and creates want for fault-tolerant implementations. Signal processing and communication circuits are effected by soft errors. The complexity increases as protection against soft errors increases in many applications. There are distinct advancements in VLSI technology i.e., number of circuits called Fast Fourier Transforms (FFTs) increased on a small chip. In this case we have to implement the fault tolerance in order to preserve the data efficiently. There are distinct techniques exist to achieve fault tolerance. The most used technique is algorithmic-primarily based fault tolerance (ABFT) techniques that attempt to use recursive properties to find and accurate errors. But in advanced systems it is not unusual that variety of the filters function in parallel, as an instance a filters having same response are connected in parallel and subjected to different inputs. ECC (error correction codes) is the one of the method to detect and correct errors in FFTs. We propose different multipliers in FFTs architecture for which multiplier is most suitable in whole design. In this proposed method each filter can be considered as a bit. This method allows most efficient protection when there is large number of parallel filters present. The method is evaluated employing a Array, changed booth, Wallace tree and Dadda multipliers showing the potency in terms of speed, low power consumption and space.
{"title":"Relative performance of multipliers: A fault tolerance perspective for parallel FFTs","authors":"Sai Satish Inala, P. Pushpalatha","doi":"10.1109/ICRITO.2017.8342423","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342423","url":null,"abstract":"As technology will increase as quality of circuits additionally will increase that tends face reliableness challenges and creates want for fault-tolerant implementations. Signal processing and communication circuits are effected by soft errors. The complexity increases as protection against soft errors increases in many applications. There are distinct advancements in VLSI technology i.e., number of circuits called Fast Fourier Transforms (FFTs) increased on a small chip. In this case we have to implement the fault tolerance in order to preserve the data efficiently. There are distinct techniques exist to achieve fault tolerance. The most used technique is algorithmic-primarily based fault tolerance (ABFT) techniques that attempt to use recursive properties to find and accurate errors. But in advanced systems it is not unusual that variety of the filters function in parallel, as an instance a filters having same response are connected in parallel and subjected to different inputs. ECC (error correction codes) is the one of the method to detect and correct errors in FFTs. We propose different multipliers in FFTs architecture for which multiplier is most suitable in whole design. In this proposed method each filter can be considered as a bit. This method allows most efficient protection when there is large number of parallel filters present. The method is evaluated employing a Array, changed booth, Wallace tree and Dadda multipliers showing the potency in terms of speed, low power consumption and space.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342469
Sandeep Kumar, Renuka Mahajan, Naresh Kumar, S. Khatri
The world is exceedingly reliant on the Internet. Nowadays, web security is biggest challenge in the corporate world. It is considered as the principle framework for the worldwide data society. Web applications are prone to security attacks. Web security is securing a web application layer from attacks by unauthorized users. A lot of the issues that occur over a web application is mainly due to the improper input provided by the client. This paper discusses the different aspects of web security and it's weakness. The main elements of web security techniques such as the passwords, encryption, authentication and integrity are also discussed in this paper. The anatomy of a web application attack and the attack techniques are also covered in details. This paper explores a number of methods for combatting this class of threats and assesses why they have not proven more successful. This paper proposes a better way for minimizing these type of web vulnerabilities. It also provides the best security mechanisms for the said attacks.
{"title":"A study on web application security and detecting security vulnerabilities","authors":"Sandeep Kumar, Renuka Mahajan, Naresh Kumar, S. Khatri","doi":"10.1109/ICRITO.2017.8342469","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342469","url":null,"abstract":"The world is exceedingly reliant on the Internet. Nowadays, web security is biggest challenge in the corporate world. It is considered as the principle framework for the worldwide data society. Web applications are prone to security attacks. Web security is securing a web application layer from attacks by unauthorized users. A lot of the issues that occur over a web application is mainly due to the improper input provided by the client. This paper discusses the different aspects of web security and it's weakness. The main elements of web security techniques such as the passwords, encryption, authentication and integrity are also discussed in this paper. The anatomy of a web application attack and the attack techniques are also covered in details. This paper explores a number of methods for combatting this class of threats and assesses why they have not proven more successful. This paper proposes a better way for minimizing these type of web vulnerabilities. It also provides the best security mechanisms for the said attacks.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127234856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342512
S. M. Hussain, Maryam Mubarak Muhammad Al Balushi, A. S. Omar, A. Singh, Chandrasekhar Ramaiah
One of the challenging and difficult tasks is to get the students actively engaged inside the classroom and help them to embrace online material off campus. As stated in [17] More times students spend engaged, the more they can enhance their learning skills. For a long time, a good number of teaching tools and techniques have been in practice to address the problem of student engagement [2]. In today's digital technology, students are showing a keen interest in adapting digital devices like mobile phones and laptops[10]. Recent studies shows that the teaching with mobile technologies is increasing because of its positive impact on students' engagement which in turn improves student experiences[1,2]. The research aims at briefing the design and implementation of Flipped teaching using e-tools such as Titan pad and Flubaroo and its impact on the Students Performance at Institutional level in Oman. A 10:2 Methodology proposed by S. Hurst in Reading Horizon [18] has been adapted. The Cohort students were 42 students were involved in this practice from two sessions. Many different activities were conducted in the class to simulate the design such as Group activities, Individual activities, Quizzes etc. Both type of data Qualitative and Quantitative are analysed and it was proved to be successful from the results obtained and hence enhancing students learning experiences and their performance.
{"title":"E-learning tools to enhance student learning experience: A practice on control system engineering","authors":"S. M. Hussain, Maryam Mubarak Muhammad Al Balushi, A. S. Omar, A. Singh, Chandrasekhar Ramaiah","doi":"10.1109/ICRITO.2017.8342512","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342512","url":null,"abstract":"One of the challenging and difficult tasks is to get the students actively engaged inside the classroom and help them to embrace online material off campus. As stated in [17] More times students spend engaged, the more they can enhance their learning skills. For a long time, a good number of teaching tools and techniques have been in practice to address the problem of student engagement [2]. In today's digital technology, students are showing a keen interest in adapting digital devices like mobile phones and laptops[10]. Recent studies shows that the teaching with mobile technologies is increasing because of its positive impact on students' engagement which in turn improves student experiences[1,2]. The research aims at briefing the design and implementation of Flipped teaching using e-tools such as Titan pad and Flubaroo and its impact on the Students Performance at Institutional level in Oman. A 10:2 Methodology proposed by S. Hurst in Reading Horizon [18] has been adapted. The Cohort students were 42 students were involved in this practice from two sessions. Many different activities were conducted in the class to simulate the design such as Group activities, Individual activities, Quizzes etc. Both type of data Qualitative and Quantitative are analysed and it was proved to be successful from the results obtained and hence enhancing students learning experiences and their performance.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122284111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342414
Y. Klochkov, E. Klochkova, I. Krasyuk, S. Krymov, D. Gasyuk, N. Akobiya
This article considers questions of improvement quality management systems in small-sized ownership organizations, and suggests a procedure for an effective customer's satisfaction management. An analysis of risk of losing clients was carried out, and provided examples of corrective actions on the basis of using MS Project. As a result: the level of customer satisfaction has grown, the number of projects that have been fulfilled in violation of deadlines has decreased, management has been able to make better decisions about new projects.
{"title":"An approach to decrease the risk of losing customers","authors":"Y. Klochkov, E. Klochkova, I. Krasyuk, S. Krymov, D. Gasyuk, N. Akobiya","doi":"10.1109/ICRITO.2017.8342414","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342414","url":null,"abstract":"This article considers questions of improvement quality management systems in small-sized ownership organizations, and suggests a procedure for an effective customer's satisfaction management. An analysis of risk of losing clients was carried out, and provided examples of corrective actions on the basis of using MS Project. As a result: the level of customer satisfaction has grown, the number of projects that have been fulfilled in violation of deadlines has decreased, management has been able to make better decisions about new projects.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342435
Kavya Gupta, T. Dangayach, Girish Kumar, Piyush Gupta
The paper proposes a methodology for the evaluation of disassembly features of an automotive system and constructs an overall metric called the Disassembly Index. For this, various attributes related to design, cost, etc. are considered. The methodology is illustrated using the case study of an automobile clutch system. It is envisaged that this will help in redesigning the system(s) with an overall objective of reducing time, effort and expenditure involved in the automobile servicing process.
{"title":"Disassembly index evaluation of automotive systems using graph theory and AHP","authors":"Kavya Gupta, T. Dangayach, Girish Kumar, Piyush Gupta","doi":"10.1109/ICRITO.2017.8342435","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342435","url":null,"abstract":"The paper proposes a methodology for the evaluation of disassembly features of an automotive system and constructs an overall metric called the Disassembly Index. For this, various attributes related to design, cost, etc. are considered. The methodology is illustrated using the case study of an automobile clutch system. It is envisaged that this will help in redesigning the system(s) with an overall objective of reducing time, effort and expenditure involved in the automobile servicing process.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131053887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342496
N. Khera, Divya Shukla, Priya Sharma, I. Dar
This paper presents the development of microcontroller based lemon ripening condition monitoring system using National Instrument LabVIEW software. Ripening of the lemon occurs on its plant and is generally characterized from the changes in its color, size and the acidic level. In this paper, the ripening stages of the lemon are analyzed based upon change in their in colors at different stages. The ripening stages of lemon at the plant are analyzed directly from its image obtained from the wireless camera interfaced with the microcontroller board. The image data file is wirelessly transferred and stored using Wi-Fi communication in Dropbox. The image data file is retrieved from gmail server and is processed in LabVIEW to monitor the condition of lemon. On identifying the ripening condition of lemon, an email is send to the intended user account for picking the lemon and preventing it from over ripening.
{"title":"Development of microcontroller based lemon ripening condition monitoring system","authors":"N. Khera, Divya Shukla, Priya Sharma, I. Dar","doi":"10.1109/ICRITO.2017.8342496","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342496","url":null,"abstract":"This paper presents the development of microcontroller based lemon ripening condition monitoring system using National Instrument LabVIEW software. Ripening of the lemon occurs on its plant and is generally characterized from the changes in its color, size and the acidic level. In this paper, the ripening stages of the lemon are analyzed based upon change in their in colors at different stages. The ripening stages of lemon at the plant are analyzed directly from its image obtained from the wireless camera interfaced with the microcontroller board. The image data file is wirelessly transferred and stored using Wi-Fi communication in Dropbox. The image data file is retrieved from gmail server and is processed in LabVIEW to monitor the condition of lemon. On identifying the ripening condition of lemon, an email is send to the intended user account for picking the lemon and preventing it from over ripening.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342518
Mohammed Saud Al-Adhoobi, Manju Jose, A. Singh
The aim of this study is to conduct an evaluation review in terms of road safety procedures and experiments undertaken in Oman and GCC Countries as well as worldwide. The Road Safety Audit is a fundamental and driven process to accomplish a thoughtful study of traffic safety. The research paper examines the need for road safety audits and reviews. Different international practices of road safety audits are discussed. Critical evaluation, as well as the role of road safety awareness, is also performed.
{"title":"A review of international practices of road safety audits","authors":"Mohammed Saud Al-Adhoobi, Manju Jose, A. Singh","doi":"10.1109/ICRITO.2017.8342518","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342518","url":null,"abstract":"The aim of this study is to conduct an evaluation review in terms of road safety procedures and experiments undertaken in Oman and GCC Countries as well as worldwide. The Road Safety Audit is a fundamental and driven process to accomplish a thoughtful study of traffic safety. The research paper examines the need for road safety audits and reviews. Different international practices of road safety audits are discussed. Critical evaluation, as well as the role of road safety awareness, is also performed.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342514
Y. A. Saidi, A. Singh, S. K. Jha
Food manufacturing sector is growing with accelerated speed in Oman as well as in other countries. Manufacturing sector seek to achieve the food security and to prevent food defect. There are many factors that have impact on the manufacturing sector, one of them is job satisfaction of the employees. To overcome this, we need to understand the factors which are related to job satisfaction. In this research paper different parameters which lead towards job satisfaction are identified. Few of these parameters are top management, pays, promotion, coworkers and line manager, job security and organization culture. These different parameters are identified and evaluated for job satisfaction.
{"title":"Evaluation of job satisfaction in food manufacturing sector in Oman","authors":"Y. A. Saidi, A. Singh, S. K. Jha","doi":"10.1109/ICRITO.2017.8342514","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342514","url":null,"abstract":"Food manufacturing sector is growing with accelerated speed in Oman as well as in other countries. Manufacturing sector seek to achieve the food security and to prevent food defect. There are many factors that have impact on the manufacturing sector, one of them is job satisfaction of the employees. To overcome this, we need to understand the factors which are related to job satisfaction. In this research paper different parameters which lead towards job satisfaction are identified. Few of these parameters are top management, pays, promotion, coworkers and line manager, job security and organization culture. These different parameters are identified and evaluated for job satisfaction.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342455
Shilpi Chawla, Gaurav Dubey, A. Rana
An unexpected increase in the application of social web sites has led to the need in development of a very robustful and trust worthy systems and varied machinery forms in order to analyze such large forms of data and their ware houses which is being collected from various industries. We are always eager and excited to know what people think what they feel and perceive about various aspects of living and non-living beings. In need to understand and analyze various traits of behavior and the varying personality there is a need of opinion mining. It is a collection of all the extracted information from all the available resources and possible instances which could be in the form of hidden emotions, paragraphs and could be text, urban language and various un-identified representations. It is not only related topics like sensex, politics, finance and other meaningful words, but represents many things in the wide area of application. Almost all the sites have provided the option to display and present various medias and their views on various real life events. They can share various aspects of philosophy too and many more. They can represent various opinions on various streams of life which has really become crucial in our daily life to analyze the pattern in which things are exponentially growing. This research paper provides you with sentimental analysis of various smart phone opinions on smart phones dividing them Positive, Negative and Neutral Behavior. This is basically being obtained by studying the various posts being posted by varied number of users considering their areas of interest categorizing the smart phones. Analysis of plenty of words coupled in a sentence represent various sentiments of users and the various experiences and impact that product has given them. This analysis compiles a structural modeling approach and Bayesian Interface system to identify the polarity of the opinion which subsequently classifies positive and negative opinions.
{"title":"Product opinion mining using sentiment analysis on smartphone reviews","authors":"Shilpi Chawla, Gaurav Dubey, A. Rana","doi":"10.1109/ICRITO.2017.8342455","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342455","url":null,"abstract":"An unexpected increase in the application of social web sites has led to the need in development of a very robustful and trust worthy systems and varied machinery forms in order to analyze such large forms of data and their ware houses which is being collected from various industries. We are always eager and excited to know what people think what they feel and perceive about various aspects of living and non-living beings. In need to understand and analyze various traits of behavior and the varying personality there is a need of opinion mining. It is a collection of all the extracted information from all the available resources and possible instances which could be in the form of hidden emotions, paragraphs and could be text, urban language and various un-identified representations. It is not only related topics like sensex, politics, finance and other meaningful words, but represents many things in the wide area of application. Almost all the sites have provided the option to display and present various medias and their views on various real life events. They can share various aspects of philosophy too and many more. They can represent various opinions on various streams of life which has really become crucial in our daily life to analyze the pattern in which things are exponentially growing. This research paper provides you with sentimental analysis of various smart phone opinions on smart phones dividing them Positive, Negative and Neutral Behavior. This is basically being obtained by studying the various posts being posted by varied number of users considering their areas of interest categorizing the smart phones. Analysis of plenty of words coupled in a sentence represent various sentiments of users and the various experiences and impact that product has given them. This analysis compiles a structural modeling approach and Bayesian Interface system to identify the polarity of the opinion which subsequently classifies positive and negative opinions.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342440
K. Gupta, K. Kishore, S. C. Jain
This paper incorporates water distribution network (WDN) design of CSIR-CEERI, Pilani and then detecting the presence of leakage in it. For design purpose, EPANET computer software is used to execute elongated duration hydraulics and water quality simulation. The analysis results depict possibly generated pressure and flow values at respective nodes and pipes. For leak detection, emitter coefficient is introduced and then, designed network is loaded in MATLAB to apply Head Loss Ratio (HLR) algorithm, a ratio of two differences in nodal pressure values. The plot so generated reveals that pressure value reduces drastically, showing the existence of leakage in the network.
{"title":"Modeling and simulation of CEERI's water distribution network to detect leakage using HLR approach","authors":"K. Gupta, K. Kishore, S. C. Jain","doi":"10.1109/ICRITO.2017.8342440","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342440","url":null,"abstract":"This paper incorporates water distribution network (WDN) design of CSIR-CEERI, Pilani and then detecting the presence of leakage in it. For design purpose, EPANET computer software is used to execute elongated duration hydraulics and water quality simulation. The analysis results depict possibly generated pressure and flow values at respective nodes and pipes. For leak detection, emitter coefficient is introduced and then, designed network is loaded in MATLAB to apply Head Loss Ratio (HLR) algorithm, a ratio of two differences in nodal pressure values. The plot so generated reveals that pressure value reduces drastically, showing the existence of leakage in the network.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114424556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}