Seismic performance of multi-storeyed building on sloping ground
The buildings situated on hill slopes in earthquake prone areas are generally irregular, torsionally coupled & hence, susceptible to serve damage when affected by earthquake ground motion. Such buildings have mass & stiffness varying along the vertical & horizontal planes, resulting the center of mass & center of rigidity do not coincide on various floors, hence they demand torsional analysis, in addition to lateral forces under the action of earthquakes. These unsymmetrical buildings require great attention in the analysis & design. Analysis of hill buildings is somewhat different than the buildings on leveled ground, since the column of hill building rests at different levels on the slope. The shorter column attracts more forces & undergoes damage, when subjected to earthquakes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Tabu Search Enhanced Artificial Bee Colony Algorithm to Solve Economic Load Dispatch with Prohibited operating zones and Ramp Rate Limit Constraints
This paper proposes a new Tabu Search Enhanced Artificial Bee Colony (TSEABC) algorithm that integrates the concepts of Tabu Search (TS) and Artificial Bee Colony (ABC) techniques. The proposed algorithm is applied to solve Economic Load Dispatch(ELD) problems considering of prohibited operating zones and ramp rate limits of thermal units, capacity limits and power balance constraints. In the proposed TSEABC algorithm, the best attributes of both TS and ABC are utilized, and it is capable of finding the better optimal solution for the combinatorial optimization problems. For validating the proposed algorithm, it has been tested on the standard three, six and fifteen unit test systems. The comparison of results show that the proposed TSEABC algorithm is well suitable for solving non-linear economic dispatch problems, and it is doing better than the EP, PSO and other modern metaheuristic optimization methods reported in the recent literatures.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Performance Evaluation of BLDC Motor using Intelligent Hybrid Controllers for Position Control
This paper presents the development and implementation of a new and practical fuzzy switching position controller for process industry control. Compatible with the structure of a bang–bang controller, a two-input fuzzy switching position controller with five rules is proposed. The idea is based on constructing a fuzzy switching control law which is functionally analogous to a traditional bang–bang controller. Fuzzy logic rules are used to enable an improved version of the conventional bang–bang control. The objective is to replace the conventional bang–bang controller with the proposed fuzzy switching position controller. A modified three-stage bang–bang controller is also designed and implemented. This controller is tested under the same conditions as that of the proposed fuzzy switching position controller, and its performance is used as a basis of comparison by which both controllers are measured. Both controllers are developed using MATLAB using the position control of a brushless dc motor drive found in the majority of these new robotic devices. Simulation Results shows that the fuzzy switching position controller produces adequate control performance, particularly in handling nonlinearities and external disturbances. The efficacy of the fuzzy switching position controller is demonstrated by its positive results, practicality, and feasibility in the process industry sector, when compared with a modified traditional bang–bang controller.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Photomorphing detection using demosaicing
The field of computer graphics is rapidly maturing to the point where human subjects have difficulty distinguishing photorealistic computer generated images (PRCG) from photographic images (PIM). In legal situations and in the intelligence community where photographs are used as evidence, it is crucial to understand whether the image is authentic or forged. So, it is very essential to develop the system which can distinguish between original images and computer generated images. Computer graphics many softwares are capable of generating highly photorealistic images that can be impossible to differentiate from photographic images. Therefore, classifying photographic images and photorealistic computer graphics has become an important problem for image forgery detection. So, we are providing the novel approach for this problem using Demosaicing algorithm. Demosaicing algorithm is having some special features. Missing color values are determined from a weighted linear combination of neighboring pixels. The process of demosaicing interpolates the raw image to produce at each pixel an estimate for each color channel. With proper analysis, traces of demosaicing are exhibited in the peak of an analysis signal. The presence of demosaicing indicates the image is from a digital camera rather than generated by a computer.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Integrating Hybrid Wind Solar Energy Source into Distribution Grid with Reduced Harmonics
The ever-increasing energy consumption, fossil fuels costs and exhaustible nature and worsening of global environment have created a boom to renewable energy based generation system. Among the renewable energy sources, solar and wind energy are infinite and high potential sources. Thus the fusion of these two energy system is best suited for the reduction of fossil fuel in energy generation. When is connected to grid, it causes power quality problem because of its fluctuating nature. This proposed work describes the methodology for improving power quality of the grid system interfaced with hybrid wind-solar system. The proposed topology is validated through dynamic simulation using the MATLAB/Simulink Power System Toolbox.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
SRTURP: Secure routing through unobservable routing protocol for mobile Ad-hoc networks
A mobile ad hoc network consists of mobile nodes that communicate in an open wireless medium. Adversaries can launch analysis against the routing information embedded in the routing message and data packets to detect the traffic pattern of the communications; thereby they can obtain the sensitive information of the system, like the identity of a critical node. Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability properties since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, we define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then we propose an unobservable secure routing scheme Secure Un-Obseravable Routing Protocol to offer complete unlinkability and content unobservability for all types of packets. On- Demand secure Routing protocol is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that SRTURP can well protect user privacy against both inside and outside attackers. This Secure Routing Protocol is implemented on ns2, and evaluated its performance by comparing with Ad-hoc On Demand Distance Vector and MASK. The simulation results show that SRTURP not only has satisfactory performance compared to Ad-hoc On Demand Distance Vector, but also achieves stronger privacy protection than existing schemes like MASK.A mobile ad hoc network consists of mobile nodes that communicate in an open wireless medium. Adversaries can launch analysis against the routing information embedded in the routing message and data packets to detect the traffic pattern of the communications; thereby they can obtain the sensitive information of the system, like the identity of a critical node. Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability properties since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, we define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then we propose an unobservable secure routing scheme Secure Un-Obseravable Routing Protocol to offer complete unlinkability and content unobservability for all types of packets. On- Demand secure Routing protocol is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that SRTURP can well protect user privacy against both inside and outside attackers. This Secure Routing Protocol is implemented on ns2, and evaluated its performance by comparing with Ad-hoc On Demand Distance Vector and MASK. The simulation results show that SRTURP not only has satisfactory performance compared to Ad-hoc On Demand Distance Vector, but also achieves stronger privacy protection than existing schemes like MASK.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Symmetry filtering method of clutter reduction for GPR based buried landmine detection
Modern landmines are mainly non- metallic or contain small amount of metal, that they cannot be detected using conventional detectors. Ground Penetration Radar (GPR) is capable of detecting shallowly buried non-metallic objects. GPR is the best alternative for detecting non-metallic landmines. But, GPR also performs inadequately due to the presence of clutter which dominates the data and obscures the main information. In this paper symmetrical ?ltering method is going to be applied on measured B-scan data to reduce unsymmetrical clutter. Results of the symmetry ?ltering and symmetry point location algorithm are presented.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Generation of Beams from Conventional and Non-Conventional Antennas using Phase Control
Antenna arrays are particularly preferred as they provide flexibility in design, excellent gain and high directivity. They allow optimization via the tapering of amplitude, the special distribution, the phase distribution or their combination providing also the option to generate specific sector and cosec beams for advanced radar applications. The narrow beams obtained from parabolic antennas or from an array of radiators are used to achieve high gain, precise direction finding and high degree of resolution of complex targets. But these narrow beams require multi scans which is highly involved and time consuming. These difficulties can be overcome by providing flat beams which are broad basically. The phase only control allows a fast scanning of the beam without moving the antenna structure. In this paper an attempt is made to design an array of antennas to produce shaped beams like sectors by introducing an optimally designed phase distribution. The results of this paper are extremely useful for designers of antenna arrays for scanning and non-scanning radar and communication applications.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Performance evaluation of two way relaying with hardware impairments
Practical transceivers have hardware impairments, which may affect the data rate of a system. In this paper, two way relaying with hardware losses is considered and is different from previous methods, which considers only ideal hardware case. Here both hops are subjected to independent and non-identical distributed nakagami-m fading variants with Amplify-and-Forward (AF) protocol and Decode-and-forward (DF) protocol. Hardware impairments are calculated at source, relay and destination. The outage probability is calculated with a function effective end-to-end signal-to-noise-and-distortion ratio (SNDR). In a similar way ergodic capacity also achieved. For low SNR values losses will be less but substantial. And for high SNR values losses will increase without bounds. But for SNDR case, increasing SNR makes some constant value of threshold, which is inversely proportional to the SNDR, called SNDR ceiling. Finally, this paper suggests the design guidelines for selecting hardware equipment to overcome hardware impairments with maximum extent.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Simulation of custom power devices using PSCAD/EMTDC
For some decades, power quality did not cause any problem, because it had no effect on most of the loads connected to the electrical distribution system. Voltage sags is the most common type of power quality disturbance in the distribution. Recently various power electronic devices are proposed for this purpose. Among these devices special attention was given to the family based on the VSC technology for faster response. This project intends to investigate mitigation technique that is suitable for different type of voltage sags source with different type of loads. The mitigation techniques that will be studied are such as Dynamic Voltage Restorer (DVR), Distribution Static Compensator (DSTATCOM). The simulation is done using PSCAD/EMTDC software.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]