E-ISSN: 2456-2033

Our Indexing
News & Events
IJAREM: Volume 03 - No. 02, 2017


1. Determining of Critical Solid Ratio of AISI 1020 Steel by Casting Simulation
Murat Çolak, Fehim Findik
One of the most important factors within the parameters is to define the resistance formed by solid dendrites growing against flow of liquid feeding in solid-liquid region. Feeding is stopped when solid-liquid space blocked into liquid flow. This point is defined as critical solid ratio (CFS). In the present study, it is aimed to determine the values of critical solid ratio (CFS) by means of casting simulation software in the casting of sand mould by the alloying of steel casting for AISI 1020. The solidified casting is cut and the formed porosities are examined and the experimental results are compared with the results obtained from the SolidCast simulation program. The results show that the feeding activity increases and as a result porosity formation decreases with the increment of critical solid ratio in sand casting prepared in the alloying of steel casting for AISI 1020. For this part, the CFS ratio is calculated as 60% in steel casting for AISI 1020. Furthermore, in this study an exact consistency has been obtained in the results of SolidCast simulation with the real casting marks attained from the sand casting by entering the data correctly.


3. Speed Control of DC motor using Programmable Logic Controller
Raosaheb Pawar, Yogesh Shirke, Prashant Titare
In this paper, a simplified approach for speed control Of DC motor using Programmable Logic Controller (PLC) is presented. This approach is based on providing a variable dc voltage to dc motor from a fixed dc supply voltage via a PLC. PWM wave are used for switching on or off power to dc motor (armature circuit) depending on the reference (command) speed. By changing the ON and OFF time of PWM wave we can vary the duty cycle of DC motor , Thus by varying the duty cycle we could achieve effective speed and It is easy, fast and effective by this method of control to vary motor speed from 0 to 100% of rated speed. The proposed system is suitable for different industrial applications such as subway cars, trolley buses, or battery-operated vehicles.


4. A study of Evaluation of Training & Development in Selected Banks of Kolhapur City
Gunali D. Diwan
Employee training is becoming a necessity to every organisation now-a-day. Employees are entrusted different roles and responsibilities in the banks. Training and development enhances efficiency and develops a systematic way of performing duties and assigned tasks. More ever it bridges the gap between job requirement and employee present specification. This is mainly to assess the effectiveness of the various facts of training like employee's attitude towards training inputs, quality of training, and output of the training.
Evaluation of training means assessment of the impact of training on the trainee's performance and behavior. The present paper is descriptive in nature falls under the category of general review for understanding the conceptual framework of evaluation, its needs and purpose and various models adopted by organisation for evaluation purpose. Finally in conclusive remark paper suggests the most widely used model and what are the issues which lead to ignorance of evaluation as well as in the course of evaluation.


5. Review Paper on Vehicle to Vehicle Communication for a Platooning System using CAN Bus
Vaishali Satish Pawar, Y. M. Patil
This topic explains communication between vehicles. The aim of this project is to create a technology which is helpful to drive vehicles in platoon. A platoon is known as a number of vehicles where a master lead vehicle is followed by many slave trucks and passenger cars. Data such as speed, direction, braking, and destination place can be shared between the vehicles while they are in motion.


6. Assessment of health risk factors with the help of Relative Importance index
S.B.Kadam, P.R.Minde
The research was conducted in six main stages. The first stage included identifying the research problem, setting out the dissertation‟s aim and objectives and developing the research plan. The second phase included reviewing the literature related to risk assessment, health risk and risk management. The third stage was developing the questionnaire to investigate the risk factors that causes the health risk as well as the activities which causes the more occurrences of risk events. Fourth phase includes the statistical analysis for questionnaire was done by using relative importance index (R.I.I.) and weighted mean method. The fifth phase was finding out the remedial measures for the risk factors and activities based on the results obtained from the field survey and literature review. Finally in the last phase i.e. phase six conclusions of research and recommendations were then drafted.


7. Study of Water Softening Process
Aparna Ghadge and Sagar Gawande
Water softening is the removal of calcium, magnesium, and certain other metal cations in hard water. The resulting soft water is more compatible with soap and extends the lifetime of plumbing.The presence of certain metal ions like calcium and magnesium principally as bicarbonates, chlorides, and sulfates in water causes a variety of problems. Hard water leads to the buildup of limescale, which can foul plumbing, and promote galvanic corrosion. In industrial scale water softening plants, the effluent flow from the re-generation process can precipitate scale that can interfere with sewage systems.The slippery feeling experienced when using soap with soft water occurs because soaps tend to bind to fats in the surface layers of skin, making soap molecules difficult to remove by simple dilution. In contrast, in hard-water areas the rinse water contains calcium or magnesium ions which form insoluble salts, effectively removing the residual soap from the skin but potentially leaving a coating of insoluble stearates on tub and shower surfaces, commonly called soap scum.Which of these effects is considered more or less desirable varies from person to person, and those who dislike the sliminess and difficulty of washing off soap caused by soft water may harden the water by adding chemicals such as baking soda, calcium chloride or magnesium sulphate.


8. Virtual Casting: A novel approach for casting development process
Utkarsh. S. Khade, Dr. Vinayak. R. Naik, Dr. Vasudev D. Shinde
AS foundry industry is prime supplier to various manufacturing sectors. Casting process is well known to foundrymen's since ancient time and from that time continuous upgradation of knowledge is going on till today. Yet Indian and Global foundries facing a huge hurdle to get sound quality of casting as well as to maintain higher casting yield. Due to the liberalization and globalization polices of state governments, foundries have to compete from other foundries over globe and ultimately this results into increasing pricing and timing pressure to sustain in market. And practical solution to this botheration can be given by using virtual casting method. Which can be used for the complete process development and solving current problems.Till today in medium and small foundries the conventional practices are carried out for development of new casting and for elimination of the casting defects. This process will not only require a huge amount of resources but also more time hence its quit uneconomic operations. To make this process economic and fast virtual casting process can be used. In virtual casting process whole process is simulated using computer modeling software and simulation package. In virtual casting 3D designs of the given casting are made and it is given as input to simulation software and process parameters are finalized and simulation is carried out. From the result of simulation the clear idea regarding casting quality is obtained. If the results are not satisfactory the required changes is done in design, model and other process parameters and again simulated. The process is repeated till best results are obtained and same process is used for getting actual casting. Hence it will result into considerable amount of saving of resources and time which results into profit maximization. A case study is given in article to explain virtual casting process and its practical application.


9. Analysis of Watermarked Video Data for Authentication, Authorization and Data Protection
Krunal P. Rane, Deepti A. Barhate
The watermarking is a technique to embed the image into a particular video for copyright protection of the data. The embedded video is nothing but watermarked video. The watermarking is a familiar tool for content protection, authentication and authorization of web data. The watermarked video is not affect by different attacks and video processing. The embedded watermark can be extracted from watermarked video using watermark extraction process. For inserting the watermark into particular data many algorithms are implemented such as Discrete Cosine Transform, Discrete Wavelet Transform, Singular Value Decomposition, Principal Component Analysis and using neural networks. Each algorithm has its individual qualities and drawbacks also. Basically the watermarked video must be having characteristics like robustness, perceptual transparency blindness, and capacity.In this paper the compressive approach for digital video watermarking is introduced, were watermark image is embedded in to the video frame each video frame is decomposed in to sub images using 2 level Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA) Transform is applied for each block in the two bands LL & HH.[1, 2]combining the two transform improved the performance of the watermark algorithm.The watermarked video data is accessed by many users but due to embedding of watermark the data can be easily identified form hacking, pirating etc. The quality of watermarked video is to be check by measuring parameters like PSNR, Correlation factor. The PSNR checks robustness of watermarked video while perceptual transparency is checked by Correlation factor. The watermarked video is not affected by noise like salt & paper noise, white Gaussian noise, additive noise and different processing like rotation, cropping, sharpening etc. The video after extraction of watermark cannot degrade the quality of data is shows the robustness of web data.


11. Resolving Black Hole attack in Integrated Internet MANET
The integration of internet and MANETs offers ascend to heterogeneous system where viable correspondence between a fixednode in a web and a mobile node in a MANETs is a challenging task. This integration increases the application domain of MNAETs. However gateways are utilized for correspondence between them. The information going in heterogeneous system must be shielded from various types of attacks. The blackhole attack is one of the notable security dangers in integrated internet MANET. In order to provide communication in IIM, the mobile nodes have to first discover the gateway as it is important and inescapable and for this purpose the intruders utilizes the loophole to carry out their malicious behaviors. We propose an algorithm that detects and resolves the black hole attack. Simulation results show that our work is better than existing in terms of security deployment.


12. Mitigating black hole attack using Public Key Infrastructure
Umme-Haani, Syeda Fareesa Naaz, Arshia Sultana, C. Atheeq
Multi-hop wireless ad hoc network composed of wireless mobile devises communicate by relaying on intermediate node. This network characterized by lack of infrastructure, without central coordinator and constrained resources. Routing is possible by assumption that nodes in a network are cooperative, but it is not always true in distributed constrained resource environment. Attacker can perform the malicious activities by not following routing protocol stipulations, one such attack is black hole attack. In which attacker node manipulate the control message and attract the communication information towards it and then drop the information. Prior work detect and remove the black hole attack by monitoring the nodes, which is not feasible solution in hostile environment. We mitigate the black hole attack by PKI. Simulation results shows that our proposed method accurately prevent the black hole attack and hence extend the network performance.


13. Economic Growth and Poverty Reduction in India
Dr. Anuradha Tyagi
Poverty continues is a serious problem in India, with its impact on human welfare in the form of poor health, low levels of education and a poor quality of life. Unfortunately, about 33 per cent of India's population still lives in acute poverty (less than $1.25 per person per day). Thus, a careful analysis of the determinants of poverty and of various government policies that can help reduce poverty is very desirable.The role of economic growth in poverty reduction has also been supported by Deaton and Drèze (2001), Bhagwati (2001) and Datt and Ravallion (2002). Sen (1996) has strongly emphasised the need for higher government expenditure on social assistance to the poor, especially in provision of education, as the most important determinants of poverty reduction. Higher growth rates were associated with faster decline in poverty, partly because growth helped increase employment and real wages which contributed to poverty reduction. The increase in government social expenditure is also shown to have contributed significantly to poverty alleviation. However, it is also observe that higher GDP growth increased government revenues, which enabled the government to increase expenditure on the social sectors. Overall, this evidence suggests that for rapid reduction in poverty, sustaining high growth is the most crucial element. Growth is considered pro-poor if growthpromoting policies combine with policies that allow the poor to participate fully in the opportunities unleashed and so contribute to that growth. This includes policies to make labour markets work better, remove gender inequalities and increase financial inclusion.This paper empirically examines the relation between economic growth and poverty alleviation.


Arti Mandlik, Ms. Bharti Patil
The use of Wireless Sensor Network (WSN) to handle more complex functions is increasing drastically. Tree Networks are widely used in Sensor Networks. The sensor networks are self organizing wireless networks. We proposed methods and algorithms to implement ETPS (Efficient Tree-Based Self Organizing Protocol) a new model of Network and algorithms to route network it can enhance dependability and effectiveness of correspondence. In ETSP, The Nodes are partitioned into: Non- Network and Network node. Arrange node can convey to their neighboring node. Non-Network node assemble the communicate parcel. For joining the system we utilize self sorting out process, in that we utilize diverse measurements are utilized, for example, youngster node, bounce, correspondence remove and leftover vitality to reach available sink node. we select the sink hub with maximum weight. Tree Network is framed layer by layer when Non-Network hub can be changed into Network hub. These tree organize topology is balanced powerfully to adjust vitality utilization and delay arrange life time. We take the experimental simulation with NS2 to assess ETSP. The results of simulation show that our proposed convention can build a tree-based network with higher success rate at very fast timing.


15. FPA System Modeling to Predict Performance of H3BO3 (nm) And Tio2(μm) As Lubricants in Machining
P. Shreenivasa Rao, P.V.J Mohan Rao
Now a day's turning is an extensively used metal removal process in manufacturing industry that involves generation of high cutting forces and temperature. Lubrication becomes critical to minimize the effects of these forces and temperature on cutting tool and workpiece. Development of lubricants that are eco-friendly is acquiring importance. For this a specific study on the application of MQL (Minimum Quantity Lubricants) as lubricating oil in turning operation is going on. In the present work a specific study on the application of Nano solid boric acid with titanium dioxide (μm) suspended in lubricating oil in turning of EN 24 steel with carbide tool. SAE-40 is taken as base lubricants and boric acid solid lubricant of (50, 60 80, 538nm) particles size and titanium dioxide (100μm) with different weight percentages taken as suspensions. Variations in cutting forces, tool temperatures and surface roughness are studied. For this Boric acid Nano particles were prepared by using High Energy Ball Milling. Ball milling which was carried out for the total duration of 15 hours. The sample was taken out after every 5 hours of milling for characterizing. The Nano Structured boric acid particle size measurement was done by X-Ray Diffractometer which was supported by the XRD Scherer's formula. It was found that the particle size got reduced from 538nm to 63nm for the period of 15 hrs. In present work, the obtained results were predicted by usingFPA (flower pollination algorithm) is developed. For the prediction of output parameters of the lathe machining process is modelled using two input variable parameters such as particle size of boric acid (nm) and weight percentage of titanium dioxide (μm). Then the model predictions are compared with a set of reliable experimental data available, and it is found So that proposed FPAgives the results which are well in agreement with experimental results.


16. Induction Motor Fault Diagnosis Using Microcontroller
Pratik Padmakar Sutar
80% of industrial loads are Induction Motors. These machines suffer mechanical, thermal, and electrical stresses which are uncontrollable. Early detection and diagnosis of faults is desirable for improving operation effectiveness and to avoid harmful and wrecking outcome preventing losses on financial side as well. Detection and diagnosis can be done in various ways such as vibration monitoring, thermal monitoring, chemical monitoring, and acoustic emission monitoring and all of them require costly sensors and specialized tools, whereas current monitoring is very cost effective one. In this paper a microcontroller is proposed which helps in gathering of input parameters to used them for analysis, diagnosis, and mitigation of faults.


IJAREM Features