Mechanica 2011 - IIT Madras

April 9,10 (Mechanical)

Mechanica 2011, an annual technical festival of the Mechanical Engineering Department of IIT Madras, Chennai. At Mechanica, we present to you unparallel oppoirtunities to test your skills.

National Symposium on Rotor Dynamics - IIT Madras

December 19,20,21

Most machines have one or more rotating parts. Rotating machine elements thus form the backbone of industrial infrastructure and therefore play a pivotal role in the growth and development of the country. Rotor Dynamics is the key in design and maintenance of all such rotating machinery. This area has made tremendous strides in recent years.

ObCom 2011 - VIT

September 9

This International Conference is a major event to be conducted following the grand success of series of ObCom conferences during 2003, 2004 and 2006, which were audited by a good number of participants from Academia and Industry across the World. The past ObCom conferences received good contributions from academia, industry and research organizations. Our sponsors included governmental and non-governmental agencies like DRDO, ISTE, DIT, CSIR etc.

Want your College symposium details Here

www.tpapers.blogspot.com

SEND YOUR COLLEGE SYMPOSIUMS, WORKSHOP, CONFERENCE ETC. DETAILS TO totpapers@gmail.com

Technical Papers and Symposium Details

totpapers@gmail.com

Post your papers here. Share your knowledge. Send your papers to totpapers@gmail.com Also send your college symposium, workshop, conferece, etc. Details

Abstract:

Phase Change Materials (PCM) are used in latent heat storage system. The use of PCM is the best method of thermal energy storage, because the process of storage is isothermal and the specific heat capacity of the PCM is infinite and hence the storage density is very high. But the thermal conductivity of PCM is manifestly low. In order to counterbalance that Nanoparticles are utilized.  The selection of PCM plays vital role in the thermal energy storage system. In this paper an attempt is made to provide information on Phase Change Materials for thermal energy storage for various applications and the use of proper nanoparticle for it. This paper also assists to enhance the rate of heat transfer while charging and discharging of stored thermal energy.

To Download Full Paper CLICK HERE
Abstract:

Shape change and dimension change in association with the plastic flow of residual stresses are the perennial problems as far as welding is concerned. Apart from shape and dimensional changes the distortion poses problem of difficulties on further assembly and maintaining the aesthetics.   Correcting distortion involves heavy cost and time and in many cases the correction becomes impossible. These difficulties prompt to develop methods to control distortion during various stages of fabrication. They involve theoretical prediction and proper sequencing to balance the heat input to control distortion rather than correcting it after occurring. It is to be noted that the prediction of distortion is not an easy task since it involves analysis of transient thermal stresses and computation of incompatible plastic strains.Hence in many, the practical application of proper sequence of weld would relieve us from the worry of distortion..
The objective was to control distortion during fabrication of a vessel which has many internals.  Each internal has a number of stiffeners which were to be welded on the internal.  Considering the amount of welding and high heat input, it is found out that the distortion would likely to be more. Further, to add to this problem, the stiffeners were to be welded only on one side of the all the internals and also the maximum thickness of internals were 8 mm. After a detailed analysis on heat input, size of the internal and one side welding, it was decided to devise proper weld sequence of each internal and also  proper sequences for the internal to the main vessel welding.  Accordingly weld sequences were devised for more than 20 internals. Due to heavy welding on one side, one of the internals got deformed slightly above the required levels.  Since heating on the component was restricted, this deformation was corrected mechanically. After fabricating all the internal assemblies they were welded to the main shell with suitable sequences so the mismatching problem was avoided.

To Download Full Paper CLICK HERE
Abstract:


This paper discusses the case study and, comparison of productivity of a component using a real time multi stationed AUTOMATED ROTARY TRANSFER LINE used for Drilling, tapping and inspecting a standard block of size 50 X 50 X 75 mm with drill size diameter 5 x 20 mm long and tapping the drill by M6 machine Tap.
 
The clamping of the component, part transfer and feed of the drilling machine spindle is done using electro-pneumatics.  The total logic of the system is based on Low cost automation with the micro controllers. The following studies are carried out 1. Time saved by component handling (loading and unloading), using pneumatic clamping, 2. Increase in productivity both qualitative and quantitative, 3. Improved repeatability and accuracy, 4. Less human intervention, indirectly reduction in operator fatigue, 5.Less rejection due to automatic controls 6.Minimization of production costs.


To Download Full Paper CLICK HERE
Abstract:


Any major industry’s success depends invariably on the location of its bases, production centers and warehouses. Thus locating the sites before establishing these units  is done by facility location and planning unit of the industry. For greater profits the facilities should be located at an optimum distance from the market , raw material procurement sites utilities like water , sand etc.   For these problems involving layout a number of algorithms are in use like ALDEP,CORELAP, CRAFT etc. But since the location of facilities have become very complex due to greater constraints these days a determined search of a good algorithm begins. This can be achieved by using GENETIC ALGORITHMS. This type of evolutionary algorithms have made the computational effort fast and accurate.

To Download Full Paper CLICK HERE

AI AUTOMATES SUBSTATION CONTROL

Posted by tpapers On 12:52 pm 0 comments
Abstract:

Controlling a substation by a fuzzy controller speeds up response time diminishes up the possibility of risks normally related to human operations. The automation of electric substation is an area under constant development Our research has focused on, the Selection of the magnitude to be controlled, Definition  and  implementation  of  the  soft  techniques, Elaboration  of  a  programming  tool  to  execute  the  control  operations. it is possible to control the desired status while supervising some important magnitudes as the voltage, power factor, and harmonic distortion, as well as the present status. The status of the circuit breakers can be control by using a knowledge  base that relates some of the operation magnitudes, mixing status variables with time variables and fuzzy sets .The  number of necessary magnitudes to a supervise and to control a substation can be very high in the present research work, many magnitudes were not included .To avoid the extensive number of required rules nevertheless , controlling a substation by a fuzzy controller has the advantage that it can speed up the response time and diminish the possibility of risks normally related to human operations.   

To Download Full Paper CLICK HERE
Abstract:


There are different types of security models in the present day world. A prototype of security model is considered in which stepper motor is controlled using micro controller. Stepper motor is only considered because of its advantages such as precise positioning and accurate placement. These can be controlled by using microprocessors but micro controllers have several advantages over  microprocessors due to which it is considered for controlling of  motor. Though there are different types of  stepper motors selection of  motor is based  on the application. Micro controllers produce very minute currents which are not sufficient to drive the stepper sufficient to drive the stepper motor, so a driver circuit is used namely ULN 2003 to amplify the current . ULN 2003 consists of 7 pairs of Darlington pair transistors which are used to amplify the current. Sensors used for protection consists of transmitter and receiver and if any thing is obstructed between them signal will be given to the controller and stepper motor rotates to that side, by connecting a camera to the stepper motor the image can be monitored. This can be further extended and can be used in robotics which is the future of the world.

To Download Full paper CLICK HERE

Abstract:

This paper proposes a novel bionic approach for enhancing reliability of power electronic system by utilizing some principles including autonomous decentralized architecture inspired from human body system. The application of bionics in power electronics is innovative from the methodological point of view. Finally a single phase full-bridge power inverter based on autonomous decentralized architecture is investigated. The investigated inverter has advantages in reliability, flexibility and user-friendliness compared to conventional centralized power converters. The proposed autonomous decentralized architecture in this paper has a promising prospect and paves the way towards future Plug and Play power electronic systems for so many significant advantages .This paper studies reliability principle in human body system and applies it to the design of power electronic system requiring high reliability. A single phase full-bridge inverter based on autonomous decentralized architecture is investigated in the method of PEB. The designed converter has advantages in reliability and flexibility compared to conventional power converter .The goal of this paper is to provide some novel ideas for designing high reliable power system based on PEB and to stimulate further discussion on application of bionics in power electronics from the methodological point of view.

To Download Full Paper CLICK HERE


Abstract:

Rapid developments in the field of power electronic devices with turn off capability like insulated gate bipolar transistors (IGBT) and gate turn off transistors (GTO), makes the voltage source converters (VSC) getting more and more attractive for High voltage direct current transmission (HVDC).This new innovative technology provides substantial technical and economical advantages for direct applications compared to conventional HVDC transmission systems based on thyristor technology. VSC Application for HVDC systems of high power rating (up to 200MW) which are currently in discussion for several projects are mentioned. The underlying technology of VSC based HVDC systems, its Characteristics and the working principle of VSC based HVDC system are also presented. This paper concludes with a brief set of guidelines for choosing VSC based HVDC systems in today’s electricity system development.

To Download Full Paper CLICK HERE
Abstract:

Power line communication (PLC) presents an interesting and economical solution for Automatic Meter Reading (AMR). If an AMR system via PLC is set in a power delivery system, a detection system for illegal electricity usage may be easily added in the existing PLC network. In the detection system, the second digitally energy meter chip is used and the value of energy is stored. The recorded energy is compared with the value at the main kilo Watt-hour meter. In the case of the difference between two recorded energy data, an error signal is generated and transmitted via PLC network. The detector and control system is proposed. The architecture of the system and their critical components are given. The measurement results are given.
This paper describes detector system for illegal electricity usage using the power lines based on the research work-taking place at the Central Power Research Institute (CPRI), Bangalore. The target of this study is to discover new and possible solutions for this problem.

To Download Full Paper CLICK HERE
Abstract:

The Exploitation of a power-distribution net work involves the scheduling of multiple maintenance and unforeseen repair tasks. The main resource is a net work subject to topological, economical and electric constraints.
A line section being maintained needs to be isolated from the rest of the network by opening all surrounding switches. Energized, which is unacceptable in most cases. Hence, these areas have to get there supply via some alternative way, i.e, service needs being restored closing switches connecting to an energized part of the network, taking into account overloading of branches, energy losses, and the cost of the necessary switching operations. Incase tasktasks are carried out in the same area ,switching operations might be shared among them. In some cases a valid net work reconfiguration might not even exist. Finally, typical scheduling constraints have to be met: resource of limited availability (man power ,vehicles etc.),view dates, priority relations ,etc. We present PLANETS, a prototype scheduler based on CHIP, generating never optimal schedules for the tasks to be carried out in one week making sure that ,at any movement in time the network is appropriately reconfigured to guarantee power supply to all consumers. The minimization criterion involves lateness, priority and total cost of the necessary switching operations.

To Download Full Paper CLICK HERE
Abstract:

Basically, the motor drive system comprises a voltage source inverter-fed induction motor (VSIM): namely a three-phase voltage source inverter and the induction motor. The squirrel-cage induction motor voltage equations are based on an orthogonal d-q reference-rotating frame where the coordinates rotate with the controlled source frequency. The paper presents a novel fuzzy logic controller for high performance induction motor drive system. The inputs to the fuzzy logic controller are the linguistic variables of speed error and change of speed error, while the output is change in switching control frequency of the voltage source inverter. In this paper a comparison between fuzzy logic controller and traditional PI controllers are presented. The results validate the robustness and effectiveness of the proposed fuzzy logic controller for high performance of induction motor drive. Simulink software that comes along with MATLAB was used to simulate the proposed model.

To Download Full Paper CLICK HERE

Abstract:

This paper is based on the project “Design and Fabrication of Vacuum Groundnut Dryer”. This is a design innovative project. The project provides solution for drying groundnuts in efficiently and economically.
Groundnut is one of the major oil seeds of India. In our Country the drying of unshelled groundnut is carried out mostly in natural lights which take longer times. Moreover the harvesting of groundnut takes place during rainy season, which affects the drying time and quality. Groundnut accounts for around 28% of the total oilseed production of the country. Annual production of seed and oil are around 5-8 and 1.5 million tons respectively. Due to industrialization of Indian economy, labour cost is becoming high for agricultural and related activities. Labour availability is also less. So there is need for alternative method in agricultural processes. Like most other agriculture crops, groundnuts are semi perishable and their quality during storage can be deteriorated through microbial proliferation, insect and rodent infestation, loss of flavor, viability and rancidity due to biochemical changes as well as absorption of certain odours and chemicals.  After going through the advantages and principles of the vacuum drying technique, and keeping the problems faced by the Indian farmers in mind, an attempt has been made for drying groundnut with the help of vacuum energy. That’s this project called VACUUM GROUNDNUT DRYER. The operating characteristics of the vacuum drying process result in significant advantages in terms of productivity, quality and energy consumption.

To Download Full Paper CLICK HERE

INTELLIGENT COOLING SYSTEM

Posted by tpapers On 3:22 am 0 comments
 Abstract:

Our paper aims at controlling the flow rate of coolant by regulating the valve by implementing FUZZY LOGIC. In conventional process the flow rate is constant over the entire engine jacket. These effects in over heating and excessive cooling, which induces thermal stresses & reduction in efficiency.. The flow rate of coolant will be controlled by control unit & intelligent sensors. In this system the sensor will sense the cylinder temperature as similar as thermostat and will control the opening and closing of water passage in the piston cylinder arrangement. The mass flow rate of water will be controlled by a valve arrangement. If the temperature of the engine cylinders increases, the sensor will sense the temperature and the signal is given to the control unit and it controls the valve opening resulting in increase in the flow rate. Similarly when the engine retards the temperature of the cylinder decreases which will be sensed by the sensor and will operate the valve. It helps in improving thermal efficiency and mechanical efficiency.

To Download Full Paper CLICK HERE

GROUND IMPROVEMENT TECHNIQUES

Posted by tpapers On 3:49 am 0 comments
Abstract:

Ground improvement is the most imaginative field of geotechnical engineering. It is a field in which the engineer forces the ground to adopt the project's requirements, by altering the natural state of the soil, instead of having to alter the design in response to the ground's natural limitations. The results usually include saving in construction cost and reduction of implementation time.
There are number of techniques available for improving the mechanical and engineering properties of the soil. However, each technique has some limitations and suit abilities to get maximum improvement in the soil conditions with minimum effort. Some of the important techniques are discussed in this paper.
To improve the strength of the soils, especially in case of granular type of soils, COMPACTION METHODES are found as best methods among all type of techniques. Based on the mechanism applied for compacting the soil, it is sub divided into different methods like dynamic compaction, blasting, vibro techniques ...etc.These are briefly discussed in this paper. 
When there are some limitations encountered for applying the above technique, grouting techniques, stabilization of soil using different admixtures can be adopted effectively which can bring variations in the soil conditions. The various types of above techniques are briefly discussed in this paper.
Finally, recent advancements in ground improving techniques using GEOTEXTILES, ELECTRIC TREATMENT METHODES are also briefly discussed in this paper. These techniques are widely used in these days.   

To Download Full Paper CLICK HERE

FIREWALLS SYSTEM

Posted by tpapers On 5:53 pm 0 comments
Abstract:

Interconnectivity is no longer an option for most organizations. The information and services available are essential to the organizations. Moreover, individual users within the organization want and need Internet access, and if this is not provided via LAN, they will use dial-up capability from their PC to an Internet service provider (ISP). However, while Internet access provides benefits to the organization, it enables the outside world to reach and interact with local network assets. This creates a threat to the organization. While it is possible to equip each workstation and server in the premises network with strong security features, such as intrusion protection, this is not a practical approach. Consider a network with hundreds or even thousands of systems, running a mix of various versions of UNIX, plus Windows. When a security flaw is discovered, each potentially affected system must be upgraded to fix this flaw. The alternative, increasingly accepted, is the firewall. The firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter. The aim of this perimeter is to protect the premises network from Internet-based attacks and to provide a single choke point where security and audit can be imposed. The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function.

To Download full Paper CLICK HERE

TOOL COMMAND LANGUAGE

Posted by tpapers On 5:34 pm 0 comments
Abstract:

TCL/TKs (Tool Command Language/Tool Kit) strength is that it is a small, interpreted, language that can be embedded, access graphics and system features, and is extensible. It also is multiplatform and has very wide support.  It can be downloaded on the NET, and it runs TCL scripts for backend processing. TCL is a language, called the Tool Command Language.  TK is a set of extensions or "widgets"(the actual official designation) that happened to be written by TCL’s author to add graphic capability to his TCL interpreter they include things like list boxes, entry boxes, radio buttons, check boxes, etc.... In fact, prior to TCL/TK 8.0, TCL was at version 7.3, and TK was at version 4, as I recall. In a way, TCL’s relationship to TK is kind of like VBs relationship to activex(which ALSO has controls as mentioned above, and are sold as one package). In fact, a VB user can program for a long time without realizing that he or she is using activex components all over the place.  
Tcl was originally intended to be a reusable command language. Its developers had been creating a number of interactive tools, each requiring its own command language. Since they were more interested in the tools themselves than the command languages they would employ, these command languages were constructed quickly, without regard to proper design.

To Download Full Paper CLICK HERE

Ethical Hacking

Posted by tpapers On 4:35 pm 0 comments
Abstract:

The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients.

To Download Full Paper CLICK HERE 

Wireless LAN Security

Posted by tpapers On 4:33 pm 0 comments
Abstract:

In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications

As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers.

To Download Full Paper CLICK HERE

Ajax Technology

Posted by tpapers On 11:51 pm 0 comments
Abstract:

In recent years, information system based on browse/server architecture (namely B/S architecture) received more favor by enterprises. Ajax technology consists of five parts. They are HTML(Hiper Text Markup Language), JavaScript, DHTML(Dynamic Hiper Text Markup Language), DOM(Document Object Model) and XML(Extensible Markup Language). With the help of cooperation and collaboration of these technologies, they can optimize the conventional enterprise information system by using an asynchronous way. Meanwhile, a quickly-responded and smoother user interface was provided. Enterprise information system with Ajax can be operated in a more efficient way, which means even use the current hardware, it can provide more load capacity, be more stable and serve more clients in parallel. In this paper: we present two kinds of information system models, one use conventional B/S architecture and the other use Ajax enhanced B/S architecture.

To Download Full Paper CLICK HERE

SEMANTIC WEB

Posted by tpapers On 7:14 pm 0 comments
Abstract:
The  web today  enables  people  to access  documents and services  on  the  Internet  but  today’s  methods  require human intelligence. The semantic  web augments  the  current web with  formalized knowledge  and well  formatted data thatcan be processed by computers. . The semantic web is a vision of information  that  is  understandable  by  computers,  so that  they can  perform  more of the tedious work involved in  finding, combining, and acting upon information on the web. Data that is generally hidden away in HTML files is often useful in some contexts,  but  there  is  no global  system  for  publishing data in such  a way  that  it  can  be  easily  processed by  anyone.  This makes Semantic Web a rational solution for the problem.. This will  enable  computers  to  assist  human  users  in  tasks and understand data the way they cannot today. The  layered  architecture  serves  as  the  basic  building block of  the  system  and supports  the  vision  of  a Web imbued with  meaning.  The  similarities  that  it  shares  with  the  object oriented programming language has  made  the  Unified Modelling  Language  usable  by  both  object-oriented Programming and semantic web development and the  Semantic Web  Browsers,  extend the  notion  of  the  Web browser  into  the Semantic Web. There will also be creation of more open market in  information  processing and computer  services  enabling the creation of new applications and services from combinations of existing service.

To Download Full Paper CLICK HERE