November - 2014 (Volume-4 ~ Issue-11 ~ Part-2)

Paper Type

::

Research Paper

Title

::

Effect of CNC Cutting Parameters on Dimensional Accuracy of circular pockets using CMM

Country

::

Egypt

Authors

::

Omar Monir Koura ||, Salah H. R. Ali

Page No.

::

01-06

::
10.9790/3021-041120106
aned
::
0.4/3021-041120106 aned
iosrjen   3021-0411-0206 iosrjen

Several factors affect the accuracy and quality of manufactured parts when machined using circular pocket cycles on CNC machining centers. Such accuracy depends to a great extent on work-piece material, the cutting conditions; namely spindle speed, feed rate, depth of cut and the structure of the fixed cycle. This accuracy plays an important role on the required tolerance and fit of manufactured parts to be assembled. The present paper studies the influence of those parameters on the accuracy and quality of milled pocket diameter with its roundness. Several specimens made of aluminum, copper and steel were pocket milled on a CNC using different cutting conditions. Coordinate Measuring Machine (CMM) was used to assess the errors in diameter and roundness measurements of machined parts. In despite of scientific advances in machining technology, however there are still clear deviations in the measurement results according to choice of the cutting condition, especially when change the type of work-piece material. Moreover, expanded uncertainty in measurement has been estimated using most effective experimental parameters and statistical analysis.

 

Keywords: - CNC-CMM, cutting conditions, CNC circular pocket cycles.

[1] Sotiris L. Omirou and Andreas C. Nearchou, An Epitrochoidal Pocket -A New Vanned Cycle for CNC Milling Machines, Robotics and Computer - Integrated Manufacturing, Vol. 25/1, pp. 73-80, February 2009.
[2] Abdullah Sütcü and Ümmü Karagöz, Effect of Machining Parameters on Surface Quality after face Machining MDF, Wood Research, Vol.57, NO.2, 2012, pp. 231-240.
[3] Kris M.Y. Law and A. Geddam, Prediction of Contour Accuracy in the End Milling of Pockets, Journal of Material Processing Technology, Vol.113, 2001, pp. 399 – 405.
[4] Kris M.Y. Law and A. Geddam, Error Compensation in the End Milling of Pockets: A Methodology, Journal of Material Processing Technology, 139, 2003, pp. 21–27.
[5] B.K. Hinds and T.S.Ong, End Milling of Circular Pockets to Meet Geometric Tolerances, Journal of Material Processing Technology, Vol.152, 2004, pp. 339 – 345.

 

Paper Type

::

Research Paper

Title

::

Performance of Communication Networks Handoff System

Country

::

Jordan

Authors

::

Ahamad Sharadgah

Page No.

::

07-10

::
10.9790/3021-041120710
aned
::
0.4/3021-041120710 aned
iosrjen   3021-0411-0210 iosrjen

Handoff phenomena has a considerable effect on the efficiency of any communication network. Probability of failures occurring because of handoff must be determined. This paper presents the parameters affecting handoff problem of communications networks and optimizing and controlling such parameters to get minimum handoff of the mobiles networks mathematically. The parameters controlling handoff phenomenon are studied and optimized using mathematical and analytical methods. It is found that handoff has bad effects on the mobiles calls, the probability of handoff failures depends strongly on the arrival rate of handoff calls such that as this rate increased the probability of handoff is decreased but this rate has a critical value. In the studied model under a given numeric values the minimum rate of arrival handoff calls was 0.675. The probability of handoff has an inverse relation with handoff rate. The probability of handoff failures depends strongly on the arrival rate of handoff calls such that as this rate increased the probability of handoff is decreased but this rate has a critical value.

 

Keywords: - communications, handoff, networks, optimization.

[1] Alagu S., Meyyappan T, 2011, "Analysis of Handoff Schemes in Wireless Mobile Network", IJCES International Journal of Computer Engineering Science , Volume1 Issue2, November 2011.
[2] Alagu.S and Meyyappan.T, 2011, "Analysis of Algorithms for handling Handoffs in wireless mobile networks‖, International Journal of P2P Networks Trends and Technology, Volume1 Issue2 – 2011.
[3] Antti M. (2007), Analysis of handoff performance in mobile WiMAX networks, master thesis, ESPOO, FINLAND.
[4] S. Shirvani Moghaddam, V.Tabataba vakili and A.Falahati, ―New Handoff Initiation Algorithm (optimum combination of Hysteresis and Threshold based methods)‖, Vehicular Technology Conference (VTC 2000) , Vol.4, 2000, pp.1567-1574.
[5] T.Salih and K.Fidenboylu, ―A comparison of the performance of two – tier cellular networks based on queuing handoff calls‖, International Journal of Signal processing, vol.1, 2004, pp. 343 – 347 .

 

Paper Type

::

Research Paper

Title

::

Multi Cold Stores Temperature control by SMS

Country

::

Sudan

Authors

::

Abdelrasoul Jabar Alzubaidi ||, Isam muhydeen

Page No.

::

11-16

::
10.9790/3021-041121116
aned
::
0.4/3021-041121116 aned
iosrjen   3021-0411-0216 iosrjen

Short message service (SMS) has become familiar and necessary to everyone, and so become the remote control. Therefore, it would be wonderful to use the short messages for applying remote control. Here, short messages are used to serve as a remote control for the co1d-stores. The remote control system consists of microcontroller , GSM modems , a personal computer (PC) , cold stores , and a designed circuit. One PC interfaced to a GSM modem serves as a remote control transmission set, while the other set of microcontroller interfaced along with the GSM modem is used to receive short messages from the transmission set. When a short message is received , it will be analyzed by the microcontroller . The analyzed message gets interpreted by the microcontroller in order to control the operations in the cold store . This remote control system can be used for any electronic or electrical devices to operate them from anywhere using this technique , wherever the mobile network is available.

 

Keywords: - control system , PC , Mobile phone , SMS , cold store, microcontroller

[1] Manual on meat cold store operation and management By/Dr G. Cano-Muz ApriI.202008 .
[2] Remote control http://en.wikipedia.org/wiki/Remotecontrol April.1O.2008.
[3] Radio control httpengineeringtalk.com/ March. 15.2008
[4] History of remote control http://www.modellbah nottcom/tqpage/ihistory.html March.5.2008.

[5] Radio control httpengineeringtalk.com/ March. 15.2008.

 

Paper Type

::

Research Paper

Title

::

Distributed freezing rooms Temperature control by power line

Country

::

Sudan

Authors

::

Isam muhydeen ||, Abdelrasoul Jabar Alzubaidi

Page No.

::

17-22

::
10.9790/3021-041121722
aned
::
0.4/3021-041121722 aned
iosrjen   3021-0411-0222 iosrjen

power line communication (PLC) is a new trend of technology . Data can be transmitted over the power lines networks. .These networks are essentially dedicated for power distribution. In this paper the power lines network will be used as a media for data transmission and reception. Modems on the terminations of the power line network are to be connected .Hence data coming from the source get modulated by the modem and pass through the power lines to reach to the destination node .In the destination another modem performs demodulation of data to hand it to the user. The data to pass through the power lines can be coming from any data source. In the design , a personnel computer is used as a data source .In the destination another personnel computer is used. The program written in the destination personnel computer performs the task of sequential control to the freezing room. An interface circuit is designed and connected to the destination personnel computer through the parallel port .The interface circuit on the other side is connected to the control panel of the freezing room. The program along with the interface circuit performs the control of the freezing room . Hence, power lines are used to serve as a remote control for the freezing rooms. The proposed remote control system consists of personal computers (PC 's) , power lines , modems ,interface circuit and freezing rooms., . The analyzed data gets interpreted by the destination personnel computer in order to control the operations in the freezing rooms . This remote control system can be used for any electronic or electrical devices to operate them from anywhere using this technique , wherever the power line network is available.

 

Keywords: - control system , PC , Modem, PLC, freeze room , power line.

[1] Manual on meat cold store operation and management By/Dr G. Cano-Muz ApriI.202008 .
[2] Remote control http://en.wikipedia.org/wiki/Remotecontrol April.1O.2008.
[3] Radio control httpengineeringtalk.com/ March. 15.2008
[4] History of remote control http://www.modellbah nottcom/tqpage/ihistory.html March.5.2008.

[5} Radio control httpengineeringtalk.com/ March. 15.2008.

 

Paper Type

::

Research Paper

Title

::

Construction Of Shape Function By Radial Point Interpolation Method For 1d Case

Country

::

Morocco

Authors

::

A. Mjidila ||, S. Jalal ||, L. Bousshine ||, Z. Elmaskaoui

Page No.

::

23-35

::
10.9790/3021-041122335
aned
::
0.4/3021-041122335 aned
iosrjen   3021-0411-0235 iosrjen

In this paper, is presented a construction of Shape function by Radial Point Interpolation Method for 1D case. The original code 2D, developed by G.R. Lui and coworkers, was modified for 1D case. Treated case is a 1D support Domain built over six nodes. Three basic functions were used to construct the shape functions, Multi-Quadratic (MQ), exponential (Exp) and Thin Plate Spline (TPS) functions.

 

Keywords - Mesh-less method, Shape function, RPIM, Basis function

[1] Rong Liu, Meshfree methods: moving beyond the finite element method (CRC Press LLC, 2003).
[2] Rong Liu and Y.T. Gu, An Introduction to Meshfree Methods and their programming, (2006 Springer )
[3] Youping Chen, James D. Lee, and Azim Eskandarian, Meshless Methods in Solid Mechanics(2006 Springer Science , Inc)

 

Paper Type

::

Research Paper

Title

::

Quantitative Risk Analysis of VSAT Communication System

Country

::

Jordan

Authors

::

Mohammed Tahseen Al Agha

Page No.

::

36-39

::
10.9790/3021-041123639
aned
::
0.4/3021-041123639 aned
iosrjen   3021-0411-0239 iosrjen

Since today's business environment is dynamic and rapidly change, many surprises and risks are taken into account appear suddenly, leading to block the implementation of engineering projects or may cause a total collapse. A risk management plan has been extensively used to deal with threats facing the activities of any organization. It aims to maximize the probability and consequences of positive events and minimize the probability and consequences of adverse events. This paper presents the advantages of using quantitative risk analysis techniques to describe what risk managers will expect and what require to be done to enhance the performance of the organization. It also provides better information to support critical decisions which help to evaluate and estimate the size of contingency reserves for the time and cost that would be appropriate for stakeholders. The technique will be used in the assessment is based on Expected Monetary Value which is a simple calculation of a value such as expected cost target, and a decision tree analysis that is a powerful utility for choosing an option from alternatives.

 

Keywords: - Contingency reserve, making decisions, risk analysis, risk assessment, risk management plan

[1] Duncan, W. R., A Guide to the Project Management Body of Knowledge (Project Management Institute Inc., Newtown Square, Pennsylvania, USA, 2013)
[2] Mark Gabel, P.E., Project Risk Management Guidance for WSDOT Projects (WSDOT, Washington, USA, 2013)
[3] Project Management Institute, Practice Standard for Project Risk Management (Project Management Institute, Inc., Pennsylvania, USA, 2009)
[4] Hopkin, Paul, Fundamentals of risk management : understanding, evaluating, and implementing effective risk management (The Institute of Risk Management, London, 2010)
[5] Knútur Birgir Otterstedt, Risk analysis on VoIP systems, master theses, Faculty of Industrial Engineering, Mechanical Engineering and Computer Science, University of Iceland, June 2011

 

Paper Type

::

Research Paper

Title

::

An optimized algorithm for a secured Wireless Sensor Networks integration into Enterprise Information System

Country

::

Morocco

Authors

::

Ouail Abroun ||, Abderrahim Tahiri ||, Noura Aknin ||, Kamal Eddine El Kadiri

Page No.

::

40-47

::
10.9790/3021-041124047
aned
::
0.4/3021-041124047 aned
iosrjen   3021-0411-0247 iosrjen

Due to it wide range of applications, Wireless Sensor Networks (WSN) represent a rapidly growing technology promising to resolve problems that were impossible in the near past. At the level of enterprises, the integration of WSN technology to their information system is an issue which stills under research, and many challenges face such merging. In this paper, we focus on the security aspect of WSN integration to Enterprises Information System (EIS) through the discussion of the different components of security that should be covered in order to consider a system as secured. From another level, our aim in this paper is to suggest an optimized algorithm that can lead to a secure use of WSN inside enterprises. To attain this purpose, we diagnose the main threats that face WSN security in those enterprise and compare the different WSN security related algorithms.

 

Keywords: - Attacks; Authentication; EIS; Middleware; Security; WSN.

[1] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless networks, 8(5), 521-534.
[2] A. S. K. Pathan, H. W. Lee & C. S. Hong, (2006, February). Security in wireless sensor networks: issues and challenges. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference (Vol. 2, pp. 6-pp). IEEE.
[3] B Cody-Kenny, D. Guerin, D. Ennis, R. Simon Carbajo, M. Huggard, & C. Mc Goldrick. (2009, October). Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes. In Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (pp. 25-30). ACM.
[4] C.Karlof, & D. Wagner, (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2), 293-315.
[5] D. G. Padmavathi, & M. Shanmugapriya, (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.

 

Paper Type

::

Research Paper

Title

::

Design and Analysis Of Composite Propeller Using ANSYS

Country

::

India

Authors

::

D.Gopaiah ||, N.Amara Nageswararao

Page No.

::

48-59

::
10.9790/3021-041124859
aned
::
0.4/3021-041124859 aned
iosrjen   3021-0411-0259 iosrjen

The present thesis deals with modeling and analyzing the propeller blade of underwater vehicle for its strength. A propeller is a complex geometry which requires high end modeling software. The solid model of propeller is developed using CATIA V5 R17. Tetrahedral mesh is generated for the model using HYPER MESH. Static, Eigen and frequency responses analysis of both aluminum and composite propeller are carried out in ANSYS. Inter laminar shear stresses are calculated for composite propeller by varying the number of layers. The stresses obtained are well within the limit of elastic property of the materials. The dynamic analysis of aluminum, composite propeller which is a combination of GFRP (Glass Fiber Reinforced Plastics) and CFRP (Carbon Fiber Reinforced Plastics) materials.

 

Keywords: - Composite propeller, Static analysis,Eigen value analysis, Harmonic analysis, FEA

[1] Taylor, D.w, "The Speed and Power and Ships", Washington, 1933
[2] J.E.Conolly, "Strength Of Propellers", reads in London at a meeting of the royal intuition of naval architects on dec 1.1960,pp 139-160
[3] Terje sonntvedt, "Propeller Blade Stresses, Application Of Finite Element Methods" computers and structures, vol.4,pp193- 204
[4] Chang-sup lee, yong-jik Kim, gun-do Kim and in-sik nho. "Case Study On The Structural Failure Of Marine Propeller Blades"
[5] M.jourdian, visitor and J.L.Armand. "Strength of Propeller Blades-A Numerical Approach", the socity of naval architects and marine engineers, may 24-25, 1978,Pp 20-1-21-3.