Friday, March 30, 2018

Dynamic Modeling of PEMFC and SOFC


In this paper, a complete description of dynamic modeling of proton exchange membrane fuel cell (PEMFC) and solid oxide fuel cell (SOFC) is given. For modeling of fuel cell for software based study, calculation of all voltage drops during chemical reaction of fuel is required. Additionally a flow chart of fuel cell output voltage calculation is also explained which includes fuel cell voltage, double layer charging effect, thermodynamic response and terminal voltage of fuel cell. 


By using ac to dc converter, the fuel cell power can be connected to load or grid. Based on this study, a mathematical model of fuel cell is developed in simulink software MATLAB to obtain output characteristic of fuel cell. 

By Pratik Mochi | Mihir Bhatt"Dynamic Modeling of PEMFC and SOFC"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11087.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electrical-engineering/11087/dynamic-modeling-of-pemfc-and-sofc/pratik-mochi

research publication, ugc approved journals for engineering, special issue publication

A Modified Method for Preventing Blackhole Attack in MANETS


Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It's a real world analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. Study of previous work concludes that works done on security issues in MANET were based on different reactive routing protocol but still there is needs to avoid Black Hole attack in MANETs. 


This research work proposed detection and mitigation technique to avoid black hole attack and improve the network performance. Performance of proposed solution is similar with original AODV and tries to maintain privacy of content. 

By Mukul Dhakate | Humera Khan | Prof. Anwarul Siddique"A Modified Method for Preventing Blackhole Attack in MANETS"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11065.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11065/a-modified-method-for-preventing-blackhole-attack-in-manets/mukul--dhakate

multidisciplinary journal, submit paper online, indexed journal

Brief Review on Al6351 Composite


For the past few years there has been a rapid growth in the utilisation of aluminium alloys, particularly in streams like aerospace and automobile industries. The versatility of aluminium makes it widely used metal. It is due to its low weight, density, high strength, wear resistance etc. Al6351 has high strength good mechanical and tribological properties when compare to other alloys. AL6351 can be seen in forms of extruded rods, wire and shapes which are easily machinenable and can have a wide variety of surface finishes. 


By Mrs M. Vijaya | Dr K. Srinivas"Brief Review on Al6351 Composite" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11107.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/11107/brief-review-on-al6351-composite/mrs-m-vijaya

peer reviewed journals, manuscript submission, call for paper engineering

Hybrid Biomass-Solar Power System with Establishment of Raw Material Procure


The utilization of sustainable power sources is ending up exceptionally essential because of the restricted stores of non-renewable energy sources and worldwide ecological worries for the creation of electrical power age and usage. In remote regions, towns, it is anything but difficult to get more sum biomass. Subsequently by the utilization of crossover frameworks comprising of Biomass and PV for creation of electrical vitality in these remote regions can be more temperate. 


On the off chance that the advancement of a PC based approach for assessing, the general execution of independent half and half PV-Biomass creating frameworks are broke down ,at that point these outcomes are helpful for creating and introducing cross breed frameworks in remote regions This paper centers the practical thought of independent crossover frameworks having PV and Biomass for electrical generation in remote zones. Additionally in this paper a reproduction approach has been recommended for planning remain solitary network for remote regions. 

The normal sun powered radiation and amount of biomass required information are to anticipate the general execution of the creating framework. The batteries can likewise be utilized as a part of this framework to store the additional vitality which can additionally be utilized for reinforcement. Likewise the additional power is utilized to supply to the network. Here the reproduction is completed utilizing HOMER programming. The outcomes and investigation can used to enhance the improvement of the proposed demonstrate. 

By Vikash Pooniya | Mr. Pravin Kumar | Dr. Deepika Chauhan | Md. Asif Iqbal"Hybrid Biomass-Solar Power System with Establishment of Raw Material Procure"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11105.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electrical-engineering/11105/hybrid-biomass-solar-power-system-with-establishment-of-raw-material-procure/vikash-pooniya

international peer reviewed journal, paper publication for engineering, conference issue publication

Data Prevention from Network Hacking


We are sending data from source node to destination using wireless sensor networks (WSNs), In wireless sensor networks, it is a typical threat to source privacy that an attacker performs back tracing strategy to locate source nodes by analyzing transmission paths. So there is lot of chances to lose data and information theft by network hackers. Network hackers performs eves dropping, sniffers attack, Denial of service attack. These types of attacks are achieved by negative commands generated by intermediate server maintained by hackers. 


With the popularity of the Internet of Things (IoTs) in recent years, source privacy protection has attracted a lot of attentions. However, they fail to get the tradeoff between multi-path transmission and transmission cost. In this project, we propose a Constrained Random Routing (CRR) mechanism and Greedy techniques, which can constantly change routing next-hop instead of a relative fixed route so that attackers cannot analyze routing and trace back to source nodes. 

At first we designed the randomized architecture for each sensor nodes. Then calculate the coordinates and weights of node, Finally, the selected weights help to decide which node will become the next hop. In this way, attackers would be confused by the constantly changing paths. The simulation results prove that our proposal can achieve high routing efficiency in multi-path transmission. 

By A Prasanth | P Sankar Ganesh | S P Raja Gopalan"Data Prevention from Network Hacking"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11035.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11035/data-prevention-from-network-hacking/a-prasanth

high impact factor, ugc approved journals for engineering, special issue publication

Palm Karnel Shell Ash as a Partial Replacement for Cement in the Production of Paving Blocks


Palm kernel shell is known for its similar mineral element with cement and little binding ability in ash form. This research presents a report on the study of the material properties of paving block by inclusion of Palm Kernel Shell Ash (PKSA) as partial replacement for cement, to know the optimum replacement without falling below minimum breaking strength to which Paving blocks can still be produced. In achieving this, a mix of 1:1.5:3 with a 0.5 w/c was used throughout the production with PKSA replacing cement for 0%, 5%, 10%, 15%, 20%, and 25% for 7 days, 14 days, 21 days, and 28 days considered in the test for compressive, and tensile strength and 7 days, 21 days, and 28 days for flexural strength for all percentages. 


The findings revealed that 10% cement replacement yielded an optimum strength increase of 6%, 9%, 6% and 5% for compressive strength; 5%, 8%, 13% and 3% for split tensile strength for the curing days respectively. In addition, 4% increase in flexural strength for 7 days curing with no significant increase for 21 and 28 days curing. On the overall, the research revealed that PKSA inclusion as partial replacement for cement as binder in paving block making resulted in cost reduction of about 3.3% savings 

By Ottos, C. G. | Isaac, O. E."Palm Karnel Shell Ash as a Partial Replacement for Cement in the Production of Paving Blocks"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11194.pdf 

Direct URL: http://www.ijtsrd.com/engineering/chemical-engineering/11194/palm-karnel-shell-ash-as-a-partial-replacement-for-cement-in-the-production-of-paving-blocks/ottos-c-g

manuscript publication, submit paper online, indexed journal

Advance Safe Locker Security System using Dactylogram


In this paper focuses on affording a secured attestation and user-friendly mechanism to operate the closet. In spite of the availability of digital lockers hacking the lock code by an illegitimate person has become a plain-sailing task. Existing system electronic locks are available in the market based on password, RFID, wireless and IoT. Our proposed system, primary aim is towards to resolve the problems occurred in the safe locker security. We introduced more advanced and secure locker on multilevel attestation using Dactylogram, Passcode and OTP. (dactylogram used for human biometric more secure attestation then other attestation) 


By S. Prabhakaran | P. Sridhar | R. Alexander"Advance Safe Locker Security System using Dactylogram"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11045.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11045/advance-safe-locker-security-system-using-dactylogram/s-prabhakaran

best journal, manuscript submission, call for paper engineering