Welcome To Our Search Page

Modeling Simulation and Harmonic Analysis of a Ser

Deptt. of Electrical Engg., *BIT Mesra, Ranchi, ** NIT Jamshedpur, India


Abstract : Series Resonant Inverter (SRI) is a source of very high frequency energy and is used for high frequency applications, such as Induction heating, Metal and thin film plastic surface treatment, communication and AC power flow areas (HVDC and HVAC) etc. SRIs are linked with the load through high frequency transformers to improve the current gain. Inclusion of transformers and RL load leads to higher frequency harmonic components in the load voltage. The present papers includes the harmonic analysis of a basic SRIs (Class – A), feeding RL load with the consideration of transformer parameters. System is modeled first in continuous time domain and then harmonic analysis is carried out using MATLAB/SIMULINK which is extended to the filtering out the higher frequency harmonic components using Butterworth IIR filter.

Keyword : Series Resonant Inverter, Modeling, High frequency transformer, Harmonic analysis, Butterworth filter.


1Department of Mechanical Engineering, Memorial University of Newfoundland, Canada


Abstract : : In this work the rainfall in Marathawada is studied, and possible source of rainfall erraticism is analyzed. Based on the historical data, prediction of rain in the year 2015 is made. Since the rain amount varies widely from year to year, it would be advisable for the farmers to have an alternative for irrigation or have alternate sources of income. Since the prediction is being made well in advance on December 2, 2014 i.e. the date of completion of the manuscript, , it gives sufficient time to farmers to select future course of action if the technique demonstrated here is followed subsequently.

Keyword : Monsoon rain prediction, annual rainfall, rainfall frequency spectrum, El Nino and La Nina influence on rainfall, drought and famine, crop failure

Structural and Optical Properties of Multilayered

Department of Physics, Central University of Rajasthan and is Assistant Professor in Department of Applied Physics, Indian School Of Mines, Dhanbad, India


Abstract : Li Doped multilayer ZnO thin films were deposited using sol-gel spin coating technique. Structural properties of films using XRD showed as the number of layers of the coating increases the crystallite size increases with maximum value > 50nm. Microstrain of films showed lower values for thicker films. Envelop method is used to determine optical properties of film using transmission spectra. Urban energy values of the films were calculated.

Keyword : Li doped ZnO, thin films, Sol-gel, Envelop method

Implementation of Fast Fourier Transform using Ver

Department of ECE, Jharkhand Rai University, Ranchi , Jharkhand, India1 Department of Mathematical Science, Politecnico di Torino, Italy2


Abstract : The Discrete Fourier Transform (DFT) can be implemented very fast using Fast Fourier Transform (FFT). It is one of the finest operations in the area of digital signal and image processing. FFT is a luxurious operation in terms of MAC. To achieve FFT calculation with a many points and with maximum number of samples the MACs requirement could not be matched by efficient hardware’s like DSP. So a fine solution is to use dedicated hardware processor to perform efficient FFT working out at high sample rate, while the DSP could perform the less concentrated parts of the processing. Verilog implementation of floating point FFT with reduced generation logic is the proposed architecture, where the two inputs and two outputs of any butterfly can be exchanged hence all data and addresses in FFT dispensation can be reordered.

Keyword : FFT, MAC, butterfly exchanging circuit, FPGA, DSP’s.

budesonid 200 mg budesonid amning budesonid 2care4


Department of CE, IIT, New Delhi, India


Abstract : Concrete is an inherently porous material. Pores have been classified in terms of pore size distribution parameters. Mean radius or equivalent radius has also been used in the assessment of porous material like concrete and it has been related to other parameters like water-cement ratio, degree of hydration, age etc. Different methods are used to estimate such a radius and overall radii distribution, Mercury Intrusion Porosimetry being the most common. The method has yielded appreciable results within its limitations and they have been extensively studied. But it is quite cumbersome to carry out and becomes increasingly costly for higher pressure applications. Other methods like water retention curves and imaging of individual pores require a lot of effort to generate statistically significant results. This paper presents the result of an effort to carry out pore radius estimation in essentially cement paste samples using the phenomenon of capillary absorption of water. Capillarity in porous materials is governed by the Lucas-Washburn equation to an appreciable extent. Five water-cement ratios(0.2,0.3,0.4,0.5,0.6) and five curing ages(1,3,7,28,90 days) have been used to widen the scope and observe the trends. Results have been compared with the MIP results from an earlier study in the same laboratory. The magnitude found for the effective pore sizes through Lucas Washburn Equation are two to three orders smaller than the corresponding mean pore radius as obtained in MIP studies. But the comparison trends between w/c ratios and curing ages are seen to be largely similar. It is believed that this parameter might be used for the purpose of comparative evaluation of materials based on actual rates of absorption.

Keyword : Effective pore size, Capillarity, Lucas Washburn Equation


Department of Pure and Applied Physics, Guru Ghasidas Central University, Koni, Bilaspur Chhattisgarh, India- 495009


Abstract : We determine the intrinsic shapes of the light distribution of elliptical galaxies NGC 5638 and NGC 5813 by combining the profiles of photometric data from the literature with triaxial models. We use ensembles of models so that the shape estimates are largely model independent. We follow the methodology as described in Statler (1994) which is modified to suit our requirements. We find that short to long axial ratios at very small radii and at very large radii, and the absolute value of the triaxiality difference are the best constrained shape parameters. We use a modified prior as obtained from the shape estimates of a large sample of elliptical galaxies to determine the intrinsic shapes of the elliptical galaxies NGC 5638 and NGC 5813. Shape estimates using modified prior should be more reliable. These results are compared with the previous estimates which are determined by using flat prior reported by Chakraborty et al (2008) and Singh and Chakraborty (2009). The plot shows the intrinsic shapes of the NGC 5638 and NGC 5813 as a function of (q0,q∞) for two dimensional shapes and (q0,q∞,|Td|) for three dimensional shapes, where q0 and q∞(=q) are the short to long axial ratios at small and at large radii and |Td| is the absolute values of the triaxiality difference, defined as |Td|= |T∞ - T0|. The probability is shown in the dark grey region: darker is the region higher is the probability. We find that both the galaxies NGC 5638 and NGC 5813 are rounder inside and flatter outside.

Keyword : Intrinsic Shapes, Triaxial Models, Photometry, Elliptical and Galaxies.

esomeprazol lansoprazol hogopfattelse.site esomeprazol pulver

Detection of Distributed denial of service using h

Department of Computer Science, Birla Institute of Technology, Patna Campus, Patna, India and Department of Computer Science, Birla Institute of Technology, Mesra, Ranchi, India


Abstract : Honeypots is a resource which pretends to be a real target, so that we can protect the real resource or service from the malicious users/hackers and know their intentions and attack patterns. In this paper, we present a security solution whereby we deploy three fake services on three ports on the server. These act as bait to the hacker and whenever one tries to access, we close the connection and know the IP address and the ports from which it is establishing the connection, and store it in a database. On a large number of connection attempts on these fake services, the IP addresses are deemed as malicious users and they are denied connection on the main service and their report is given to the admin, so that we can manually block or unblock the IP addresses and can identify the location and take requisite action.

Keyword : DOS, DDOS, Fake IP Address, Honeypots, Hackers.