Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi A Review on the Power Quality issues and solutions Amita A. Mane Dr. D. Y. Patil Educational Federation’s Dr. D. Y. Patil College of Engineering and Innovation Varale Campus, Near Talegaon Railway Station, Pune­410507 [email protected]

Abstract- Presently many types of FACT devices are used for It is very difficult to quantify power quality like other goods and improving power quality. This paper is only discussing about the services. Power quality is nothing but a voltage quality. different power quality issues and custom power devices like DVR Technically in engineering terms power is given by product of and DSTATCOM which are the solution for power quality voltage and current. The power supply system only controls the problems. This paper gives the information about percentage of quality of the voltage but it has no control over the currents that different power quality problems. Also it presents DSTATCOM and DVR and various controlling techniques for proper controlling particular load might draw. Hence the standards in power quality of both devices. area are devoted for maintaining supply voltage within certain Keywords-Power Quality, DSTATCOM, DVR, Controlling limits. Main reason behind our interest in power quality is techniques. economic value. It can have a direct economic impact on many industrial consumers. I. INTRODUCTION III. POWER QUALITY ISSUES Now a day’s both the electric utilities and the end users of electric power are becoming increasingly concerned about power  Harmonic distortion quality of electric power. Main reason behind this is the  Voltage transients development in semiconductor device technology, which results  Voltage sags and swells into the increasing use of power electronic based devices such  Over current as a computer power supply, cycloconverter, adjustable speed  Poor power factor drives (ASD) at a distribution systems or industrial systems [1].  This new, highly efficient electronic technology provides product Flickering quality with increased productivity. But disadvantage of these  Voltage spikes power electronics based devices is that these devices are more (a) Voltage sags and swells: A voltage sag or dip is sensitive to power quality variations than was equipment used nothing but decrease of rms voltage from 0.1 to 0.9 pu for a in the past. There are various types of power quality problems duration of a 0.5 cycles to 1 minute [11]. Sources of voltage sag but the voltage sag and voltage swell are responsible for most are heavy loads, transformer energizing. A voltage swell is defined severe problem and also economical losses. Nowadays, various as increase of rms voltage from 1.1 to 1.8 pu for durations from 0.5 types of custom power devices (CPD) such as Distribution Static cycles to 1 minute. Sources of voltage swells are capacitive loads Compensator (DSTATCOM) and Dynamic Voltage restores (DVR) open circuits. are introduced which are used for the mitigation of power quality (b) Voltage transients: It is voltage disturbance shorter problems. DSTATCOM and DVR are voltage source converter than sag or swell are transients. It is abrupt change in voltage or (VSC) based custom power devices. A DSTATCOM injects a current waveform. There are two types of transients, impulsive current and DVR inject a voltage in series into the system for the transients and oscillatory transients. correction of voltage sags, voltage swell and interruption. (c) Harmonic distortion: Harmonics are Sinusoidal Performance of CPD mainly depends upon the controlling voltages or currents having frequencies that are integer multiple technique used; this paper gives the introduction to DSTATCOM of the fundamental frequency. and DVR and also gives review on various control techniques.

II. WHAT IS POWER QUALITY Definition: Power quality problem is defined as any power problem manifested in current, voltage or frequency deviation that results in failure or malfunctioning of the customer equipments [1]. The required power quality level is that level which will result of proper operation of the equipment at a particular facility.

24th June 2017 , ISBN No. 819070985-2 1 1 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

(VSC) is assumed at the heart of the DSTATCOM. Generally, the configuration of DSTATCOM consist of energy storage system, voltage source converter (VSC), coupling transformer connected in shunt with ac system and control circuit as shown in following figure2 [4][5]. It injects the current into the system to correct the voltage sag and swell.

Fig.1 Percentage of power quality problems

IV. SOLUTION TO POWER QUALITY PROBLEMS There are two approaches for the mitigation of power quality problems. The solution to the power quality problem can be done from utility side or from customer side. First approach is called line conditioning, where the line conditioning systems are installed which suppresses the power system disturbances. Second Fig 2. Schematic representation of the DSTATCOM approach is called load conditioning, which ensures that the equipment is less sensitive to power disturbances, allowing A. The control methods for DSTATCOM operation even under significant voltage distortion. But the restructuring of the power sector and with the shifting trends The necessary features of any control scheme are fast towards distributed generation, the line conditioning systems or response, flexibility, robustness and ease of implementation. This utility side solutions will play a major role in improving the inherent section explains some control techniques of DSTATCOM. supply quality. Some of the effective and economic measures 1. PWM based control with only voltage measurement: can be identified as following [3]. This control technique [6] only requires voltage 1. Lightning and surge arrester: These are designed for the measurement and no reactive power measurement. This protection of the equipments from lightning. control system only measures the rms voltage at the load 2. Energy storage systems: Energy storage systems are used point. The switching operation of VSC is based on a for protection of sensitive protection equipment from sinusoidal PWM technique which offers simplicity and good shutdowns caused by voltage sags or interruptions. These response. By using high switching frequency efficiency of are dc storage systems such as batteries, flywheels, converter can be improved with less switching losses. superconducting magnet energy storage (SMES). 2. Flexible DSTATCOM operation in voltage or current control 3. Thyristor based static switch: It is a versatile device which mode: is used for switching In this control technique [7] first one is voltage control a new element into the circuit when voltage support is mode in which the voltage of a distribution bus is controlled needed. Spikes, sags or interruptions occur in the systems, the by DSTATCOM so that it will be balanced and sinusoid. static switch can be used for switching a new element into the 3. Battery energy storage system (BESS) based DSTATCOM: circuit when voltage support is needed. If there is any voltage With the use of this control technique [8] DSTATCOM is one or more devices such as filter, capacitor, energy storage connected to battery energy storage system to mitigate the systems etc. power quality issues. Spikes, sags or interruptions occur in the systems, the static VI. DYNAMIC VOLTAGE RESTORER (DVR) switch can be used for switching one or more devices such as filter, capacitor, energy storage systems etc. DVR is another solution to power quality problems [9]. It is a series compensating device which injects the voltage in series V. DISTRIBUTION STATIC COMPENSATOR (DSTATCOM) and in synchronism with the standard voltages for compensating When the STATCOM is applied in the distribution system voltage influences. Main components of DVR are boosting is called DSTATCOM, and its configuration is same or with some transformer, inverter, filter, energy storage device etc. General modifications. A current controlled voltage source converter structure of DVR is shown in following figure3 [10]. 24th June 2017 , ISBN No. 819070985-2 2 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Fig.4 Structure of DVR with Hysteresis Voltage Control Technique

VII. CONCLUSION This paper gives the review on the concept of Power Quality, Fig.3 General DVR structure different power quality issues and solution to the power quality. It gives review on custom power devices used for improving A. The control methods for DVR power quality, which are DVR and DSTATCOM. Also it presents 1. Voltage unbalanced compensation using d­q­0 the different control techniques used for custom power devices transformation technique: for mitigation of power quality problems. For voltage unbalanced compensation this [12] control VIII. REFERENCES technique is used in DVR. The controller has better performance in d­q­0 coordinates than the controller in the 1. “Electrical power systems quality” third edition, Rogar C. conventional system. For producing reference voltage to Dugan, Mark F. Mcgranaghan, Surya Santoso, H. DVR, controlled variables in d­q coordinates are inversely Waynebeaty. transformed to original voltages. 2. K. Eichert, T. Mangold, M. Weinhold, “Power Quality 2. Feed forward pre­sag/swell voltage control method: Issues and their Solution” ,in VII seminario de Electronica This control technique [13] regulate the output voltage of de Potencia, Valparaiso, Chile, April 1999. pulse width modulated (PWM) voltage source converter 3. Mahesh Singh, Vaibhav Tiwari, “Modeling analysis and (VSC). This control scheme of DVR is based on the parks solution to power quality problems” unpublished. transformation. It is simpler and having lower cost. It can 4. G. Venkataramana, and B. Johnson,”A pulse width modulated compensate sag/swell accurately with fast response under power line conditioner for sensitive load centers,” IEEE variable load condition. Trans. Power Delivery, vol. 12, pp 844­849,Apr 1997. 3. Hysteresis voltage control technique: 5. L. Xu, O. Anaya­Lara, V. G. Agelidis, and E. Acha, Above figure shows structure of DVR with Hysteresis “Development of prototype custom power devices for Voltage Control technique [14]. It consists of energy storage power quality enhancement,” inProc. 9 th ICHQP system, three phase IGBT inverter, booster transformer, 2000,Orlando, FL, Oct. 2000,pp.775­783. hysteresis voltage controller. There are two inputs to the 6. Hojat Htami, Farhad Shahnia, Afshin Pashaei, S.H. Hosseine hysteresis voltage controller one is from supply side and “Investigation on DSTATCOM and DVR operation for another is from booster transformer, which is voltage Voltage in Distribution Network with a New Control injected by DVR. Controller compares these two signals Strategy”, Power Tech, 2007 IEEE Lausanne, 1­5 July 2007. and according to these signals switching pattern is 7. G. Ledwich and A. Ghosh “A flexible DSTATCOM operating established in voltage or current control mode”,IEE Proc-Gener.Trunsm. Dirrib. Vol. 149, No. 2, March 2002 8. Ch. Siva Koti Reddy and Dr. P. linga Reddy” A DSTATCOM Control Scheme for Power quality improvement of Grid connected Wind Energy System for Balanced and Unbalanced Non linear loads”, International Journal of Modern Engineering Research.

24th June 2017 , ISBN No. 819070985-2 3 3 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

9. Benachaiba Chellai, FERDI Brahim, “Voltage Quality 12. Rosli Omar and N.A. Rahim “Voltage disturbances improvement using DVR,” Electrical Power Quality and Mitigation in Low Voltage Distribution System Using New Utilizations, Journal vol. XIV, No. 1, 2008. Configuration of Dynamic Voltage Restorer (DVR)” World 10. Power Quality enhancement Using Custom Power devices Applied Sciences Journal,10; 1480­1489,2010 by A. Ghoshand G. Ledwich.2002. Kluwer Publication. 13. Sajay A Deokar, Laxman M Waghmare “DVR Control 11. M. Bollen “Understanding Power Quality Problems, voltage Strategy for dynamic Power Quality Disturbance sags and Interruptions,”IEEE press, 1999. Mitigation”, International Journal of Scientific Research Publications, Volume 2, Issue 11, November 2012.

24th June 2017 , ISBN No. 819070985-2 4 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Weaving Simple Face ­ Flip ­ Face Fabric using Orthogonal Weft Tapestry Weave

R.G. Panneerselvam Department of Weaving Indian Institute of Handloom Technology Varanasi, India [email protected]

Abstract—’Face - Flip - Face Fabric’ contains two images one weave prominence? Whether these new weaves could be backing the other. The purpose is to use the fabric, one time with useful to produce diversified range of Two­in­one fabrics one image and next time by reversing with the other one, serving with different textures to overcome the limitations of double dual purpose; one is added thickness and other is double side cloth? usage with differently looking colour and image which break the monotonous. For the last few decades, the fabric was produced • Is there any possibility of developing different loom using only one weave that is self stitched double cloth which is techniques and jacquard techniques to weave the new having two limitations. One is the roughness of coarser fabric compound structures, which could be adopted techno­ because of the binding weaves and other is the lifting of huge ergonomically by the unorganized sectors of textile number of ends for back picks. This study addresses the above industry? issues with the aim to give the graduates and designers of Textile Following are the objectives of the study to address the Technology, a practical knowledge in the subject of ‘Designing above issues: and Weaving a New Compound Fabric Structure’ and guide them to manufacture diversified simple fabrics for domestic and export • To evolve new compound structure namely ‘Orthogonal market using both heald and treadle shedding. Weft Tapestry (OWT)’ by studying the principles of two Keywords— design; draft; healds; lifting plan; orthogonal; shedding, weaves namely orthogonal weave [4, 5, 6] and weft tapestry tapestry; treadle; weave weave [7, 8]; • To use OWT weaves to produce Two­in­one fabric which I. INTRODUCTION is renamed as Simple Face ­ Flip ­ Face Fabric (Simple FFF Most of the woven figured fabrics have a figure with two or Fabric) and Figured Face ­ Flip ­ Face Fabric (Figured FFF more colour and weave effect on one side. The figure is same on Fabric); the other side but the colours and weave get interchanged. Thick • To design new loom technique namely ‘Double Decker reversible printed fabrics are developed by printing two different Shedding (DDS)’ and ‘Double Decker Picking (DDP)’ for figures one for face and other for back. Experiments were weaving the new structure. For this, the Double Race Board conducted to produce figured fabric in the name of ‘Two­ in ­ Sley developed for producing two fabrics at a time [9] and one’ containing two images, elephant on one side and horse on heald shedding to produce 3D fabrics [10] are taken as base. other side, one backing the other [1]. The purpose of this type of In the study, the name ‘Two­ in­ one Fabric’ has been fabric is to use the fabric, by reversing, one time looking with one renamed as ‘Face ­ Flip ­ Face Fabric’ to pronounce more image and next time with the other one. To quote an example, the technically with the sense that both sides of fabric become face ordinary thick floor carpet, used at least for a decade, give when it is flipped. One time, when the horse figure side of the monotonous look. Instead, the carpet woven with the said two­ fabric becomes face side, the elephant figure side becomes back in­ one concept will serve dual purpose. One is added thickness side and vice versa when it is flipped. The study aims to evolve due to stitched double fabric and other is its double side usage new weave structure to weave FFF fabric to overcome some of with differently looking colour and image to break the monotonous. the limitations of stitched double cloth weave used for producing The principle of producing two ­ in ­ one fabric was based on two­ in­ one fabric. The first limitation is the rough feeling of only one weave that is figured self stitched double cloth for the fabric when woven with coarser counts because of the twill and last three decades with two limitations [2]. One is the rough feeling sateen weave bindings used in the figure and ground of both the of fabric when woven with coarser counts and other is the lifting layers. The second limitation is the lifting of huge number of of huge number of ends for back picks [3]. ends for back picks. The following issues are raised from the above observations: Other aim of the study is to have many more structures to • Is there any other compound fabric structure to use in place produce diversified range of fabrics with different textures. The of double cloth to produce Two­in­one fabric without any study has been extended to evolve new weave structure which

24th June 2017 , ISBN No. 819070985-2 5 5 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi produces smooth face flip face fabrics in finer, medium and coarser 1. The character of no interchanging of two picks in orthogonal counts range without any prominence of binding. In this study, weave is retained as it is, but the character of tapestry of using different varieties of OWT weaves are derived and then weaving different colours and / or different materials are added to these of ‘Simple Face ­ Flip ­ Face Fabric’ is experimented using Double two picks. In this principle, face side weft (F) in one colour of one Decker Shedding (DDS) principle in handlooms by which lifting material is backed by the back side weft (B) in other colour of of face ends, while introducing back picks, are achieved without same material that of face side or another material without any any extra strain. interchanging. The basic weave of 2 Picks OWT in 4 X 4 and its draft, peg­plan, regular tie­up and treadle pressing order are given II. ORTHOGONAL WEFT TAPESTRY WEAVES in Fig. 2. The stitching warp (st) and separating warp (se) is in 1: The development of new weave structure is based on the idea of 1 ratio. At the right side of figure, the two different colour effects combining both the characteristic of orthogonal weave and weft obtained one on the face side and other at back side is also tapestry structures. The characteristic combined are: indicated. This weave requires 3 healds and 4 treadles to weave. • No interchanging of any picks in the orthogonal weave. • Complete interchanging of all the coloured picks in the weft tapestry. Hence, the new weave is named as ‘Orthogonal Weft Tapestry (OWT)’. The basic concept of deriving new OWT weave is: Out of the set of picks, few picks are made to interchange and other picks not to interchange; few picks to interchange only Fig. 2. Design, draft and regular tie­up of 2P OWT weave on the face side and other picks to interchange only on the back side, without interchanging between face to back. These B. 3 Picks OWT Weave interchanging and no interchanging characters of wefts Three picks OWT (3P OWT) weave is the combination of combined with different colours and material, result in forming character of three picks orthogonal structure and three picks two distinct face and back layer having independent figuring weft tapestry structure which are shown at the third column in parts in different places. Fig.1. Out of three different coloured picks, two picks in two This is the base to form two different effects / figures one colours of one material, interchange to form ground and figure on the face and other at back side of one fabric. The warp is in on the face. These two picks are backed by the third colour pick two series namely stitching warp (st) and separating warp (se) at the back side without making any interchanging with the face arranged in 1: 1 order taken in two separate beam. The stitching side. The design, draft, peg­plan, tie­up and treadle pressing order warp beam must be in moderately loose tension and the separating required for weaving this effect are given in the Fig. 3. The warp beam in normal tension. The illustrative weft interlacing stitching warp and separating warp is in 1: 2 ratio. The check diagram of orthogonal, weft tapestry and orthogonal weft tapestry colour effect formed by the colours 1 and 2, on the face side, weaves formed with two, three and four picks are given in Fig. 1 while weaving and the single colour effect obtained by colour 3 in rows and columns respectively for understanding the principle at back side, are shown at the bottom of figure. of all the weaves.

Fig. 1. Illustrative weft Interlacing Diagram (ID) of Orthogonal weave, Tapestry weave and OWT weave A. 2 Picks OWT Weave Two picks OWT weave (2P OWT) is the combination of character of two picks orthogonal structure and two picks weft tapestry structure which are shown at the second column in Fig. Fig. 3. Design, draft and regular tie­up of 3P OWT weave

24th June 2017 , ISBN No. 819070985-2 6 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

C. 4 Picks OWT Weave Four Picks OWT weave is the combination of character of four picks orthogonal structure and four picks weft tapestry structure which are shown at fourth column in Fig. 1. Out of four picks per set, the first and second picks are face picks forming ground and figure of the face image respectively. The third and fourth picks are back picks forming ground and figure of the back image respectively. This results in forming two distinct face and back layer having interchanging of colours in different places independently with each other. This concept is the base to form two different effects / figures one on the face and other on the back.

Fig. 5. Comparison of weft ID of 2P, 3P and 4P OWT structures weft interlacing diagram of 2P, 3P and 4P OWT structures are compared in Fig. 5. and warp interlacing diagram of 2P, 3P and 4P OWT structures are compared in Fig. 6. In 2 picks OWT, two ends (drawn in one dent) in warp direction, and two picks in weft direction stay one above the other. With 48S reed count drawn 2 per dent, the ends per inch are 48. There are 24 stitching ends of 2/20S and 24 separating ends of 2/20S ­2ply. 12 stitching ends are seen on the face side above the face pick and 12 stitching ends are seen at the back side below the back pick. All the 24 separating ends stay at the centre in between face picks and back picks and hence separating ends are not seen either on the face or at the back. The picks per inch are about 24 of 2S – 2 ply. 12 face picks stay on the face side below which 12 picks stay at the back side.

Fig. 4. Design, draft and regular tie­up of 4P OWT weave D. Interlacing Diagrams (ID) of OWT Weaves Fig. 4 shows the design, draft, peg­plan, regular tie­up and treadle pressing order of four different weaves of 4 picks OWT to form big size check / stripe effect on one face and smaller check / stripe effect on the other face. The stitching warp and separating warp is in 1: 3 ratio. The big check colour effect formed by the colours 1 and 2, on the face side, while weaving, is shown at the bottom of figure. The small check colour effect formed by the colours 3 and 4, at the back side, while weaving, is also shown. The dotted lines on the big check effect indicate the line of interchanging to form big check. The straight lines on the small check indicate the line of interchanging to form small check. The straight lines on the big check and the dotted lines on the small check together indicate the repeat of superimposed effect of both the faces.

Fig. 6. Comparison of warp ID of 2P, 3P and 4P OWT structures

24th June 2017 , ISBN No. 819070985-2 7 7 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Similarly, in 3 picks OWT, the set of three ends (drawn in  Double Decker Shedding – (DDS) technique with ordinary one dent) in warp direction, and three picks in weft direction stay picking one above the other. With 48S reed count drawn 3 per dent, the  Double Decker Shedding combined with Double Decker ends per inch are 72. There are 24 stitching ends of 2/20S and 48 Picking (DDP) called ‘DDSP’ technique separating ends of 2/20S ­2ply. 12 stitching ends are seen on the face side above the face picks and 12 stitching ends are seen at the back side below the back picks. 48 separating ends divide into two sets, each of 24 ends. The first set of 24 separating ends (face) stay between and separate face ground and face figure picks. The second set of 24 separating ends (centre) stay between and separate face picks and back picks. Hence separating ends are not seen either on the face or at the back. The picks per inch are about 36 of 2S – 2 ply. Out of 24 face picks, 12 picks stay on the face side below which 12 picks stay in the middle. 12 back picks stay below these 24 face picks. Similarly, in 4 picks OWT, four ends (drawn in one dent) in warp direction, and four picks in weft direction stay one above the other. With 48S reed count drawn 4 per dent, the ends per inch Fig. 7. Double Decker Shedding (DDS) are 96. There are 24 stitching ends of 2/20S and 72 separating ends of 2/20S ­2ply. 12 stitching ends are seen on the face side Double Decker Shedding means in the given height of the above the face picks and 12 stitching ends are seen at the back reed, two sheds are formed one above the other with three layers side below the back picks. 72 separating ends divide into three of warp sheet. This enables, to insert two picks either one after sets, each of 24 ends. The first set of 24 separating ends (face) the other or simultaneously as shown in Fig. 7. Special kind of stay between and separate face ground and face figure picks. drafting is employed in healds by which two sheds are formed The second set of 24 separating ends (centre) stay between and one above the other simultaneously. Two shuttles one after the separate face picks and back picks. The third set of 24 separating other, in pick by pick order is inserted by ordinary throw shuttle ends (back) stay between and separate back ground and back picking. In the Double Decker Shedding and Picking (DDSP) figure picks. Hence separating ends are not seen either on the technique, along with double decker shedding, a new Double face or at the back. The picks per inch are about 48 of 2S – 2 ply. Decker Sley having special shuttle box and pickers is employed. 24 face picks stay on the face and 24 picks stay on the back. Out Using this special sley, two shuttles are propelled simultaneously of 24 face picks, 12 picks stay on the face side below which 12 one above the other. Two picks are inserted simultaneously in picks stay in the middle. Out of 24 back picks, 12 picks stay on the two sheds formed by double decker shedding. If the healds the back side over which 12 picks stay in the middle. are set with double decker shedding, it is denoted by DDSH and if the jacquard is set with double decker shedding, it is denoted From the above explanation, it is clear that for the given by DDSJ. count, as the number layers increase, the number of ends and picks per inch also increase and hence the thickness and weight A. DDS of 2 Picks OWT Weave of the fabric also correspondingly increase. The increase in ends Fig. 8 shows the design, draft, peg­plan, tie ­ up, treadle pressing per inch in three weaves is clearly seen from the weft interlacing order and picking order to weave 2 picks OWT weave, using 2 diagrams which are equal to 1/3" width of cloth. The increase in healds and 2 treadles by DDS and DDSP principle. The ratio picks per inch in three weaves is clearly seen from the warp between stitching warp and separating warp is 1: 1. The drafting interlacing diagrams which are equal to 1/3" length of cloth. In is indicated by 1, |, 2, |. The symbol ‘|’ above the draft indicates OWT structure, the separating ends stay almost straight without that the particular separating end in sequence is directly taken in any crimp. But the stitching ends move up and down as seen in between the wires without drawing in the wires of any heald. 2 the warp interlacing diagram shown at Fig. 6. The crimp percentage healds are set with simple roller reversing motion. The stitching of stitching ends varies from 3 to 5 times of length of separating ends are drawn through these two healds and the separating ends. It depends upon the count of yarn and OWT weave that is ends are simply drawn, in between the heald wires as detailed 2 or 3 or 4 picks . above. In the weave, the ‘/’ mark shown above the light shading indicates the interlacement of stitching ends achieved by stitching III. DOUBLE DECKER SHEDDING healds and the ‘X’ mark shown above the dark shading indicates the interlacement of separating ends achieved by DDS without All the varieties of Simple FFF Fabric which are produced operation of healds. There is no other mark other than over the by using heald – treadle shedding with regular tie­up, can also shading portion. Hence it is clear that the shedding is achieved be woven by using the simply by operating the stitching healds.

24th June 2017 , ISBN No. 819070985-2 8 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The healds are set to form centre closed shedding and keep achieved by lifting of face separating healds. Hence it is clear all the stitching ends in the centre of the reed. A separate back that the shedding is achieved simply by operating the stitching rest at the lease rod position is used below the separating ends. healds and face separating healds without operating centre The height of the back rest of the separating ends is adjusted to separating ends. keep all the separating ends at the centre of reed along with stitching ends. The two healds are connected with 2 treadles directly at the bottom. Due to the centre closed shedding of roller reversing motion, when the first treadle is pressed down, the first stitching heald (HL1) moves up with all the odd stitching ends (st 1) to the top of reed forming the top layer. At the same time, the second stitching heald (HL 2) moves down with all the even stitching ends (st 2) to the bottom of reed forming the bottom layer simultaneously. The 2 ply separating ends (se) remains at the centre of reed unaltered forming the centre layer in between the top and bottom layer because it is neither in the first heald nor in the second heald. Hence, two decks of sheds – bottom shed and top shed ­ are formed one above the other. Fig. 9. Weave, draft and tie­up for DDSH to weave 3 Picks OWT The healds HL 1 and HL 2 are set to form bottom closed shedding and keep all the stitching ends at the bottom of reed. The healds HL3 and HL4 of face separating ends are set to form bottom closed shedding at the centre of reed. A separate back rest at the lease rod position is used below the centre separating ends. The height of this back rest is adjusted to keep all the centre separating ends at the centre of the reed along with the face separating ends. All the healds are set with bottom reversing motion. The top of healds HL1, HL2 are separately connected with 2 treadles T1 and T2 to raise the stitching ends from bottom Fig. 8. Weave, draft and tie­up for DDSH to weave 2 Picks OWT of the reed to top of the reed. Similarly, the top of healds HL3, Two shuttles with two different wefts are used one for top HL4 are also separately connected with another 2 treadles T3 shed (Face pick) and other for bottom shed (Back pick). Both the and T4 to raise the face separating ends from the centre of reed to face and back pick thus inserted are beaten together top of the reed. simultaneously to the fell of cloth. Similarly, the next two picks of To perform first shedding, T1 and T4 are pressed together. the repeat are inserted by following the treadle pressing and Due to the bottom closed shedding, when T1 is pressed down, picking order as shown in the figure. HL1 moves up with all the odd stitching ends to the top of the In the new method of ‘Double Decker Picking’ principle, a reed forming the top layer. At the same time, HL 2 remains at the special sley called ‘Double Decker Picking Sley’ is employed bottom of reed with all the even stitching ends forming the bottom having two shuttle boxes one above the other on either sides. layer. Along with HL1, HL4 is also raised from centre to top. By Two shuttles in two different colours / material are placed one this, the face separating ends (F se) drawn through HL4 at draft above the other in two shuttle boxes. By single picking, both the B move from centre to top of the reed. The remaining face shuttles are propelled simultaneously one above the other in the separating ends drawn through HL3 and all the centre separating two sheds formed one above the other by double decker ends (C se) remains at the centre of reed unaltered forming the shedding principle and two picks of different colour / material are center layer in between the top and bottom layer. Hence, two get inserted simultaneously. decks of sheds – bottom shed and top shed ­ are formed one B. DDS of 3 Picks OWT Weave above the other. Fig. 9 shows the weave, draft, peg­plan, tie ­ up, treadle Three shuttles with three different colour wefts are used. pressing order and picking order to weave 3 picks OWT weave, First shuttle with weft colour 1 (Fg ­ C1) is thrown in the top shed. using 4 healds and 4 treadles by DDS and DDP principle. The Similarly another shuttle with weft colour 3 (B ­ C3) is thrown in ratio between stitching warp and separating warp is 1: 2. In the the bottom shed. Both the face and back pick thus inserted, are weave, apart from ‘/’ mark shown above the light shading, and beaten together simultaneously to the fell of cloth. Then, keeping the ‘X’ mark shown above the dark shading, the ‘X’ mark over the treadle T1 pressed as it is, treadle T3 is pressed in place of T4. blank portion indicates the lifting of face separating ends When T1 and T3 are pressed down, HL1 with st 1 remain at the top without any change. The face separating ends drawn through 24th June 2017 , ISBN No. 819070985-2 9 9 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi the HL3 get raised and thereby making opposite lifting of face To perform first shedding, T1and T4 are pressed together. separating ends. The third shuttle carrying weft colour 2 (Ff ­ C2) Due to the bottom closed shedding, when the T1 is pressed is inserted in the top shed and beaten to the fell of cloth. By this, down, HL1 moves up with all the odd stitching ends from bottom insertion of three picks totally get completed which are Fg + B to top of the reed forming the top layer. At the same time, HL2 and Ff. Similarly, the next three picks of the repeat are inserted by remains down with all the even stitching ends at the bottom of following the treadle pressing and picking order as shown in the reed forming the bottom layer. HL4 is raised along with HL1 at the treadle pressing order and picking order. draft C and D. HL6 is also raised along with HL1 at the draft B and When double decker picking sley is also used with double C. By this, the face separating ends drawn through HL4 move decker shedding, the shuttle carrying the face ground weft (Fg from centre to top of the reed and also the back separating ends – C1) is kept in the top shuttle box and the shuttle carrying the drawn through HL6 move from bottom to centre of the reed. The back weft (B ­ C3) is kept in the bottom shuttle box. Both the remaining face separating ends drawn through HL3 remain at the shuttles are inserted simultaneously during first double decker centre of the reed along with centre separating ends. The back picking. The face figure weft shuttle (Ff – C2) is inserted by separating ends drawn through HL5 remain at the bottom of reed throw shuttle picking along with the even stitching ends forming the bottom layer. C. DDS of 4 Picks OWT Weave Hence, two decks of sheds – bottom shed and top shed ­ are formed one above the other. Fig. 10 shows the weave, draft, peg­plan, tie ­ up, treadle pressing order and picking order to weave 4 picks OWT weave, Four shuttles with four different colour wefts are used. First using 6 healds and 4 treadles by DDS and DDP principle. The shuttle is thrown in the top shed which become the first face ratio between stitching warp and separating warp is 1: 3. It is ground pick (Fg – C1). The third shuttle is thrown in the bottom clear from the weave that the shedding is achieved simply by shed which is first back ground pick (Bg – C3). Both the picks are operating the stitching healds along with face separating healds beaten together simultaneously to the fell of cloth. Again, second and back separating healds without operating centre separating shuttle is thrown in the top shed which become the first face ends . figure pick (Ff – C2). The fourth shuttle is thrown in the bottom shed which is first back figure pick (Bf – C4). When double decker picking sley is also used with double decker shedding, the shuttle carrying the face ground weft (Fg – C1) is kept in the top shuttle box and the shuttle carrying the back ground weft (Bg ­ C3) is kept in the bottom shuttle box. Both the shuttles are inserted simultaneously during first double decker picking. The face figure weft shuttle (Ff – C2) and back figure shuttle (Bf ­ C4) are inserted by throw shuttle picking.

IV. SIMPLE FACE - FLIP - FACE FABRIC OWT weaves are used to produce ‘Simple Face ­ Flip ­ Face Fabric (Simple FFF Fabric)’ with the aid of heald treadle or heald dobby shedding device. OWT weaves are also used to produce ‘Figured Face ­ Flip ­ Face Fabric (Figured FFF Fabric)’ with the aid of Jacquard shedding device combined with heald shedding. In Simple FFF Fabric, the effects like mono colour, vertical stripe, cross over stripe and check effect are produced in different permutation and combination. In Figured FFF Fabric, any two figures could be produced one for face and other for back. Fig. 10. Weave, draft and tie­up for DDSH to weave 4 Picks OWT Otherwise, figures could also be combined with the simple effects The healds HL 1 and HL 2 are set to form bottom closed like mono colour, stripe, and check effect. shedding and keep all the stitching ends at the bottom of reed. The healds HL3 and HL4 of face separating ends are set to operate from centre to top of the reed. The healds HL5 and HL6 of back separating ends are set to operate from bottom to centre of the reed. All the healds are set with bottom reversing motion. The top of healds HL1and HL2 are separately connected with 2 treadles T1 and T2 to raise the stitching ends from bottom to top. The healds HL3 and HL5 are connected with another treadle T3. The healds HL4 and HL6 are connected with another treadle T4.

24th June 2017 , ISBN No. 819070985-2 10 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Fig. 12. Four Samples of Simple FFF Fabric The photograph of two different products that are manufactured by the new concept are shown in Plates A, and B in Fig 13.. The door mat with big checks (woollen) becoming door Fig. 11 – Ten different varieties of Simple FFF Fabric mat of small checks (cotton) when reversed is shown in Plate A (J Totally ten different varieties are produced in Simple FFF in Fig. 11). How a gents jacket with vertical stripe becomes jacket Fabric as shown from A to J in Fig. 11. Each variety is shown in with horizontal stripe when reversed is illustrated in Plate B (F in two divisions. Left side shows one face of the cloth and right Fig. 11). side shows another face of the cloth. The Simple FFF Fabric is All the possibilities of producing Simple FFF Fabrics using divided into three groups. Mono / Mono, Cross / Mono and two, three and four picks OWT weaves have been derived in the Cross / Cross are the three effects produced by 2 picks OWT. study. From the new Double Decker Shedding method derived in They are indicated at A, B and C in Fig. 11. Stripe / Mono, Check the study , it is evident that the OWT weaves could be produced / Mono, Stripe / Cross and Check / Cross are the four effects by using less number of healds and treadles with effort less lifting produced by 3 picks OWT. They are indicated at D, E, F and G in of minimum number of healds while introducing back picks. The Fig. 11. Stripe / Stripe, Check / Stripe and Check / Check are the samples developed during the study prove that OWT weaves three effects produced by 4 picks OWT. They are indicated at H, are completely suitable to produce smooth rubber like Simple I and J in Fig. 11. FFF Fabrics in all count and quality range. The warp pattern, drafting, denting, tie­up are one and the same for each group. The different effects in each group are produced using heald – treadle shedding keeping the same treadle pressing plan but changing the colouring order. Otherwise, they can be produced using heald – dobby shedding keeping the same colouring order but changing the peg­plan. Plates A, B in Fig. 12 show two different Simple FFF door mats woven using 2 Picks OWT weave. Plates A and B are woven with mono colour effect on face side backed by mono colour effect (A in Fig. 11). In A, wool is used for one side and cotton for other side. In B, viscose is used for one side and cotton for other side. The door mat woven using 3 Picks OWT with check colour effect backed by mono colour effect using wool for one side and cotton for another side is given in Plate C (E in Fig. 11). Plate D is both side fine silk Simple FFF Fabric of 4P OWT weave woven with bigger check colour effect backed by smaller check colour effect (J in Fig. 11). Fig. 13. Two Products of Simple FFF Fabric

24th June 2017 , ISBN No. 819070985-2 11 11 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Hence, the designers and students can very well adopt these 2. Z. J. Grosicki, “Stitched Double Cloths”, Watson’s Advanced Textile weaves to produce unique and innovative reversible product Design, 2004, pp. 104­113. range like shawl, scarf, mufflers, jackets, floor carpets, door mats, 3. N. Gokarneshan , “Double Cloth”, Fabric Structure and Design, 2011, pp. 102­ 106. table mats, table cloth, room dividers and door curtains for both 4. B. K. Behera, Rajesh Mishra, “3 – Dimensional Weaving”, Indian domestic and export market. Journal of Fibre and Textile Research, 33 (September), 2008, pp. 274­287. Acknowledgment 5. A. E. Bogdanovich, Mohamad, “Three – Dimensional Reinforcements for Composites”, SAMPE Journal, 45 (November / The authors are indebted to the expert weavers of Weavers’ December), 2009, pp. 14 – 18. Service Centre Bangalore who cooperated technically to carry 6. Xiaogang Chen, “3D Weaving and 3D Woven Structures”, out the study. The authors are also indebted to office of www.texeng.co.uk / papers / 3D_Weaving.pdf, The University of Manchester. Development Commissioner for Handlooms, New Delhi and 7. Z. J. Grosicki, “Weft Tapestry”, Watson’s Advanced Textile Design, Gandhigram Rural Institute, Gandhigram for the support extended 2004, pp. 192­200. to conduct this study. 8. H. Nisbet, “Tapestry Fabrics”, Grammar of Textile Design, 1985, pp. 481­ 486. References 9. Shankar Kumar , “Double Race Board Sley”, Brochure, Indian Institute of Handloom Technology, Salem, 1983. 1. D. Jayaramaiah, “Two In One (Figured Fabric)”, Souvenir 1982, 10. R. G. Panneerselvam, “Weaving of 3 Dm Fabric in Handlooms”, IIHT, Salem. www.fibre2fashion.com, September, 2008.

24th June 2017 , ISBN No. 819070985-2 12 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Improvement in Anti­aging and Anti­weathering Properties of Nano­Composite Coatings by the Incorporation of Graphene Nano­materials Shambhu Sharan Kumar*1 Sanjay Kumar Jha2 1Birla Institute of Technology, Mesra, Ranchi­ 835215 2Sandip Foundation, Sijoul – 847235, India E­mail: [email protected] Mani Kant Paswan3 S.S. Narvi4, N.D. Pandey5 3National Institute of Technology, Jamshedpur 4,5Motilal Nehru National Institute of Technology, Allahabad, India

Abstract— In present extensive research work, the properties of based on polyurethane (PU) based compounds due to their polymer-nano-composite coating was improved with respect to outstanding performances, such as high tensile strength, chemical aging, weathering and corrosion resistance using nano-graphene and weathering resistance, good process­ability, and mechanical materials coupled with an epoxy resin based primer coat. Based properties [2,3]. However, polymeric materials belong to the on the literature survey that the coating containing nano-additives organic coating family and generally deteriorate when exposed would provide strong resistance to overall degradation and if that is modified by nano-graphene particles through silanization, will to different environmental conditions. The degradation improve the stability of the graphene particles in the coatings; by mechanism and required protection of PU resin is being studied doing this, the performance of the nano-composite coatings was since last two decades [4,5]. improved and applied on aluminium and mild steel panels for In a technical language, we can say that the degradation further analysis and testing. Coating-performance was evaluated occurs when the amount of energy absorbed, exceeds the bond­ 0 by exposing them into diesel & engine oil at 80 C for 48 hours to energy of a polymer. The main factors contributing to study the anti-aging property. Further, coated samples were environmental degradation include ultraviolet (UV) light, aqueous exposed to ultraviolet (UV) light and salt mist (containing 3.5% environment and oxygen [5­7]. Under UV irradiation, the chemical NaCl Solution) by placing specimens alternatively in two respective chambers on intervals of 24 hours for 30 days and more. structures of polymeric materials irreversibly change, which Coating-performance analysis was also carried out using atomic simultaneously affect both the physical properties, i.e. gloss force microscopy (AFM). Results show that a 17.15% reduction in reduction, yellowing, blistering, cracking, etc and mechanical coating thickness is observed for the coating containing silanized properties, loss of tensile strength, brittleness, changes in glass graphene in contrast to a 20.60% reduction in thickness for the transition temperature (Tg) etc. According to the principle of coating with unmodified graphene. Furthermore, nanocomposite degradation [5], ultraviolet light activates bonding of the urethane coatings containing unmodified graphene had a higher corrosion group and the existence of the oxygen leads to the oxidation of rate (38.71E-06 mpy) than nanocomposite coatings containing the CH group, which in turn leads to the formation of peroxide, silanized graphene, boasting a corrosion rate of 12.11E-06 mpy, 2 ketone, and carbonyl near the polymeric coating surface [6,7]. which confirmed the positive effects of graphene silanization. The oxidation of byproducts then gets absorbed at the coating Keywords—Nano-Graphene material, Nanocomposite Coating; surfaces in wet environment and is unable to escape in dry Composite Surface; UV degradation; corrosion preventioncomponent; formatting; style; styling; insert (key words) environment, thus leading to adsorption. Water molecules also accelerate this process [8­10]. I. INTRODUCTION In order to improve the anti­weathering properties of For the purpose of anti­aging, anti­weathering and corrosion polyurethane coatings, in most cases, various UV absorbers and protection, protective coatings are applied to substrate­surfaces stabilizing agents are applied to minimize the absorption of UV in order to prevent deterioration of surfaces in automobiles, light on the surface of the polymeric material by quenching free aircraft, sporting goods and marine structures [1,2]. These radicals or by absorbing high­energy radiation. The incorporation coatings must satisfy the following requirements; i.e. (i) to retain of nanoparticles into polymeric coatings is one of the most a product’s integrity facing environmental factors over a long promising methods to improve both their mechanical and period of time, (b) efficiently avoid the absorption of moisture, weathering properties. The nanoparticles used in coatings are SiO , TiO , ZnO, Al O , and ZnS [11,12]. The selection of (c) prevent the liberation of any toxic agents or byproducts during 2 2 2 3 a product’s service life, and (d) to be low in cost for easy nanoparticles is based on the inherent properties they possess. availability. Most protective coatings used in such cases are Some nano­additives that can be added to coatings for UV

24th June 2017 , ISBN No. 819070985-2 13 13 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

protection include ZnO and TiO2. Although they improve the Silanized graphene nano particles (s-GNP) preparation: anti­weathering properties of the coatings, anatase Titania nano­ Organo­silane ([3­ (2­Aminoethylamino) propyl] trimethoxysilane) materials produce free radicals due to their photo­catalytic was used to silanize pristine graphene according to the work of properties [12­14]. Li B, et al [17]. In this preparation, 2 grams of pristine graphene Recently, Mirabedini et al [14] studied the weathering was dispersed in 200 ml ethanol (95%) by high power ultra­ performance of polyurethane nanocomposite coatings by sonication for one hour. The flask was then heated up to suppressing the photo­catalytic activity of titania modified with approximately 120°C to boil the ethanol under magnetic stirring. silane molecules. The incorporation of ZrO2 nanoparticles into Then 12 ml of the silane surfactant was added drop­wise into the polymer coatings was reported to improve tribological sealed flask. After five hours of reaction, the graphene/ethanol characteristics, including reduced frictional coefficients and wear mixture was cooled down to room temperature, and the resulting rates. Nanocomposite coatings made of silica and polyamide silanized graphene suspension was rinsed with 500 ml deionized exhibited higher scratch resistance than those without silica (DI) water using a filtration process. The silanized graphene was nanoparticles [13,14]. Therefore, polyurethane nanocomposite then dried overnight in the oven at 70°C for further use. coatings with the addition of graphene nano­flakes have been Preparation of substrates: To ensure good bonding developed. Since graphene is a hydrophobic material that absorbs between the GFRC or aluminum, and the coating, the surfaces of most of the incident light and has extraordinary mechanical either substrate were sanded using 3M 413Q abrasive sandpaper strength (tensile strength between 0.5 and 1.0 tera­pascal); it with a 400 grit number. Then the surfaces were cleaned with DI shows excellent potential to slow down the degradation process water and acetone. of coatings from environmental influences, such as water, UV Preparation of base-coat: The base coat was prepared by light, and oxygen [13,15]. mixing the CM0482300 epoxy primer with the CM0120900 epoxy Our recent work has proven that the insertion of graphene adducts in a 1:1 weight ratio. Then the mixture was stirred slowly in polymer film increases water­repellency. Therefore, based on for 15 minutes before being used on the test samples. The our hypothesis, the weathering process can be prevented and/or nanocomposite base coat was developed by adding silanized retarded by using graphene since it absorbs incident light, graphene to the standard base coat in 2%, 4%, and 8% weight provides mechanical durability, and increases hydrophobicity of percentages. In this preparation, first the nano­additives were the top coating. The silanization process consists of covering added into the epoxy adduct, and then the mixture was placed in the graphene surface with organo­functional alkoxy­silane a sonicator at room temperature for 30 minutes. After 30 minutes molecules. A silane­type surfactant was applied to treat graphene of sonication, the epoxy adduct was added to the epoxy primer nanoparticles (GNPs) in order to improve dispersion and and magnetically stirred on a hot plate for four hours at room interfacial bonding [13,15,16]. temperature, which allowed a good distribution of nano­additives in the base coat. II. EXPERIMENTAL Preparation of Top Coat: Graphene nano­flakes or silanized A. Materials graphenes were mixed well with the polyester urethane top coat via 30 minutes of probe sonication followed by four hours of Glass fiber­reinforced composite (GFRC) (2.5 x 5.0 cm in high­speed mechanical agitation. The basic top coat consisted size) and specific aluminum alloy (AL 2024­T3) specimens were of mixing the white paint with the hardener in a 1:1 ratio by weight. procured for the use as substrates for coatings. AL 2024­T3 was Then the mixture was stirred slowly for 30 minutes before being chosen because it is primarily used in the manufacture of aircraft used on the test samples. A series of nanocomposite top coats components. Aluminum alloy sheets (1 x 2 inch) were coated with were respectively prepared by adding silanized graphene with the nanocomposite for EIS testing. Epoxy primer together with 2%, 4%, and 8% weight percentages. In this preparation, first the epoxy adduct (which is a polyamine based compound) that works nano­additives were added into the hardener, and then the mixture as a hardener in conjunction with primer, was painted on the was placed in a sonicator at room temperature for 30 minutes. composites as the base coat. A polyurethane based compound After 30 minutes of sonication, the hardener was added to the that shows excellent bonding with epoxy primers, along with the white paint and magnetically stirred on a hot plate for four hours hardener, was used as the top coat. Nano­size graphene platelets at room temperature. To ensure uniform testing conditions and were purchased from Angstrom (product number N008­100­N). maintain uniform coating of 2 mils (50.8 microns) on all test At least 80% of the graphene platelets had a Z­dimension of <100 specimens, the thickness of the coating was measured using a nm. A Fisher Scientific FS 200 sonicator was used to assist with Mitutoyo­293­725 digital micrometer. breaking up the agglomeration of the nanoparticles to ensure uniform distribution of the nano­additives. [3­ (2­ Application of Coatings: Coatings were applied by air Aminoethylamino) propyl] trimethoxysilane was purchased from assisted spray gun. The required times for production of a Sigma­Aldrich Co Limited thickness of 2.0 to 3.0 mils of dry film is between 16 and 18 hours for un­accelerated drying and between 2 and 3 hours for B. Methods

24th June 2017 , ISBN No. 819070985-2 14 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi accelerated drying. The glass fiber­reinforced plastic or aluminum specimens were first coated with a base primer and then with a top coat when the base primer was cured. UV Exposure Test: The UV degradation test was performed using the QUV accelerated weathering chamber, purchased from the Q­Panel Company. Tests were in compliance with SAE standard ASTM D 4587­09, which describes the basic process of exposing paint and related coatings to UV light. The specimens were tested for a total of 30 days and characterized for surface Figure 1: Percentage Thickness Reduction of Various UV morphology, hydrophilic/hydrophobic behavior, and also coating and Salt Fog Exposed Samples Containing Different Percentages thickness in four­day intervals. of Nano­additives. The bar is plus/minus 0.2 mil. Corrosion Test: The corrosion resistance test was Figure 1 shows even better result with the decrease in performed in a Singleton salt spray chamber according to SAE coating thickness of 10.78% and 8.72% for those coatings with standard ASTM B117, which describes the procedure of corrosion 4% and 8% silanized graphene, respectively. It can be concluded testing after exposure to the UV­condensation test. Specimens from these results that nanocomposite coatings with an increased were put in the corrosion chamber on racks with slots at a 15­ percentage of silanized graphene have improved resistance to UV and salt fog degradation, which is depicted by a lesser degree angle. The pH was kept between 6.7 and 7.2, and the fog decrease in coating thickness. Also, this is consistent with our concentration averaged 1.2 ml/hour, as suggested by the testing previous study, which showed that the inclusion of unmodified standard. Specimens were alternatively maintained inside the graphene particles into a polymeric coating leads to a decreased corrosion chamber and the UV chamber in 24­hour intervals for a reduction in coating thickness after UV and salt fog exposure; period of 30 days. however, after 30 days of climate condition treatment, a 20.60% III. RESULTS AND DISCUSSION reduction in the coating thickness is noticed for the polyurethane coating with unmodified graphene, while in this study, only a A series of coatings were containing silanized graphene 17.13% reduction in coating thickness is observed for with 2%, 4%, and 8% (by weight percentages) on the glass fiber­ polyurethane coating modified with silanized graphene. This is reinforced plastic & aluminum specimens. In this fabrication, the an indication that silanized graphene improves the resistance of GFRP or aluminum specimens were first coated with the base polymer coating to degradation to a greater extent than unmodified primer. Then, top coats were spray coated onto the composite graphene samples. The spray process was controlled to limit the thickness It can be observed that coated test samples containing 2% of the coating to 1 mil (25.4 microns). The total thickness of the silanized graphene particles have greater resistance to coating system (base primer + top coat) was 2 mils (50.8 microns). degradation than coated test samples without nano­additive To make natural weathering condition, including sunlight and inclusions. In addition, it can be seen that an increased percentage rain or dew, all samples were tested in the QUV chamber and salt­ of silanized graphene particles up to 8% leads to greater resistance spray chamber. to UV and salt fog degradation. Also, an additional study An alternating cycle between absorption and adsorption comparing samples containing silanized graphene with under climate conditions causes deterioration of polymer unmodified graphene showed there is an exponential decrease in coatings; once deterioration of polyurethane begins the formation coating thickness for coated samples containing 2% unmodified of cracks and blisters take place. The increased formation of cracks graphene, while for a nanocomposite coating containing silanized and blisters due to continued exposure leads to the release of graphene, the decrease in coating thickness is steadier. pigment cells, and their reduction results in a small reduction of The improved performance of nanocomposite coatings with the coating thickness. During the period of testing, it was found silanized graphene could be due to the fact that one of the that polymer coatings with and without silanized graphene functions of silanization is to help in the dispersion of graphene experienced a reduction in thickness, which is because of the in polymer coatings or other media and thus inhibits the compaction of coating under UV light, and oxide layer formations aggregation of graphene sheets throughout the coating. The followed by erosion in the corrosive environment [6­8]. For the reduced number of graphene aggregates inside the coating could coatings containing 2% silanized graphene particles, the original lead to less stress points from which crack formation could start coating thickness was also 2.12 mils before UV and corrosion and hence lead to a diminished reduction in coating thickness. exposure, but after the same period of climate condition treatment, For a comparison of coatings with and without the addition of the thickness decreased to 1.81 mils, a 17.13% decrease in coating silanized graphene, we chose two samples with which to do thickness. weathering experiments. Here, two samples were alternatively incubated for 30 days in both UV and salt fog chambers. One sample was with the polyurethane coating only. The other sample was the coating with the addition of 2% silanized graphene nano­ 24th June 2017 , ISBN No. 819070985-2 15 15 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi materials [9,10]. The coatings were studied with a microscope to Similarly, the inclusion of nanoparticles on the surface of the observe their topographical changes before and after weathering coating, was also confirmed by SEM images (Figure 3 & 4), experiments. which show good dispersion of the silanized graphene inside the Figure 2(A) shows an AFM image of the surface of a coated coating. Figure 2(D) refers AFM image of the coating sample test sample containing 0% silanized graphene particles before containing 2% silanized graphene after 30 days of UV and salt exposure to UV light or the salt fog test. The reduced presence of fog exposure. In this case, no blistering is visible on the surface surface roughness of the specimen indicates significant gloss. of the coated test specimen. Consequently, the nanocomposite But after 30 days of UV light and salt fog exposure, the surface of coating containing 2% silanized graphene ought to offer improved the coating was completely ruined, and the formation of blisters corrosion resistance of various sizes can be clearly seen in Figure 2(C). In addition to blistering, which is the most obvious indication of UV degradation, a strong presence of small cracks can be seen over the entire sample’s surface. The combination of blistering­formation on the surface of the sample indicates the degradation of the coating after 30 days of UV and salt fog exposure.

Fig. 2 D: AFM Amplitude Image of Polyurethane Coating with 2% Silanized Graphene after UV and Salt Fog Exposure.

Fig. 2.A: AFM Amplitude Image of Polyurethane Coating with Addition of 0% Silanized Graphene, Figure 2(B) shows an AFM image of the surface of a coated test sample containing 2% silanized graphene particles that has not been exposed to UV or corrosion tests. Due to the presence of silanized graphene nano­materials, the surface of the sample is rougher, showing dispersion of graphene nanoparticles inside the polymer coatings. Figure 3: SEM Images of Nanocomposite Coating Containing Silanized Graphene However, we do notice crack formation on the surface of the coating. This crack formation is likely the result of severe corrosion/degradation and is often seen on conventionally used polymeric coatings. It has been proven that the agglomeration rate of a nano­particle increases as a function of its inclusion in a polymer coating. But due to the lack of changes seen on the Fig.2.B: AFM Amplitude Image of Polyurethane Coating surface of the 2% s­GNP nanocomposite coating, these AFM with addition of 2% Silanized Graphene, images strongly suggest that the resistance to degradation of a nanocomposite coating containing silanized graphene is much better than for a coating devoid of nano­particle inclusion [11­13].

Fig. 2C: AFM Amplitude Image of Polyurethane Coating with 0% Silanized Graphene after UV and Salt Fog Exposure,

24th June 2017 , ISBN No. 819070985-2 16 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Table 1: Corrosion Values Of Various Test Samples Containing Different Percentages of Nano­additives by weight

Names Sample Icorr (A) Ecorr (V) Corrosion Names (mpy) Rate S1 Aluminum 4.750 x 10­12 ­0.628 420.1E­03 (bare) S2 Coating with 5.57 x 10­8 ­0.585 4.930E­03 primer 0wt% silanized graphene S3 Coating with 1.37 x 10­10 ­0.120 12.11E­06 Figure 4: SEM Image of Nanocomposite Coating Containing primer 2wt% Unmodified graphene silanized For bare glass fiber composite specimens coated with a graphene polymer coating containing 4% silanized graphene, the contact S4 Coating with 5.48 x 10­11 ­0.0844 4.851E­06 angle values varied from 80.45o to 52.99o after UV and salt fog primer 4wt% exposure, which was a better performance than the coating silanized containing 2% silanized graphene. The time series degradation graphene of the contact angle for a polymer coating containing 8% silanized S5 Coating with 3.52 x 10­11 ­0.051 3.115E­06 o o graphene was from 81.23 to 54.7 after UV and salt fog exposure. primer 8wt% This sample displayed the most resistance to UV and salt fog silanized degradation. The contact angles seen in this case were graphene consistently higher than for coatings with 2%, 4%, and 8% S6 Coating with 4.37 x 10­10 ­0.119 38.71E­06 silanized graphene. The higher percentage of silanized graphene primer 2wt% did not affect the properties of the coating, while in the case of unmodified 8% unmodified graphene inclusion, the coating was susceptible graphene to deterioration. Overall, AFM served as a good visual indicator S7 Sn­Cu coating 2.32 x 10­11 ­0.341 4.52E­07 of the degradation process. with primer Before UV and salt degradation, the shininess and 2wt% smoothness of the sample leads to higher contact angle unmodified measurements. The contact angle change of the above coatings graphene was investigated using a goniometer. In the absence of a protective coating, a rapid decrease in contact angle values after Two conclusions can be drawn from the AFM images. First, 30 days’ exposure was observed with the time series degradation a nano­additive­like graphene, when added to a coating, can act of bare glass fiber composite samples, which was from 65.230 to like a reinforcement that binds the pigment cells and increases 37.310 after 30 days exposure. the resistance of the coating against environmental factors, such as UV degradation and corrosion. Graphene absorbs all of the The time series degradation of the contact angle of bare light and provides hydrophobicity. Second, the mechanism of glass fiber composite specimens coated with a polymer coating coating degradation, which proceeds through the formation of but without nano­additives varied from 69.66o to 46.850, which is blisters, pits, and cracks on the surface, resulting in the loss of better than for the bare glass fiber specimens. However, the time coating properties, has been reestablished. series degradation of the contact angle of bare glass fiber composite specimens coated with a polymer coating containing The silanized graphene could be acting as an absorbing 2% silanized graphene varied from 78.85degree to 50.89 degree agent for the UV radiation and hence contributing to a reduced after UV and salt exposure, which represents an improvement development of ester in the coating. Also ester formation is over the basic coating. decreased as the percentage of silanized graphene is increased in the coating, it can be concluded that the silanized graphene acts The corrosion potential is indicated by the intersection of as an agent that absorbs part of the UV radiation to which the the slopes of the cathodic and anodic branches of the curve. polyurethane­coated test sample is exposed and hence reduces Potentio­dynamic test values of all specimens are represented in its degradation. For the aluminum sample coated with a coating Table 1. containing 0% silanized graphene, the corrosion rate is 4.93E­03 mpy, but for the coated specimen containing 2% silanized graphene, the corrosion rate is 12.11E­06 mpy. 24th June 2017 , ISBN No. 819070985-2 17 17 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The observed corrosion rates show that the test specimen REFERENCES containing 2% silanized graphene corroded at a slower rate than 1. Aglan, H., Calhoun, M., Allie, L. Effect of UV and hydrothermal the coated test sample without nano­additives. In addition, it aging on the mechanical performance of polyurethane elastomer, was observed that an increased loading of silanized graphene by Journal of Applied Polymer Science; 108, 558­564, 2008. weight into the coating resulted in an improved resistance to 2. Ramakrishna, S., Mayer, J., Winter mantel, E., Leong, K.W. corrosion; the sample containing 8% silanized graphene had the Biomedical applications of polymer­composite materials: A review. lowest corrosion rate of 3.115E­06. Composites Science and Technology 2001, 61, 1189­1224. 3. Yang, X.F., Tallman, D.E., Bierwagen, G.P., Croll, S.G., Rohlik, S. Blistering and degradation of polyurethane coatings under different accelerated weathering tests. Polymer Degradation and Stability 2002, 77, 103­109. 4. Yang, X.F., Vang, C., Tallman, D.E., Bierwagen, G.P., Croll, S.G., Rohlik, S. Weathering degradation of a polyurethane coating. Polymer Degradation and Stability 2001, 74, 341­351. 5. Ludwick, A., Aglan, H., Abdalla, M.O., Calhoun, M. Degradation behavior of an ultraviolet and hygrothermally aged polyurethane elastomer: Fourier transform infrared and differential scanning calorimetry studies, Journal of Applied Polymer Science, 2008, Figure 5: Corrosion Rate Comparison of Coated Test Samples 110, 712­718. Containing Unmodified Graphene Particles versus Coated Test 6. Oertel, G., Abele, L, Polyurethane handbook: Chemistry, raw Samples Containing Silanized Graphene Particles. materials, processing, application, properties. Hanser: 1994. Figure 5 shows the difference in corrosion rates between a 7. Merlatti, C., Perrin, F.X., Aragon, E., Margaillan, A. Natural and artificial weathering characteristics of stabilized acrylic­urethane coating containing 2% silanized graphene and a coating paints. Polymer Degradation and Stability 2008, 93, 896­903. containing 2% unmodified graphene. 8. Pappas, S.P. Weathering of coatings ­ formulation and evaluation. Progress in Organic Coatings 1989, 17, 107­114. CONCLUSIONS 9. Fernando, B., Shi, X., Croll, S. Molecular relaxation phenomena during accelerated weathering of a polyurethane coating. J Coat The polyurethane coating containing 2% graphene nano Technol Res 2008, 5, 1­9. materials showed greatly improved the performance compared to 10. Bauer, D.R. Degradation of organic coatings. I. Hydrolysis of the standard polyurethane coating; since graphene provides melamine formaldehyde/acrylic copolymer films. Journal of Applied hydrophobicity, absorbs incident light, and improves mechanical Polymer Science 1982, 27, 3651­3662. robustness of the coatings. That’s why; test samples were 11. S.P., P. Weathering of coatings­formulation and evaluation, Progress prepared by the addition of 0%, 2%, 4%, and 8% weight in Organic Coatings 1989, 17, 107. percentage of graphene into standard polyurethane coatings. 12. W, S. Polymer degradation, principles and practical applications. Macmillan: New York, 1981 AFM examination and water contact angle tests were performed 13. Blakey; Evaluation of paint durability­natural and accelerated. to quantify the variation in properties. These tests confirmed Progress in Organic Coatings 1985, 13, 279­296. that the addition of graphene in composite coatings improve the 14. Mirabedini, S.M., Sabzi, M., Zohuriaan­Mehr, J., Atai, M., resistance against UV degradation and corrosion. Through a time­ Behzadnasab, M. Weathering performance of the polyurethane series study of the AFM images at different stages of the UV and nanocomposite coatings containing silane treated tio2 nanoparticles. corrosion tests, the progression of degradation was explained in Applied Surface Science 2011, 257, 4196­4203. 15. Daouda Diouf, “Investigating the Effects of Silanized Graphene detail by the formation and enlargement of blisters, pits, and Nanocomposite Coatings on Fiber Reinforced Composites Exposed cracks. Overall, this research has provided a detailed overview of to UV Light and Salt Fog Environments,” M.S. Thesis, Wichita the mechanism of coating degradation and has suggested a State University, February, 2014. means to arrest or decrease the rate of this degradation by using 16. Katangur, P., Patra, P.K., Warner, S.B. Nanostructured ultraviolet a nano­additive, namely graphene. resistant polymer coatings. Polymer Degradation and Stability 2006, 91, 2437­2442. ACKNOWLEDGMENT 17. Li, B., Olson, E., Perugini, A., Zhong, W.­H. Simultaneous enhancements in damping and static dissipation capability of Authors highly acknowledge the technical support in the polyetherimide composites with organo­silane surface modified graphene nano­platelets. Polymer 2011, 52, 5606­5614. laboratories of Nano Technology Application Centre, Allahabad University and M.N.N.I.T. Allahabad for carrying out this extensive research work.

24th June 2017 , ISBN No. 819070985-2 18 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Competitiveness measurement of supplier related risk in supply chain Mahesh Chand Assistant Professor, Mechanical Engineering Department YMCA University of Science and Technology, Faridabad, HR Email­[email protected]

Abstract— This paper deals with competitiveness measurement of risk of supply chain disruptions [8]. Supplier capacity constraints in supplier networks of supply chain. The primary objective is to result in the inability to supply the quantities demanded by identify and measure the competitiveness index of supplier related risks purchasers. Fluctuations in demand may tax a supplier beyond in supply chain. The paper outlines the different factors of supplier its abilities through insufûcient utilization of equipments and related risks and presents methods for risk management in a complex employees [13]. Other capacity risks include volume/product mix network environment. The results indicate that risk management is an important development target in the studied supplier networks. The requirement ûuctuations that result from the increased customers’ calculated competitiveness measurement index helps the researchers sophistication and the unpredictability of demand and process and practising managers in understanding and managing the risks in technological changes. The development of effective strategies supplier networks. for managing risk hinges on first understanding the sources of Keywords: Supply chain, Risks, competitiveness, supplier risk and their relationships [3]. The main objectives of this paper are as follows 1. Introduction • To identify the supplier related risk in supply chain Purchasing and supply management are widely • To calculate the competitiveness index of identified risk. acknowledged as strategic for companies, because they 2. Identification of Supplier Related risk in supply chain contribute to build and to maintain a competitive advantage [10]. There is significant literature dealing with SCRM which Supply management involves coordinating with has been defined as the management of supply chain risks upstream partners to ensure timely delivery of supplies. through coordination or collaboration among the supply chain The increasing complexity of products and services, partners so as to ensure profitability and continuity [20]. Supply characteristically shorter the product lifecycles, globalization of management becomes more critical because the increasing trade, and the improvements in logistics, have led companies to dependence on suppliers makes companies highly exposed to focus on their core businesses. The main consequence of these supply risks. SRM is becoming ingrained within supply competitive environment changes is has caused company management in order to mitigate the risks of the supply chain. competitiveness and survival to depend more on their suppliers The investigation of SRM has received increasing attention only [4]. An increasing dependence on suppliers leads companies to over recent years. A great portion of the literature has focused on be even more exposed to uncertain events,so that supply risk the specific sources of supply risk and their groupings [7] and management (SRM) becomes necessary as part of supplier another portion has analyzed the methods, both qualitative and management [23][24]. Thus supplier selection (SS) becomes one quantitative, used by companies to assess supply risks [26] and of the most important issues for purchasing managers [10]. Supply to manage them [16]. Supply risks classified as capacity risks reside in the course of movement of materials from suppliers limitations, currency fluctuations and supply disruptions [11]. to the firm and include the reliability of suppliers, and Supply risks related to design, quality, cost, availability, considerations such as single versus multiple sourcing and manufacturability, suppliers, legal and environmental issues, centralised versus decentralised sourcing [5]. Delays in material health and safety [25]. Some selected supplier related risks issues flows often occur when a supplier, through high utilization or are selected through literature are as follows: another cause of inflexibility, cannot respond to changes in 2.1 Cost demand. Other culprits include poor­quality output at supplier Cost reduction plays an important role in every movement plants (or at their suppliers’ plants), high levels of handling or of supply chain partners. There is always a risk of increase in inspections during border crossings and changing transportation cost due to government policies rules and regulations. modes during shipping. Supplier insolvencies are a major source Relationship between hazard (i.e., market uncertainty) and a

24th June 2017 , ISBN No. 819070985-2 19 19 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi safeguard mechanism in transaction cost economics and the extra such a large financial investment in his business, the small cost required for mitigating the conceivable hazard, such as businessperson must make every effort to reduce the risks demand uncertainty, present in inter­firm contracts [22]. associated with carrying inventory. 2.2 Delivery mistakes 2.9 Inflexibility There may be time limits on the delivery of items. Within Flexibility is a complex and multidimensional concept, these time limits, some conditions for supplying the items may difficult to summarize [9]. Flexibility reflects the ability of a system become important, while other conditions may not be the dominant to properly and rapidly respond to changes, coming from inside ones [12]. According to [19] risks might include such factors as as well as outside the system. quality, product design and production, supplier development 3. Methodology used and stability, logistics, and any physical activity that impinges Methodologies used in this research are as follows: negatively on the supply chain’s ability to meet its objectives 3.1 Questionnaire-based survey regarding the delivery of goods or services. The questionnaire was designed on a 5­point Likart scale. 2.3 Financial instability It contained supplier related risk in supply chain regarding the A key feature of supply chain risk is that, the complexity implementation and transition in supply chain management. Nine makes it difficult for the exposed company to estimate the total supplier related risk are identified through literature and financial losses, which contributes to the impediment in how to discussions with industrial and academic experts are shown in design risk mitigation solutions for supply chains. Current Table 1 with their mean score. The respondents were asked to business trends that increase the vulnerability to risks in supply indicate the level of difficulty in managing these supplier related chains are [6] Financial risks also include factors like settlement risk in supply chain, on the Likart scale, 1 not at all and 5 very process disruption, improper investments, and not bringing cost important. transparency to the overall supply chain [2]. 3.2 Evaluation of competitiveness index (CI) 2.4 Problems in the product quality For computing the competitiveness index the mean score The group of features and characteristics of a saleable good with their rank of supplier related risk has been calculated on the which determine its desirability and which can be controlled by a basis of Table 1. After this rank, inverse rank and weight for each manufacturer to meet certain basic requirements. Most measure is to be finding out. For assigning weight to different businesses that produce goods for sale have a product quality measures of competitiveness index, the highest and lowest values or assurance department that monitors outgoing products for of five point Likert scale i.e. 5 and 1 are mapped 100% and 0% consumer acceptability. respectively. For each of the issues of competitiveness a weight 2.5 Difficulties in satisfying the demand is assigned. The criteria for weight (Wi) is as under: According to the structure of demand is one of the most Wi = +1 (Strength), when percentage score > 60% (Mean important selves to decide on the level of collaboration and value>3). information exchange [18]. Therefore, it is essential to identify = 0 (Neutral), when percentage score is between 40­60% the reasons behind demand for a particular product at a particular Mean value between 2 and 3). time to stand in competitiveness market. = ­1 (Weakness), when percentage score < 40% (Mean value 2.6 Discontinuity of supply <2). The capabilities of a supplier are required in coordinating This framework was used by [14] is Cj= Sum [Wi X Log Ki] the product design process with supplier [17]. The coordination used this model for study the select issues of supply chain at design stage may result in better design and improved financial management. [15] Used this method for analysing the operational performance, if the supplier has sufficient knowledge for design risks in supply chain. Sum of entries of last column (Wi Log Ki), of the product. Factors like communication with manufacturer will give competitiveness index i.e. 4.85. Theoretically, and a good organizational culture of supplier also play important competitiveness index value may range between ­ 6.52 to +6.52. role while coordinating with manufacturer [1]. Computation of competitiveness index for this study is illustrated 2.7 Inadequate transport with the help of a worksheet as shown in Table 1. Transportation risks occur due to delay in transportation Table 1 Measurement of competitiveness index mode chosen. Due to transportation risk overall production system can be stopped. To outcome this type of risks suitable mode of transportation should be chosen. 2.8 Inadequate inventory Inadequate inventory affect all companies regardless of how much inventory the company carries. A small business typically has a large amount of its cash tied up in inventory. With

24th June 2017 , ISBN No. 819070985-2 20 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

S. No. Supplier related risk Mean Rank Inverse Rank Log Ki Weight Wi X (Ki) (Wi) Log Ki 1 Cost increases 3.92 1 10 1 +1 1.00 2 Delivery mistakes 3.78 2 9 .95 +1 .95 3 Financial instability 3.59 3 8 .90 +1 .90 4 Problems in the product quality 3.42 4 7 .84 +1 .84 5 Difficulties in satisfying the demand 3.26 5 6 .77 +1 .77 6 Discontinuity of supply 3.09 6 5 .69 +1 .69 7 Inadequate transport 2.97 7 4 .60 0 .00 8 Inadequate inventory 2.84 8 3 .47 0 .00 9 Inflexibility 2.77 9 2 .30 ­1 ­.30

4. Result and discussion 11. Johnson, M. E. Learning from toys: Lessons in managing supply Based on response from questionnaire survey on various supplier chain risk from the toy industry, California Management Review, pp. 106­124, 2001. related risk, competitiveness index has been evaluated (Table 1). 12. M. Kumar, P. Vrat, and R. Shankar, A fuzzy programming approach Competitiveness index has been found to be 4.85. Maximum value for vendor selection problem in a supply chain, International Journal can reach up to 6.52. Presently Competitiveness index of this of Production Economics, pp. 273­285, 2006. study among these measures is quite high. This approach can be 13. H.L. Lee, V. Padmanabhan, and S. Whang, Information distortion in a supply chain: The bullwhip effect, Management science, pp. utilized by the organization to benchmark its performance with 546­558, 1997. national and international standards. It has been observed that 14. M. Chand, and R.K. Singh, Study of Select Issues of Supply Chain organizations are doing quite well in terms of cost, delivery, Management: A Case Study, International Journal of Advanced financial stability, product quality, demand and supply however Manufacturing Systems, pp.151­155, 2010. 15. M. Chand, T. Raj and R. Shankar, Analytical Network Process (ANP) there is need for improvement in area of transportation, inventory Based Modeling For Analysing The Risks In Traditional, Agile, And and flexibility for dealing well with supplier related risk considered Lean Supply Chain.Journal of Statistical Science and Application, 2013. in this research. 16. G.J. Micheli, E. Cagno, and D.A. Giulio, Reducing the total cost of References supply through risk­efficiency­based supplier selection in the EPC industry. Journal of Purchasing and Supply Management, pp. 166­ 1. K. Arshinder, A. Kanda, and S.G Deshmukh, A review on supply 177, 2009. chain coordination: coordination mechanisms, managing uncertainty 17. K.J. Petersen, R.B. Handfield, R. B., and G.L. Ragatz, Supplier and research directions. In Supply chain coordination under integration into new product development: coordinating product, uncertainty (pp. 39­82), 2011, Springer Berlin Heidelberg. process and supply chain design, Journal of operations management, 2. J. L. Cavinato, Supply chain logistics risks: from the back room to 371­388, 2005. the board room, International journal of physical distribution & 18. U. Ramanathan, Aligning supply chain collaboration using Analytic logistics management, pp. 383­387, 2004. Hierarchy Process. Omega, 431­440, 2013. 3. C. H., Chiu, and T. M. Choi, (2016). Supply chain risk analysis with 19. R.E. Spekman, and E.W. Davis, risky business: expanding the mean­variance models: a technical review. Annals of Operations discussion on risk and the extended enterprise, International Journal Research, pp. 489­507, 2016. of Physical Distribution & Logistics Management, pp. 414­433, 2004. 4. L. De Boer, E. Labro, and P. Morlacchi, A review of methods 20. C.S.Tang, Perspectives in supply chain risk management, supporting supplier selection, European journal of purchasing & International Journal of Production Economics, pp. 451­488, 2006. supply management, pp. 75­89, 2001. 21. A.J.Y. Weele and F.A. Rozemeijer, F. A., Revolution in purchasing: 5. A. Diabat, K. Govindan,, and V. V. Panicker, Supply chain risk Building competitive power through proactive, European Journal management and its mitigation in a food industry, International of Purchasing & Supply Management, pp. 153­160, 1996. Journal of Production Research, pp. 3039­3050, 2012. 22. O.E. Williamson, The mechanisms of governance, Oxford 6. M. N. Faisal, Prioritization of risks in supply chains, In Managing University Press, 1996. Supply Chain Risk and Vulnerability, pp. 41­66, 2009, Springer London. 23. F. Wu, S. Yeniyurt, D. Kim, & S.T. Cavusgil, The impact of 7. L. C. Giunipero, L. C., A. R. Eltantawy, R., Securing the upstream information technology on supply chain capabilities and firm supply chain: a risk management approach, International Journal performance: A resource­based view. Industrial Marketing of Physical Distribution and Logistics Management, pp. 698­713, 2004. Management, pp. 493­504, 2006. 8. V. M., Grötsch, C. Blome, and M.C. Schleper, Antecedents of 24. G.A. Zsidisin and L.M. Ellram, An agency theory investigation of proactive supply chain risk management–a contingency theory supply risk m anagement, Journal of supply chain management, pp. perspective, International Journal of Production Research, pp. 2842­ 15­27, 2003. 2867, 2013. 25. G.A. Zsidisin, L.M. Ellram., J.R. Carter and J.L. Cavinato, An analysis 9. D. Gupta, and J.A. Buzacott, A “goodness test” for operational of supply risk assessment techniques, International Journal of measures of manufacturing flexibility, International Journal of Physical Distribution & Logistics Management, pp. 397­413, 2004 Flexible Manufacturing Systems, 233­245, 1986. 26. G.A. Zsidisin, A. Panelli, and R. Upton, Purchasing organization 10. C. W. Hsu, T.C. Kuo, S.H. Chen, and A.H. Hu, Using DEMATEL to involvement in risk assessments, contingency plans, and risk develop a carbon management model of supplier selection in green management: an exploratory study, Supply Chain Management: An supply chain management, Journal of cleaner production, pp. 164­ International Journal, pp.187­198, 2000. 172, 2013.

24th June 2017 , ISBN No. 819070985-2 21 21 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Survey on Standalone Architecture for Cellular IOT

Vidhya R1, Karthik P2 1. Research Scholar, 2. Professor Department of E&C Engineering, KSSEM, Bangalore­ 560062, India [email protected]

ABSTRACT: M2M applications are bursty in nature and are can easily coexist with the 4G networks is the proliferation of the characterized by very low signaling to data volume ratio when device ecosystem and the emergence of ultra­low cost terminals compared to data intensive applications like ftp or video streaming. (module cost less than $5). The battery life of such devices are Such applications lead to either the Radio Access or the Core also expected to be in the order of a few years with an assumed Network overload. When such applications are accommodated over data rate expected from devices being in a few hundred bytes/ the existing LTE networks which are fine-tuned for Vo LTE and high speed internet applications, congestion control becomes a hard hour uplink. It has been proposed that the Cellular IOT system problem. In order to accommodate the ever increasing requirements will support 20 dB of additional link budget in order to ensure for M2M or IOT devices, a new cellular IOT (CIOT) system is wide area coverage. Essentially Cellular IOT wants to be an under discussion in multiple forums. A CIOT system can be well alternative to disparate technologies like WiFi, Zigbee, Low energy integrated into an existing LTE network or can be loosely coupled. Bluetooth and other proprietary systems. With the emergence of In this paper we propose a loosely coupled CIOT architecture based Category 0 LTE devices and efforts to make such Cat 0 chipsets on the network in a box approach. We provide signaling more common it looks like Cellular IOT systems are finally emerging enhancements and one mechanism to prioritize IOT devices at the to become a viable technology to consider for operators. While RAN level. Rel­12 LTE Cat 0 devices are a first step in the right direction, they Keywords—Cellular IOT (CIOT), NB-IOT, LTE, M2M, IOT are not enough for small sensor type of devices where long battery life is extremely important. With that in mind, the 3GPP Release­13 I. INTRODUCTION is working towards modifications for these low throughput sensor LTE Standards are now focused on LTE Advanced and type devices. One key modification would be to ensure that devices towards 5G technologies. The evolution towards 5G mobile can work in the sub 5Mhz bands as well and as an example the devices communication networks will be characterized by increasing will work in 1.4MHz bandwidth only, regardless of the bandwidth number of wireless devices, service types and the availability of of the cell. The UE transmit power could be capped at 20dB and different types of coexisting radio access technologies. There are the devices could work in the throughput range of around 200kbps. three main challenges that need to be addressed by any next Some of the key features of the study item undertaken by generation of 3GPP Standards; massive growth in the number of 3GPP [2] [3] is to understand how 3GPP Cellular IOT system could devices; massive growth in traffic volume and an increasingly compete with non­3GPP technologies on cost, coverage and power wide range of application characteristics. For these challenges to efficiency. Key features that are being looked at are the following: be addressed properly and specifically in order to handle M2M 1. Improved indoor coverage: and Internet of Things (IOT) type devices, it is necessary for LTE Most M2M device types will be deployed indoors and as radio­access technology (RAT) to evolve further and explore such any Cellular IOT system that takes shape should ensure that mechanisms to best handle the M2M/IOT data. Cellular IOT is the devices indoor, e.g. in an apartment basement, could still get gaining traction in the Industry and in academic circles as a coverage. solution to handle the expected M2M device types and volume. The offside advantage of the evolving Cellular IOT discussions 2. Support for massive number of low throughput devices is that of reusing existing GSM narrow band channels and The number of M2M/IOT devices are expected to be massive spectrum as a means of GSM spectrum harvesting. In this paper with the average data per device remaining small and these packets we propose a Cellular IOT network based on a Network in a Box are expected to be delay insensitive. approach and show that that in such an approach the only issue 3. Ultra low cost that needs to be solved will be the RAN overload issue for IOT To be competitive with non 3GPP standards like Zigbee, it is device prioritization. essential to support sub $5 chipsets. 3GPP Release­13 is working A. Cellular IOT requirements towards this. The Cellular IoT (CIOT) white Paper [1] shows the 4. Low power consumption opportunity scope for mobile operators if they have a Cellular It is essential that the Cellular IOT system can support extreme IOT system in place before the expected boom of M2M devices. Power Save Modes in order to realise battery life in the order of a The other need for developing a good Cellular IOT system that few years. 24th June 2017 , ISBN No. 819070985-2 22 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

5. Radio Access Network-Core Network interface adaptation for M2M The fast that a new clean slate Cellular IOT system is being developed should take care of this objective. It is also the key objective of this paper to address this issue in detail so that existing 4G systems and the emerging Cellular IOT systems can coexist and cowork. B. LTE Network in a Box LTE ‘Network­in­a­box’ (NIB) solution is a viable low cost solution for broadband penetration into rural areas as it brings down the CAPEX. Operational costs is also expected to be reduced as the power requirements of such NIB solutions are expected to Fig 1: The ETSI M2M architecture scope [7] run on non­conventional energy sources. A typical NIB would The High level architecture for M2M includes a Device and consist of a collapsed MME, SGW, PDN­GW, HSS, PCRF, OCS Gateway Domain and a Network domain. The Device and Gateway and OFCS functionalities. It is possible to have IMS services as Domain is composed of the M2M device, M2M area network and well in the same box in a self­contained standalone network mode. a M2M gateway. Network operators can then come up with lucrative geographic The M2M Devices connect to Network Domain either via specific service plans to enable cost effective broadband “Direct Connectivity” in which case the M2M Device performs penetration into rural areas. Such standalone NIB solutions offer registration, authentication, authorization, management and better service availability than traditional mobile networks making provisioning with the Network Domain or as a “Gateway as a it a good candidate as a public safety network as well. NIB Network Proxy” where the M2M Gateway acts as a proxy for the solutions can also be used to recover from network failures as it Network Domain towards the M2M Devices that are connected allows for rapid deployment. to it. Examples of procedures that are proxied include: Different NIB architectures are possible, authentication, authorization, management, and provisioning. 1. Distributed Architecture: A NIB can offer locally selected M2M Devices may be connected to the Networks Domain via function while rest of core function can be served by multiple M2M Gateways. M2M Area Network provides centralized core network connectivity between M2M Devices and M2M Gateways. 2. Totally Isolated Architecture: A NIB can function as a fully Examples of M2M Area Networks include: Personal Area Network independent isolated network without any transmission technologies such as IEEE 802.15.1 [i.3], Zigbee®, Bluetooth® connection to external or to an urban network deployment. etc. The M2M Gateway runs M2M Application(s) using M2M Service Capabilities. The Gateway acts as a proxy between M2M 3. Local breakout deployment: A NIB can support a local Devices and the Network Domain. The M2M Gateway may provide breakout architecture to scale to local traffic volumes. service to other devices (e.g. legacy) connected to it that are II. A NETWORK IN A BOX APPROACH FOR CELLULAR IOT hidden from the Network Domain. A. Considerations in LTE and Cellular IOT coexistance The Network Domain is composed of the Access Network One of the key consideration in a CIOT network will be the which allows the M2M Device and Gateway Domain to ability to handle a vastly varying latency sensitivities data from communicate with the Core Network, the Core Network which M2M/IOT devices. In order to handle short data bursts from IOT provides IP connectivity, Service and network control functions, devices multiple techniques have been suggested. Connection Interconnection provisions and the M2M applications that that less communication protocol for IoT devices over LTE mobile run the service logic and use M2M Service Capabilities accessible networks which requires no control plane signaling at the EPC via an open interface. has been suggested in [6]. In a NIB the issue of a separate EPC In this paper it is proposed that the NIB A system in a box authentication and connection establishment is redundant. A RRC will have to handle only the RAN level load and the core network level connection itself with some modifications can be treated as issues become redundant in a NIB approach. The M2M an attach request as well. architecture from ETSI also fits well in a NIB approach. The The below diagram shows the ETSI M2M architecture application servers can also install a proxy in the network box itself for better performance.

24th June 2017 , ISBN No. 819070985-2 23 23 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The MakeIdle module will run when a device attempts a RACH and decided if this has to be prioritized. To minimize signaling and resource allocation to latency insensitive devices in practice, we need to predict whether the

next RACH will arrive (to be received or to be sent) within tthreshold seconds. The prediction should be as quickly as possible, because we would then be able to switch the IOT device to Idle mode promptly. We make this prediction by assuming that the RACH inter­arrival distribution observed in the recent past will hold in the near future. After each successful RACH, the method waits for a short period of time and sees whether any more RACH requests arrive. If a RACH arrives, the method resets and waits, but if not, it means a transfer may be finished and the IOT device should switch to Idle mode. The strategy works as follows, suppose the current time is t = 0, Compute the conditional Fig 2: The proposed LTE CIOT NIB architecture probability that no RACH will arrive within twait +tthreshold seconds, The key analysis in this paper is the mechanism to handle given that no RACH has arrived in twait seconds. the widest range latency in the NIB only at the radio level so that P(twait) = P(no packet in twait + tthreshold|no packet it is well suited for CIOT. Handling access prioritization between This conditional distribution is easy to compute given latency insensitive and latency sensitive applications will be the observations of the packet arrival times of the last several packets. key additional functionality needed in a CIOT system. In this From an accumulated RACH traces that is collected in the eNB, paper we propose a mechanism of monitoring the RACH we observed that P(t ) increases as t increases, when t is periodicity, typical Signaling to Data ratio, latency indication of a wait wait wait in the range of [0; t ] (if t is greater than t , it means device/class of devices and the eNB deciding if the request has to threshold wait threshold the radio has been idle for too long time after the packet be discarded or postponed. transmission and there is not much room for energy saving). This In the diagram below the new latency index is introduced in property implies that the longer the radio waits and sees no packet, the RRC connection request message, it is possible to change the the higher the likelihood that no packet will arrive soon. PRACH preamble set itself to indicate the latency index of a device We now find the t in order to make the likelihood “high or a class of devices. wait enough”. During twait, the eNB can be considered to consume energy, so to decide how much is “high enough”, we should take

energy consumption into account. Our answer is: P(twait ) is “high

enough” if the expected energy consumption of waiting for twait and then switching states is less than the expected consumption

of waiting for a RACH to arrive in the next twait seconds. The

method determines twait by minimizing the expected energy

consumption across all possible values of twait , and taking the value that minimizes the consumption. The expected energy

consumption of waiting for twait and then rejecting a RACH is:

E[Ewait_RACH_Reject] = [E RACH_Reject +E(twait )] By making such an online analysis the eNB can easily have a prioritization mechanism to handle any RAN overloads.

Fig 3: RACH procedure with a Latency index Based on the periodicity of the RACH and the approximate data transmitted for a RACH, an online analysis is performed to indicate if a device needs to be handled or sent to Idle for a specified period of time. The inter RACH interval and the volume of data sent per RACH for an IOT device can be monitored and a control module can predict when to put the IOT device into its Idle state, and when to move from Idle to Active state. Further Fig 4: RACH Reject simulation results signaling optimizations are possible by assuming default Idle periods for the IOT device if the eNB does not respond.

24th June 2017 , ISBN No. 819070985-2 24 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

III. CONCLUSIONS AND FUTURE WORK 3. GP­140299, Cellular System Support for Ultra Low Complexity and Low Throughput Internet of Things, 3GPP TSG­GERAN Meeting In this paper we propose a CIOT architecture based on the network #62 in a box approach. We show that much of the issues associated 4. Network Sharing in LTE, Technology White Paper from Alcatel­ with core network overload become redundant and the only issue Lucent that needs to be handled is the RAN over load issue. It is shown 5. Cellular­Wi­Fi Integration, A comprehensive analysis of the that with the enhanced RACH procedure for CIOT there are technology and standardization roadmap, Interdigital White paper, mechanisms available to prioritize a distribution of latency June 2012. insensitive to highly latency sensitive applications. WE propose 6. Roger Piqueras Jover, Ilona Murynets, Connection­less communication of IoT devices over LTE mobile networks, 2015 one method of observing the RACH patterns itself to make IEEE decision of prioritizations. It is also possible to highly optimize 7. ETSI TS 102 690, Machine­to­Machine communications the overall so called “connection less” approach to CIOT by virtue (M2M);Functional architecture of using a network in a box approach. As an M2M overlay, it is 8. Anthony Lo, Yee Wei Law, Martin Jacobsson and Michal Kucharzak also very practical to overlay such a NIB CIOT box on existing , Enhanced LTE­Advanced Random­Access Mechanism for Massive Machine­to­Machine (M2M) Communications, LTE network without causing any impact on the existing network 9. 3GPP TR 23.888 V1.3.10, “System Improvements for Machine­ planning. Type Communications, Jun 2011. References 10. LTE network in a box, Nokia white paper. 1. Introduction to “Clean­Slate” Cellular IoT radio access solution, Huawei whitepaper. 2. GP­140292, Access System for Ultra Low Complexity and Low Throughput Internet of Things based on Cellular, 3GPP TSG GERAN Meeting #62

24th June 2017 , ISBN No. 819070985-2 25 25 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi A Novel Inductive Power Transfer System for Wireless Charging of Electric Vehicle

S.Balaji Dr P.Deiva Sundari Dr.P.S.Mayurappriyan J.Annes Assistant Professor, Professor and Head Professor, Assistant Professor, Electrical and Electronics Department, Electrical and Electronics Department, Electrical and Electronics Department, Electrical and Electronics Department, KCG College of Technology KCG College of Technology, KCG College of Technology, KCG College of Technology Chennai, India. Chennai, India. Chennai, India. Chennai, India. [email protected] [email protected] [email protected] [email protected]

Abstract— The rising energy crisis is a bottleneck to economy of a country. There are many global initiatives that are working towards resolving the energy crisis. This has taken the form of increased regulation and restriction on carbon emissions, the promotion of greener manufacturing and construction projects, the funding of research into hybrid technologies and more sustainable technologies. After nearly a century with the internal combustion Fig. 1 Schematic of IPTS engine dominating the personal transportation sector, it now appears that the electric vehicle is on the verge of experiencing rapid growth A. Primary Converter and Compensation in both developed and developing vehicle markets. Like any The A.C supply from the mains will be converted D.C, the transformative new technology, electric vehicles create a variety of D.C will be now converter into High frequency A.C by inverter. potent economic development challenges and opportunities. So The inverter will use soft switching techniques, exploiting the many automobile companies started to develop an alternate advantage IGBT and MOSFET. The compensation circuit will technology for vehicles. They developed hybrid electric vehicle reduce the VA requirement of the inverter. This high frequency which works on both electricity and gas. But they have few A.C supply is given to the Primary coil. The primary coil is made significant disadvantages like off-road charging, limited recharge off Litz wire, because it offers low resistance at high frequency. points, short driving range and speed. Recently many automobile giants like Toyota, Nissan etc. are trying to develop 100% “Go B. Secondary Compensation and Power Conditioner Green” Vehicle which eliminates the dependency on fuel. The The Secondary compensation circuit at the secondary main objective of this project is to develop an efficient and cost improves the power capability and efficiency can be improved effective Contactless Power Transfer System (CPTS) using dramatically. The transferred high frequency power is delivered Inductive Power Transfer Concept (Resonant Inductive Coupling)for to load by a Power conditioner .The Power Conditioner is usually charging an electric vehicle.This project will eliminate the off- road charging of the vehicle and the vehicle can be charged while a High frequency rectifier , which will convert high frequency A.C the car is on the move. CPTS can be used wherever there is a to D.C. This D.C will be stored in the battery of electric vehicle. parking bay, toll area and traffic signal. This CPTS technology reduces the pollution and increases the driving range. The idea of III. STATIONARY WIRELESS CHARGING FOR ELECTRIC VEHICLES the IPT system dates from the 19th Century when Nikola Tesla A stationary charger consists of a primary pad buried in the presented his well-known Tesla coil[1] ground and a pick­up pad mounted underneath the vehicle, as Keywords—IPTS; litz wire; resonance; high frequency illustrated in Fig. 2. The primary pad is typically sealed in rubber or covered with plastic to prevent the coil from flooding and/or I. INTRODUCTION other hazardous situations. It frequently contains ferromagnetic The concept of wireless power transfer can be utilized to materials to shape the magnetic field, and metal rings or plates charge the batteries of electric vehicle. The aim of this paper is to that reduce the leakage of the magnetic field [2]. The same or very develop an efficient and cost effective Contactless Power Transfer similar pad structure is attached under the vehicle. The primary System (CPTS) using Inductive Power Transfer Concept pad may sometimes be elevated by several centimeters to reduce (Resonant Inductive Coupling) with minimum power loss across the vertical distance between the coils. An automatic guided air gap for charging electric vehicles. This will eliminate the costlier system might be installed in the vehicle to help the driver align the Plug or Cord that is used in Plug in Electric Vehicle. vehicle directly under the primary pad. The charging station and the vehicle exchange data by using inductive or short­range II. SCHEMATIC OF INDUCTIVE POWER TRANSFER communication modules The topology of IPTS is shown in Fig. 1. The IPTS system consists of Primary converter, Primary compensation circuit, Primary Coil, Secondary Coil, Secondary Compensation and Load. 24th June 2017 , ISBN No. 819070985-2 26 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

B. Litz Coil Design V *10 4^ No of Turns N  Bm * Ac * f The No of turns and skin depth is given by the formula as follows. Where, V­ Voltage

Bm­ Flux Density

Ac­ Cross sectional area of coil Fig.2. IPTS for electric vehicle f­ Frequency. C. Power Transfer and Efficiency IV. HEALTH ISSUES AND SAFETY CONCERNS The below table indicates the power transfer and efficiency for The International Commission on Non­Ionizing Radiation various gaps in cm. For a distance of 25mm, the efficiency was Protection (ICNIRP) or the Australian Radiation Protection and 76% . Nuclear Safety Agency (ARPANSA) standards .For the range Dis- Input Input Input Output Output Output  below 100 kHz, they have similar specifications for maximum tance DC DC DC DC DC DC (%) exposure to the magnetic field. For example, for the 3 kHz – 65 kHz (mm) Vol- Curr Power Vol- Curr- Power frequency range, the ICNIRP EMF Exposure Guideline specifies a tage ent (W) tage ent (W) (V)(A)(V)(A) maximum level for the occupational exposure to be at 30.7 ìT, and the maximum level for the general public to be at 6.25 ìT. Since the 0 150 4.5 675 74 8.5 629 93 magnetic field over a human body is usually uneven and has 5 150 4 600 72 7.5 540 90 different values at different locations, the ARPANSA standard 10 150 3.7 555 92 5.2 483 87 suggests spatial averaging of the field after taking measurements 15 150 3.2 480 101 4 404 84 20 150 2.4 360 93 3.1 282 78 at the head, chest, groin, and knee level. 25 150 1.8 270 89 2.3 204 76 V. HARDWARE SETUP FOR IPTS VI. CONCLUSION Eliminating the disadvantage of limited drive range would attract more users to opt for electric vehicles and thus increasing its demand resulting in limiting the pollution due to emissions. IPTS may be preferred widely for public mass transport systems where concealing of unit is needed and in applications where frequent maintenance due to physical contact is not desirable. Being the current topic of research, the project will encourage more R&D work with industry collaboration and also generate revenue. Fig 3. Hardware setup for IPTS A. Transmission and Receiver Side Power Electronics REFERENCES It consists of 1­x Mains Interface , diode bridge rectifier Stage 1. Tesla coil ­Wikipedia, the free encyclopedia [Online]. and High­frequency inverter stage .Half bridge resonant inverter available: http://en.wikipedia.org/wiki/Tesla_coil. topology is used.In this inverter the switching frequency is set at resonant frequency resulting in Zero current switching(ZCS). 2. Aristeidis Karalis, J.D. Joannopoulos, Marin SoljacEic’, Efficient wireless non­radiative mid­range energy transfer, Annals of Physics, Receiving side consists of receiver coil, high frequency rectifier vol 323. stage. Polypropylene capacitors are used as resonant tank 3. Dr. Morris Kesler, Highly Resonant Wireless Power Transfer: Safe, capacitors. Efficient, and over Distance,http://www.witricity.com/pdfs/highly­ resonant­power­transfer­kesler­witricity­2013.pdf.

24th June 2017 , ISBN No. 819070985-2 27 27 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi NORMALIZED BIBLIOMETRIC INDICATORS : A REVIEW WORK

Siddhartha Sankar Biswas 1* , Parul Agarwal 2* and Mohammad Sadiq Nisar Siddiqui 3 Department of Computer Science & Engineering School of Engineering Sciences & Technology Jamia Hamdard University New Delhi, INDIA 1 [email protected] , 2 [email protected] and 3 [email protected]

Abstract—In this paper the authors observe that the existing popular The H­index reflects mainly two important information : (i) the bibliometrics are not appropriate to judge the research capabilities number of publications and (ii) the number of citations per of researchers or scientists. All these need to be normalized to publication. The H­index is designed to improve upon simple make them more significant, more appropriate and more measures such as the total number of citations or publications. meaningful. This work is a review work on the methods of Thus it is obvious that this index is appropriate to compare normalizing any kind of bibliometric of a researcher or a scientist. An interesting open problem is also proposed which cannot be solved researchers/scientists working in the same field; Because the without soft-computing technique, but needs more advanced search citation conventions differ widely among different core subjects. engine and information technology tool. The h­index “gives an estimate of the importance, significance, Keywords— H-index, G-index, iN-index, Bibliometric. and broad impact of a scientist’s cumulative research contributions”. But the H­index has a lot of weakness too. I. INTRODUCTION B. G-Index Almost all the existing popular bibliometrics are based upon In 2006 Leo Egghe [3] proposed the bibliometric G­index. Consider citation statistics [6,7], but none of them are normalized. a collection of publications of a researcher/scientist ranked in Consequently the true talents or true researchers cannot be judged decreasing order of magnitude on the number of citations that with the help of the present notion of the bibliometrics, the way they received, the G­index is the largest number such that the top they are defined mathematically. It is observed in the present world g publications have received together at least g2 citations i.e. that there are some groups of researchers, may be six to ten most cited g papers have been cited g or more times on the average. researchers sometimes in one group, who publish their work jointly This is in fact a rewriting mathematically of the above definition and each of them avail full credit of the number of citations or H­ index or G­index etc. This paper is not for the genuine cases of joint or team work which is no doubt excellent. This work is for those cases where about six to ten people claim to have done joint as below: work which in reality is something else!. Consequently, there is a need to normalize the bibliometrics mathematically. In this work the authors have made a rigorous study to submit a review work, mainly from the work[1], as an attempt for the same. Clearly it is debatable to the world academicians to consider whether G­index is a better metric than H­index or whether H­ II. PRELIMINARIES OF SOME POPULAR BIBLIOMETRIC INDICATORS index is a better metric than G­index. But it is fact and agreed that In this section we present the concept of few existing popular both G­index and H­index are good and have their independent bibliometric indicators [1]. in­built significance. The main advantages of the G­Index are that A. H-Index it accounts for the performance of author’s top quality articles, and at the same moment it helps to make more apparent the In 2005 Jorge Hirsch [8] proposed the bibliometric H­index. difference between authors’ respective impacts. The inflated Many authors (for example, see [3­5], [9], [10]) then studied H­ values of the G­Index help to give credit to lowly­cited or non­ index showing its huge merit and importance. A researcher has H­ cited papers while giving credit for highly­cited papers. index equal to h if h of his N number of published papers have at least h number of citations each, and the other (N”h) papers have C. iN-Index no more than (h­1) number of citations each. Thus H­index is an In The iN­index is the number of articles with N or more integer which mathematically can never be negative. citations, where N is a positive integer. The most popular iN­

24th June 2017 , ISBN No. 819070985-2 28 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi index is for N = 10, called by i10­index. Thus i10­index is simply various researchers around the world. the number of articles with 10 or more citations, the idea being Although both P1 and P2 has 2000 citations, but much more that ten citations means it got looked at for making conclusion in credit goes to Mr.X compared to Mr.Y. This is a very important many situations. and significant issue to do justice to the method of estimation of Similarly the i100­index is the number of articles with 100 or index. This logic is completely missing in the existing notion of H­ more citations, the i500­index is the number of articles with 500 or index, G­index, i10­index and any other existing indices. It shows more citations, etc. for different values of N. a huge demerit of these existing popular indices. There are several other bibliometrics which are m­index, c­ III. THREE(3) NEW BIBLIOMETRICS : CORRECTIONS OF THE index, s­index, e­index, RG score, etc. defined on the basis of POPULAR BIBLIOMETRICS : H-INDEX, G-INDEX AND IN-INDEX (I10- citations, but they are of very particular nature and of limited INDEX) significance. There is no index metric which can be claimed to be absolutely best, however research is going on to find out a kind In [1] there are some corrections proposed to improve the of absolutely best index metric applicable to all the researchers of existing popular bibliometric indicators. We present those new all the subjects. concepts in this section for review and analysis. D. Computing the H-Index of a Researcher A. Hm-index : the revised model of H-index Let us discuss : How to compute the H­index of any In [1] the author introduced a new and modified version of researcher say, Mr.X. Let f be the function that corresponds to H­index called by Hm­index, which removes the inner and in­built the number of citations for each publication. Thus, if P be the set weakness of the metric H­index caused due to number of co­ of publications of a researcher, then the function f can be defined authors. The notation Hm here stands for ‘H modified’. The Hm­ as below:­ index is constructed incorporating the reality by way of the f : P ’! I+ , where I+ is the set of positive integers. philosophy that one paper if authored by a single researcher Consider a researcher/scientist Mr. X. We can now compute instead of multiple researchers should cater to full h­index to the the H­index of the researcher X as described below : author, and if it is multiple authored then the h value is to be First of all we arrange all the f values in descending order. shared equally among all the authors. Then, we look for the last position in which f value is greater than B. Introducing ‘Hm-index’ of a Researcher or equal to the position. This position h is accepted as the H­ Suppose that at a certain day the researcher X has H­index index of Mr.X. equal to h. Consider his top h number of publications (on the For example, suppose that the researcher X has 6 basis of number of citations) which are P1, P2, P3, ….., Ph. Suppose publications P1, P2, P3, P4, P5 and P6 with 22, 19, 9, 6, 6 and 3 that the publication Pi has ni number of authors (self and (ni – 1) citations respectively. Then, f(P1) = 22, f(P2) = 19, f(P3) = 9, f(P4) number of co­authors) where ni e”1 for each i = 1, 2, 3, …,h. Then = 6, f(P5) = 6 and f(P6) = 3. Clearly the H­index of Mr.X is equal the Hm­index of the researcher X is defined by Hm­index = h2/ to 5. n, One major demerit of H­index can now be explained by an example. Suppose that another researcher Y has also 6 publications P1, P2, P3, P4, P5 and P6 with 3200, 2800, 1900, 1600, 6 and 2 citations respectively. The data shows an excellence of the As a particular case, if all the publications of a researcher researcher Y having huge impact out of his top four publications, are single­authored, then unlike the researcher X. But the H­index of Mr.Y is also equal to 5 which is also the H­index of Mr.X!, i.e. the H­index of both the researchers X and Y are appearing equal. But can you say that both X and Y are almost of same talent? Thus one cannot compare the researchers X and Y by the values of their respective H­index only. and in that case Hm­index reduces to H­index value h. The Hm­ index is an improved version of H­index as it gives due weightage E. Weakness of the model H-index to the single authored publications, or multiple authored Although the popular H­index is a good indicator, but it has publications according to the number of authors in the a lot of weakness too, both mathematically and in ground reality. publications. In fact Hm­index is a major correction of the existing For example, consider the publication P1 of the researcher Mr.X popular concept of H­index. and the publication P2 of the researcher Mr.Y. Suppose that P1 is C. G -index : the revised model of G-index a single­authored paper authored by Mr.X only and the P2 is a m multiple authored paper (ten authors: Mr.Y and nine co­authors). Suppose In [1] the author also introduced a new and modified Also suppose that P1 and P2 both are cited 2000 times so far by version of G­index called by Gm­index in a similar way. Suppose

24th June 2017 , ISBN No. 819070985-2 29 29 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi that the researcher X has G­index equal to g. Consider his top g V. CONCLUSION number of publications (on the basis of number of citations) which In this paper the authors studies the weakness of the existing are P1, P2, P3, ….., Pg. Suppose that the publication Pi has ni popular index like H­index, G­index, iN­index, etc. All these metrics number of authors (self and (ni – 1) number of co­authors), where have a lot of demerits too, besides their own merits. Consequently ni e”1 for each i = 1, 2, 3, …,h. Then the Gm­index of the researcher these measures need doing normalization which have been done X is defined by in [1]. A good review of the overall corrections of these indices are G -index = g2/n, m made in this paper. The ‘H­index’, ‘G­index’ and ‘i10­index’ (and even i5­index) may not be available for the beginners in research (say, for a Ph.D. scholar in a university) even if he be an excellent researcher, because of short duration of time. Consequently, the ‘Hm­index’, ‘Gm­index’ and ‘im10­index’ too may not exist for the As a particular case, if all the publications of a researcher beginners. are single­authored, then The h­index can be manually calculated using citation databases or using automatic tools. Subscription­based databases such as Scopus, Web of Knowledge, etc. provide automated calculators. In July 2011 Google offered a simple tool which allows researchers to keep track of their own citations and also produces an h­index and an i10­index. However, there are few specific and in that case Gm­index reduces to G­index value g. In fact Gm­ index too is a major correction of the existing popular concept of databases applicable subject­wise, viz. INSPIRE­HEP database G­index. which can automatically calculate the h­index for researchers working in high energy physics. But each database is likely to D. i N-index: the revised model of iN-index m produce a different h for the same scholar, because of different In [1] the author also introduced a new and modified version coverage. of iN­index called by i N­index in a similar way. m References And in particular for N = 10, one can define the im10­index of a researcher incorporating the similar type of corrections in the 1. Biswas, R., “Theory of IRE with (á,â,ã) Norm” : An Engineering Model for Higher Education Management (HEM) & Policy existing concept of iN­index (i10­index). Administration in India, IGI Global Publisher, USA (2015). 2. Biswas, R. Is ‘Fuzzy Theory’ An Appropriate Tool For Large Size IV. AN OPEN PROBLEM ON BIBLIOMETRIC INDICATORS Problems, Springer Briefs in Computational Intelligence. (2015) Springer. Heidelberg. In the above discussed modification of the notion of H­ 3. Egghe, L., Theory and practice of the g­index, Scientometrics, 69(1) index, G­index, iN­index, etc., the contribution of all the authors in (2006) p 131­152. a multiple­authored paper are assumed to be equal or almost equal. 4. Egghe, L., An improvement of the h­index: the g­index. ISSI But in reality it is not so in most of the cases. Newsletter. 2(2006) p 8­9 We are not arguing here about the definition of 5. Egghe, L., How to improve the h­index. Scientist. 20(2006) p­14 ‘contribution’. Because in case of guidance to Ph.D. scholar, 6. Garfield, E., Citation Indexes for Science: A New Dimension in sometimes a discussion and suggestion given by the supervisor Documentation through Association of Ideas. Science,122(3159) (1955) p 108­111. of 30 minutes too could be a huge contribution to the 7. Garfield, E., The History and Meaning of the Journal Impact Factor. corresponding published paper for which the Ph.D. scholar himself JAMA, 295(1) (2006) p 90­93. might have worked for even one year or more after availing the 8. Hirsch, J.E., An index to quantify an individual’s scientific research guidance!. output, Proc Natl Acad Sci US A. 102(46) (2005) p 16569–16572. But in other cases of a team research work, there may exist a 9. Jin, B. H., H­index: An evaluation indicator proposed by scientist. Science Focus, 1(2006) p 8­9. major amount of deviation in percentage. Thus it is a good open 10. Jin, B. H,, Liang, L. M., Rousseau, R. and , Egghe, L., The R­ and AR­ problem to further revise the notion of Hm­index, Gm­index, im­10 indices: complementing the h­index. Chinese Science index etc if the piece­wise information about research Bulletin. 52(2007) p 855­863. contributions (weights) of each individual author in multi­authored publications can be known. These weights are expected to be * Siddhartha Sankar Biswas is the Principal Author and fuzzy weights [2] or intuitionistic fuzzy weights [2]. For a detail Parul Agarwal is the Corresponding Author explanation of these type of open problems which call for soft­ computing tools, the work[1] needs to be studied.

24th June 2017 , ISBN No. 819070985-2 30 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Advances in the Synthesis of Nano Composite Coatings

Sanjay Kumar Jha Shambhu Sharan Kumar Sandip Foundation, Sijoul – 847235, India Birla Institute of Technology, Mesra, Ranchi­ 835215 E­mail: [email protected] E­mail: [email protected]

Abstract— Industrial stoving top coats provide better surface range of properties, can be produced and improved. The synthesis protection as well as pleasing aesthetic look to metallic components and the applications of hybrid organic­inorganic nano­structured in comparison to conventional air drying paints. But, the materials are being developed since last two decades. Novel performances of industrial stoving top coats were not meeting the routes are also being developed in order to synthesize three­ present requirements of end-users. Therefore, appropriate dimensional reinforced nano­composite materials [2,3]. incorporation of nano-materials in paint-formulations has been explored by performing extensive research work for the purpose If we discuss about widespread corrosion problem; it can of improvement in overall quality of industrial grade polymer- be said that a metallic component gets corroded by the natural nano composite coatings to meet the users’ requirement. oxidation process in which a material degrades drastically due to In our extensive research work, previously characterized chemical or electrochemical reaction with its environment. It is a rutile nano-TiO2, nano-ZnO and nano-SiO2 particles alongwith scientific fact that corrosion cannot be completely stopped but it rutile micron TiO2 pigment have been incorporated with designed can be controlled by applying proper techniques, technology compositions in polyester-amino and thermosetting acrylic (TSA)- and management [4,5]. It has also been accredited that among all amino resins based super white top-coat formulations to explore the protection methods, protective coatings have become the the best possible performances of polymer-nano-composite most commonly used methods to control the corrosion as well as coatings. Further, performance evaluations of formulated paints better aesthetic appearance of surfaces [6,7]. and surface coatings have been done as per ASTM/BIS quality test methods; e.g. dry film thickness (DFT) test, gloss test, adhesion In continuing development in the areas of paints and surface test, immersion test, salt spray test, quick ultraviolet accelerated coatings, it has been considered that paints have been (QUV) weathering resistance test and aging test etc. On account manufacturing at micron level for a long time [8,9]. But in recent of the data obtained after meticulous testing, excellent decades, nano materials alongwith high qualities of resins, performance results have been observed, e.g., 100% adhesion, 91- solvents and additives have been introduced in the synthesis of 99% gloss, 800-2400 hours passed in salt spray test and 600-1500 nano­composite coatings to improve overall quality of nano hours passed in QUV weathering resistance test and appreciable particles reinforced composite paints and surface coatings [10,11]. results in aging test. Furthermore, on the basis of rigorous experimentation and observations, it has been proven that the II. EXPERIMENTAL appropriate applications and optimum dispersion of suitable nano- A. Materials particles with micron sized rutile TiO2 pigment particles in high quality of resins media can produce multi-purpose reinforced For this extensive research work, previously characterized polymer-nano-composite coatings by way of a slight technological and synthesized nano­ZnO and nano­TiO2 particles were taken modification. from Nanotechnology Application Centre, University of Allahabad Keywords— Polymer-nano composite coatings, nano engineered and Corrosion Engineering Lab., I.I.T. Bombay. Nano­ZnS and paint, corrosion resistance, weathering resistance, nano-TiO , nano- 2 nano­SiO additives have been procured from Byk Additives and ZnO and nano-SiO 2 2. Instruments Company Ltd. TSA, polyester and amino resins, micron TiO , other chemicals, apparatus used in paint I. INTRODUCTION 2 formulations and all tastings facilities were provided by R&D Polymer­nano composite coatings are materials that are Laboratories of Berger Paints Limited, Kolkata and Tata Motors produced by reducing the pigment­materials along with other Limited Jamshedpur. paint ingredients at nano scale to form a nano scale denser product B. Methods to coat the substrate surfaces for the purpose of enhanced In first step of polymer­nano composite coating formulation, protection [1,2]. Coating industry is one of the first among all to optimum compatibility of butylated melamine formaldehyde tap the potential of nanotechnology. Proper addition and optimum (BMF) resin with TSA and polyester resins were checked as per dispersion of nanoparticles in resins media can improve many determined ratio (i.e. 1:4 & 3:7) w.r.t. consistency, transparency properties of nano­composite coating system and can produce and adhesion of prepared clear films. When all parameters have multipurpose reinforced coatings with a little cost difference [1­3]. been found satisfactory, further step has been followed. In 2nd

Organic or inorganic nanocomposite materials have a vast step, composition­percentage of micron sized TiO2 and other nano­ potential for fulfilling many new applications and by engineering pigments were determined to maintain the pigment­binder ratio the polymers­host interactions; nanocomposites having a broad for their optimum dispersion in resins media (mentioned in Table­I).

24th June 2017 , ISBN No. 819070985-2 31 31 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

TABLE I. DESIGN OF COMPOSITIONS (BY WEIGHT % RATIO) OF MICRON Item Composition TSA-amino Polyester- AND NANO SIZED PIGMENTS FOR DIFFERENT PAINT FORMULATIONS: Sl. Composite amino No. Coating Composite Mill- Micron Nano- Nano- Total Coating base Sized TiO2 ZnO Wt. % sample Rutile (Wt. % (Wt.% ratio 1 Mill­base 44.0% 44.0%

No. TiO2 ratio) ratio) (of 2 TSA resin 43.0% — (Wt.% Pigment) 3 Polyester resin — 43.0% ratio) 4 Xylene 8.50% 2.70% 1 & 11 21.0 ­ ­ 21.0 5 Butanol 1.00% 2.00% 2 & 12 20.5 0.5 ­ 21.0 6 Butyl cellosolve 1.00% 1.00% 3 & 13 20.0 1.0 ­ 21.0 7 Solvent C­IX 2.00% 4.80% 4 & 14 19.5 1.5 ­ 21.0 8 Methoxy Propyl — 2.00% 5 & 15 20.5 ­ 0.5 21.0 acetate 6 & 16 20.0 ­ 1.0 21.0 9 Slip additive 0.20% — 7 & 17 19.5 ­ 1.5 21.0 10 Dispersion additive — 0.20% 8 & 18 19.0 0.5 1.5 21.0 11 Thixotropic additive 0.30% 0.30% 9 & 19 19.0 1.0 1.0 21.0 Total 100% Total 100% 10& 20 19.0 1.5 0.5 21.0 Composite- coating Samples 1, 2, 3, …., 10. 11, 12, 13, In 3rd step, a two liter ball­mill was charged and run with …., 20. calculated ingredients (i.e., BMF resin, Disperbyk additives, butanol, butyl cello­solve, xylene, solvent C­IX, Nano­byk (silica) All types of formulated paints were applied (e.g. cathodic additive (0.4%) with designed pigment composition (referred in electrodeposition primer coat, intermediate coat and top coat) on th Table­ I) to get different mill­bases. In 4 step, make­up stage for surface treated standard sized mild steel panels and cured at TSA­amino and polyester­amino paints preparation was followed specified temperature and time. After curing, coated samples were with the help of obtained mill­bases (mill­base volume percentage undergone through dry film thickness (DFT) test, opacity test, was kept by 44.0%) along with required ingredients (designed in gloss test, adhesion test, impact test/cupping value test, hardness Table­ II). test, immersion test, corrosion and weathering resistance test Prepared micron (samples 1 & 11) and nano (samples 2­10 etc. All test procedures were performed according to ASTM & 12­20) paints have been characterized by pot life testing (there standard for automotive paints and coatings. should be no pigment settlement, sedimentation, skinning and vehicle separation), viscosity, thinning ratio, non­volatile III. RESULTS AND DISCUSSION contents, tack free time, settling property, curing schedule etc Scheduled observation of performed aging test (Tables III and results were found satisfactory for further uses. & IV) on coated samples at 800C for 48 hours in diesel and engine TABLE II. MAKE­UP STAGE FOR PREPARATION OF NANO­ oil refers that there was no appreciable change in gloss. These PARTICLES MODIFIED TSA­AMINO AND POLYESTER­AMINO COMPOSITE results show that with the increase in the concentration of nano COATINGS BY PREPARED MILL­BASES ALONG WITH REQUIRED DESIGNED TiO2 and nano ZnO separately and also with different INGREDIENTS: combinations in cross­linked TSA­amino and polyester­amino binders, there was a continuous improvement in gloss due to the

high refractive index of rutile micron & nano­TiO2 [1­3]. TABLE III. PERFORMANCE TEST OBSERVATIONS OF TSA­AMINO COMPOSITE COATINGS W.R.T. DIFFERENT COMPOSITION (WEIGHT % RATIO) OF MICRON & NANO SIZED PIGMENTS IN DIFFERENT PAINT FORMULATIONS

24th June 2017 , ISBN No. 819070985-2 32 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Coating Cross cut Gloss at Aging Test OUV Salt spray Test Adhesion 600 angle at 80°C weathering Test: Passed Sample Test for 48 hours Test: Passed hours No. Hours 1 100/100 (100%) 91% Gloss was reduced by 4.0 % 600 hoursPassed 800 hoursPassed 2 100/100 93% reduced by 3 % 900 1200 3 100/100 94% reduced by 2.0 % 1000 1400 4 100/100 95% reduced by 1.0 % 1100 1600 5 100/100 93% reduced by 3.0 % 900 1200 6 100/100 94% reduced by 2.0 % 1000 1400 7 100/100 95% reduced by 1.0 % 1100 1600 8 100/100 97% No change 1300 2000 9 100/100 98% No change 1400 2200 10 100/100 99% No change 1500 2400

Fig. 3: QUV weathering Test of PE­Amino coatings Fig. 1: QUV Test of TSA­amino Composite Coatings

Fig. 4: Salt Spray Test of Polyester­amino coatings TABLE IV. PERFORMANCE TEST EVALUATIONS OF POLYESTER­AMINO Fig. 2: Salt Spray Test of TSA­amino Composite Coatings COMPOSITE COATINGS W.R.T. MICRON & NANO SIZED PIGMENTS IN DIFFERENT PAINT FORMULATIONS

24th June 2017 , ISBN No. 819070985-2 33 33 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Coating Cross cut Gloss at Aging OUV Salt spray Test Adhesion 600 angle Test at weathering Test: Passed Sample Test 80°C for Test: Passed hours No. 48 hours Hours 11 100/100 (100%) 92% Gloss was reduced by 4.0% 600 hoursPassed 800 hoursPassed 12 100/100 93% reduced by 3.0% 900 1200 13 100/100 94% reduced by 2.0% 1000 1400 14 100/100 95% reduced by 1.0% 1100 1600 15 100/100 93% reduced by 3.0% 900 1200 16 100/100 94% reduced by 2.0% 1000 1400 17 100/100 95% reduced by 1.0% 1100 1600 18 100/100 97% No change 1320 2016 19 100/100 98% No change 1416 2208 20 100/100 99% No change 1512 2424

It is the fact that coatings are damaged by UV radiations of hydrophobic properties having contact angle >1500, which causes wavelength range (280 nm – 400 nm). There are two types of UV water droplets to bead off of a fully cured surface picking up dirt radiations and subsequent protection methods: 1st (UV (A) and other surface contaminant along the way. This self­cleaning radiation and 2nd UV (B) radiation. UV (A) radiation is having action helps to clean and maintain the coating­surfaces.Further, high wavelength (range: 315nm – 400 nm) and low intensity. we noticed that when nano­TiO2 is blended and dispersed with

Protection from such radiation can be performed by nano­ZnO nano­ZnO, nano­ZnS and nano­SiO2 in specified ratio, overall pigment. UV (B) radiation is having low wavelength (range performance increases drastically due to the synergistic effects between 280 nm – 315 nm) and high intensity. In this case, nano­ of nano pigments with micron pigments in paint media [2,9,10].

TiO2 pigment provides protection. That is why, the combination It has also been revealed on the basis of the obtained results of UV (A) and UV (B) absorbers (i.e., nano­TiO2 and nano­ZnO that the performance of polyester­amino resins based polymer­ pigments) have been added in paint formulations for better nano composite coatings (samples no. 18, 19 & 20; Table­ IV) is weathering protection. Observation Table­3 shows the superior than that of the other TSA­amino resins composition tremendous performance of nano­particles reinforced polymer based paints. It is imperative to mention that the polyester­amino composite coatings [4, 5 & 6]. resins composition based paint exhibited better aging resistance, Since, micron sized bulky particles are used as pigment in weathering and corrosion resistance as well as required hardness conventional coatings where water, dirt and other foreign particles and flexibility when crosslinked and cured by proper baking (at can permeate into the voids and due to this activity erosion as 133±20C for 30 minutes). Such combination (i.e. polyester and well as corrosion take place on the substrate surface [3, 6]; whereas amino resins) is the most suitable and cost effective for the use nano engineered paints and surface coatings are densely packed as binder in industrial stoving top coats [7,11]. with robust molecules of nano ZnO, nano TiO2 and SiO2 that act as an impermeable and functional barrier to foreign environment IV. CONCLUSIONS for the purpose of overall protection [5, 6]. Appreciable Synergistic effects of nano­TiO , nano­SiO and nano­ZnO improvement was observed in corrosion resistance (i.e. no 2 2 particles take place alongwith micron rutile TiO2 due to their unique evidence of blistering and rusting during salt spray test on sample compositions in resins media and make nano­coatings even more panels; TSA­amino: 8, 9 & 10, and PE­amino:18, 19 & 20) referred effective. Optimum dispersion of nano­TiO2 along­with nano­ in Tables III & IV. ZnO particles in polyester­amino and TSA­amino composite There was no appreciable change also in QUV weathering coating systems, appreciably improved overall coating resistance test (i.e. no significant evidence of pigment chalking, performances e.g. better corrosion resistance, adhesion property, paint film peel­off and gloss­reduction during QUV weathering gloss retention, QUV weathering resistance, chemical resistance test on panels no. 8, 9, 10, 18,19 & 20; ref. Tables III & IV) and and other mechanical properties have been improved. Further, in also in other mechanical properties of surface coatings [7,8]. the case of addition of nano SiO2, gloss has been reduced but Thus positive impact has been found due to the synergistic scratch resistance has been improved significantly, therefore that effect of compactly packing of combinations of nano materials in may be recommended for interior top coat applications or for voids between micron sized pigment particles [4, 6]. In the case semi glossy finish. of self­cleaning action, nano engineered paint performs super

24th June 2017 , ISBN No. 819070985-2 34 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Nano­composite coating formulation system has some 2. Christopher Seubert, Review: An overview of the coatings; journal/ limitations, e.g. agglomeration of nano­particles, hardening of coatings/ ISSN 2079­6412, pp. 221­222, 2012. ultra fine particles etc. However, benefit of nano­coating is more 3. A. Öchsner, W. Ahmed and N. Ali; Nanocomposite Coatings and Nanocomposite Materials, ISBN­13: 978­0­87849­346­3, pp. 10­ important than its constraint. Therefore, our endeavor should be 12, 2009. to overcome these limitations and to make even more effective 4. Mars G.Fontana, Corrosion Engg. McGraw Hill Publisher: ISBN­ surface coating system w.r.t. cost, quality, applications and 13:978­0070214637, pp. 1­45, 2006. performances. 5. www.DuPont™.com/Ti­Pure® Titanium dioxide / DCO_B_H_ 65969_ Coatings. P. 3­5. 2012. Acknowledgment 6, www.icannanopaints.com, Research & developments, P. 1­4, 2011. We extremely acknowledge the Research Labs of Prof. 7, ASTM Standard, “Standard practice for preparing, cleaning & Avinash Chandra Pandey, Nano Technology Application Centre evaluating corrosion test specimens”, pp. 1­19, 2011. of Allahabad University, Berger Paints Limited, Kolkata and Prof. 8, Chang, K.­C., Hsu, M.­H., Lu, H.­I., Lai, M.­C., Liu, P.­J., Hsu, C.­ A.S. Khanna (Metallurgical Engg. Department, I.I.T. Bombay) for H., Ji, W.­F., Chuang, T.­L., Wei, Y., Yeh, J.­M., et al. Room­ temperature cured hydrophobic epoxy/graphene composites as providing us practical facilities to carry out the present research corrosion inhibitor for cold­rolled steel. Carbon 2014, 66, 144­ work. Further, we are grateful to Prof. N.D. Pandey (M.N.N.I.T. 153. Allahabad), Prof. S.S. Narvi (M.N.N.I.T. Ald.) and Prof. M.K. 9, Asmatulu, R., Ceylan, M., Nuraje, N. Study of superhydrophobic Paswan (Mechanical Engineering Department N.I.T. Jamshedpur) electrospun nanocomposite fibers for energy systems. Langmuir for their innovative suggestions. Finally very special thanks to 2010, 27, 504­507. Prof O P Gandhi & Prof S K Atreya, IIT Delhi and Prof P I Patil, 10, Li, B., Olson, E., Perugini, A., Zhong, W.­H. Simultaneous enhancements in damping and static dissipation capability of Sandip Foundation, Nasik. polyetherimide composites with organosilane surface modified graphene nanoplatelets. Polymer 2011, 52, 5606­5614. References 11, Asmatulu, R., Mahmud, G.A., Hille, C., Misak, H.E. Effects of uv 1. A.S. Khanna, Nanotechnology in High Performance Paint Coatings, degradation on surface hydrophobicity, crack, and A.J. Exp. Sci. (Vol.21, No.2; pp. 25­32, 2011. thickness of mwcnt­based nanocomposite coatings. Progress in Organic Coatings, vol. 72, 553­561, 2011.

24th June 2017 , ISBN No. 819070985-2 35 35 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Camotransmutees

Dr Sunil Jacob1, Saira Joseph1,Joel George2,Sanu Antoo2,Kiran On behalf of the existing technology we are introducing a new Baby2 wearable ideology[6­7]. By the arrival of this device, it will resolve Professor all the existing crisis faced by current wearable technology both Electronics and communication Engineering Dept in commercial as well as military[7]. Scms school of engineering and technology I. METHODOLOGY Ernakulam Under this section, we are going to discuss the steps that Students has been followed to accomplish our concept. Electronics and communication Engineering Dept The idea is to design a glove with number of neo pixel on it. Scms school of engineering and technology The tip of the fingers is having RGB color sensor. Once the Ernakulam RGB color sensor sense the ambience color the whole gloves [email protected] blend itself into the ambience color and create a camoflash [email protected] effect. [email protected], ADAFRUIT FLORA PLATFORM [email protected], Adafruit’s FLORA is designed around the ATMEGA32U4 [email protected] microcontroller with 3.3 V logic and has built­in USB and USB Abstract—Camotransmutees is an innovative creation of wearable HID support allowing it to act as a mouse or keyboard to for switching different colors based on the surroundings. We being an attach directly to computers. It is easily programmed over USB innovative group has decided to create this revolution(camotransmutees) using the Arduino IDE and has a small but easy to use to provide the service persons with a custom­made wearable, which onboard reset button to reboot the system. The onboard can switch to different colours based on the surrounding power supply is designed to be flexible and easy to use with an ambience.Thiscamotransmutees has equipped with wide range of onboard­polarized 2­pin JST battery connector with Schottky technological features to assist the service persons on battlefield. This technology has an embedded location tracker to track out the location at diode protection for use with external battery packs from 3.5 V which the soldier resides.Camotransmutees also has a provision to to 16 V DC and power switch connected to 2 A power FET for instantly change its colors according to the user command. This device safe and efficient battery on/off control. Designed with a is fully operated based on the solar power. In case if the user may face thoughtful layout, data buses are interleaved with power and some health issues, the wearable can detect those issues. This wearable ground pads for easy module and sensor attachments without has pulse rate detector, heart rate monitor, temperature monitor. Also it worrying about overlapping traces. can communicate with others who use this wearable. RGB Color Sensor with IR filter and White LED - TCS34725 Keywords- Adafruit Flora, RGB Color Sensor Your electronics can now see in dazzling color with this Introduction lovely color light sensor. We found the best color sensor on the Technology plays a large role in most aspects of today’s market, the TCS34725, which has RGB and Clear light sensing society. elements. An IR blocking filter, integrated on­chip and localized With colors you can set a mood, attract attention, or make to the color sensing photodiodes, minimizes the IR spectral a statement. You can use color to energize, or to cool down. By component of the incoming light and allows color measurements selecting the right color scheme, you can create an ambiance of to be made accurately. The filter means you’ll get much truer elegance, warmth or tranquility, or you can convey an image of color than most sensors, since humans don’t see IR. playful youthfulness [1]. Color can be your most powerful design The flora platform is connected to the RGB colour sensor via element if you learn to use it effectively. wires. The RGB colour sensor sense the colour of object Technological influences are growing more apparent in the around it and with the help of the flora board the LED glows. fashion industry. Advances and new developments are shaping The sensor detects the colour and it is transferred to the and creating current and future trends[2­4]. programmable flora board. The LED glows according to the Development such as wearable technology has become an colour sensed. important trend in fashion and will continue with advances such as clothing construction[5]. II. HARDWARE Military technology has played an important role in the fashion The flora board and RGB color sensor are connected industry. The camouflage pattern in clothing was developed to using I2C logic. The RDB color sensor will be mounted on the help military personal be less visible to enemy forces.

24th June 2017 , ISBN No. 819070985-2 36 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi tip of the gloves. For five finger five RGB color sensor will be IDE so Mac & Windows users can get started fast ­ or with the mounted. The RGB color sensor touch any object or new Arduino IDE, it takes only a few seconds to add Flora­ surrounding the whole neo pixel connected in series with the support. The FLORA has USB HID support, so it can act like a RGB color sensor glows. The result is the entire surface area of mouse or keyboard to attach directly to computers. the gloves will be blending in the color of the touched object FLORA has a small but easy to use onboard reset button to or the surrounding reboot the system. The power supply is designed to be flexible and easy to use. There is an onboard polarized 2 JST battery connector with protection schottky diode for use with external battery packs from 3.5v to 16v DC in.

III. CONCLUSION The Camotransmutees is just enabling the things to blend according to the ambience color and create a camoflash effect. The neopixel covers the whole gloves and due to the persistence of vision we will not be able to differentiate the dark region and thus getting 90% accuracy in blending The FLORA has built­in USB support. Built in USB means you plug it in to program it, it just shows up ­ all you need is a IV. REFERENCE Micro­B USB cable, no additional purchases are needed! We 1. www.adafruit.com have a modified version of the Arduino IDE so Mac & Windows 2. Enhancing the quality of life through wearable technologySungmee users can get started fast ­ or with the new Arduino IDE, it takes Park; S. Jayaraman only a few seconds to add Flora­support. The FLORA has USB 3. FabriceAxisa; P.M. Schmitt; C. Gehin; G. Delhomme; E. McAdams; HID support, so it can act like a mouse or keyboard to attach A. DittmaFlexible technologies and smart clothing for citizen medicine, home healthcare, and disease prevention directly to computers. 4. “Optical illusion: Dress color debate goes global”. BBC N! Pg no FLORA has a small but easy to use onboard reset button to 124­129 reboot the system. The power supply is designed to be flexible 5. What is a Wearable Device? WearableDevices.com. documentary and easy to use. There is an onboard polarized 2 JST battery 6. Wyszecki, Günther; Stiles, W.S. (1982). Colour Science: Concepts connector with protection schottky diode for use with external and Methods Pg234-236 battery packs from 3.5v to 16v DC in. The FLORA has built­in 7. Letowski, T.R. (2012). Owning the Environment: Stealth Soldier— USB support. Built in USB means you plug it in to program it, it Research Outline. Aberdeen Proving Ground, MD: U.S. Army Research Laboratory. Pg. 20­24 just shows up ­ all you need is a Micro­B USB cable, no additional purchases are needed! We have a modified version of the Arduino

24th June 2017 , ISBN No. 819070985-2 37 37 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Data Analysis in Indian Context and Indian Data or Data of Indians

Kapil Department of computer Application National Institute of Technology Kurukshetra, Haryana [email protected]

Abstract: Many Indian scientists are working meticulously to MOOCs is revealed. Therefore, it is very hard to conduct any analyze different sorts of data like- image, remote-sensing, disease, study to understand learning behaviour of Indian students or crop, water, education etc. and regularly coming up with new learners. Though recently SWAYAM [5] platform has come up, algorithms, results etc. And most of the time, data crunching is this can be a ray of hope to get the data. made on the data provided by various repositories. Such repositories are built due to the first attempt to solve the problem Again, much research has been done to recognize that generally belongs to the developed nations. Interestingly, not handwritten characters of various languages such as English much of the data is available that is generated by or about Indian but very less data is available for Indian Languages. In fact, no or population. And hence much of its results are not best fit to India very less data is available for Indian Languages which reduce and Indian population. Therefore, through this article, we wish to the chances of machine learning algorithms to overcome aware about the deep unavailability of the Indian Data. challenges such as translation, dictionary checking etc. Keywords: Indian Data, Indian Continent, Data Analytics In case of health domain, no central repository that keeps patients’ symptoms, prescribed examinations and treatment. Thus, I. INTRODUCTION it does not leave any possibility of learning pattern from huge Indian government along with International agencies like crowd pouring into hospitals. Similar work has already been done World Bank and International Monetary Fund are spending a lot in other countries [3] to improve the situation of research and development. Almost all Though data is scarcely available or in some cases the aspects are driving the scientists and academicians towards unavailable, yet now things are changing for example­ [4] keeps doing research. Most of such research development activities a lot of data and disseminates to the public. Weather data, air require data which can either be created or taken from someone pollution data and geographical data are directly available with else’s research. In India, except medical and bio­sciences domain, the help of satellites. Hence, we can believe that slowly people it is very rare to collect the primary data during research. This has are getting aware of data and its importance. led us to have “no data” or “old data” or “data which is not closely related to the Indian population” situations. III. CONCLUSION In the article, we shall see the problem across the domains Many of us are working day and night to crunch the data to with possible reasons for the scarcity of the data. validate algorithms, feature sets generated etc with the final aim of getting improved results which are crucial in article publication. II. LITERATURE SURVEY Many times the data is taken from the repositories, only a few India is a diverse country where human body structure attempts are being made to collect correct/precise data as it is varies a lot from one region to another like the native of Punjab time­consuming and does not result in quick publications. To are of strong built with around 6 feet height while people from gather precise and correct data, entrepreneurs/innovators are Himachal are of strong built but short height. Similarly, voice required who will innovatively collect the data with reduced human quality varies too. Such data if available can help developing effort of data collection, at the same time it should be correct (i.e. ergonomic tools, clothes, shoes, furniture, designing building the data generator is aligned with the thoughts of collector) and structures that best suits to the inhabitants. Similar data has precise (i.e. the qualification of attributes and data entering must been recorded in other countries [1] for different reasons. be in some standard way and should not be left with the respondents completely. Similar issues relate to animals, birds and vegetation too. As India continent is made up of places like deserts, cold deserts, References high mountains, river plains, Deccan plateau, Sunderban delta, it 1. Bogin, B., & Varela­Silva, M. I. (2010). Leg length, body proportion, and health: a review with a note on beauty. International journal of houses a large variety of species, with a lot of variations. The environmental research and public health, 7(3), 1047­1075. data corresponding to few of the domain is recorded but that is 2. bsi.gov.in not updated to utilize newest technologies and ideas [2]. 3. https://catalyst.harvard.edu/services/shrine/ Since Indian Massively Open Online Courses are not very 4. https://data.gov.in/ popular, very scarce data related to Indians tendency towards 5. https://swayam.gov.in

24th June 2017 , ISBN No. 819070985-2 38 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi A STUDY ON GLOBAL GREEN COMPUTING Er.Gagan Prakash Negi Kiran Bala Department of Computer Science and Engineering. School of Management Maharaja Agrasen University Maharaja Agrasen University Baddi, Solan (H.P.), India Baddi, Solan (H.P.), India [email protected] [email protected]

Abstract—In this present scenario e-waste are becoming a main are produced from many hazardous materials such as mercury, problem for the developing countries. E-waste is the term used cadmium and other toxic substances. On the time of disposing combination of discarded parts of electronic appliances which comprises the computers and its component, it will cause to pollution and hazardous chemicals which is fatal for our environment, example is impact the environment to great extent. The impact of the toxic computer components. Green Computing is the study and activity of waste that is produced by us through throwing our old computers designing, engineering, manufacturing and disposing computing devices by applying eco- friendly methods. Green computing gives us and peripherals lead to land pollution [17].This is the big the solution to handle hazardous e-waste problem which is concerns challenge, how to minimize the power consumption and thereby towards the environment. In this paper, our goal is to describe the reducing the carbon content in the atmosphere [16]. The goal of problem of e-waste in developing countries; providing various methods green computing is to reduce the use of hazardous materials, to apply the concepts of green computing to save the energy and make maximize energy efficiency throughout the product’s lifetime, and environment green by providing some new technology and techniques. upgrade recycle power [16 Many IT manufactures and vendors Keywords—green computing, e-waste, recycling. are continuously investigating in designing energy efficient computing devices, reducing the use of serious materials and I. INTRODUCTION encouraging the recyclability of digital devices and paper [20]. In this time the necessity of electronic devices are Its practice came in to existence in 1992, when the Environmental increasing rapidly day by day and so that the production of Protection Agency (EPA) launched the Energy Star Program. EPA these device are growing rapidly, to meet the demands of the a voluntary labeling program that is designed to promote and consumers globally. As we know that newly advanced devices discern energy efficiency in monitors, climate control equipment and other technologies [18]. To more understanding of Green are replacing the old ones and the devices which have been Computing in this paper we have discussed about the need of replaced are dumped and after some time that is not usable. These green computing, various technologies to make eco­friendly unusable devices become the reason of environmental pollution. environment and some effective steps to save energy. Many developed countries taking concerns with this problem or steps to solve this problem. Due to e waste the level of greenhouse III. PRESENT SCENARIO gases (GHG) has so much increased. This is the goal of scientists, engineers and policy makers is to reduce emission 20% below by In this time with rapid change in technology, electronic 1990 levels in 2020[6]. devices are used for a short period of time and older are dumped All standard paper components have been specified for often. Replacement becomes cheaper as compared to repairing three reasons: (1) ease of use when formatting individual papers, of electronic devices. (2) automatic compliance to electronic requirements that facilitate Due to dump in unused lands the toxic chemicals released the concurrent or later production of electronic products, and (3) by these electronic products get mix into soil and water. By burning conformity of style throughout a conference proceedings. these electronic devices chemicals like lead, mercury, cadmium­ Margins, column widths, line spacing, and type styles are built­ ashes are mixing in air which is so much hazardous and it will in; examples of the type styles are provided throughout this impact food chain. When burning PVC plastic which is present in document and are identified in italic type, within parentheses, making computer and in many electronics components produces following the example. Some components, such as multi­leveled dioxins and furame which again is hazardous. equations, graphics, and tables are not prescribed, although the various table text styles are provided. The formatter will need to create these components, incorporating the applicable criteria that follow.

II. GREEN COMPUTING Green Computing is the latest technology which is responsible for the manufacturing and use of computer devices by consuming less carbon. Many computers and its component Fig 1: Amount of waste generation by sector 2006­2008[11]

24th June 2017 , ISBN No. 819070985-2 39 39 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Most of the developing countries export their e­ waste to is loaded in container ship, going to countries like India, China, developing countries. Even recycling is possible but during Pakistan, where the worst happens to it [3]. recycling the workers and environment concerned with the It is found that there is great difference between currencies process get affected that’s why most of the developing countries of developing and developed countries due to which people of export their e­ waste to developing countries developing countries choose cheaper product, and cheaper means There is a major difference between recycling in developed the product which is dangerous for health and environment. This and developing countries. For example some parts of the Europe currency difference also becomes reason for manufacturing of are not reprocessed e­waste like plastics to evade brominated cheaper product in developing countries. furans and dioxins being released. In case of developing countries there is no take care of such things during the process of IV. METHOD ADOPTED BY DEVELOPED COUNTIRES recycling. Today government of every country is focused on environmental sustainability, are exploring technology and taking initiatives for reducing greenhouse gases as like the ministry of science, technology and innovation of Denmark’s and ministry of economy, trade and industry of Japan­ which established and took initiative for green IT establishment, and provide a strong model of green innovation policy[3]. In US, two organizations US Department of Energy(DoE) and the US Environment Protection Agency(EPA) has also initiated in the area if green ICT [5] In 13th February 2003, there is establishment of first law in the world i.e. RoHS (Restriction of the use of certain hazardous substances in Electrical and Electronic equipment) law (directive 2004/95/EC). This law limits the use of hazardous substances in electrical and electronic equipment. The six toxic substances have been squeezed: lead, mercury, cadmium, hexavalent chromium, Fig 2. Who gets the e-waste in Asia [11]. polybrominated biphenyls (PVV) and poly brominated dephenyl In a survey report of 2005, it is found that 18 Europeans ethers (PEPDS). For cadmium the maximum value is been set is seaports was tried to export 473 of e­waste illegally. It is also 0.01% exceptionally, and for others it is been considered that the found in that report about 23,000 metric tons of e­waste was value should not exceed 0.1% [7]. illegally shipped to India, Africa and china [2]. In February 2003 the WEEE (Waste Electrical and electronic In US also it is found that 50­80% of the waste should be equipment) legislation (directive 2002/96/EC) has also regularized used for recycling in their country itself is illegally exported. This the process of collection, recycling and regaining of electronic all happened because recycling in developing countries is in low goods. As per of this the used product can be returned by the cost. In India many scrap yards can be seen in Delhi, Mumbai, consumers which is free of cost and the authority is given to the Bangalore, Firozabad, and Meerut where thousands of workers production team for managing e­waste properly [7]. had put their life in the danger because they are thinking to earn A Green grid association is a global association is a fantastic today without thinking about the future [3]. step of companies to developing and support standards, It is found that European Union has adopted one way which measurement method, processes and new technologies that lead is appreciable is that manufacturer is responsible financially or to energy efficiency in data centers [8]. physically for their equipment, till on their survivability­ which leads to company towards planning of product which support V. METHOD ADOPTED BY DEVELOPING COUNTIRES green computing [4]. India has committed to reduce its IT emission by 20­25% as The methods adopted by China, India and Pakistan for e­ compared to the 2005 emission level. Ministry of environment waste recycling and discarding are extremely polluting the and forest (2011) of Govt. of India has also take step under environment in a great extent and is awfully unhealthy for humans. National Action Plan on Climate Change (NAPCC) for Green India For examples including open burning of plastic waste, exposure [9]. of toxic solders, river dumping of acids, and widespread general dumping. In Africa there is no proper policy for the recycling of e­ waste this all is done on an easy way, baselessly that leads to As per of Action Network executive director Jim Pockett­ ungoverned dumpsites or landfills. when an electronic waste is taken for recycler, 80% of that material

24th June 2017 , ISBN No. 819070985-2 40 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

should be organized some awareness programs related to green computing and e­waste management system. Green IT should be a compulsory subject rather than to be optional. Government should encourage the citizen and manufactures to adopt green computing techniques.

VII. APPROACHES TO GREEN COMPUTING 1. People must switch off their computer at night so it runs only eight hours a day­ it will reduce energy use by 810kWh Fig 3. Imported e-waste that can’t be sold at the Alaba Market per year and net a 67 percent annual savings. in Lagos, Nigeria, is piled up in a nearby swamp.(Based Action 2. Flat screen monitors use less energy and such monitors are Network)[12] not as hard on our eyes as CRT’S. 3. LCD monitors typically use a cold­cathode fluorescent bulb to provide light for the display. Some newer displays use an array of light emitting diodes (LEDs) in place of the fluorescent bulb, which reduces the amount of electricity used by the display. LCD monitors uses three times less when active, and ten times less energy when in sleep mode. 4. Unplug the electronic if not in use. The average household could save $100 a year by unplugging appliances that aren’t in use. 5. A small monitor­ a 14­inch display uses 40 percent less energy than a 17 inch one. Fig 4.Agbogbloshie landfill in Ghana[13] 6. Enable sleep/ stand mode is an effective way to conserve It is found in a report that 41 millions tones of e­waste were battery in a laptop computer. discarded globally in 2014 and Africa has become the dumping 7. Recycling of Electronics Waste is more effective because ground for it. The Agbogbloshie landfill in Ghana (Fig 4) is just recycling process is more environmentally friendly than one where mountains of television sets, microwave, computers the process of making new material because it can keep and refrigerators from countries all over the world are dumped down the use of new raw stuff, land degradation, pollution, [13]. and energy utilization [15]. The estimation is given by Zambia Information and 8. Use network printer in a business organization to save the Communication Technology Authority that is in Zambia alone paper and energy [14]. has about 10 million mobile users. In the last few months it is 9. Power off your monitor when you are not using it instead found that most of the countries purchase forgery devices from of using screen savers. China and are disposal of carelessly [10]. 10. There must be a more power production through renewable VI. METHOD TO BE ADOPTED resources mention if fig 5 and in fig 6. E­waste is a great problem of this time, so it’s a necessary to take initiative towards Green Computing to reduce the impact of e­waste and to make our environment free from toxic chemicals. In developing countries there is a great need of formation and implantation of rules and regulation for reduction of IT emission and e­waste management system. It is necessary to make law against the importing of e­ waste from the developed Fig 5.Solar energy based power plant sloex energy countries in low prices and then for manufacturing of some other electronic equipment which cost them cheap. In every electronic product it should be written that whether it is green product or not. Government should made more and more awards, scholarships and fellowships to encourage scientist, research scholars and students to contribute in this area. Government

24th June 2017 , ISBN No. 819070985-2 41 41 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Fig 6. Wind Energy based power plant Fig 9. Virtualization 11. Buy vegetable or non­petroleum­based inks—they are made from renewable resources require hazardous solvent. VIII. APPROACHES TO GREEN COMPUTING 1. It reduces the amount of pollutants in the surrounding. 2. It saves the power consumption and reduces the amount of heat produced from the electronics. 3. It reduces the burden on paper industry. 4. It encourages the use of Renewable Resources. 5. It promotes effective utilization of natural resources.

IX. CONCLUSION

Fig 7. Vegetable or non-petroleum based inks In this paper we observed that developing countries are in the race of implantation of green computing and e waste 12. Blackle: It is a website powered by Google Custom Search management but not in that extends which is required as per of and created by Heap Media, which aims to save energy by the time. There is a law and policies in developing countries for displaying a black background and using grayish­white font this but there implementation are still poor. It is a great need of color for search results. It saves energy because the screen time to take serious steps towards this problem. We also mention some approaches for implementing green computing their use is predominantly black. Set Blackle as your homepage. can also helps to save our environment but many more approaches required to make our earth neat and clean. Acknowledgment It is very difficult task to finish any job alone, same here I motivated by my director Dr. Anuradha Mehta, MAIT, Maharaja Agrasen University Baddi, H.P. India. I also thankful to my Guru Dr. S.C. Chauhan Prof. Abhilashi University Mandi, We wish to acknowledge Dr. Raman Goyal Assistant Professor MAIT, Maharaja Agrasen University Baddi H.P. India to prepare this Fig 8. Blackle to save energy manuscript. 13. Virtualization: Computer virtualization is the process of References running two or more logical computer systems on one set 1. Tony Chan,”Inside the Australian Govt. ICT sustainability plan of physical hardware. 2010­2015", posted in green telecom live newsletter, Australia, august 10, 2010. 2. 2013Where does e­waste end up? Green Peace International Feb 24 2009. 3. Dr.S.Taruna, Pratibha Singh and Soshya Joshi, Green Computing in Developed and Developing Countries, International Journal in Foundation of Computer Science & Technology (IJFCST), Vol.8, No.3, May 2014.

24th June 2017 , ISBN No. 819070985-2 42 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

4. The computer revolution/computers and environment/disposal/ 14. Priya Rana, “Green Computing Saves Green”, International Journal recycling available at: http://en.wikibooks.org/wiki of Advanced Computer and Mathematics Sciences, Vol.1, Issue 1(Dec The_Computer_Revolution/Computers_an_Environment/Disposal/ 2010), PP 45­51. Recycling. 15, Rina Mishra, Sonali Jain, NirupamaKurmi, “An Emerging Technolgy: 5. Daniel Araya, Jin Shank and Jingfang Liu­ICTS and The Green Green Computing”, International Research Journal of Engineering Economy­US and Chinese Policy in the 21st century, available at: and Technology, Vol.2, Issue 2(May 2015). www.danielaraya.com/s/Green_Economy.pdf. 16, Prashant Garg, Sanjay Bhavnagar, Deepali, “Green Computing”, 6. GeSI (2008), Smart 2020: Enabling the low carbon economy in An International Journal of Engineering Sciences, Vol.3, Issue (Dec Information age United States Report addendum. 2014), PP 81­84. 7. Fatima Zahar Hanne, Green IT: Why Developing Countries Should 17, A.Mala, C.UmaRani, L.Ganesan, “Green Computing: Issues on the Care?, IJCSI International Journal of Computer Science Issues, Vol. Monitor of Personal Computers”, Research Inventy: International 8, Issue 4, No 1, July 2011 . Journal of Engineering and Science, Vol.3, Issue 2(May 2013), PP 8. The Green Grid. About the green grid 2010; available at: http:// 31­36. www.the green grid .org/about­the­green­grid. 18, JamshedSiddiqui, “Green Computing: Protect Our Environment 9. Government of India Ministry of Environment and Forest, “National from Computer and its Devices”, An International Journal of Mission for Green India”, New Delhi 26th march 2011, available at: Advanced Computer Technology, Vol.2, Issue 12(Dec 2013) www.naeb.nic.in.access on 12 may 2011. 19, Vijay A Tathe, Deepavali P Patil, “Green Computing”, International 10. Michael Malakata­Safari.com to tackle Kenya’s growing e­waste Journal of Emerging Technology and Advanced Engineering, Vol.2, problem­ 23.02.2014, Computerworld Zambia. Issue 4(April 2012). 11. “Waste Management.” United Nations. Accessed March 3, 2014. 20, Mrs. SharmilaShinde, Mrs. SimantiniNalawade, Mr.AjayNalawade, “Green Computing: Go Green and Save Energy”, International Journal 12. Scientists urge action on e­waste ­ Technology & Science ­ CBC of Advanced Research in Computer Science and Software News. Engineering, Vol.3, Issue 7(July 2013). 13. https://www.democraticunderground.com.

24th June 2017 , ISBN No. 819070985-2 43 43 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi A comparative study of CNFET and conventional MOSFET

Bal Krishan Sanjai Kumar Agarwal Sanjeev Kumar Electronics Engg. Dept., Electronics Engg. Dept., Director, YMCA UST, YMCA UST, DNS College of Engg. & Tech., Faridabad, (HR)India. Faridabad, (HR)India. Amroha,( U.P.)India [email protected]. [email protected]. [email protected].

Abstract- MOSFET (Metal oxide semiconductor field effect individual devices in an integrated circuit followed Moore’s law transistor) has been used widely in electronics industries. With [1]. Size of less than 60nm are common in today’s silicon based the increasing technology , we are scaling down the channel length MOSFET. This reduction in size makes scaling of the silicon of MOS which may results in many short channel effects. To get MOSFET increasingly difficult. Scaling has also encountered rid of all these drawbacks of conventional MOSFET we are serious constraints related to fabrication technology and device studying CNFET (Carbon Nanotube field effect transistor). This performances. Some of such constraints include quantum paper investigates the experiences of the most exceptional utilization of carbon nanotube in electronic field, the Carbon mechanical tunneling of carriers through the thin gate oxides, Nanotube Field-Effect Transistor (CNFET). The inspiration of quantum mechanical tunneling of carriers from source to drain research in CNFET is fuelled by the unique electrical features of and from drain to body, control of the density and location of CNT specially the semiconducting feature. Moreover, the constant dopant atoms in the MOSFET channel and source drain region push to discover future nanoelectronic device that can perform as to provide high on­off current ratio, the finite sub­threshold slope. amazing as MOSFET likewise push the exploration of CNFET to To parley with these limitations many proposals for some be more forceful. The first section gives an outline of the CNT solutions include overhauling structures and technologies with and structure of CNFET. The next section gives the comparison a focus of extending their scalability. Other solutions involve amongst CNFET and MOSFET. In this paper, a comparison is being made between conventional MOSFET and different types using new materials and technologies to replace the existing of CNFET. Lastly finished up a future substitution of MOSFET. silicon MOSFET. The mainstream idea is to identify alternatives The significant contrast in CNFETs and MOSFET is that it has which would enable continuous improvement in the performance CNT in channel rather than Silicon. CNFET indicates enhanced of electronics systems are high dielectric constant (High–K), metal characteristics with scaling of innovation. CNFET band gap is gate electrode, double gate FET. High­K dielectric materials straightforwardly influenced by its chirality and diameter, which provide efficient charge injection into transistor channels and is the greatest preferred standpoint over MOSFET. Investigation reduce direct tunneling leakage current making them useful for of different types of CNFET comparison is made in this paper. gate insulators. The very large scale integration (VLSI) Keywords : MOSFET, Carbon Nanotube , Bandgap , CNFET. frameworks relies on upon silicon MOS innovation, Industry Technology Road Map has anticipated that in the nano regimes, I. INTRODUCTION the expected high density will encounter substantial difficulties The rise of Nanoscale technology can be discussed as per in terms of physical phenomena and technology limitations, the Moore’s law when the numbers of transistors tend to increase possibly preventing the continued improvements in figures of on an IC leading to the demand for decreasing the size of transistor merit, such as low power and high performance. and hence the circuit size is also reduced. Despite the pliable We can now see a pursuit for Nanoscale alternatives to nature of CMOS there are still many challenges in the field of bulk silicon transistors. Ultrathin body devices such as Fin FET nanotechnology. The dissipation of power of the device is have received an enormous attention in recent years. increased to a great extent when CMOS is driven down. This The modification of channel material in the conventional enhances the leakage current simultaneously. One of the MOSFET structure with a single carbon nanotube can help us to calamitous speed bump of MOSFET device is short channel effect facilitate further scaling down of device dimensions. Regardless and therefore MOSFET has been replaced by the very popular of the considerable number of difficulties related with scaling, CNFET owing to its similarities in the areas of manufacturing silicon based semiconductor innovation will keep on scaling process and electrical properties. In CNFET the stream of electrons down later on. takes after the ballistic transport and the leakage current is low However, research is progressing toward improving carrier henceforth showing great performance attributes over transport in the transistor channel region [2]. One possible option conventional MOSFET. The path of technological advancements is to use carbon nanotubes (CNTs) to realize high channel mobility has been paved by the scaling down of devices. Dimension of devices. 24th June 2017 , ISBN No. 819070985-2 44 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The major difference in CNFET and MOSFET is that it has CNFET is a field effect transistors that consists of a single CNT in channel instead of Silicon. CNFET shows improved CNT or an array of CNTs in channel instead of bulk silicon which characteristics with scaling of technology. These offers is being used in MOSFET. Electronic configuration of CNFET is advantage of a higher drive current density, due to the larger electronic structure of graphene itself that can roll up and form a current carrier mobility in CNTs compared to bulk silicon [3]. In hollow cylinder. The circumference of such carbon nanotube can particular, with CNTs we obtain good operation even at very be expressed in terms of a chiral vector: high frequencies [4­10]. CNFET band gap is directly affected by h=nâ1+mâ2 its chirality and diameter which is the biggest advantage over The nanotube diameter and the chiral angle are given by: = MOSFETs. Study of various types of CNFET is made and a comparison is made in this paper.

II. CNT and CNTFET Graphene sheets are rolled up into tubular shapes to make CNTs. Planar graphite is organized in a hexagonal structure because of its sp2 junctions, carbon nanotubes likewise show this honeycomb structure on a molecular level. In 1991, Iijima first found that carbon nanotubes orders a macromolecular class with one of a kind mechanical, thermal and electrical properties. Some of these properties come from the nearby connection between carbon nanotube and graphite, and other from their one­ dimensional angles [11]. Figure 1, demonstrates the microscopic perspective of a carbon nanotube. Figure 2: Graphene atomic structure. The I–V characteristics of the CNFET are like MOSFET. The voltage required to turn­on the transistor is known as the threshold voltage. The threshold voltage of the intrinsic CNT channel can be approximated to be of first order as the half band­ gap is a inverse function of the diameter [13]. The CNFET likewise achieves four terminals as found in a customary silicon device. As appeared in Figure 3, the undoped semiconducting nanotubes are put under the gate as channel region, while vigorously doped CNT fragments are put between the gate and the source/drain to allow a low series resistance in the ON­state [14]. As the gate Figure 1: Microscope Image [12] of a Carbon Nanotube. potential swells, the devices electro­statically turned on or off CNT is used as semiconducting channels in carbon through the gate. nanotube field effect transistor(CNFET). A Single­wall carbon nanotube(SWCNT) has come up to be a more sensible alternative to MOSFET owing to the simple manufacturing process of this device as it consists of one cylinder only. The angle of the atom arrangement along the tube in a SWCNT determines whether this SWCNT acts as a conductor or a semiconductor . This dependency on this angle has been given the term chirality vector and is represented by the integer pair (n ,m). To determine if a CNT is metallic or semiconducting one needs to consider its indexes (n, m). The nanotube is metallic if n = m or n “ m = 3i, where i is an integer. Otherwise, the tube is semiconducting [13]. The diameter of the CNT can be calculated as

=

where a0 = 0.142 nm is the inter­atomic distance between each carbon atom and its neighbor. Figure 3: Schematic diagram of a CNT transistor 24th June 2017 , ISBN No. 819070985-2 45 45 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

(a) Cross sectional view (b) Top view. mean free path. Since mean free path is inversely The gate to­source voltage that makes a comparable proportional to temperature. reference current is taken as the threshold voltage for the • The nanotubes conducts mainly on its surface where all transistor that has diverse chirality. Figure 4, exhibits the threshold carbon atoms bonds are saturated resulting no interface voltage of both P­CNFET and N­CNFET gotten from simulation states .On other hand, no dandling bonds are present to for various chirality vectors (diverse n for m = 0) [14]. A synthesis form interface states. This helps in achieving excellent process for manufacturing SWCNTs with the desired (n, m) channel control and higher linearity is obtained due to linear chirality structure has been presented[15]. The possibility of near dependence between drain current and gate­substrate ballistic channel transport, simple utilization of high– k gate voltage above threshold. insulator and novel device material science make the CNFETs Carbon nanotubes offer alternative uses in various especially all the more engaging. Albeit the greater part of the applications. These applications include their use as electron work on CNFETs has concentrated so far on their d.c. properties source in field emission devices, interconnects and FETs [20]. however more important and technologically pertinent are their a.c. properties. Hypothetically, it has been expected that a short III. TYPES OF CNFETs : nanotube working in the ballistic regime, and the quantum (1) Back gate CNFET: capacitance farthest point ought to have the capacity to give pick up in the THz range [16]. The first back gate CNTFET was proposed by Tans et.al. [17]. In this structure a single SWCNT was used to bridge two noble metal electrodes prefabricated by lithography on an oxidized silicon wafer. Here the SWCNT assumes the part of channel and the metal electrodes act as source and drain. The intensely doped silicon wafer itself acts as the back gate.This experiences a portion of the impediments like high parasitic contact resistance (e”1Mohm), low drive currents (a few nanoamperes), and low transconductance gm H” 1nS [18]. To reduce these limitations the next generation CNTFET developed which is known as top gate CNTFET.

Figure 4: Threshold voltage of CNTFETs versus n (for m = 0) as reported in [14]. As mentioned earlier that by altering the chirality vector or Figure 5: Image of Back­gated CNFET. the diameter of the CNT, CNFETs can control the threshold voltage. A major challenge arises regarding growth of metallic tubes during fabrication process of carbon nanotubes which confers its impact on power, delay and functional yield on CNT based circuits. This becomes a task for CNTFET technology to control the size, type, and chirality of CNTs that most definitely determine its electrical properties. One should also keep a check on minimizing parasitic resistance and capacitance while developing a fabrication process and device structure. Some distinct properties of CNTFET are : • Carbon nanotube has 1­D nature due to which it supports ballistic transport where mean free path is longer than the Figure 6 : Back Gate CNFET. path. Thus, scattering probability is reduced to very large (2) Top gate CNFET: extent. To get better performance Wind et al. proposed the first top • CNFETs have potential for low thermal noise due to longer gate CNFET in 2003[19]. Figure 7, demonstrates the schematic

24th June 2017 , ISBN No. 819070985-2 46 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi diagram of a top­gated CNFET with Ti source, drain, and gate References: electrodes. A 15­nm SiO2 film was utilized as the gate oxide. Here 1. G. Moore , Progress in Digital Electronics, IEDM Tech Digest, gate is placed over the CNT. The advantage of top gated CNFET 1975, pp.11­13,1975. over back gated CNFET is summarized in table­1[18]. 2. S. Datta ,” 85nm Gate Length Enhancement and Depletion mode InSb Quantum Well Transistors for Ultra High Speed and Very Low Power Digital Logic Applications. IEDM,”2005,pp. 783­786. 3. Tans S. J., Alwin R. M. Verschueren and Dekker C,”Room­ temperature transistor based on a single carbon nanotube,” Nature,1998, Vol.393, pp. 49­52. 4. R. Martel, T. Schmidt, H. R. Shea, T. Hertel, and Ph. Avouris.”Single­ and multi­wall carbon nanotube field­effect transistors.”Applied Physics Letters,1998, Vol. 73. Number 17, pp. 2447­2449. 5. Avouris P., Appenzeller J., Martel R. and Wind A. J.,”Carbon nanotube electronics,”Proceedings of the IEEE,2003, Vol. 91, pp. 1772­1784. 6. Wind S. J., Appenzeller J., Avouris P, “Lateral scaling in carbon nanotube field effect transistors,” Physical Review Letters,2003,Vol. 91, No. 5, pp. 058301, 2003. Figure 3. Top-gated Structure of CNFET 7. Dang T., Anghel L., Leveugle R,”CNTFET Basics and Simulation. International Conference on Design and Test of Integrated Systems Table 1:Advantages of Top gated CNFET over Back gated in Nanoscale Technology, “2006, IEEE Explore. CNFET [18] 8. Guo J., Datta S. and Lundstrom M,”Assessment of Silicon MOS and Carbon Nanotube FET Performance Limits Using a General Theory Parameters Back Gate Top Gate of Ballistic Transistors, “IEEE. CNFET CNFET 9. S. Heinze, J. Tersoff, R. Martel, V. Derycke, J. Appenzeller, and Ph. Avouris,”Carbon Nanotubes as Schottky Barrier Transistors,” Threshold voltage ­12V ­0.5V Physical Review Letters,2002, Vol.89, pp. 106801. Drain Current In the order In the order 10. Jing Guo., Supriyo Datta, and Mark Lundstrom. “A Numerical Study of Scaling Issues for Schottky­Barrier Carbon Nanotube of nanoampere of microampere Transistors,”IEEE Trans. On electron devices,2004,Vol.51, No.2, Transconductance 1ns 3.3ns pp. 172­177. 5 6 11. S.Iijima,”Helical microtubules of graphitic carbon,” Nature, Vol. I(on)/I(off) 10 10 354, no.6348, Nov. 1991, pp.56­8.(2002)The IEEE website. [Online]. Available: http://www.ieee.org A comparioson analysis is done between Back gate CNFET 12. J. Appenzeller, J. Knoch, R. Martel, V. Derycke, S.J.Wind,P. and Top gate CNFET in term of the parameters like threshold Avouris,”Carbon nanotube electronics,” IEEE Transactions on voltage, drain current , transconductance. Nanotechnology,2002, Volume 1, 4, Dec 2002, pp.184­9. 13. Stanford University CNFET model Website. Stanford University, Conclusion: Stanford, CA [Online]. Available: http://nano.stanford.edu/ Comparison between CNFET and MOSFET, In this section we model.php? id=23,2008. have given a brief comparison between the performance of CNFET 14. Y. Ohno , S. Kishimoto, T. Mizutani, T. Okazaki, and H. Shinohara,”Chirality assignment of individual single­walled carbon and MOSFET. nanotubes in Carbon nanotube field­effect transistors by micro­ (i) In case of Si­MOSFET switching occurs by altering the photocurrent spectroscopy,” Appl. Phys. Lett.,2004, vol. 84, no. 8, channel resistivity but for CNFET switching occurs by the pp. 1368–1370. modulation of contact resistance. 15. B.Wang, P. Poa, L.Wei, L. Li, Y. Yang, and Y. Chen,”Selectivity of single­walled carbon nanotubes by different carbon precursors on (ii) CNFET is equipped for conveying three to four times higher Co– Mo catalysts,” J. Amer. Chem. Soc.,2007, vol. 129, no. 9, pp. drive currents than the Si MOSFETs at an overdrive of 1 V. 9014–9019. 16. Castro,L. C,”Method for predicting FET for carbon nanotube FETs,” (iii) CNFET has about four times higher transconductance in IEEE Trans. Nanotechnol.4, 2005,pp.699–704. comparison to MOSFET. 17. Tans S. J., Alwin R. M. Verschueren and Dekker C ,”Room­ (iv) The average carrier velocity in CNFET is almost double temperature transistor based on a single carbon nanotube,” that in MOSFET. The on­current performace favorable Nature,1998, Vol.393, pp. 49­52. 18. Avouris P., Appenzeller J., Martel R. and Wind A. J,”Carbon nanotube position of the CNFET is either because of the high gate electronics,” Proceedings of the IEEE,2003, Vol. 91, pp. 1772­1784. capacitance or because of the enhanced channel transport. 19. Wind S. J., Appenzeller J., Avouris P,” Lateral scaling in carbon The improved channel velocity for the CNFET is due to the nanotube field effect transistors,” Physical Review Letters,2003, increased mobility and band structure of CNFET. Vol. 91, No. 5, pp. 058301. 20. R. Martel, H.­S. P. Wong, K. Chan, P. Avouris, “Carbon nanotube In addition, Carbon Nanotube Field Effect Transistor will filed effect transistors for logic applications,” IEDM Tech Digest, assume imperative part in designing of electronic circuits, which 2001, pp.159­16 ¯PDCA12­70 data sheet, Opto Speed SA, are the base of digital computers. Mezzovico, Switzerland,2001.

24th June 2017 , ISBN No. 819070985-2 47 47 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Implementation of Atmel in BLDC motor control Harshada S.Joshi (Author) Chandrakant Lakade(co-Author) G.H.Raisoni College of Engineering. G.H.Raisoni College of Engineering. Wagholi,Pune,Maharashatra Wagholi,Pune,Maharashatra [email protected] [email protected]

Abstract—BLDC motor are used in no. of applications like in three or more Hall Effect sensors. It would require to inverse the industry, household applications, modern electrical traction time difference between two successive Hall Effect sensor signals. system. BLDC motor consist of PM rotor & stator. It is having BLDC motor consists of rotor with PM & a stator with windings. good power density, more efficiency and also having less It is also known as electronically commutated motor. These are maintenance cost. There is difference between DC and BLDC supplied by DC electric source through inverter, which produces motor. BLDCPM does not uses brushes for commutation purpose. With the help of different solid state devices like IGBT, MOS- ac signal for driving the motor. The brushes & commutator have FET commutation is done electronically. This paper describes the been eliminated. The function of the commutator is replaced by complete implementation of BLDC motor speed control. The control electronics. Here the current commutation is control by results are also mentioned below. For controlling purpose, different solid state switches which is sensed with the help of controller from Atmel family is used. For speed control PWM hall effect sensors & then send signal to that specific switches. technique is used. Traditionally, PWM­VSI technique used for driving BLDC but Index Terms— Brushless DC motor, voltage source inverter Pulse there are many limitations such as requirement of additional filters width modulation. elements, poor quality of output waveforms, harmonics etc. While matrix converters having very satisfactory features like sinusoidal I. Introduction input and output currents, regeneration Capability, load voltage Now a day, BLDC motor is abundantly used in almost all with varying amplitude and frequency etc. Now a days, induction the residential, commercial & industrial applications. There is motor & PM synchronous motors are actuated by matrix lots of difference between brush and brushless DC motor. Brush converter. There are various methods for controlling matrix DC motor is bulky. So it affects on the speed control of motor. converter like Alesina Venturini (AV) method, Pulse Width Also, in such type of motor, brushes are used for commutation Modulation (PWM) method, Space Vector Modulation Technique purpose while in case of BLDC commutation done electronically (SVM) etc. using different solid state devices. As the brushes are absent so II. Operating Principle maintenance & repair cost required for motor is also less. It is more useful, efficient & reliable motor. A brush less dc motor is defined as a permanent BLDCPM motor is similarly like synchronous motor. In this synchronous machine with rotor position feedback. The brushless motor same condition is happened as in case of synchronous motors are generally controlled using a three phase power motor, magnetic field generated by stator & rotor revolve at same semiconductor bridge. The motor requires a rotor position sensor frequency. Due to this BLDC motor does not experience slip like for starting and for providing proper commutation sequence to in case of Induction motor. turn on the power devices in the inverter bridge. Based on the For commutation purpose BLDC motor used different rotor position, the power devices are commutated sequentially electronic solid state devices like MOS­FET, IGBT etc. every 60 degrees. Instead of commutating the armature current In BLDC motor any 2 phases are in working condition at a using brushes, electronic commutation is used for this reason it time. So it consists of hall sensors or rotary encoder. This senses is an electronic motor. This eliminates the problems associated the position of rotor so that we come to know that which 2 phases with the brush and the commutator arrangement, for example, are in working condition. The stator & PM which are fixed on the sparking and wearing out of the commutator brush arrangement, rotor generates uniform magnetic field & also flux density in air thereby, making a BLDC more rugged as compared to a dc motor. gap. So, this tolerates stator coils to rotate by constant DC The block diagram of a BLDC motor control system is shown in voltage. It gives trapezoidal AC voltage waveform when switches Fig. The four main parts of the BLDC control system are the from one stator coil to another. The speed and torque of the power converter, controller, sensors and motor. motor depend on the strength of magnetic field. The strength of magnetic field depends on the rotor current (or voltage) passing through coil. So to control the speed of motor, the flow of current or voltage through the winding can be controlled. For speed measurement & for identifying rotor position usually we required

24th June 2017 , ISBN No. 819070985-2 48 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Inverter gives 3 phase supply to the motor for excitation of stator wdg in motor & the controller helps to maintain the output speed whether there will be change in any parameter or not. Input of controller is speed from motor but it is in mechanical form, it is converted to electrical signal by hall sensors and gives the signal to microcontroller. Now, output from microcontroller is corresponding voltage required to maintain the output speed.

IV. Hardware setup & Results The complete hardware setup is shown in picture. The complete hardware consisting of auxiliary power supply, driver Fig.1. Basic Block Diagram of BLDC Motor & power circuit, microcontroller, different ICs, etc. The power converter is a three phase power semiconductor bridge. The main function of the power converter is to transform 1. Type of Motor permanent magnet power from the DC source to AC so the motor can convert electrical synchronous motor energy to mechanical energy. The sensor is used to determine the rotor position, and it sends this information to the controller. 2. Phases 3 The controller requires feedback information about the rotor 3. Operating Frequency 50 Hz (± 5%) position so it can generate a pulse width modulation (PWM) 4. Rated Voltage 500 V(DC) duty cycle to power the phases of the semiconductor bridge. 5. Rated Power 1KW The controller uses a PWM modulator to generate signals which 6. Rated Speed 3000rpm drive the power converter. The speed of a BLDC is directly proportional to the voltage, and the applied voltage is increased Table.1 Specification of the PMBLDC or decreased accordingly. In a PWM controller, the PWM duty 1. Hall Effect Sensors cycle controls the voltage. BLDC motor commutation is controlled electronically. The III. Block diagram of complete hardware motor is rotated by energizing the stator windings in a particular sequence, and in order to do this it is important to know the rotor The block diag. of complete hardware setup is explained position. Rotor position is sensed using Hall Effect sensors which with the help of following diagrams. are embedded in the stator. As the rotor magnetic poles pass the sensor, the sensor changes state at the same angular position each time a magnet passes by. Whenever the rotor magnetic poles pass near the Hall sensor, the sensor sends a high or a low signal for the North or South pole to the controller. Based on these combinations of sensor signals, the exact sequence for commutation can be determined. Below are some of the advantages of a Hall Effect design: • Hall Effect sensors provide a faster response time to a change in the magnetic field; therefore they provide greater Fig.2- Block Diagram of the Overall System efficiency in commutating a BLDC motor. • Due to their accuracy they provide constant torque.

Hall A Hall B Hall C 0 0 0 0 0 1 0 1 1 1 1 1 1 1 0 Fig.3-Block Diagram of BLDC motor 1 0 0 The block diag. consisting of microcontroller, VSI inverter, DC source, BLDC motor,etc. Table.2 Hall Sequence for Counter Clockwise Rotation of Magnetic Field

24th June 2017 , ISBN No. 819070985-2 49 49 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

From above Table 2 it shows phase excitation corresponding 3. Driver Circuit to Hall signals. If the phases are excited in given sequence rotating HCPL 3120was selected as default driver circuit. HCPL 3120is magnetic field will be produced in clockwise and counter clock 8­pin photo coupler designed exclusively for use in MOSFETs wise direction respectively. There are total six possible outcomes drive applications. This photo coupler is capable of driving the of Hall signals, corresponding to each signal there is a fixed gates of IGBTs and power MOSFETs directly. The photo­IC excitation of phases. Change of excitation of phase current is coupler is housed in compact packages. This, combined with called commutation. For BLDC motor commutation takes place their ability to drive IGBTs and power MOSFETs directly, makes whenever there is change in Hall signal. system design easier, allows simpler circuit configurations and 2. Three Phase Inverter improves system reliability. The isolation is required between Single­phase VSIs cover low­range power applications and power circuit and pulse generating control circuitry. These will three­phase VSIs cover the medium­to high­power applications. prevent damage to control circuit due to any undesirable power The main purpose of these topologies is to provide a three­phase circuit conditions. The DC power supply for all driver circuits voltage source, where the amplitude, phase, and frequency of should be derived from isolated AC supplies. The main component the voltages should always be controllable. Although most of of the circuit is driver IC HCPL 3120 which provides isolation and the applications require sinusoidal voltage waveforms (e.g., provides pulses to the gate of IGBT, fulfilling its power ASDs, UPSs, FACTS, VAR compensators), arbitrary voltages are requirement. The isolation is provided with the help of opto­ also required in some emerging applications (e.g., active filters, coupler present inside the IC. The output current capacity of voltage compensators). HCPL 3120 is up to 2.5 A. The peak voltage of the output pulse From, standard three­phase VSI topology, as in single­phase depends upon Vcc which is generally around 15 V. Typically gate VSIs, the switches of any leg of the inverter (S1 and S4, S3 and to source voltage requirement of MOSFET IRRP260n 15 V. Hence S6, or S5 and S2) cannot be switched ON simultaneously because with the help of HCPL 3120, gate to source voltage and transient this would result in a short circuit across the DC link voltage gate current requirement can be fulfilled. The output of buffer supply. Similarly, in order to avoid undefined states in the VSI, circuit is connected to HCPL 3120 through 500 Ù resistances in and thus undefined AC output line voltages, the switches of any between them to prevent rise in input current above the maximum leg of the inverter cannot be switched OFF simultaneously as input current limit of HCPL3120. The Vcc connection of HCPL this will result in voltages that will depend upon the respective 3120 is between 8th and 5th terminal. The output pulse appears line current polarity. In order to generate a voltage waveform, the between 6 (or 7, as they are connected to each other externally) inverter moves from one state to another. Thus the resulting AC and 5. output line voltages consist of discrete values of voltages that are Vi, 0, and ­Vi. The three­phase VSI consists of six active switches. The converter consists of the three legs with MOSFET transistors, or (in the case of high power) GTO thyrist0rs and free­wheeling diodes. The inverter is supplied by a voltage source composed of a diode rectifier with a C filter in the DC link. The capacitor C is typically large enough to obtain adequately low voltage source impedance for the alternating current component in the DC link. Any output voltage can in average be generated, of course limited by the value of the DC voltage. The general idea is based on a sequential switching of active and zero vectors. Fig.4-driver circuit Only one switch in an inverter­leg can be turned ON at a The 10 Ù resistances limit the gate current to a safer value time, to avoid a short circuit in the DC link. A delay time in the mainly during turn on time. During turning OFF time gate terminal transistor switching signals must be inserted. During this delay is grounded through HCPL to which diode 4148 is forward biased time, the dead­time TD transistors cease to conduct. The duration and 10 Ù resistors is bypassed. This is required to ensure fast of dead­time depends of the used transistor. Most of them it turn off of the switch. Two anti­parallel Zener diodes of 15 V will takes 1 ­ 3 µsec. Although, this delay time guarantees safe clip off positive voltage as well as negative voltage if it exceeds operation of the inverter, it causes a serious distortion in the ± 15.7 V. This provision is to avoid gate to source breakdown of output voltage. It results in a momentary loss of control, where the switch. the output voltage deviates from the reference voltage. Since this is repeated for every switching operation, it has significant influence on the control of the inverter. This is known as the dead­time effect.

24th June 2017 , ISBN No. 819070985-2 50 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

4. Hardware Implementation of Voltage Source Inverter 6. Hardware Setup

Fig.5- VSI inverter As shown in Fig.5, we have implemented a three phase CONCLUSION voltage source inverter. Six switches mounted with their heat In this project, with the very basic concept of Matrix sink are used in the circuit. Along with the switches a fuse of 10A Converter and PWM techniques the speed control of the BLDC is connected in series to the input of the circuit. The fuse is used motor is achieved. By using microcontroller, it can generate the to provide protection to the circuit. It is used to avoid higher appropriate PWM pulses to trigger the switches of matrix overshoot in the MOSFET switches. The three phase output of converter. The program is embed in micro­controller. According the inverter circuit is connected to the motor. The MOSFET to that is easy for controlling the motor. It is reliable & having switches that are used are IRFP260n with a voltage rating of 200v good accuracy. Then the matrix converter converts single ph to and current rating of 50A. three ph supply without any intermediate link or DC link capacitor. By using PWM module in the micro­controller it provides PWM signals. According to these signals the inverter operates & triggers the specific switching devices. BLDC motors have no. of advantages over brush DC motor in market. The use of this motor is more in case of various control electronic applications. It’s having some desirable features like requires minimum maintenance, small in size , noiseless operation, high operating speed, proper torque to weight ratio. Besides these advantages there are some Fig.6­Hardware Implementation of Driver Circuit and Auxiliary limitations of this motor. As economic point of view, cost of the Power Supply motor is more than traditional cost of DC motor. 5. Hardware Implementation of Driver Circuit and Auxiliary As in BLDC motor we required some costly devices like Power Supply rotor position sensors or Hall Effect sensors, matrix converters. Fig.7 shows, the hardware implementation for the auxiliary power Now a day, sensor less BLDC motor is used. Such type of motor supply and the driver circuit board. The stepped down AC supply don’t require rotor position sensor also PWM switching technique is fed through the step down transformers of rating 230/18 V. the is different than sensor BLDC motor. AC voltage is then converted into DC by use of diode bridge Due to these changes, it eliminates the problem of torque rectifier. The further arrangements can then be seen into the ripple also the cost becomes low as there is no requirement of schematic diagram. Driver circuit is connected to the auxiliary position sensors. In future applications of DC motors in power supply thus providing gate pulses to the MOSFET appliances like hard disks, wheel chairs and toys are replaced by switches. BLDC motors due to their low maintenance cost and high efficiency. REFERENCES 1. C.S. Joice, S.R. Paranjothi, and V. JawharSenthil Kumar, “Digital Control Strategy for Four Quadrant Operation of Three Phase BLDC Motor With Load Variation,”IEEE Transactions on industrial informatics, Vol.9, No.2, May2013. 2. H.K. SamithaRansara, U.K.Madawala, “A New Matrix Converter Based Three Phase Brushless DC Motor Drive,”IEEE 2011. 3. Bhim Singh and Sanjeev Singh, “State of the art on permanent magnet brushless DC motor drives,”J. Power Electronics, Vol. 9, Fig.7- Driver circuit No. 1, January 2009.

24th June 2017 , ISBN No. 819070985-2 51 51 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

4. R. Krishnan, Sung­ Yeul Park and Keunsoo Ha, “Theory and 9. Microchip, AN898, “Determining MOSFET Driver Needs for Motor Operation of a Four­Quadrant Switched Reluctance Motor Drive Drive Applications,” © 2003 Microchip Technology Inc. With a Single Controllable Switch—The Lowest Cost Four­Quadrant 10. Freescale semiconductor, Application note, “3­Phase BLDC Motor Brushless Motor Drive,” IEEE transactions on industry applications, Control with Sensorless Back EMF Zero Crossing Detection Using Vol.41, No.4, July/August 2005. 56F80x,”© Freescale Semiconductor, Inc., 2001, 2005. 5. ShrutiShrivastava,JageshwarRawat and AmitAgrawal in International 11. AnandSathyan, Nikola Milivojevic, Young­JooLee, Mahesh Journal of Engineering Research, 01 Dec. 2012 presented, Krishnamurthy and Ali Emadi, “AnFPGA­Based Novel Digital PWM “Controlling DC Motor using Microcontroller (PIC16F72) with Control Scheme for BLDC Motor Drives,” IEEE transactions on PWM,”Int. Journal of Engineering Research, Volume No.1, Issue industrial electronics, Vol.56, No.8, August2009. No.2, pp : 45­47, 01 Dec. 2012 . 12. P.W. Wheeler, J. Rodriguez, J.C. Clare, L. Empringham and A. 6. K.Shivanarayana, G.Anil, K.SrividyaSavitri, “Simulation of Four Weinstein, “Matrix Converters: A technological Review,” IEEE Quadrant Operation & Speed Control of BLDC Motor on Matlab / transactions on Industrial Electronics, vol.49, No.2 April 2002. Simulink,”Int. Journal of Science and Modern Engineering (IJISME), 13. C. Senthil Kumar, N. Senthil Kumar, M. Eswari, “Comparative ISSN: 2319­6386, Volume­1, Issue­8, July 2013. study of conventional and matrix converter fed brushless dc motor 7. Aswathy Paul, “Speed Control for Four Quadrant Operation of drive,” PRZEGL¥D ELEKTROTECHNICZNY, ISSN 0033­2097, Three Phase BLDC Motor Using Digital Controller,”IOSR Journal R. 89 NR 7/2013. of Electrical and Electronics Engineering, e­ISSN: 2278­1676, p­ 14. Manali A. Pawar, N.T. Sahu, A.Y.Fadnis, S.Y.Ambatkar, “A Novel ISSN: 2320­3331, Volume 9, Issue 1 Ver. V (Feb. 2014), PP 07­12. Topology of Matrix Converter for Driving a BLDC Motor,” 8. Microchip,PIC18Fxx31, “Brushless DC (BLDC) Motor Control International Journal of Electrical, Electronics and Data using PIC18Fxx31 Microcontrollers,” © 2003 Microchip Communication, ISSN: 2320­2084, Volume­2, Issue­2, Feb.­2014. Technology Inc.

24th June 2017 , ISBN No. 819070985-2 52 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Track Me Not

Design for Trust, Transparency and Control Harshika Jain (Author) Vaibhav Singh (Co-Author) Department of Industrial Design Department of Industrial Design National Institute of Design ­ NID National Institute of Design ­ NID Paldi, Ahmedabad 380007 Paldi, Ahmedabad 380007 [email protected] [email protected]

Abstract— As much as we love it or hate it, a connected future is This is serious stuff. To fully grasp the magnanimity of the subject, what is to come. A connected future also implies the need for data connections were made between theory and practice in the security and informed decision making about how much data one wants domain of Digital Privacy and Cyber­Security in a socio­technical to share. Rather than picking faults in the system and go against it, system to explore opportunities for systemic design in democratic products, services and policies which keep up with the connected future participation and policy innovation. Sometimes critical concerns should be developed. Therefore, how might we enable people to use the like cyber security and the need for secured transparency might internet safely with trust and transparency while offering them control go unnoticed if not conveyed in the right manner. Hence, this over their privacy? Instead of telling people to not share online, it is more important to make them aware and give them the option of choosing paper has been written with clinical precision as well as deep the level of privacy they want. Technology is still alien to a whole lot empathy. people and it is essential to let people use it safely and with full In the domain of data collection, there are very few players information. Result: A 2 factor authentication device concept, awareness ­ hackers with different motivations (hacker does not mean trigger cards, a digital footprint map, a method to increase ethical content someone who is evil, only the intent matters), people who write sharing and a giga map have been made. constructive code and the lawmakers + enforcers who try to keep Keywords—Cyber Security, Privacy, Systems Thinking, Design, a watchful eye, much like god, but with all due respects to atheists, connected future now even god can be deceived. But the effect of the activities and adventures of these players are felt on a greater level by I. INTRODUCTION individuals, corporates and government portals. Sometimes the Without integrative disciplines of understanding, results of the after­party can be found in the deep dark web if one communication, and action, there is little hope of sensibly is lucky. extending knowledge beyond the library or laboratory in order to Why is data collection such a concern? It is because serve the purpose of enriching human life. The significance of individual beads of data can be collected to form a necklace and seeking a scientific basis for design does not lie in the likelihood decode information about a person. Data alone is simply facts of reducing design to one or another of the sciences. Rather, it and figures but when it is organized and interpreted to derive lies in a concern to connect/ integrate useful knowledge from the meaning out of it, it becomes information. In one of our arts and sciences to suit the problems and purposes of the present. experiments with the well­known mapping applications Orbitist Therefore, design thinking leads an insight into the new liberal and Carto, posts from Instagram and Twitter were geo­located, arts of a technological culture. [1] since most people tag their location in photos and tweets. It can This study has been undertaken by involving stakeholders also be used to find which particular area in the world uses a ranging from school children, ethical and unethical hackers, cyber certain keyword. People create a digital footprint of their online law advocates, bankers to individuals who have fallen prey to activities when they give permissions to apps to get access to intellectual property theft. their location, post something on , etc. However, the Netizens of the world. Welcome to Track Me Not. Data is data so generated in the wake of one’s digital footprints is being broadcasted through servers located on Mars via a high permanent. Stop, think and connect. Even if we do not remember, gain antenna to one and all. Not to forget mentioning that cookies the internet remembers. Hate posts posted some 5/6 years ago are being used everywhere to eat the sweet chunks of data can still be found. embedded in the dough of the internet. Hopefully, this can prompt If one passes into the void after 10 years, what happens to one to shuffle uncomfortably in their chairs and enjoy the sweet the immense amount of data and the passwords they have and guilty pleasures of living in oblivion. generated? It hangs around on the internet permanently; much Disclaimer: This piece has been written without forced like space debris. The internet is soon going to be an encyclopedia attempts at comedy but understandable for audiences aged 6­60. of the world. Also, one never know when a cloud­bleed can

24th June 2017 , ISBN No. 819070985-2 53 53 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi happen due to which personal data and chat histories can rain We have the temperament to be technically savvy but not down and get accumulated in Google cache. Now, with amazing the temperament to be digitally secure. In our quest to become face recognition technologies coming in the market, it is going to masters of technology, ­­­­are we actually becoming slaves of it? be super easy to detect people in a CCTV feed or in random The decision is in our hands. images floating around on the internet. II. MATERIALS AND METHODS Although most people do not admit it, one of the major reasons for startups to fail is ‘data theft’. Companies that have The following tools were used for grasping the area of cyber just started out do not draft their Privacy Policy and Terms of security and digital privacy as part of the design process. Systems Use well, so data can be stolen by the employees and used in design is a process of studying, understanding and mapping the unfair means. Privacy policies are copied and pasted in some stakeholders and subsystems surrounding a particular domain. cases as well which can lead to serious implications. Therefore it 1. Sketch notes: sketch notes are visual notes created from a is imperative for companies to have cyber security, cyber law mix of hand writings, drawings, typography, shapes and policies, techno legal clauses, provisions for getting NDA and visual elements like arrows, boxes and lines. [2] NCA signed by employees etc 2. Sticky note responses: The size constraint of sticky notes Looking at the advancements in hacking, there are growing ensures that people write only what is necessary. concerns since there have been cases of entire power grids and 3. Mind maps: when the main idea is put in the centre of the nuclear power plants of a country being hacked. Medical records sheet and related information, facts and images are put and prescriptions to patients inside a hospital database can be jumbled up leading to severe complications. There have been around it. This is an effective visual tool to collate cases when pacemakers have been hacked and the speed been information. tampered with. Cyber­warfare is raging on even as peace treaties 4. Drawing insights and ideation: After conduction of primary are being signed. Tesla was hacked too, that wasn’t expected and secondary research, infused with a lot of statistics, now, was it? What could digital punishments look like? insights were brewed. Based on the insights, solutions were Data is the new digital currency. People pay for free services ideated. such as emails and social media sites with their personal data, 5. Solution segregation: The solutions were rated on which is sold to advertising companies to show them selective parameters and scores were assigned to each parameter, advertisements based on their preferences, much like Tinder. Now the parameters being – Impact, Wickedness and Timeline does one really want to check into the pizza joint just around the for Implementation. corner that they went to five minutes ago? Well, we are not 6. Giga mapping: It is super extensive mapping across multiple indicating that all of us are fugitives and are about to enter civil layers and scales, for investigating relations between war and thus need to huddle in a hole deep under the surface of seemingly separated categories and so implementing the earth, but the amount of data people are putting up on the boundary critique to the conception nd framing of our internet is certainly immense. systems. [3] Another interesting thing to ponder about is where this Workshops, talk sessions and co­creation workshops were data is stored. It is stored in servers spread out all across the attended and held by us with various stakeholders. Workshops world. Servers are huge and they are required to be kept in a are a very hands­on way to learn and teach something for which certain temperature range which means that a lot of energy is the right tools are also needed. used in keeping these data centres cool. Big companies place 1. Com Expo Cyber Security solutions conducted an Ethical their data centres in cold countries like Siberia or inside a river to Hacking Workshop on 8 and 9 October 2016 at DA­IICT bring down cooling costs. (Dhirubhai Ambani Institute of Information and But data is not just facts and figures. It is stories of people. Communication Technology). Technical terms related to We want to enable people to use the internet safely­ ­ with trust hacking and methods to conduct the same were taught. and transparency while offering them control over their privacy. The firewall of the college network was bypassed in the One should be able to control how much of their personal workshop. information they are signing off when they click ‘I agree’ without 2. On 14 October 2016, we conducted an awareness reading the privacy policy and terms of use of a company. One workshop about ‘Privacy and Digital Security’ for classes should be able to ethically give credits to all pictures/ media/ 3­5 and 6­8 at the Mahatma Gandhi International School in articles reports that they use for reference and also check how it Ahmedabad. Analogies of water leaking from a tank and a is licensed, ie, creative commons, share alike etc. How might we glass overflowing were used to explain concepts such as give power to the people so that they can decide with full personal data leaking from our devices. Total no. of children: knowledge about what happens to their information? Although 120, 60 in each class category. Age group: 7­10 yrs (class 3­ this may seem like painting a picture of an ideal world, small baby 5) and 11­13 yrs (class 6­8). steps can make a difference.

24th June 2017 , ISBN No. 819070985-2 54 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

3. A Mozilla Maker Party was held at the Gujarat Technical OTHERS University (GTU) in Chandkheda in Gujarat on 18 and 19 1. People need interaction with technology to be simple, October 2016 in association with Mozilla Gujarat. Maker intuitive and pleasurable. Party is one of the prime events of Ahmedabad and had a 2. People are aware of the methods to prevent themselves footfall of about 4000 people in 2016 which included from being a cybercrime victim but not aware of the students, developers, entrepreneurs and idea generators consequences of being one. who came to learn, teach, encourage and inspire. 3. People have the temperament to be technically savvy but We conducted a 1 hour co­creation workshop on the not the actual knowledge or inclination to be digitally ‘Speculative Future for Digital Privacy and Cyber Security’ secure. with students of information technology and computer 4. Most people do not know how much information they are sciences as a part of a lecture series on Privacy and Security. giving away when they post something online. The ideas were along the lines of artificial intelligence taking over, artificial phone instead of a smart­phone, connected 5. Teenagers are the most vulnerable while using the internet. devices and IoT, wearables transmitting information directly 6. In any industry, security of data is the most important. and the outburst of wearables. How thinking visually can 7. Trust is the cornerstone of the digital economy. be used as a tool to capture their ideas was tested. 8. Our information is our digital currency. 4. On 27 October 2016, Advocate Manan Thakker was invited 9. Different age groups and ethnographies need different to NID to conduct a talk session on Cyber Security. This solutions catered to their needs. was in combination with a sketch note making workshop 10. The generation of baby boomers and millennials has used [2]. For prospective designers who have already done the internet extensively while the previous generations have internships and will be doing jobs or starting their own not. Therefore, there is a gap in terms of internet ethics that companies in the future, the session was very informative. is imparted to them from a young age. Sometimes, people end up breaking the IT laws unawaredly and sometimes not and that’s where terms of fair use come IV. RESULT into play. The tools, events, stakeholders, media and outcomes have III. OBSERVATIONS AND INSIGHTS been covered on our blog: trackmenot.wordpress.com in detail with images and mind maps. Many ideas were generated based School Children on the observations and insights (also represented in the Giga 1. Children think that antivirus will keep them secure on the Map) but they were segregated. The first level of categorization internet. is product, service, awareness and policy which is colour coded. 2. Majority of the children are on social media platforms and Then they were rated on the basis of wickedness, impact and if not from their own phone, they access social media implementability. Going back to completing the cycle, an analysis applications from their parents’ or siblings’ phones. of how the solutions would affect the stakeholders was made. 3. Majority of the students in the classes had their own Here are a few solutions that have been developed further. personal internet enabled devices, irrespective of their age. 1. Privy, a device to secure internet enabled devices. Also 4. As most of them were used to iPad and mobile phones, featured on Yanko Design and TrendHunter. It offers 2 factor children from classes 3­5 chose 4 digit passwords. The older authentication for protecting against security breaches. It age group had a mix of alphabets and numbers. Despite provides an additional layer of security along with one’s being told multiple times to write a secure password, a device passwords. With this, cyber criminals will have to student ended up making a matrix password (unlocking first hack privy, then also hack individual devices to get pattern). access to private data. (a product concept) 5. 30% of the students think ‘password’, ‘date of birth’ and phone numbers are good passwords. 6. 40 out of 60 students in the class 3­5 range download mobile applications without informing or asking permission of their parents. A child reported that a very popular video game was asking him vital details such as the time he returns from school, his name, age, location etc. 7. They could understand terminology like passwords and bugs when examples of a house key and a leaking glass of water were taken to explain it.

24th June 2017 , ISBN No. 819070985-2 55 55 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

2. Ethical content sharing and creative common attribution: People who generate creative content are apprehensive before publishing their work online for fear of theft and another person making money off it. A licensing system will be highly effective even in companies for formulating data theft laws for employees and interns. A creative commons symbol alongside images in search engines will lead people to make informed choices while using an image and also give credits to the original content creator. 5. Giga Map: The flow of information and placement of elements was decided along with vertical and horizontal formats of arranging data. Statistics, missing data that was still needed to complete the map were added and henceforth, the colour scheme was decided, keeping in mind the subject being dealt with. [4] Acknowledgment

We have been guided in this systems study of Cyber security and digital transparency by the department coordinator 3. Stop. Think. Connect initiative ­ trigger cards for school­ of Product Design – Prof Praveen Nahar. Our sincerest thanks to children. An initiative aimed at creating awareness and him for prodding us to view the study from different directions curiosity among school kids about their online behaviour and engage with stakeholders in interesting ways. and privacy. These cards can be used for conducting We would also like to thank : workshops and will act as facilitators to make children get 1. Dhruv Mahajan from BITS Pilani, Goa campus who gave us used to basic precautions and consequences while using an overview of the field of Cyber security when we were internet enabled devices. just starting out and also giving us access to his Cyber­ Security online tutorials on Takshila Learning. 2. Advocate Manan Thakkar for making us aware of the legal implications of breaching cyber laws and also for conducting a talk session at the National Institute of Design specially focused on the design community. 3. Viral Parmar, from ComExpo cyber security whose ethical hacking workshop we attended at DA­IICT and who let us conduct a workshop in the Mozilla Maker Party in his lecture series. 4. Pranshu Dubey from PixelDo media, Ruzbeh Postwala from Axis Bank, Maanasa Mahesh from NID, Suhas Raghavendra, Bindiya Mutum, and other people who have helped us out but wish to remain anonymous. 5. Greg Sundermann from Carto for giving us access to the 4. Digital footprint map of Ahmedabad from Twitter and Twitter connector, Nicholas Gunner from Orbitist for helping Instagram feed. The purpose of this map is to show and us make a digital footprint of Ahmedabad. Kristen ‘O’ make people aware of how easy it is to track a particular Connor from Orbitist for covering our efforts on the Orbitist person. This experiment has been featured on the blog of blog. Salil Parekh from NID for pushing us to take this step Orbitist mapping application. Locations of instagram posts in the first place. and geotagged tweets were plotted on a map. 6. Students and staff of Mahatma Gandhi International school. 7. The Product Design batch of 2013 of NID for inspiring us, listening to our stories, giving moral support. They have become family in these 4 years. 8. Our Families for always standing by us.

24th June 2017 , ISBN No. 819070985-2 56 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi References 11. https://theintercept.com/2015/11/12/edward­snowden­explains­ how­to­reclaim­your­privacy/ [1] Richard Buchanan, “Wicked problems in Design Thinking”, The 12. http://www.healthcareinfosecurity.com/how­to­minimize­medical­ MIT Press, Design Issues, Vol. 8, No. 2 (Spring, 1992), pp. 5­21 device­risks­a­5310 [2] Mike Rohde, “The Sketchnote Handbook: the illustrated guide to 13. https://www.wired.com/2016/09/tesla­responds­chinese­hack­major­ visual note taking”, 2012, ISBN ­ 9780321885111 security­upgrade/ [3] Birger Sevaldson, “Giga Mapping: Visualisation for Complexity and 14. https://www.wired.com/2015/07/hackers­remotely­kill­jeep­ Systems Thinking in Design” Nordic Design Research Conference highway/ 2011 Helsinki 15. http://www.gadgetsnow.com/tech­news/Indians­dont­care­about­ [4] Steven Heller and Rick Landers, “Raw Data : Infographic Designers’ privacy­Why­should­they/articleshow/25599929.cms Sketchbook”, 2014, ISBN ­ 9780500517451. 16. http://tech.firstpost.com/news­analysis/according­to­symantec­ Web References: smartphone­apps­are­putting­indians­privacy­at­risk­322834.html 1. Website: Tactical Technology Collective 17. http://phys.org/news/2013­06­photos­online.html 2. Website: Teach Privacy 18. http://cis­india.org/raw/indian­express­october­2­2016­nishant­ 3. Live Feed from IP cameras shah­love­in­the­time­of­tinder 4. Com Expo Cyber Security 19. http://thehackernews.com/2016/10/iot­dyn­ddos­attack.html 5. Advocate Manan Thakkar ­ Cyberra Legal Services 20. https://www.engadget.com/2016/10/28/europe­facebook­whatsapp­ 6. Takshila Learning data­sharing/?utm_source= feedburner &utm_medium= feed 7. SystemThinkers.com &utm_campaign=Feed%3A+weblogsinc%2Fengadget+%28 Engadget %29 8. https://medium.com/design­x­data/a­message­to­companies­that­ collect­our­data­dont­forget­about­us­913fccdba66a#.1t451r1i6 21. http://www.workmadeforhire.net/the­rest/whats­the­difference­ between­copyright­and­creative­commons/ 9. https://www.freeprivacypolicy.com/ 10. https://techcrunch.com/2016/09/23/is­this­the­creepiest­use­of­ facial­recognition­tech­yet/?sr_share=facebook

24th June 2017 , ISBN No. 819070985-2 57 57 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Data hiding Effect of Spatial diversity in SFBC- OFDM encoder in MIMO coding channel

Babu I Dr. Deepa Jose Research Scholar Associate Professor Department Electronics and Communication Engineering Department Electronics and Communication Engineering Research center at KCG College of Technology KCG College of Technology (Affiliated Anna University) (Affiliated Anna University) Chennai, India Chennai, India

Abstract-To improve the quality and reliability of wireless link we Stenography can be used for wide range of applications require spatial diversity schemes that use two or more antennas. such as in Defence organization for safe circulation of secret This is especially beneficial for the defence communication, since data, in military and intelligence agencies, in smart identity cards it’s allows multiple users to share a secure information using where personal details are embedded in the photograph itself. data hiding method and limited communication spectrum and avoid co-channel interference. The RTL design approach, In medical imaging, patient’s details are embedded within implementation details in VHDL modules, Verification plan, test image providing protection of information and reducing results and error graphs with respect to Matlab fixed point transmission time and cost. To develop a High Level Security implementation for the SFBC Encoder block for multiple path of policy for the processing of the medical data and their the transmit chain. The design includes the input buffer resources transmission through internet to guide a health care personnel for binary data, the QAM 16 modulation implementation, Symbol who process and manage highly sensitive health care information. block generation and SFBC encoder implementation. The weight ASIC Design is more expensive and its can got matrix required for computing the code block elements is stored in a buffer. Each frame of 3072 bits, out of which 16 bits are fed to reconfigurable and more significant point is due to a very high the input buffers in each clock. The target device xc6vlx240t used nonrecurring engineering cost. To overcome the shortcomings utilized 13% Slice Registers, 25% of DSP48E1s, and Clock of DSP and ASIC, one hardware platform that has become very frequency 311.236MHz. popular for design, prototyping and validation of such digital Keywords-SFBC, QAM, FPGA, Symbol block generation signal processing algorithms is Field Programmable Gate Arrays (FPGA). They commonly have a large amount of resources (Logic 1. INTRODUCTION Elements) available for system development and work at clock speeds in the range of 50MHz up to 1GHz [7].unlike FPGA is more Nowadays is very important to know that wireless comfortable to redesign rather than the ASIC design. FPGA allows communication is growing very fast along with the security issues control over parallelism in resource utilization and also the are also increasing rapidly. To overcome security issues to measurement of resource utilization and also the measurement of communicate with a secure channel along with secure channel resource utilization and power consumption. These features are coding algorithms, why because in internet the introducer easily important as the computational requirements of a particular enter our communication area and introduce some malicious to algorithm play a large role in gauging its suitability for real­world intercept the communication. To overcome the problem we used design and implementation of digital communication systems, a strong cryptography, but cryptography technique will solve either for prototyping or for commercial deployment. FPGA based the problem with some extent, so that the reason we need add hardware module is designed for MIMO encoding. An FPGA data hiding technique in Wireless communication systems based rapid prototyping platform is used to design, implement continue to great to effort to achieve for ever higher data rates and validate MIMO system [2]. The implementation of a STBC and secure communication systems. Diversity gain can also be system is discussed particularly using programmable logic such achieved by space­time coding (STC) at the transmit side. The as FPGA. most challenging for systems that are bandwidth, power and At two transmit antennas, transmit diversity in Long Time complexity limited. One popular and practical MIMO technique Evolution is based on SFBC. But SFBC is with little related to is the Alamouti Scheme[1] [2] which requires simple processing seem to more familiar STBC has been deployed in various third in encoding stage and this lower complexity makes this scheme generation (3GPP) and WiMax standards. In STBC with Altamonte an ideal candidate for real­world implementation. STBC introduced code, as shown in Fig 1 in [3], widely applicable in special diversity in MIMO communication.

24th June 2017 , ISBN No. 819070985-2 58 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

3. Data hiding model in SFBC-OFDM coding channel

Figure 1. Space-time block coding:Almouti code The main aim of the paper is to present the design and implementation of an FPGA based SFBC encoder block Figure.2 Data hiding system in SFBC-OFDM coding channel implementation for MIMO system. This design demonstrates The structure of data hiding in the MIMO­OFDM coding STBC encoder. The code block generator is used to generate the channel is shown in below Fig.2 Secret data are combined into code block elements for a given set of symbol block and respective the channel coding stream first. The data stream is decoded by weight matrix. It uses two cores, the complex multiplier and the the space­time decoding technique and OFDM demodulation on accumulator which are configured balancing both the resources the receiver side. In the receiver section the carrier data are and performance. A set of 16 MACs (Multiply and accumulator) decoded as well as the secret data are also extracted through the are used to generate a set of 256 elements of one matrix of the extraction algorithm. code block. 3 such instances are used to compute the complete Taking the error correcting capability of the channel coding 768 elements of the code block. into consideration, it must be ensured before data hiding that the In this paper, based on MIMO­SFBC­OFDM technologies, total errors caused by secret data replacement and channel data hiding using SFBC Encoder and the RTL view representation interference will not exceed the error correcting capability. of SFBC Encoder verified in VHDL language and the error between Only then can the carrier data be received without distortion matlab and RTL fixed point implementation. And the rest of the and the secret data can be extracted accurately on the receiver paper is organized as follows Section 2 Literature survey on data side the Block diagram of data hiding using SFBC­OFDM coding hiding technique, section 3 describes the data hiding model in channel in Figure.2 [7]. In Fig.2 first the secret data are embedded SFBC­OFDM coding channel. Then, section 4 Methodology of into the channel. Then after the carrier data stream is encoded by the design, section 5 simulation and analysis of BER of secret the space­time coding techniques and the SFBC­OFDM data in MIMO­SFBC­OFDM. Section 6 shows the synthesis modulation and transmitted by the one or more antennas. Here report using Xilinx FPGA Target Device (xc6vlx240t). the SFBC­encoder module we designed using HDL language and 2. Literature survey compare the Matlab fixed point vectors are taken as the golden sample to compare the RTL of Encoder output. Research on data hiding is started has been manifested long way back during the ancient Greek tyrant Histiaeus in 499 4. Methodology BC. But today also it’s a new technique to each and every domain, The methodology is outlined as follows: especially communication domain huge requirement of data hiding technique required. Both theoretical and experimental are reported VHDL codes are authored and simulated functionally in in the literature. Some of the work is summarized below: Modelsim before being moved to Xilinx @14.1 for full timing simulation and logic synthesis. The post synthesis simulation is Liquan Chen, Miao Lu (China-2011)-The main research operated taking the hardware components into consideration. topic of information hiding is how to hide secrets into another public carrier with redundancy, and then deliver the confidential information through the carrier in an open environment. Later, Hentai Ma et al (2010) in, the impacts of the image data model, distortion measurement and attack­channel model on hiding capacity are studied, respectively. Meanwhile in, the data hiding capacity based on MIMO technologies was proposed qualitatively. Bharati Krishna Tirthaji (1992) “Vedic Mahematics and its Spirtual Dimension” Motilal Bansari Publishers

24th June 2017 , ISBN No. 819070985-2 59 59 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Output buffer Block: Input 16 bit output from the FIFO Output • The 16 bit output from the real and imaginary buffers are concatenated and been stored in the final buffer. • The reading from the FIFO is done parallel • The size of the output buffer data is 256x1x3(3 instances): width 32 bit [15:0] imaginary ,[31:16] real • Depth of 256 [255:0]

5. Simulation and analysis Simulated and analyses of the BER characteristics of carrier source data and secret data in the SFBC­OFDM coding channel with various SNRs. The MIMO­OFDM frame structure is represented in Figure 5 the representation of two curves its show the BER performance of the carrier cover data and the decoded extracted source data when the transmitted signal is processed by SFBC­OFDM modulation and Alamouti space­time coding in Figure 3 Design Methodology and Flow Chart a 2x2 antenna system. When the SNR value is higher than 15dB, the BER of the secret data it reach the 10­4 level by which the secret data can be correctly recovered.

Figure 4: describes the Modulator block RTL Description: Input buffer and Mapping block Figure 5 BER of secret data in MIMO-SFBC OFDM Input Random bit stream of 3072 bits, where 16 bits I. Verification plan for SFBC Encoder Design: are fed to the input buffer in each clock. This paper design was done using the RTL design approach Output • Each 2 bits [1:0] are mapped to the for the SFBC encoder. The design includes the input buffer equivalent q­15 format and are stored in resources for binary data and SFBC encoder implementation. the memory (i) Each frame of 3072 bits, out of which 16 bits are fed to the • 3072 bits are re arranged in 6 memory input buffers in each clock. instances, each memory of size 256x1, (ii) Input buffers structure: 16 FIFO’s are required in each buffer width [1:0] depth [255:0] to store the respective real and imaginary data • First instance describes 2 memories, the (iii) Expected output: Code block of 768x1 for each frame, Width real_1 256x1 memory and imaginary _1 of 32 bits. 256x1 memory. Similarly for the other two (iv) The two important data required for the calculation of code instances. block are the weight matrix (obtained from mat lab) stored • 16 FIFO’s are required to store the data in the distributed ROM memory and the symbol frame matrix, in each memory. comes from the modulator module. • 32 clock required to fill one memory

24th June 2017 , ISBN No. 819070985-2 60 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

II. Stimulus Generation for SFBC Encoder: III. Error Graphs between matlab and RTL (i) To generate the input random bit stream of 3072 taken from • The Figure 7­8 Graphs shows the error between matlab and mat lab, considered as the golden sample. RTL fixed point implementation. Number of samples: Input (ii) The RTL output at each stage is compared with the Mat lab format: 21 frames i.e. 21x 3072 bits Output format: Depth fixed point output. 16128 samples of 32 bit width (iii) The various levels tested are: • The mat lab fixed point vectors are taken as the golden Modulator output sample to compare the RTL output Figure.7 Code block output (iv) The design has also functionally tested for multiple chains i.e. for 21 frames(21 x 3072) (v) The expected output is code block of size 256x1x3, width of 32 bits representing [31:16] as real data, and [15:0] imaginary data. (vi) The output for 21 frames from RTL is been compared with the golden sample from the Matlab. Interfaces: • The output from the modulator called as symbol frame of size 16x16 for 3 instances has been given as one of the inputs to the encoder module. • Mod_ready is the signal which indicates the start and end of the modulator data, is also given as one of the inputs to Figure 7 Error Graphs the encoder block. Mod_ready when goes high indicates the start of operation for the encoder module in Figure 6.

Figure 8 Encoder block

6. Synthesis Report:

Figure.6 describes the storing of data in the input buffers.

24th June 2017 , ISBN No. 819070985-2 61 61 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Reference Number of Slice 39393 out of 301440 13% Registers 1. J. Paulraj, D. A. Gore, R. U. Nabar, and H. Bolcskei,”An overview of Number of Slice 43229 out of 150720 28% MIMO communications—A key to gigabit wireless,” Proceedings of the IEEE, vol. 92, no. 2, pp. 198–218, Feb. 2004. LUTs 2. T. Rappaport, Wireless Communications: Principles and Practice, Number used 42062 out of 150720 27% 2nd Edition, Upper Saddle River, NJ: Prentice Hall, 2002. as Logic 3. V. Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space­time block Number using 24 out of 416 5% codes from orthogonal designs,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1456–1467, July 1999. Block RAM/ FIFO 4. J Dowle, S. H. Kuo, K. Mehrotra, I. V. McLoughlin, “An FPGA­ Number of DSP48E1s 192 out of 768 25% Based MIMO and Space­Time Processing Platform,” EURASIP Clock frequency 311.236MHz - Journal on Applied Signal Processing, vol. 2006, Article ID 34653, pp. 1­14, Hindawi Publishing Corporation, 2006. Latency 313 clk’s - 5. T. Kaiser, A. Bourdoux, M. Rupp, U. Heute, “Implementation Aspects and Testbeds for MIMO Systems,” EURASIP Journal on TABLE I: Target Device: xc6vlx240t Applied Signal Processing, vol. 2006, Article ID 69217, pp. 1­3, Hindawi Publishing Corporation, 2006. Conclusion & Future Scope 6. J. ­Pacheco, Á. F. ­Herrero and J. C. ­Quirós, “Design and Implementation of a Hardware Module for MIMO Decoding in a 4G In this paper we present design Methodology and the Wireless Receiver,” VLSI Design, vol. 2008, Article ID 312614, Implementation of SFBC Encoder and Matlab fixed point vectors pp. 1­8, Hindawi Publishing Corporation, 2008. are taken as the golden sample to compare the RTL of Encoder 7. E. G. Larsson, P. Stoica, Space Time Block Coding for Wireless output. And the QAM 16 modulation implementation, Symbol Communications, Cambridge, UK: Cambridge University Press, 2003. blocks generation and SFBC encoder implementation. And Future 8. Chen Liquan, Lu Miao. Data hiding capacities in multiple antennas Scope is Analysis of data hiding capacity in MIMO­SFBC­Encoder channel coding system.Proc Eng(Elsevier) 2011;15:1848­53. System and increase the security while making a good algorithm for communication through wireless link to protect the data.

24th June 2017 , ISBN No. 819070985-2 62 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Discourse Centered Online Ethnography (DCOE) study to understand online on Social Networking Sites (SNS) and

Dr. Jayshree. V. Bhalerao Manmeet Barve Asst. Professor ­ Marketing Asst. Prof ­ Business Design, Mahatma Gandhi Vidyamandir´s Institute of S.P.Mandali’s Prin. L. N. Welingkar Institute of Management & Research, Nashik, India Management Development & Research, Mumbai, India [email protected] [email protected]

Abstract - Memorials services in India for the deceased have digital legacy of their loved once, all this is bringing the dialog always been private affairs along a few family and friends, some flowers, about demise and the departed into a very public forum. fragrance sticks and a picture of the deceased. When people breathe Apparently social customs for loss in the internet age are still not their last, they might leave the world but their online personas do not go riotously visible in the country or a compulsory custom like in with them. In the initial part of the research describes about, how the west but the act of mourning online is now a growing wave. internet has reformed the way we live and logically that also means it has changed the way we communicate, think and discuss about . It correspondingly originates with the value of having a free For the loved once left behind, the mourning or sharing has started space to grieve with which one experience can be quite comforting to move online in many different ways like people share pictures, or more painful. Internet is forcing the society to rethink about videos, quotes and stories with their online friends. The researcher traditional categories of Indian ‘culture’ and ‘society’? Is it not sheds light on how Indian interact over SNSs on the topic of death and important to learn about, how the general public is mourning for looks into the arears for improvement of Human Computer interaction our loved once online? (HCI) on SNSs for Indian users with reference to Thanatosensitivity. People mourn for someone who we do not know personally Based on 39 memorial or facebook post, the researcher has studied the and share a like or sometimes tears on facebook without even textual and photographic content shared by Indians on Social Network Sites (SNS) about demise or memory of their loved onces using Discourse knowing the person. In recent times, India has seen passing away Centred Online Ethnography (DCOE) method. The researcher of well­known figures like Jayalalithaa, Muhammad Ali, Dr. A P J investigates about any interpersonal connection between factors like Abdul Kalam, Reema Lagoo, Zohra Sehgal and other, which brings age of demise, person sharing the news, content shared over SNSs to about flooded messages of RIPs, condolence for the celebrity on understand the HCI on Thanatosensitivity .The researcher also gives SNS. The researcher has not considered digital data on SNS suggests ways to improve user experience for the people grieving on related celebrities and focus exclusively on the digital life of Social Network Sites and concludes that SNS are poorly designed for general facebook users. Today, are no longer static grief sharing with to reference to the user experience point of view. pages but the virtual worlds are places where family and friends Keywords - Mourning; Thanatosensitivity; HCI; Facebook; Discourse share memories and stories with each other. website Centred Online Ethnography (DCOE). such as Legacy.com and tributes.com has covered memorial listing of 75 percent of the people who die in the United States each I. INTRODUCTION year. In India, Tributes.in, obituaryindia.com, shradhanjali.com Social Networking Sites (SNSs) have become a common and newspaper obituary columns are working in this space touchpoint for reaching out to everyone in the network connected .Shradhanjali.com started in year 2011, has the highest online to any individual for a sense of support and connection. Same as mourning market share with the website has published over 400 the west, Indian also have started using SNS as platform to paid obituaries so far. Their monthly revenues range in between express grief and bereavement. Individuals share Rest in Peace Rs.65,000 with close to 9,000 monthly unique visitors to the (RIPs) as mark on respect along with broken­heart emoji and site.Shradhanjali.com invites contributions to remember and some even turn the online space in intimate writings of their celebrate the lives of all the passed using biographies, family connection with loved demise. Some of them share pictures of details, photos, videos, complete with background music their vacation they spend with the demise and tag them on selection. Anyone with the link from anywhere in the world can occasions of their birthday, anniversary and festivals as if they post their sympathies and remembrances to the website .The were alive. As be suitable for the first generation of digital website is available in 10 different languages Hindi, Marathi, inhabitants, youngers have now started to blogs, share videos Sanskrit, Guajarati, English, Malayalam, Tamil, Bangla and on YouTube and add picture to Instagram feeds about life’s and Kannada, and will be adding Telugu, Punjabi, Assamese, Bodo,

24th June 2017 , ISBN No. 819070985-2 63 63 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Konkani, Manipuri, Nepali, Oriya, Sindhi, Santali and Objectives Dogri.(yourstory.com, 2016). Over a year the researcher has • Investigate the textual and photographic content shared investigated through secondary research that customized virtual by facebook users on SNS about demise or memory of their space for mourning and grieving looks empty and hence SNS are loved onces using Discourse Centred Online Ethnography the only options left. (DCOE) method • Analytical study of various approaches adopted by SNS II. LITERATURE SURVEY users and to know the reaction of readers or viewers to the According to (Massimi & Charise, 2009), the term of content shared in terms of SNS interaction. ‘Thanatosensitivity’ means ‘the learning the intersection of death • Additional questions such as what kinds of content users and technology and interaction with HCI into traditional user­ like to share, whether their Facebook friends comprise mostly centered design. It’s originally, humanistically­grounded of real­life acquaintances, and whether they care to know approach to HCI research and design. Today, thanatosensitivity how many people viewed their posts. can be pragmatic as an acute instrument that can be used in influential evaluation to identify possible design glitches and III. APPROACH identify opportunities for enhancement, which identifies and For working on this research paper terms such as “virtual actively engages with the facts of mortality, dying, and death in ethnography” (Hine, 2000), “network ethnography” (HOWARD, the creation of interactive systems. 2002), “netnography” ( Kozinets, 2002) and “webnography” (Puri, Rise in newspaper reading in the previous decade gave rise 2007). In an attempt to provide a framework for doing discourse to formal obituaries and became the most profitable of any analysis in dynamic online environments (Androutsopoulos, newspaper publisher. The forms and functions of the obituary 2008) has developed a technique Discourse Centred Online are changing with the information age. Conversational surfaces Ethnography (DCOE) covers technique for conducting qualitative such as Friendster (2002), MySpace (2003) and Facebook (2004), research orderly observation of the SNSs research uses has been seen as next steps in the evolutionary process of ethnographic insights as a setting for selecting, analyzing and memorializing, artefact news of the deceased is been spread to interpretation of data on internet. Androutsopoulos suggests the entire world at the click of a mouse (Landry & Carroll, 2010). that the a researcher should involve themselves online to The growth of Facebook has created a new terrain for death on understand the flows for suggesting systematic observation and the Internet. More than 30million of Facebook user have passed if possible direct contact the participants coupled for analysis of away in the first 8 years of its incorporation. Every hour 428 user discourse, to provide a comprehensive description of online Facebook user dead which amounts to more than 3,12,500 every data. The method provides the researcher through observation month and by 2065 Facebook would true into a digital graveyard. with the ability to situate analyzed facebook profile in a local­ In 2009, Facebook gave an option of turning an individual historical or history of interaction within a community content profile into a memorial profile or page, the close family member. (Pihlaja, 2015). The objective of DCOE is the researcher to inquire (Kaleem , 2012) Facebook is allowing users entitle a “legacy about qualitative questions like, who is writing the content and contact”, the allocated contact by the decreased can take control for what purpose? How has the content been developed? What of the once facebook account after their death based on platform has been used for the appropriate uses of message, and stewardship based approaches ( Brubaker & Burch, 2016), Legacy what are the customs and unsaid rules prevailing practiced in the contact as an option is available in facebook’s security options various categories? (Haverinen, Death and Mourning Rituals in and allows the designated person to change to create one last Online Environments, 2014). post on the behalf of the deceased, also lets them manage friend SNSs in India have engendered huge amount of traffic requests, update the cover and profile photos and archive compared with other countries, but it’s not just population density content. Legacy contacts can also help to download an archive that equates for this traffic. Residents of India prefer to use of the deceased’s posts and photos. This helps families to contact technology that connects them to others and use facebook as with the people far across which are far across their offline one of their preferred medium to do so. For the purpose of network. Once the profile becomes memorialized, it is no longer research, we have only taken data from Facebook as it has 1.28 shown to friends in event invitations, photo tagging, and other billion active users visited the social network on a daily basis in suggestions such as appearing as ‘people you may know’ for first quarter of 2017. Overall, daily active users accounted for 66 those who are not yet his/her Facebook friends, all of which may percent of monthly active users. Facebook is the most popular serve as painful reminders of the death. Hence, Facebook is social network worldwide. Facebook’s appeal is not only based becoming an important virtual space to remember and honor those on its social platform but also on its strong mobile integration. we’ve lost. When a person passes away, their account can (Statista, 2017). Studying thanatosensitivity on facebook as a become a memorial of their life, friendships and experiences. This SNSs platform is easier due to easy word searching capabilities is a way in this which today Facebook users are able convert and easy to see profile of people not in your own network. their page into ‘Online Mourning places’. 24th June 2017 , ISBN No. 819070985-2 64 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Interactive and user text productive features like comments on of recent death, memorial service announcement, just a facebook wall give opportunities to investigate the open remembrances, on a birthday of the deceased or any other community data and there way of sharing grief or mourning online. occasion’. The researcher is then analyzed the history of interaction between • Number of likes and comments of the status: Manually users giving a perspective on why certain comments were made counting number of likes and comments per post. within a facebook post. The researcher has drawn on his own observations of comment and notes any previous interaction IV. FINDINGS between users and logs of comment on the facebook wall which Out 29 post examined, following are some of the status may have served as a catalyst from the user profile or the current shared by users about the mortal status of the deceased or disagreement. (Pihlaja, 2015). memorialize their friend in an inclusive community (Names of For conducting Discourse Centered Online Ethnography the deceased have changed have been to XYZ, to protect identity (DCOE), Memorial group sites on Facebook tend to be headed and to reduce ambiguity): R.I.P. (Rest in Peace) followed by the name (or nickname) of the Observation 1: (Source : Facebook Post) deceased but during our research we found few memorial group’s sites or memorial pages in India. However, like many social media Wall Comment 1: “In loving Memory of my friend, colleague sites users control the visibility of content they produce. Due to XYZ.. pic taken together in the month of March 2016 at Mumbai.. less number of samples available in India, the researcher used Will miss him a lot in the coming days!!!” three keywords to find information about the people mourning Analysis of facebook wall Status 1: online for their loved ones. 3 keywords used were rest in peace, • Date of the post: 10 August 2016 in loving memory of and missing loved ones in heaven. At the • Age of the deceased: 35 same stage the location filter was kept for Mumbai and year filter • Gender: Male to 2016. By executing we were able to find out the 39 facebook • Type of Status: Shared by someone & tagged the deceased wall status online, where people mourning and sharing their grief person on facebook. • Post by: Friend Information related to the following variable was extracted from the 39 facebook post • Type of picture uploaded along with the post: With more than one member • Date of post: When was the post added on facebook by an th individual or author of the post • Occasion of the post: Memorial (XYZ death on 6 August 2016) • Age and gender of deceased: Approximate age and gender of the deceased which was guesstimated based on picture • Comments of the status: 7 uploaded along with status or content written on the post • Number of likes: 66 • Period of Death: Period of death of the deceased was Figure 1. Screenshot of Facebook post sorted into following based on recent death, less than 1 year, more than 1 year, more than 5 years. The data was guesstimated based content writen on the post and based on date or year of death was mentioned. • Type of Status: Based of the approach used by the author : ‘Memorial page’ of the demise, Status updated done on the ‘Demise facebook page’, Status ‘Shared by someone’ on their facebook wall, Was the deceased person ‘Tagged’ on the past. The data was anlayzed content writing on the post and relationship mentioned with the deceased. • Post by: Te relation between the author and deceased such as was created by Friend, Close relative (Family Member), Relative. • Type of picture uploaded along with the post: The picture was single or deceased self portrait, with more than one member in the picture, picture of the deceased person along with the group, no picture was shared or the post was uploaded with a Quote or Poem or video. • Theme of the post: The status was uploaded as an occasion

24th June 2017 , ISBN No. 819070985-2 65 65 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Description 1: who were part of the family. This was done to spread the news The above status was posted by an office colleague in about the demise with everyone. This post has 18 comments and memory of his male teammate who passed away on 6th August 18 likes. The comments mentioned by others people such as 2016. This post has 7 comments and 66 likes. The comments ‘Please accept our sincere condolences for your tragic loss! May mentioned by others people such as R.I.P, ‘He was humble and a God bless her soul and your family! We will keep your family in very good human being. he will be in our hearts forever...’, our prayers’, extremely grieved at sad demise of your dear comment in regional language ‘Kothay chole gele dada..... akhi te daughter... My heart felt condolence at your unbearable loss.... jol diye.... batas hoye choye jeo.... tomar hasi bhora gale…miss u’ May God bless her holy soul’ ,‘Mahaprabhu Shri Jagannath XYZ (Translate: Where did you go brother… leaving us alone…), ‘I ra aatma ku shanti pradan karantu. Jay Jagannath’ (Translate: really miss X Sir, he is the best SM , I have in my career’,’Loss to Almighty Shri Jagannath, may the soul of XYZ in peace, Jai all of us. RIP’. Also, when identified and ethnographic study of Jagannath). the facebook profile of XYZ person, the last ever written post Similarly, 39 post were examined, following are the consolidated had messages like ‘XYZ is no more with us. It’s gives lots of pain observations where junior & colleague like you worked for 5 years together, got promoted with high dedication & be honesty left us today TABLE 1. AGE OF THE DECEASED morning forever. May your soul rest in peace !!!’ The last reply of Total number of Data collected 39 the deceased person had 103 likes and 35 comment. Mean 47.589 years Observation 2: (Source : Facebook Post) Standard Error 3.803 Wall Comment 2: “In loving memory of my darling daughter, Median 40 XYZ (who left us for her heavenly abode on 17th March, 2013 Shivratri, last Sunday. She was 16 and eldest of three. We, her Mode 22 family, cannot describe our loss...and I, her mother, who has lost Standard Deviation 23.753 not only her first born, but also her closest friend, support and Range 83 years confidante...we will miss you forever XYZ...” Minimum 13 years Analysis of facebook wall Status 2: Maximum 96 years • Date of the post: 17th March 2013 • Age of the deceased: 16 (Mentioned in the post) Source: Primary Data • Gender: Female Analysis 1: The mean age of the deceased was 47 and the • Type of Status: Shared by someone & tagged 29 people, standard deviation is 23.75, means the people are uploading informing about the news demise information were from various age groups youngest • Post by: Close Family member (Mother) starting at 13 to oldest at 96. 70% of people were above age of 40. People with above age of 40 were posted by mostly by younger, • Type of picture uploaded along with the post: Single who have active users Facebook. Though the memorials were • Occasion of the post: Memorial (XYZ death on 10th March written for both males and females of all ages but mainly the post 2013) written by males. The social norms for grieving online clearly still • Comments of the status: 18 are evolving. But the tech savvy millennials are showing their • Number of likes: 18 own sensibilities onto ceremonies and dialogues surrounding Description 2: bereavement. The above status was posted by a mother for a daughter after one week of her demise. This post was tagged to 29 people

24th June 2017 , ISBN No. 819070985-2 66 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

TABLE 2. TIMEFRAME POST DEMISE & RELATIONSHIP BETWEEN THE AUTHOR OF MEMORIAL AND DEMISE

Theme of the post Birthday Memorial Occasion Remembrances Grand Total Recent – 61.54% 10.26% 7.69% 79.49% Close relative / Family Members – 48.72% 7.69% 0.00% 56.41% Friends – 12.82% 2.56% 7.69% 23.08% More than 5 years – 2.56% 5.13% 0.00% 7.69% Close relative / Family Members – 2.56% 5.13% – 7.69% More than 1 year – – – 2.56% 2.56% Close relative / Family Members ––– 2.56% 2.56% Less than 1 year 2.56% 5.13% – 2.56% 10.26% Close relative / Family Members – 5.13% –– 5.13% Friends 2.56% –– 2.56% 5.13% Grand Total 2.56% 69.23% 15.38% 12.82% 100.00%

Source: Primary Data next year, and friend­acquaintance interaction slowed down within Analysis 2: The researcher found that mostly close relatives few months. and family member was author of the post written for the demise. TABLE 3. TYPE OF PICTURE USED OF THE DECEASED Further analysis could not be done, as gathering more information about the relationship is not possibly using facebook interface. Group 12.82% Similar, information over any international online obituary website More than one 10.26% could be found easily. The times lapse between the length of Quote / Poem 5.13% death and creation of the memorial is less 72 hours of the death of Single 69.23% the demise and 74.49 % of the post are uploaded within this time No Picture 2.56% frame. Posting is done immediately before and after the set mourning ceremonies. 20.51 % of the positing is done as memorial Grand Total 100.00% at specific time of the year, including birthday, death anniversaries Source: Primary Data and other festivals. The comment to any post about the demise Analysis 4: Online interaction on the walls are more fore nature or deceased was replied within minutes. death and the number of commons received for nature death are Analysis 3: 69.23% of the post had single picture more than other such as , and liver disease, photograph of the deceased while sharing mourning messages which can be caused by alcohol abuse. Only the close relative on the facebook. Some of them post group photo along with the and friends comment if the age of the decreased is very less. deceased. Only 2.56% of the times quote or poems are used or Based on the comment given by the family of demise reflect that even nothing is use than the name. Some of the pictures for were SNS helps family to accept the reality of the loss, Work through decorated using flower and rest in peace messages. To measure the pain and Readjust to the environment. In case if the age of interaction, the researcher counted comments, posts, and photo the decreased is more than 70% people are more free to comment tags. This included close friends of the deceased, less close and like and share their feeling. Lots of the comments included “acquaintances” and “strangers” whom the deceased had no expressions of frustration or vulnerability, a lot of them made connection on SNS. Far friend’s communication only over the endeavors to keep the memory of the deceased alive.

TABLE 4. THEME AND NATURE OF THE POST VS NUMBER OF LIKES AND COMMENT ON FACEBOOK Theme of the post Nature of posting Birthday Memorial Occasion Remembrances Like Comments Like Comments Like Comments Like Comments Post on the demise page ­ ­ ­ ­ 18 19 ­ ­ Shared by someone ­ ­ 1473 722 319 54 177 10 Tag the person 61 ­ 224 274 ­ ­ 247 15 Grand Total 61 ­ 1697 996 337 73 424 35 Source: Primary Data

24th June 2017 , ISBN No. 819070985-2 67 67 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

V. CONCLUSION After observing and investigating the 39 post in detailed, the researcher concludes noteworthy changes have been taking Even a topic such as death and mourning requires user place regarding people’s beliefs and the mourning process. There experience and interaction, this research gives is the first of its is a lot of movement in the Deathcare Industry, Indian startups kind insight on Indian behavior of mourning on SNS and should start creating ventures in t the obituary space and need ‘Thanatosensitivity. Modifying or refining this experience in view to have customizing options accordingly to the their religious of SNS at the time grief is a tough, but important challenge for beliefs. designers. SNS have being designed for sharing of positive new, fun and pictures of cats. The user experience and user interface VI. FUTURE SCOPE on facebook has not been designed to share news about someonce death. Everyone uses SNS is different way and the There is lot of work to be done in the area of user reaction or sharing or hearing of someone loss has to be properly understanding about the topic of death in India. Improving user monitored by the person who is has shared the news or grief. interaction and user experience design on SNS and developing Although a commenting on the post can make loved feel at peace. websites cratering to online obituary and user centric research for improving HCI. Validating and comparing the efficacy of Technology will unquestionably change the way we grieve, different online grief support options and business models is a giving us access to an instant support system for the family. For next important step for the Human Computer Interaction. those who are unable to attend a or memorial service in Research on digital legacy and study the impact of online content person can now share their sympathies online. A memorial including legal, Indian IT act, copyright and intellectual property message on SNS is a useful tool to connect with relatives, friends laws. and also those are not known to family members. Instead of worrying the family and closed relatives over phone or instant References messenger; SNS prove to be a better option for communicating Hine, C. (2000). Virtual Ethnography. UK: SAGE Publications Ltd. about the news the decreased. Its seems there is increasing trend Kozinets, R. V. (2002). The Field behind the Screen: Using Netnography for Marketing Research in Online Communities. Journal of Marketing for using Facebook for spreading message about once demise of Research, 39(1), 61­72. loved once. Closed relatives also share details about memorial HOWARD, P. N. (2002, Dec 1). Network Ethnography and the Hypermedia service (also, called as chautha in Hinduism). Giving information Organization: New Media, New Organizations, New Methods. SAGE about death also helps the loved ones to spend more time with Journals, 4(4), 550–574. the decreased for the last time. Emotions and behaviors are normal Puri, A. (2007, January). The web of insights: The art and practice of grief responses within the person’s own culture a lot of use local webnography. International Journal of Market Research, 387­408. language for sharing their thoughts an open conversation online Androutsopoulos, J. (2008). Potentials and limitations of discourse­centred online ethnography. Language@Internet, 5, Article 9. can also help to reduce death anxiety of the people who comment Massimi, M., & Charise, A. (2009). Dying, Death, and Mortality: Towards and are alive. The researcher found that people tend to get into Thanatosensitivity in HCI. CHI 2009. ‘R.I.P Olympics’ or ‘R.I.P Herd Behavior’, especially in case of Landry, K., & Carroll, B. (2010). Logging On and Letting Out: Using celebrities. People also tend to share data on how difficult is it for Online Social Networks to Grieve and to Mourn. Bulletin of Science any individual about the loss. SNS should be used to tell positive Technology & Society , 341­349. stories about decreased rather than just repetitive comments. Carroll, E., & Ramano, J. (2011). Your Digital : When Facebook, Flickr and Twitter Are Your Estate, What’s Your Legacy? Berkeley, CA, Accordingly to researcher, average Indian lack skills on US: New Riders Publishing Thousand Oaks. grief writing. The mourning websites or Facebook pung­ins can Marwick, A., & Ellison, B. N. (2012, July). “There Isn’t Wifi in Heaven!” help to improve experience on SNS. Online mourning those you Negotiating Visibility on Facebook Memorial Pages. Journal of Broadcasting never met has become common practice, and such messages of and Electronic Media, 56(3), 378­400. condolence and support are often (but not always, see below) Facebook after death: an evolving policy in a social network. (2014). International Journal of Law & Information Technology, 22(2), 107­ appreciated by the intimately bereaved. SNS provide comfort to 140. both the grieving and their well­wishers can express their feelings. Giaxoglou , K. (2014). “R.I.P. man…u are missed and loved by many”: The mourning may connect with others, previously unknown; entextualising moments of mourning on a Facebook Rest In Peace group who have suffered a similar loss Grief has become more public. site. Thanatos, 10. SNS being public medium and low on cyber security, is Haverinen, A. (2014). Death and Mourning Rituals in Online. J@RGONIA, 24, 35­41. open to ‘RIP Trolls’. Due to unregulated environment SNS lacks Brubaker, R. J., & Burch, V. C. (2016). Legacy Contact: Designing and moderation for auto tagging and other control over ‘digital ’. Implementing Post­mortem Stewardship at Facebook. ACM CHI 2016. The researcher also sees missed opportunities where people could yourstory.com. (2016, March 22). Retrieved from https://yourstory.com/ elevate the essential human experience of a memorial to a more 2016/03/shradhanjali/ significant process which cannot be only be using SNS but Statista. (2017). Retrieved from www.statista.com: https:// technology entrepreneurs in India should focus on creating online www.statista.com/statistics/346167/facebook­global­dau/ mourning website exclusively for Indian.

24th June 2017 , ISBN No. 819070985-2 68 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Thermodynamic analysis of a novel design of conventional compound parabolic concentrator system integrated with an organic Rankine cycle

Deepak Tiwaria, Ahmad Faizan sherwania Deepali Atheayab Department of Mechanical engineering, Department of Mechanical engineering Jamia Millia Islammia, Jamia Nagar, Bennett University, Tech Zone – II, New Delhi, Delhi 110025, India Greater Noida ­ 201310, UP, India Akhilesh Arorac cDelhi Technological University, Shahbad Daulatpur, Main Bawana Road, Delhi, 110042,

Abstract—In this paper a novel design of conventional compound fluid. Aghahosseini and Dincer [12] performed exhaustive parabolic concentrator system coupled with an organic rankine thermodynamic analysis of low­temperature organic Rankine cycle has been proposed. The exergetic efficiency and exergy cycle for pure and predefined working fluids and reported that destruction have been calculated to evaluate the system R123, R245fa, R600a, R134a, R407C, andR404a are best working performance by using zeotropic mixture of cyclopentane/R1234yf. fluids. It is mandatory to exploit the new energy sources which The results indicated that the zeotropic mixture exhibited better exergetic efiiciency and lower exergy destruction than pure fluid. are not only energy efficient but also environment­friendly. Further, the internal heat exchanger was also incorporated in the Therefore a conventional compound parabolic concentrator system. It was observed that first law efficiency improved and system system integrated with an organic rankine cycle has been exergy destruction reduced. The proposed system can be utilized proposed. for the power generation purposes and be the best answer for solving the energy crisis all across the globe. II. DESCRIPTION OF SYSTEM Keywords—organic rankine cycle (ORC), zeotropic mixture, exergy The schematic diagram of a recuperated solar operated organic Rankine cycle of low­grade heat source using a pure I. INTRODUCTION (HEADING 1) zeotropic mixture of cyclopentane/R1234ze is shown in Fig .1. Due to growing energy demands, the fuel sources are depleting very fast and may exhaust completely till (2042)[1].Due to overuse of fossils fuel, the environmental issues arise such as an increasing global warming, ozone layer depletion, and disturbance in climate change are encountered. The power from low­grade heat sources ( temperature < 300°C) [2] cannot develop by conventional vapor power cycle [3].The organic Rankine cycle (ORC) introduced in 1966 is used to generate the power from low­grade heat source [4].The Organic Rankine cycle works on the same principle and it has a similar structure to conventional vapor power cycle but instead of water, organic fluid is used as working fluid [5]. The organic working fluid has lower evaporation temperature than water [5]. There are various energy sources are available for low grade: solar energy [6], geothermal [7], biomass [8], the wind [9]. Wang et al. [10] proposed a prototype model of an organic Rankine cycle using R­245fa as Fig1 Illustration of ORC with internal heat exchanger (IHE) working fluid and reported that overall power generation is 4.2% using evacuated solar collector and for flat plate, a collector is 3.2 The solar collector is conventional compound parabolic %. Wang et al. [11] performed thermodynamic analysis of low­ concentrator system. The metal absorber plate is covered at the grade solar driven organic Rankine cycle using pure fluid R245fa top with glass. The solar radiation falls on the aperture area of and mixture of R245fa / R152a (0.9/0.1, 0.7/0.3) and reported that the system from where it falls to the reflector and comes to the the overall efficiency of the zeotropic mixture is better than pure absorber. The transfer of thermal energy takes place from absorber

24th June 2017 , ISBN No. 819070985-2 69 69 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi plate to fluid which flows beneath. The system consists of an The expression for computation of the Pump work is as follows expander (turbine), the evaporator (collector), a condenser and a Wp = h2­h1 (4) pump. The expression of the enthalpy at the outlet of the pump is as The isentropic compressed working fluid (state1­2) leaving follows pump enters into the evaporator. The working fluid is sensibly h = (h ­h )/ç +h (5) heated and vaporized at constant pressure and get converted 2 2s 1 p 1 The expression for amount of heat supplied in evaporator without into saturated vapor (state5).The saturated vapor enters into the IHE is as follows expander where work is obtained through isentropic enthalpy Q = h –h (6) drop (state 5­6).The low pressure and temperature of the working S (­IHE) 5 2 fluid enters into the condenser (state 6­1) where heat is rejected The expression to calculate heat supplied in evaporator with at constant pressure in order to get saturated liquid and the cycle IHE is completed. QS (+IHE) = h5 –h2a (7) The internal heat exchanger (IHE) which is installed between The expression for amount of heat rejected in condenser without the outlet of the expander and pump (Fig. 2).The internal heat IHE exchanger transfers the available exhaust heat (6­2a) to the Q cond (­IHE) = h6 –h1 (8) working entering into the evaporator. The expression for heat rejected in condenser with IHE is as follows

Q cond (+IHE) = h6a –h1 (9) The computation of the first law efficiency of system without IHE is done by following expression

çI (­IHE) = (Wexp –WP)/ Q(s) (10) The first law efficiency expression with IHE is as follows

çI (+IHE) = (Wt –WP)/ Q(+IHE) (11) Exergy analysis The expression for specific exergy flow rate for stream at steady state by following [12, 14] is as follows

 = (hi –T S – ( h ­ TT S ) (12) E i o i) o o o Fig. 2 T-s diagram of ORC with internal heat exchanger using here ‘i’ refers to state and ‘o’ refers to ambient state zeotropic mixtures The expression for exergy destruction in expander is as follows

 III. THERMODYNAMIC ANALYSIS Exergydestruction exp = TTo (s6­s5) (13) The thermodynamic modeling has been carried out on the The expression for exergy destruction in condenser without IHE basis of conservation of mass, energy and exergy. A computer code has been developed in MATLAB15a integrated with  Exergydestruction = TT [(s ­s ) ­ (h ­h ) /T ] (14) Refprop [13]. The properties of the working fluids have been )IHE(con o 1 6 1 6 o drawn by REFPROP 9.0. Exergy destruction in condenser with internal heat exchanger Energy analysis (IHE)

The expression of governing equation for energy balance  considering steady state open system as: [14] Exergydestruction (con  )IHE = TTo[(s1­s6a) ­ (h1­h6a) /To] (15)     The expression to compute exergy destruction in evaporator Q  W   m exit h exit   minlet h inlet (1) exit inlet without IHE The expression for the expander work is given as follows:  Exergydestruction evaporator( )IHE =To[(s5­s2)­(h5­h2)/Tin] (16) Wexp= (h5­h6) (2) The expression for enthalpy at the outlet of the expander is given The expression to compute exergy destruction in evaporator as follows with IHE

h6 = h5­ çexp (h5­ h6s) (3)

=To[(s5­s2a)­(h5­h2a)/Tin] (17)

24th June 2017 , ISBN No. 819070985-2 70 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The expression to calculate exergy destruction in pump is as follows

= To (s2­s1) (18) The total exergy destruction without IHE can be calculated as follows: =+ ++ (19) Exergy destruction in total with IHE =+ ++ (19) The expression for exergetic efficiency without IHE

çex(­IHE) = 1­ Itotal/Ein( ­IHE) (20)

IV. RESULTS AND DISCUSSION The Fig. 3 illustrates the hourly effect of total solar radiation, beam radiation and ambient temperature for the month of May Fig. 4.Temperature glide in evaporator and condenser for New Delhi. The above design parameters have been taken from IMD Pune, India.

Fig.5.Exergetic efficiency vs expander inlet temperature Fig. 3. Hourly effect of total solar radiation (It), beam radiation Fig. 5. shows the effect of expander inlet temperature on exergetic (Ib) and ambient temperature (To) efficiency. It can be observed from the Fig. 5 that the exergetic Fig. 4. shows the mass fraction effect of cyclopentane/ efficiency increases with increasing expander inlet temperature R1234yf on temperature glide during condensation and reaches maximum and then decreases. evaporation processes. It can be seen is from Fig. 4 that as the mass increase the temperature glide increases and reaches to maximum and then decreases. The maximum temperature glide is 43.8 K, 39.01K occur at 0.33/0.67 in condensation and evaporation process respectively. The temperature glide of the zeotropic mixture depends upon the difference of boiling point of mixing constituents. Larger the difference in boiling more will be temperature glide.

Fig. 6 Effect of expander inlet temperature on exergy destruction

24th June 2017 , ISBN No. 819070985-2 71 71 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

This is due to the reason that with increasing expander V. CONCLUSION inlet temperature the enthalpy drop across the expander increases, Based on the above study the detailed exergetic analysis therefore, the exergetic efficiency increases. Fig. 6 shows that of basic, and modified low­grade heat source powered organic the effect of expander inlet temperature on exergy destruction. It Rankine cycle using zeotropic mixture have been presented in can be noted from the Fig. 6 that it follows reverse trend for the the research paper. The following conclusions have been drawn variation of expander inlet temperature on exergetic efficiency as from the study. expected. • The temperature glide during phase change (evaporation and condensation) is developed due to the difference between boiling the point of mixture constituents. Larger the difference in boiling point temperature more will be the temperature glide • The increase in expander inlet temperature exergetic efficiency increases and exergy destruction decreases. • The internal heat exchanger further improves the exergetic efficiency and reduces exergy destruction. • Zeotropic mixture exhibits larger exergetic efficiency and lower exergy destruction than pure fluid. Fig. 7 Effect of expander inlet temperature on exergetic A. Abbreviations efficiency with IHE IHE internal heat exchanger ORC organic rankine cycle B. Nomenclature GWP global warming potential

Ein amount of exergy input (W) h specific enthalpy (kJ/kg) Q heat transfer (W) s specific entropy (kJ/kg K) T temperature (°C) W work transfer (W) Fig. 8 Effect of expander inlet temperature on exergy destruction Subscript with IHE h heat source Figs. 7, 8 represents the effect of internal heat exchanger in Input mass fraction on exergetic efficiency and exergetic destruction o Ambient state respectively. It can be observed that with incorporating internal p Pump heat exchanger , the exergetic efficiency increases and exergy destruction decreases. This may be due to the reason that with s Supply internal heat exchanger the working fluid is supplied to the xp Expander evaporator at a higher temperature than the working fluid supplied con Condenser to evaporator without an internal heat exchanger. Due to increment in evaporation temperature, the thermal mismatch between the References heat source and working is getting reduced. Therefore the internal 1. S, Shafiee, E. Topal, “When will fuel reserve be diminished?, heat exchanger improves the energetic efficiency and reduces “ Energy Policy 2009 : 181­189. exergy destruction. 2. S. Lecompte, B. Ameel, D. Ziviani, M.V.D. Borek and M.D Pepe, “Exergy analysis of mixtures as working fluids in Organic Rankine cycles, “ Energy Conversion Management 2014 ; 85:727­739. 3. B. Peris ,J. Navarro­Esbri, F. Moles, M. Gonzale­Piquer, A Mota­ Babiloni. Experimental characterization of an Organic Rankine Cycle(ORC) for power and combined Heat and power(CHP) application from low grade heat sources Energy 82 2015: 269­276. 4. S.K Ray, G. Moss, “Fluor chemicals as working fluids for small Rankine power units,” Advanced Energy conversion 6: 1966: 89­ 102.

24th June 2017 , ISBN No. 819070985-2 72 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

5. N. Yamada, M.N.A. Mohamad, and T.T. Kien, “Study on thermal 10. X.D. Wang, L. Zhao, J.L. Wang, W.Z. Zhang, X.Z. Zhao, and W. efficiency of low –to medium­temperature organic Rankine cycles Wu, “Performance evaluation of a low­temperature solar Rankine using HFO­1234yf, “ Renewable Energy 2012; 41:308­375. cycle system utilizing R245fa, “ Solar Energy 2010; 84:353­364. 6. B. F. Tchache, G. Papdakis, G. Lambrinos, and A. Frangoudakis, “ 11. J.L. Wang, L. Zaho, and X.D., Wang, “A comparative study of pure Fluid selection for low temperature solar organic Rankine cycle, and zeotropic mixtures in low­temperature solar Organic Rankine “Applied Thermal Engineering 2009; 29:2468­ 2476. cycle, “Applied Energy 2010; 87:3366­3373. 7. H.C. Jung, S. Krumdieck, “Analysis of zeotropic mixtures in 12. S. Aghahosseini, and I. Dincer., “Comparative performances analysis Geothermal organic Rankine cycle power Plant with an air­coole of low temperature Organic Rankine Cycle (ORC) using pure and condenser,” 35th New Zealand Geothermal Workshop: 2013 zeotropic working fluids, “Applied Thermal Engineering 2013; Proceedings 17 – 20 November 2013 Rotorua, New Zealand. 54:35­42. 8. C. Koroneos, T. Spachos, N. Moussipoulos, “Exergy analysis of 13. M. Sadeghi, A. Nemati, A. Ghavimi, M. Yari, “Thermodynamic renewable energy sources,” Renewable Energy 2003;28(2):295­310. analysis and multi­objective optimization of various ORC 9. A. Demribas, “Potential applications of renewable energy sources, configurations using zeotropic mixtures, “ Energy 2016; 109: 791­802. biomass combustion problems in boiler power system and combustion 14. G. Shu, Y. Gao, H. Tian H, H, Wei, X. Liang. Study of mixtures based related environment issues,” Prog Energy Combust Sci on hydrocarbons used in ORC(Organic Rankine cycle) for engine 2005;31(2):171­92. waste heat recovery. Energy 2014 ; 74:428­428.

24th June 2017 , ISBN No. 819070985-2 73 73 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi A Study and analysis of circularly polarized wearable textile antenna Ashok Yadav Ashutosh Agarwal Saurabh Singh A.N.Mishra Department of ECE Department of ECE Department of ECE Department of ECE Krishna Engineering College Krishna Engineering College Krishna Engineering College Krishna Engineering College Ghaziabad, India Ghaziabad, India Ghaziabad, India Ghaziabad, India [email protected] [email protected] [email protected] [email protected]

Abstract— In this paper, a compact and flexible design and analysis Material’s several properties influence the working of the of ultra wideband (UWB) textile patch antenna with partial ground antenna.[8­9]. In addition, the current manuscript materials used structure is proposed. It represents the circularly polarized can guarantee washing of the wearable device if the conductive antenna in the frequency range of 8.35 Ghz. To 8.55 Ghz. This part is made up from conductive thread available in market and design has the ability to work between 3.5 GHz and 8.25 GHz, accordingly reuse of it. The measured results of the present with return loss is maximum -25dB. The antenna covers S band and at X band it covers up to 8.25 GHz. The antenna is faithfully antenna designs are compared with simulations, and good applicable for the satellite bands. Here almost the whole UWB is agreement is observed.[3] covered except ISM band, Wi-Fi for 2.4 and above 8.25 GHz, and some more applications. The proposed design consists flexible, II. DESIGN OF PROPOSED STRUCTURE compact sized microstrip line fed patch antenna having dimension The geometry of an antenna made for body wearable 2 2 of 40x40 mm with partial ground of 20x40mm . applications as shown in Fig. 1, it consists of a substrate, ground Keywords— Textile antenna, UWB, Axial Ratio,Partial ground and plane and a patch. The value of dielectric constant of fabric HFSS substrate materials is 1.7. The design of patch microstrip radiator involves the calculation of the dimension of its patch. The patch I. INTRODUCTION radius (a ) has a minute effect on the resonating frequency (fr) In today’s word textile material will play a very important and it can be calculated by the following formulae role to implement Compact electronic devices have become integral need of everyday human need. Latest mobile phones are ………… (1) quite often used throughout the day and they allow not only where a= Radius of the circular patch antenna in millimeter provide telephonic call but also provide internet availability, personal digital assistant and GPS. In near future, a person is fr= Resonance frequency in GHz likely to use a range of devices and sensing devices, which include ฀r=Relative permittivity of the textile substrate material medical sensors ,with which we continuously communicate with However, in order to implement the design presented in each other, it is highly essential to provide this functionality as this manuscript, a partial ground plane is implemented. Such types freely as possible. An pivotal technology to accomplish this of truncated ground plane play an important role in the broadband target is a wearable antennas and electronics. Due to its global and wideband characteristics of the designed antennas. In availability, the 3.1­10.6 GHz ISM band is being used for the particular, this process can be related to the fact that ground manufacturing of wearable textile antennas.[1] For the plane truncation acts as an impedance matching element that convenience of the user, wearable antennas need to be hidden controls the impedance bandwidth of the circular patch. Thus, it and of low probe. This requires a possible integration of these creates a capacitive load that neutralizes the inductive nature of antenna elements within everyday clothing. Patch Microstrip the patch to produce nearly pure resistive input impedance. The antenna is an excellent candidate for wearable application, as it details of antenna geometry is given as can be made conformal for integration into our clothing. TABLE I : GEOMETRY OF ANTENNA A wearable antenna can be used as clothing used for communication purposes, which includes tracking and Substrate thickness 1mm navigation, mobile computing, public safety, and wireless Dielectric constant 1.7 communication. Using Wireless Body Sensor Networks for Length of square 40mm healthcare applications, the design of wearable antennas offers Width of square 40mm the possibility of ubiquitous monitoring, communication and Loss tangent 0.025 energy harvesting and storage. Basic requirements for wearable Partial ground 20mmX40mm antennas are a planar structure and flexible construction materials.

24th June 2017 , ISBN No. 819070985-2 74 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Fig. 4. Proposed Textile antenna geometry with Partial ground (Back View) In Figure 3 and 4 photograph of hardware of proposed antenna with SMA connector soldered carefully on conductive patch. Jeans substrate is taken as substrate as it is formed of 99% Fig. 1. Proposed Textile antenna geometry (Front View) cotton and easily available and the cheapest clothing material available on the market. Conductive fabric is a copper fabric purchased from the market. It is a cloth of conductive threads which makes it robust for use it wherever necessary. [2].

III. ANALYSIS OF PROPOSED STRUCTURE In this proposed work, HFSS i.e. Integral Equation in 3­ Dimension is used as to simulation tool for the designing of the textile patch with partial ground structure for UWB applications. This tool is more suitable for the designing of the planer antennas. Thus we take HFSS as a designing tool for the respective partial ground Microstrip patch antenna. The method used to design the antenna is by using simulation soft­ware. The antenna is first simulated in the software, optimized and the final result is fabricated on the textile material. There are various antenna design software available to make the antenna design method based on numerical methods. Some of the commonly used methods are Fig. 2. Proposed Textile antenna geometry with Partial ground Method of Moment (MoM), Finite Element Method (FEM) and (Back View) Finite Difference Time Domain (FDTD). For large antenna structure MoM method can be used to calculate the performance of antenna quickly.[3­4]

Fig. 3. Proposed Textile antenna geometry (Front View) Fig. 5. Return Loss Vs Frequency Plot This planar UWB monopole antenna is designed with the criteria of an impedance bandwidth from 3.35 to 8.25GHz, with a

24th June 2017 , ISBN No. 819070985-2 75 75 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi return loss below 10 dB. It is easy to design a UWB monopole antenna when considering only the impedance band­width. To achieve the same radiation pattern, bandwidth is difficult, due to the significant changes in the antenna pattern at higher frequencies. Plot of S(11) vs Frequency is shown in fig5. Figure 6 represents the radiation pattern of the antenna, which shows that maximum gain of an antenna is 7dBi. Figure 7 describes the 3 D radiation pattern of the antenna, the red color shows that the direction of maximum radiation. Fig. 7. 3-D Radiation Pattern Plot of Proposed antenna

Fig. 8. Tested S11 versus Frequency Graph Fig. 6. Radiation Pattern Plot The above figure 8 presents the testing result of antenna on VNA. The graph shows that testing result is matched with the simulation result. The following table describes the return loss at different frequencies under simulation and testing process of antenna.

TABLE II RETURN LOSS AT DIFFERENT FREQUENCIES FOR SIMULATED AND TESTED RESULTS Frequency 3.76GHz 6.26 GHz 8.51 GHz 11.3 GHz 12.8 GHz R.L.(Testing) ­31.82dB ­23.81 dB ­48.35 dB ­25.49 dB ­10.62 dB R.L(Simulation) ­18.46 dB ­10.18 dB ­16.52 dB ­15.49 dB ­17.43 dB

has the ability to work between 3.35 GHz to 8.25 GHz, with return loss is maximized ­25dB. Antenna covers S band and, at X band it covers up to 8.25 GHz. The plot between axial ratio and frequencies represents at the value of =­1700 Axial ratio value is less than 3dB.The AR value is less than 3dB from frequency 8.35 GHz to 8.55 GHz, this means the antenna is applicable for the circular polarization.

V. CONCLUSION Fig. 9. Axial ratio vs frequency plot A novel partial ground and circular shape and stripline feed, textile microstrip patch antenna are designed, analyzed, and IV. RESULTS AND DISCUSSION fabricated on textile material (jeans) and conducting copper tape Simulation of the proposed antenna structure is performed is used for making the circular patch. The resulting structure is using ANSOFT HFSS. Figure 3 and 4 shows the proposed compact in size and shows significant bandwidth enhancement. fabricated antenna with a front and back view. From the simulation Simulations are done using HFSS and the results are verified results it is seen that the circular patch antenna without any slot through measurements. The antenna is faithfully applicable for the satellite bands. 24th June 2017 , ISBN No. 819070985-2 76 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

REFERENCES 6. Yuehui Ouyang, Chappell WJ, High Frequency Properties of Electro­ Textiles for Wearable Antenna Applications, IEEE T Antenn Propag. 1. T.F. Kennedy, P.W. Fink, A.W. Chu, N.J. Champagne, G.Y. Lin, and Feb. 2008; 56(2): 381389p. M.A. Khayat , Body­worn e­ textile antenna: The good, the low­ mass, and the conformal, IEEE Transaction on antennas and 7. R. Garg, P. Bhartia, I. Bahl, and A. Ittipiboon, Microstrip Antenna propagation, vol. 57, no. 4, April 2009. Design Handbook, Artech House, Dedham, MA, 2002. 2. Nikhil Singh, Singh AK, Vinod Kumar Singh, Design and Performance 8. S. Sankaralingam et al Determination of Dielectric Constant of of Wearable Ultra Wide Band Textile Antenna for Medical Fabric Materials and their use as substrates for design and development Application, Microw Opt Techn Let. July 2015; 57(7): 15531557p. of antennas for wearable applications ieee transactions on instrumentation and measurement, vol. 59, no. 12, december 2010. 3. Mai AR, Osman MK, Rahim A, et al. Design, Implementation and Performance of Ultra­wideband Textile Antenna. Prog Electromag 9. S. Sankaralingam and B. Gupta Development of Textile Antennas Res. B, 2011; 27: 307325p. for Body wearable applications and investigations on their performance under bent conditions Progress In Electromagnetics 4. Rita Salvado, Caroline Loss, Ricardo Gonalves, et al. Textile Research B, Vol. 22, 5371, 2010. Materials for the Design of Wearable Antennas: A Survey, Sensors. 2012; 12(11): 1584115857p, ISSN 1424­8220. 10. Esther Florence ,Sundarsingh, Sangeetha Polygon­Shaped Slotted Dual­Band Antenna for Wearable Applications IEEE ANTENNAS 5. Balanis CA, Antenna Theory: Analysis and Design, Wiley, New AND WIRELESS PROPAGATION LETTERS, VOL. 13, 2014. York, 2004.

24th June 2017 , ISBN No. 819070985-2 77 77 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi A Proposed Novel Designing of Data Centric Security in FPGA Based Data Centers

J. Joshuadanielraj P . Karthik Assistant Professor Professor , NHCE, Bangalore KSSEM, Bangalore [email protected] [email protected]

Abstract: One of the most important concerns about the big data 2. Related Work applications is privacy, because users share more personal data and Young­kyu Choi [10] and his team have conducted content through their social networking sites and clouds. The security quantitative analysis and in depth performance on modern FPGA­ and privacy risks and developing efficient and effective frame works are critical for its success; hence a secure framework such as data CPU architectures and they found that that a QPI­based platform centric security is the hot research areas. The Attribute based encryption has greater advantage on fine­grained (< 4KB) communication would be a convenient mechanism to implement data centric security. As latency. Jagath Weerasinghe and Andreas Herkersdorf [11] the Big data applications require more server computational power, in proposed to decouple the FPGA from the CPU and to connect this paper we propose a novel approach to use FPGA based data centers FPGA directly to the Data Center networks. By connecting the for implementing both data acceleration which would increase the server FPGA as standalone component enables large scale deployment computational ability and security mechanisms to achieve data centric of FPGA in cloud computing. A. Putnam [2] and his team at security. Microsoft have designed a medium scale deployed FPGA based Keywords: FPGA, Attribute based encryption, data center, OpenCL, data centers which improved the throughput by twice of Bing data acceleration. search engine. 1. Introduction 3. Field Programmable Gate Array A field programmable gate array is a contemporary Big data is referred to the large set of data that is generated integrated circuit designed to be used by any type of customers by connected devices and social network sites, which cannot be for their applications. The details about the configuration of FPGA handled by a traditional database management system. Big Data are specified using Hardware Description Languages. This analytics is the process of analyzing large data sets to dig out sophisticated integrated circuit consists of huge set of resources hidden patterns, unknown correlation, market trends, customer and memory block to implement complex computational preferences and other useful business information. The result of algorithms and it can be used to solve any problem which involves analytics can be used for more effective marketing, new revenue computation. Having confronted with the big data characteristics, opportunities, better customer service, improved operational there is an interest to use FPGA for the real time application. The efficiency and other business benefits. A data center is a place data centers are now accelerating their data analytics and used to keep computer systems and related components such as computation using FPGA based implementations that could meet communications and storage systems. A data analyst who the requirements of the big data era. The most widely used FPGA analyses the big data will take large set of data from data center for big data applications is Altera Stratix V and Xilinx Kintex for analyzing. There are, three data analysis related challenges: Ultrascale+. The Stratix V FPGA consists of Altera’s 28 nm. Stratix® movement, processing and interacting. The solution to overcome V FPGAs deliver the industry’s highest bandwidth, highest level these challenges is hardware data acceleration [7]. of system integration, and ultimate flexibility with reduced cost With data acceleration organizations can move data from and the lowest total power for high­end applications. Kintex® its source to the place of work without losing any of it quickly to UltraScale+™ devices provide the best price/performance/watt extract insights from data and deliver it for processing and storage. balance in a Fin­FET node, delivering the most cost­effective Data acceleration supports fast processing of data by using solution for high­end capabilities including transceiver and appropriate hardware equipments. Interactivity is about usability memory interface line rates, as well as 100G connectivity cores. of data infrastructure. Data acceleration allows users to connect Our newest mid­range family is ideal for both packet processing to datacenters in universally acceptable manner such that results and DSP­intensive functions, and is well suited for applications are provided quickly. The FPGA based data acceleration is the ranging from wireless MIMO technology to Nx100G networking solution to data analysis performance challenges. and data center. FPGA accelerated systems has three major benefits: 3.1. Programming with FPGAs performance, ease­of­use, and lower total cost of ownership. In Traditionally, hardware developers have designed and this paper we presented a proposed implementation of data centric verified digital circuits on FPGAs at the register­transfer level security in FPGA based data centers. (RTL) using hardware description languages (HDLs) such as

24th June 2017 , ISBN No. 819070985-2 78 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Verilog HDL and VHDL. While these traditional methods are server that was released publically as the Open CloudServer V1. effective to ensure efficient use of the devices, they are It’s comprised of 1,632 servers, each one with an Intel Xeon impractical for implementing complex algorithms such as gene processor and a daughter card that contains the Altera FPGA sequencing. In early 2012, Altera introduced the Altera SDK for chip, linked to the Catapault network. The system takes search OpenCL, a software development kit that allows use of the OpenCL queries coming from Bing and offloads a lot of the work to the programming language to program Altera’s [1] FPGA as FPGAs, which are custom­programmed for the heavy computing accelerator devices. In late 2014 Xilinx Corporation, computational work needed to figure out which webpages results another leading FPGA vendor, announced they were also should be displayed in which order. Figure 1 shows the position developing a compiler for OpenCL. Altera’s SDK for OpenCL has of the board in one of the datacenter servers. been utilized for a wide array of algorithms in a variety of computing The system consists of 432 two­socket Intel Xeon­based fields such as deep learning , CNN algorithms, computer vision nodes, each with 64 GB of memory and an Altera Stratix V D5 algorithm. Etc.. FPGA with 8 GB of local DDR3 memory. FPGAs communicate to 4. FPGA based Datacenters their host CPUs via a PCIe Gen3 x8 connection, providing 8GB/s FPGA gives flexible acceleration for many operations. The guaranteed­not­to­exceed and width\ and each FPGA can read CPU­FPGA heterogeneous acceleration has great potential for and write data stored on its host node using this connection. the performance and efficiency improvement for data centers. 4.2. FAbRIC The FPGA based datacenters are network connected stand alone The Coherent Accelerator Processor Interface is an resource with compute, memory and networking capabilities innovative solution for data acceleration by IBM. It provides coupled with CPU. high performance solution for the cloud computation algorithms 4.1. Microsoft Catapult on an FPGA. This can replace application programs running on a dedicated core. CAPI removes overhead and complexity of the input output system, allows an accelerator to operate as part of an application. This requires less programming effort and can be used for wide range of applications [8].

Catapult is a research project conducted by Microsoft to use FPGAs as data center accelerators to improve performance, reduce power consumption, and provide new capabilities in the datacenter. For this project Microsoft has used Altera Stratix V FPGAs. Using FPGAs, Microsoft has built a kind of super­search machine network. Figure 1: A diagram of the server that hosts the FPGA board. The system consists of 432 two­socket Intel Xeon­based nodes, each with 64 GB of memory and an Altera Stratix V D5 Figure 2: CAPI hardware system FPGA with 8 GB of local DDR3 memory. FPGAs communicate to While clouds with FPGAs are available in companies like their host CPUs via a PCIe Gen3 x8 connection, providing 8GB/s IBM, there are, however, few FPGA clouds available for public, guaranteed­not­to­exceed bandwidth, and each FPGA can read especially academic, use. To target this problem, we created and write data stored on its host node using this connection [2]. FAbRIC (FPGA Research Infrastructure Cloud) a project led by Microsoft has used small daughter boards in each server Derek Chiou at The University of Texas at Austin. It enables with a single high end FPGA, and connected the card directly FPGA research and development on large­scale systems by with a secondary network in such a way that would provide low providing FPGA systems, tools, and servers to run tools in a latency, high bandwidth and if an application requires more than cloud environment. The FAbRIC POWER8+CAPI system one FPGA can be mapped across FPGAs located at multiple consists of a bunch of x86 servers and nine POWER8 servers. servers.Microsoft uses PCI to interface board to the CPU, local The x86 nodes are used as the gateway node, the file server and DRAM of 8GB. build machines are used for running FPGA tools. Each POWER8 Microsoft has found that Catapult improves the ranking node is a heterogeneous compute platform. Figure 2 shows the throughput of each server by a factor of 95%. Microsoft have schematic of hardware system and it consists of three accelerating designed an FPGA board that plugs into the Microsoft­designed devices, a Nallatech 385 A7 Stratix V FPGA adapter, an Alpha­ 24th June 2017 , ISBN No. 819070985-2 79 79 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi data 7V3 Virtex7 Xilinx­based FPGA adapter and a NVIDIA Tesla 6.1 Proposed implementation of ABE K40m GPU card. FPGA boards are CAPI enabled to provide In this paper figure 5 depicts the proposed implementation coherent shared memory between the processor and accelerators. to obtain a data centric security by realizing Attribute based 5. Data Centric Security encryption in the FPGA based data centers. Data centric security is a method to secure the data itself rather than the security of networks, servers of applications. Data­ centric security is the only way to ensure the most important asset of the business—the data—is protected. Data centric protection makes the data unusable to anyone who does not have the key to decrypt it. Encryption is a well suited data­centric technique to address the risk of data theft in smart phones, laptops, desktops and even servers, including the cloud. 6. Attribute Based Encryption Figure 5: Proposed implementation of ABE in FPGA based Attribute Based Encryption (ABE) [5] is a type of public data center key encryption in which the secret key of a user and the Cipher As the data are being generated at high speed and high text are dependent upon attributes. In ABE the decryption of a volume, it is necessary to use data accelerated data center, for Cipher text is possible only if the set of user key attributes of the our work, we propose to use FPGA accelerated data centers such user key matches the attributes of the cipher text. There are two as catapult and FAbRIC to implement Attribute Based Encryption types ABE Key­Policy Attribute­Based Encryption (KP­ABE) and to obtain data – centric security. Cipher text­Policy Attribute­Based Encryption (CP­ABE). In KP­ The construction of cipher text ABE as follows, it consists ABE, cipher texts are encrypted with a set of attributes and each of four algorithms setup, encryption, Key generation and user’s secret key is mapped with an appropriate policy as shown Decryption in figure 3. Operation Approximate Time Private key gen. 35 ms per attribute Encryption 27 ms per leaf node Decryption 0.5–0.8 ms per leaf node

6.1.1. Setup algorithm It takes only the hidden parameter as an input and it outputs Figure 3: Schematic of KP-ABE the public key and a master key. The setup algorithm uses the In Cipher text­Policy Attribute­Based Encryption (CP­ABE), bilinear group and random components are input to generate the schematic is shown in figure 4. A cipher text is encrypted with public key as shown in equation 6.1 and 6.2. a policy. Anyone whose attributes matches the policy can decrypt — 6. 1 the cipher text; otherwise the decryption fails. One of the most promising approaches is Cipher text­Policy Attribute­Based Encryption (CP­ABE) [6].

MK = (â, gá) — 6.2 6.1.2. Encryption algorithm The encryption algorithm is function of PK, M (Message) and A (access structure), and it generates a Cipher text as shown in equation 6.3.

—— 6.3

Figure 4: Schematic of CP-ABE

24th June 2017 , ISBN No. 819070985-2 80 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

6.1.3. Key generation algorithm 8. Conclusion The key generation algorithm will use set of attributes and This paper is the first ever approach to propose the importance produces a key SK (secret key) as shown in equation 6.4 . of data centric security in FPGA based data centers. We have proposed that data centric security can be achieved by using Cipher text policy Attribute Based Encryption. We believe that this approach can be implemented in FPGA based data centers to protect the user data at both rest and transmit. — 6.4 References 7. Expected outcome 1. Chris Rauer and Nicholas Finamore Jr. “Accelerating Genomics In the age of big data, the data is being generated at a Research with OpenCL and FPGAs”, Altera higher volume and velocity. Hence the security mechanism should 2. A. Putnam et al., “A reconfigurable fabric for accelerating large- be able to encrypt the streaming data without missing anything. scale datacenter services,” (ISCA), Page(s):13 – 24, 2014. For this higher data acceleration and faster encryption methods 3. HEINER GIEFERS ; IBM RESEARCH - ZURICH ; RAPHAEL POLIG ; CHRISTOPH are essential. The expected timing requirement for the proposed HAGLEITNER, “ACCELERATING ARITHMETIC KERNELS WITH COHERENT ATTACJHED implementation is illustrated in Table in 1. FPGA COPROCESSORS “ DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) , PAGES 1072 – 1077, 2015 Table 1: Approximate time calculations 4. Junzuo Lai ; Robert H. Deng ; Chaowen Guan ; Jian Weng,” Attribute- Based Encryption With Verifiable Outsourced Decryption “ IEEE Operation Approximate Time Transactions on Information Forensics and Security (Volume:8 , Private key gen. 35 ms per attribute Issue: 8 ), Page(s): 1343 – 1354. Encryption 27 ms per leaf node 5, Brent Waters “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization”, Public Key Decryption 0.5–0.8 ms per leaf node Cryptography – PKC 2011 Volume 6571 of the series Lecture Notes in Computer Science pp 53­70 As the FPGA is considered for the proposed 6, T. M. Brewer, “Instruction set innovations for the convey hc-1 implementation, itis necessary that the FPGA resource computer,” IEEE micro, no. 2, pp. 70–79, 2010. consumption is necessary to be monitored. Table 2 shows the 7, “Data Acceleration: Architecture for the Modern Data Supply approximate FPGA resource consumption in percentage Chain”, Accenture. 8, J. Stuecheli et al., “CAPI: A coherent accelerator processor Table 2: Approximate estimation of FPGA area consumption interface,” IBM Journal of Research and Development, vol. 59, no. 1, pp. 7–1, 2015. Module Generation Encryption Key 9, “Top Ten Big Data Security and Privacy Challenges” https:// cloudsecurityalliance.org/.../top-ten-big-data-security-and-privacy- of Public generation challenges key 10, YOUNG-KYU CHOI ET ALL “A QUANTITATIVE ANALYSIS ON MICROARCHITECTURES Logic (%) 75 85 80 OF MODERN CPU-FPGA PLATFORMS” PROCEEDINGS OF THE 53RD ANNUAL DESIGN AUTOMATION CONFERENCE, ARTICLE NO. 109 , 2016. Memory (%) 84 78 96 11, Jagath Weerasinghe et all “Enabling FPGAs in Hyper-scale Data DSP (%) 85 69 90 Centers”, IEEE International Conference on Cloud and Big Data Computing , 2015.

24th June 2017 , ISBN No. 819070985-2 81 81 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Packaging Guidelines for Suppliers of Raw Material Received by Factories: A case Study

Vikas Vimal Dr. Mahesh Chand Department of Mechanical Engineering, YMCA University Department of Mechanical Engineering, YMCA University of Science and Technology, Faridabad, Haryana, 121006, India. of Science and Technology, Faridabad,Haryana, 121006, India [email protected] [email protected].

Abstract—From the broad scope of supply chain area, this the same part, different suppliers from different location are having work is concentrated to transport, handling, and storage different packaging method which results in difference in cost of requirements of the packaging of materials which are being the part since the packaging cost is an additional cost to the transferred from suppliers to factories and to warehouses. In this material we procure. Efficient packaging is a necessity for almost work, the need and application of various packaging methods are every type of product whether it is mined, grown, hunted, identified and implemented to the real time working of the Danfoss extracted or manufactured. It is an essential link between the India private limited for the local suppliers only. The recycling product makers and their customers. Unless the packaging and reuse of packaging is a common agenda for organizations operation is performed correctly, the reputation of the product which is taken care of only by choosing the appropriate packaging for the material to be shipped. Transport and storage are main will suffer and the goodwill of the customer will be lost. All the area where all packaging functions are required which when skill, quality and reliability built into the product during selected wisely can cause a better utilizations of resources and development and production will be wasted, unless care is taken optimization of cost. As the demand arises the cost of the material to see that it reaches the user in the correct condition. Properly is also increased. So this work is utilized to provide a balanced designed packaging is the main way of ensuring safe delivery to solution between cost and demand of packaging with seven the final user in good condition at an economical cost (Sturdivant identified requirements of packaging. The output of this work is et.al.2017). The main purposes of this paper are as follows to provide better interface for suppliers to pack the Raw material received by the factories. • To identified the requirements of packaging and Keywords—Supply chain, Packaging, Inbound material, PPAP, • selection of packaging of raw material supplier PPAP, checklist, Guidelines. II. IDENTIFICATIONS OF REQUIREMENTS OF I. INTRODUCTION PACKAGING In industries, packaging is pervasive and essential. It In this work various available literatures: national and surrounds, enhances and protects the material we procure, from international journals and proceedings of national and processing and manufacturing through handling and storage to international conferences, research organizations, and industrial the final consumer. Without packaging, materials handling would expert opinions are explored. Important Seven areas of be a messy, inefficient and costly exercise and modern consumer requirements associated with raw material packaging have been marketing would be virtually impossible(Murmu& Mishra, 2016). identified from extensive literature review and industrial expert Further the role of the packaging and importance of the packaging follows: requirements are immersed in to the procurement process of the 2.1. Transport testing requirements organization to facilitate the information sharing form design For the strength measurement of packaging against the engineer to suppliers. The historical development of packaging transport hazards, the testing of the packaging is must before has been well documented elsewhere and will only be touched shipping. ISTA series of package testing are having the practice upon here. Suffice it to say that the highly sophisticated packaging for the all king of testing for the packaging reliability measurement. industries which characterize modern society today are far Packaging has to go through the shock test, vibration test, drop removed from the simple packaging activities of earlier test and atmospheric conditioning test as described in the ISTA times(Hellström &Saghir, 2006). Packaging lies at the very heart test practices. of the modern industry, and successful packaging technologists 2.2. Additional packaging requirements must bring to their professional duties a wide­ranging background drawn from a multitude of disciplines. This work is an additional For the fitment of the material to the container of the part of Supplier production part approval process (SPPAP). In package, the dunnage and additional fitment is required. Blocking PPAP itself all the requirements related to material that has to be and void filling is a necessary requirement of the packaging communicate with supplier are made available but the packaging design. Also the corrosive resistive packaging and moisture requirements are still left to the suppliers only which result in control packaging are required if the material being packed is discrimination in packaging pattern in between the suppliers. For sensitive to the atmospheric changes.

24th June 2017 , ISBN No. 819070985-2 82 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

2.3. Standardization requirements • Analysis of pain points and rejections during receiving For the capitalization of the packaging design throughout • Suggestions for common pain points and improvement of the different suppliers of the factory, there must be standardization receiving process of the selection of the packaging material e.g. cardboard box, • Locating suppliers of parts for KP and FD. plastic bags, CFB boxes etc. The factory itself should define their • Consult suppliers for changes in their packaging patterns standard requirements related to the selection of the packaging requirements. • Develop a General guideline for packaging for suppliers 2.4. Mode of transport requirements • Check the feasibility of the solutions and their benefits For the different mode of transport e.g. air, sea, road, the • Brainstorming packaging requirements of the material being packed may varies. • Inputs from global experts While transporting commodity through air transport, special • Develop a SPPAP checklist for the better understanding precaution should be taken care of related to the protection of • Apply that checklist to the main SPPAP document of the material.Whether traveling to an airport, seaport or just Danfoss India directly hitting the road, most cargo will spend some part of its journey inside a truck. Like other modes of transport, trucks IV. DEMONSTRATION OF ADOPTED METHODOLOGY present a host of risks unique to conditions on the ground. The objective of the project was to make a document for 2.5. Handling requirement the generic guideline for the packaging of raw material received Every box should have their correct vector packaging by the factories. The document that includes this guideline was symbols according to the handling they need. Without this approved to be the corporate guideline for Danfoss India limited information, factories are not able to accept any kind of claim. organization. This guideline document is able to make suppliers The most important vector packaging is “DO NOT STACK”, if decide the packaging pattern they need to choose depending the goods are fragile, the boxes should have this symbol.The upon the requirements of the part material, part shape and part pallets must be certified and required to be treated with heat and size. be fumigated. An SPPAP checklist was prepared from the guideline 2.6 Labeling requirements document that was attached with the main PPAP document for Label must contain following information; Product number the company to facilitate the procurement process. (buyer part number), Description of product and markings, In this guideline preparation, various types of packaging Quantity / package size, Production date or shipment date, materials were explained and their uses with the appropriate Traceability data (E.g. Machine no., shift, etc.), company’s Order requirement are defined. The requirements of the packaging are Number. The labeling is the informative function of the packaging identified and these were connected to the supplier’s packaging which should fulfill the requirement of information from the pattern. Within the process of PPAP, these requirements are packaging. communicated to the suppliers for the betterment of the packaging 2.7 Environment and safety requirements and procurement process. While selection of the packaging material, environment and safety issues are to be considered. The packaging should be reusable and recyclable. For the availability of the recyclable packaging some EN standards like EN13430 and EN13429 are to be studied. The scrap of the packaging is a hazard to the environment so the packaging should be designed to mitigate these hazards and making a eco­friendly packaging.

III. METHODOLOGY This work is done in the reference of a big global organization like Danfoss industries private limited, Chennai. The procurement process of the company was studied and the objective of that work was collaborated to the real time procurement process of the company. The flow of the activities in the industry to accomplish that work is follows, • Problem identification Fig 1. Insight of SPPAP checklist (1) • Literature survey and study of packaging methods in details • Explore the packaging patterns of suppliers exporting to Danfoss 24th June 2017 , ISBN No. 819070985-2 83 83 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The characteristics of this checklist are, • This checklist enables the procurement department to give the exact same instruction as they need regarding the packaging of the Raw material they are going to procure. • This checklist includes all the combinations of different packaging methods so that a number of options are available for the procurement engineer to suggest to his supplier. • A short note of labeling requirement is given in the comments box which is helpful for communicating the supplier regarding labeling instructions. • Detailed instructions for the selection of box, bag, separator, protection and part arrangement is given to the supplier Fig 3. Insight of Guideline checklist (1)

Fig 4. Insight of Guideline checklist (2)

V. CONCLUSION This work started with an approach of plan­do­check­act (PDCA). Firstly the gap from the actual proceeding of procurement Fig 2. Insight of SPPAP checklist (2) activity and requirement was identified and it is identified that for the selection of packaging of raw material received by factory is 4.1. SPPAP checklist for packaging guideline left to the supplier itself. In some cases the scrap rate was more The guideline document prepared was further utilized to due to the lack of requirement sharing and documentation work. prepare a checklist of the guidelines in Excel format. The So this work was originally focused on making a document for characteristics of this checklist are, this information sharing and then further addition of the • Provide a list of guideline with the details of the point shown requirement to SPPAP activity. in the space in description area as can be seen in the figure Initially a plan of activity and methodology was identified ahead. for the completion of that work and milestones were set. A through • Gives the link for particular point to the corresponding ISO/ study of the current packaging methods of all the local suppliers EN standard and the Danfoss internal standards. was analyzed and the pain points during the receiving of material • Provide a better interface for the supplier to understand the was identified and sorted with the self of Supplier Quality Function demands of the company with respect to the packaging of team. Rejections caused by faulty packaging were recorded and raw material. suggestions for improvement were identified and convened. • Provide a perfect document to the procurement process Further a thorough study of various ISO/EN standards for the which results in the betterment of the procurement function. packaging requirements, testing was studied and the proposals from these standards were recorded to include in corporate packaging scheme. Various criteria for testing and selection of packaging were identified by literature survey and brainstorming from various departments of the organization. SPPAP activities are studied and experienced for the understanding of information sharing from factory to supplier. A checklist for the requirement and selection of packaging pattern is prepared. One more checklist for the guidelines to be followed while deciding the packaging

24th June 2017 , ISBN No. 819070985-2 84 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi pattern is also prepared. These checklists are then approved by and Millimeter­Wave High Power Amplifier Modules. Journal of responsible person in global procurement and then added to Electronics Cooling and Thermal Control, 7, 1­7, 2162­6170. main SPPAP document for the betterment of the Procurement Hellström, D., & Saghir, M., (2006), Packaging and Logistics and SQF activities. Interactions in Retail Supply Chains, Published online in Wiley InterScience. DOI: 10.1002/pts.754 References Twede, D., & Clarke, R., (2004), Supply Chain Issues in Reusable Packaging, Journal of Marketing Channels, Vol. 12(1). Murmu, S. B., & Mishra, H. N., (2016), Engineering evaluation Silayoi, P., & Speece, M., (2007), The importance of packaging of thickness and type of packaging materials based on the modified attributes: a conjoint analysis approach, European Journal of Marketing atmosphere packaging requirements, LWT ­ Food Science and Technology Vol. 41 No. 11/12, pp. 1495­1517. 78 (2017) 273­280. Dobrucka, R., & Cierpiszewski, R., (2014), Active and intelligent Sturdivant, R., Bogdon, A., & Chong, E. K. P., (2017), Balancing packaging­Research and development – A review. Pol. J. Food Nutr. Thermal and Electrical Packaging Requirements for GaN Microwave Sci., Vol. 64, No. 1, pp. 7­1.

24th June 2017 , ISBN No. 819070985-2 85 85 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Atomizer Faucet Integrated with Dual Flow Mode

Tushar Gulati Naveen Solanki Maharaja Agrasen Institute of Technology, GGSIPU Maharaja Agrasen Institute of Technology, GGSIPU Plot­1, Sector­22, PSP Area, Rohini, Plot­1, Sector­22, PSP Area, Rohini, New Delhi, India New Delhi, India Email ID: [email protected] Email ID: [email protected] Lakshay Malik Bhuwan Dua Maharaja Agrasen Institute of Technology, GGSIPU Maharaja Agrasen Institute of Technology,GGSIPU Plot­1, Sector­22, PSP Area, Rohini, Plot­1, Sector­22, PSP Area, Rohini, New Delhi, India New Delhi, India Email ID: [email protected] Email ID: [email protected]

Abstract— An Atomizer faucet with dual flow mode has been can be controlled by geometrical ratios and pressure head. SMD designed which contains an atomizer mode and a normal flow is defined as the diameter of the drop whose volume to surface mode. The device is designed to fit with on a tap, replacing the area ratio is same as of the spray. It is a measure of spray quality faucet and work at a low pressure head of 0.119MPa. The assembly [3]. Spray cone angle is defined as an angle formed by two straight was divided into 4 parts i.e. Stem, nozzle, nozzle top and head. lines drawn from the discharge orifice to cut the spray contours Size constraint of the faucet and the results of Sauter Mean Diameter and Spray cone angle were pre-considered. Overlapping at a specified distance from the atomizer face [2]. It can be the required results and the effect of Nozzle Geometry, geometrical determined by the ratio of Tangential component to radial ratios for the nozzle were observed from the readings of prior component of fluid’s velocity. researchers. Spray cone angle was considered 60 which gave us tanx= Vt/Va the orifice diameter of 2mm. To provide dual flow mode, Nozzle Rashad et al. [3] in their research found the effect of was made movable with respect to the stem. To provide loss of geometrical ratios likes D /D , L /D and L /D on SMD and Spray pressure drop, obstructions were provided and friction was taken s o s s o o into account by which obstruction thickness was found to be 1.8 cone angle and they found a nonlinear yet predictable graph. mm. Design was practically tested and the water savings in Taylor [4] defined atomization constant as the ratio of Area of atomizer mode was found to be 90% and savings with normal inlet ports to the product of swirl chamber diameter and orifice mode were found to be 75%. diameter, is inversely proportional to spray cone angle.

K= Ap/Ds.Do I. KEYWORDS In different research, Halder [5] and S.K. Chen and J. 1. Atomization Rollbuhler [6] also observed the effect of different factors 2. Spray Cone Angle influencing the spray. 3. Sauter Mean Diameter Rizk and Lefebvre [7] investigated the effects of liquid 4. Atomizer Faucet properties, injection pressures and geometric dimensions and found a relation for spray cone angle as given below. II. INTRODUCTION (1) Atomizer is a device which breaks a fluid into small droplets. There are different kinds of atomizers using different sources of Mohd Syazwan Firdaus Mat Rashid et al. [8] studied Effect energy (i.e. mechanical, electrical, ultrasonic etc.) to break the of Inlet Slot Number on the Spray Cone Angle and Discharge fluid into small droplets. The objective of the paper is to design Coefficient of Swirl Atomizer and found both increasing with an atomizer faucet integrated with dual flow mode viz. atomizer number of supply slots. mode and normal mode which can fit with any kind of tap. In our The faucet is also provided with normal flow mode, which application, pressure head is the source of energy, which can be reduces the water flow rate by the action of obstruction and used to achieve the aim. Hence, pressure swirl atomizer is used friction. Martha Salcudean et al [9] studied effect of the flow which gives atomization at a low pressure head. Parameters like obstruction geometry on pressure drops. They gave an spray cone angle, liquid film thickness, size of drops and mass expression for single phase flow which is flux distribution etc. define the quality of spray.[1][2] For our application, parameters, which were considered, were sauter mean diameter (SMD) and spray cone angle, which (2) 24th June 2017 , ISBN No. 819070985-2 86 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The Objective of the research is to design a faucet atomizer, By using equation 1, D0 was found 2mm. Other values were integrated with dual flow mode which can reduce water found using above ratios, other geometric values are found. consumption in washing applications through different methods. When the nozzle is screwed down to the lower position, ,

Ls/Ds changes and supply holes open to other holes also, which III. ACRONYMS provides normal mode. In normal mode, pressure gradient is reduced and hence affecting the flow rate. From equation 2, D Lo ­ Length of orifice a and La were found to be 1.2 mm and 1.8 mm respectively. D0 ­ Diameter of orifice

Ls ­ Length of nozzle from orifice V. FIGURES

Ds ­ Maximum inner diameter of nozzle

Va ­ Axial Velocity

Vt ­ Tangential Velocity

Qm ­ Spray Cone Angle “P – Pressure drop

Ra,b – Pressure loss coefficient

ñL – Density of fluid

V0 – Average velocity fa,b – Friction factor t2 – Thickness for obstruction

De(a,b) ­ Hydraulic diameter Figure 1:­ Pressure Swirl Nozzle Vab – Velocity of flow with obstruction Source: Mohammad Rashid et al. [3] De – Diameter of hole in obstruction SMD­ Sauter Mean Diameter

IV. METHODOLOGY The faucet consists of 4 parts namely:­ 1. Head: The head of the nozzle supports faucet with the tap and also provides changes in modes of operation of nozzle through threads. 2. Stem: It can be imagined as inverted stem with water fed from the top, coming out from the supply hole with the bottom end blocked. The bottom end is extended laterally. It consists of supply holes at walls followed by radial slots at Figure 2:­Faucet Head head which gives radial motion to water passing through it. The supply slot makes acute angle with the horizontal axis. 3. Nozzle: The radial and axial due to flow starts the atomizing in nozzle. Spray The outer periphery of nozzle has holes for normal flow mode. 4. Nozzle Top: Nozzle top is the covering for the nozzle which prevents the leakage of water from the top and also gives a synchronous motion of nozzle with respect to stem. The nozzle and nozzle top are adhered together and the two parts are screwed on the stem to give a relative position of spray nozzle with supply slots. When the nozzle touches the supply slots, the stem interlocks with spray nozzle by threads, in which ratio for required atomization is achieved .The ratios hold the Figure 3:­ Atomizer stem Figure 4:­ Faucet Nozzle following values : Ds/D0 = 5.5 , Ls/Ds=0.68 ,L0/D0 =1. These values are found by extending the results of Mohammad Rashid et al. [3] for a lower pressure of 0.119MPa.

24th June 2017 , ISBN No. 819070985-2 87 87 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Table 2:­ Flow Rate in Normal Mode

Figure 5:­ Faucet Nozzle Figure 6:­ Faucet Nozzle top (top view)

Figure 7:­ Sectional View of Assembly

VI. OBSERVATIONS AND RESULTS Faucet was tested at different pressure heads and time required for a specific volume was noted which gave the volume flow for both modes was rate at different pressures. Table 1:­ Flow Rate in Atomizer Mode

VII. CONLUSSION Faucet was designed successfully and following conclusion were made through the design and its observations 1. Percentage of water savings in normal mode increases with pressure head with minimum water savings of 89.5% 2. Percentage of water savings in normal mode increases with pressure head with minimum waster savings of 64.4%.

24th June 2017 , ISBN No. 819070985-2 88 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

VIII. REFERENCES 6. S. K. Chen, A. H. Lefebvre and J. Rollbuhler, “Factors Influencing the Effective Spray Cone Angle of Pressure­Swirl Atomizers,” Journal 1. L. Bayvel and Z. Orzechowski, “Liquid Atomization,” Taylor and of Engineering for Gas Turbines and Power, Vol. 114/97, January Francis Publication, ISBN: 0­89116­959­8, 1993. 1992. 2. H. Liu, “Science and engineering of droplets: fundamentals and 7. N. K. Rizk and A. H. Lefebvret, “Internal Flow Characteristics of applications,” William Andrew publication LLC, Norwich New York Simplex Swirl Atomizers,” J. Propulsion, Vol.1, No.3, May­June U.S.A., ISBN: 0­8155­1436­0, 2000. 1985. 3. M. Rashad, H. Yong and Z. Zekun, “Effect of geometric parameters 8. M. S. F. M. Rashid, A. H. A. Hamid, O. C. Sheng and Z. A. Ghaffar, on spray characteristics of pressure swirl atomizers,” International “Effect of Inlet Slot Number on the Spray Cone Angle and Discharge Journal of Hydrogen Energy, April 2016. Coefficient of Swirl Atomizer,” International Symposium on 4. G.I.Taylor,”The mechanics of swirl atomizers” Seventh Robotics and Intelligent Sensors, Procedia Engineering, pp. 1781­ International Congress of Applied mechanics,Vol. 2, Issue 1, Pages 1786, 2012. 280­285, 1948. 9. M. Salcudean, D. C. Groeneveld and L. Leung, “Effect of Flow­ 5. M. R. Halder, S. K. Dash and S. K. Som,”Influences of nozzle flow Obstruction Geometry on Pressure Drops In Horizontal Air­Water and nozzle geometry on the shape and size of an air core in a hollow Flow,” International Journal of Multiphase Flow, Vol. 9, No 1, pp. cone swirl nozzle,” Journal of Mechanical Engineering Science, Vol. 73­85, 1983. 217 Part C, 2003.

24th June 2017 , ISBN No. 819070985-2 89 89 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi SMART ORTHOPEDIC IMPLANT FOR REAL TIME DATA ACQUISITION

Yashank Tiwari Sandeep P Jogi Dept. Instrumentation and Control Dept. Instrumentation and Control JSS Academy for Technical Education JSS Academy for Technical Education Noida, India Noida, India [email protected] [email protected]

Abstract— A clinical implant is design to embrace the AtMEGA 328p: necessities of the injured part of the body. After implantation Microcontroller ATMEGA 328p is a 32 pin with 32 bytes of bone healing dynamics and implant material properties are flash memory. The data acquired from BMP 180[9], pH sensor interest of clinician to observe. There is possibility of failure of implant even after successful surgery. Here in paper we circuitry, accelerometer is transferred using the RFID module attempt to address solution to real-time monitoring of implant .These are interfaced using AtMEGA 328p [10] in which a very and bone healing dynamics after implantation. We designed the light and robust programmme is uploaded using a boot loader . implant mimic using metallic or alloy rod with electronic The issue of battery consumption is taken into account as the component such as pressure and temperature sensors pulse transfer using the USART is done when the RFID is in use accelerometer, ISFET and RFID installed over it so as to monitor and data will only transfer after an interval of 100 seconds. the dynamics of implant and bone fracture healing. For which USART: Universal synchronous and Asynchronous highly efficient wireless data transferring techniques is used to serial receiver and transmitter[10] is I/O registers for communicate. The programming of the microcontroller is robust, very light user friendly. This enables the user to interact with the transmission and the clock generation logic for external clock implant in faster and remotely. Low energy consumption input used by synchronous slave operation, and baud rate techniques are deployed for long battery life of implant. The generator. The receiver is the most complex part of the USART issue of RFID interference during communication is also overcame module due to its clock and data recovery units. The data in this. Since RFID interfere with the other implant such as recovery units are used for synchronous data reception. In two Pacemaker devices. level receive buffer (UDRn).The power of the microcontroller Keywords—: Real-time data acquisition, Pressure sensors, that is used in operation of the complete process is between 1.8­ Temperature sensor, pH sensor, Atmega 328p fabrication, 5 V but in the implant, we use the circuitry which has an Microelectronics operational power of 1.8V. Some characteristics of the ATmega328p between temperature variations of ­40ÚC to 85ÚC I. INTRODUCTION (HEADING 1) varies with active supply current. The field of implant holds a very critical state at the vast stage of bio­medical. Orthopedic implant is required for fracture healing fast and with stability. Human body heals the fracture, and orthopedic implant provides support to immobilize the fractured bone. In present scenario no implant is available with option of monitoring day to day bone healing dynamics and interaction with implant. So, main problem of monitoring with orthopedic implants is that during the healing process the dynamics of the bone changes which results in dislocation and in some cases deformation .We here make an attempt to design such an implant mimic which can monitor the dynamics of body Figure 1 Characteristics curve of Current vs Voltage (AtMEGA during healing process. The implant acquires the data in real­ 328p Data Sheet) time using the Embedded C and IDE Arduino coding. The The issue with ATmega 328p during its operation is when it implant data are acquired using RFID module but the effects of transmit and receive data the phenomenon of hysteresis occurs using the RFID module has been. minimize by using Parylene and that increases temperature but the operational temperature is pigments to cover the implant circuitry and preventing the Lead still reaches only upto 23ÚC which makes it convenient to use. leakage in the body.

24th June 2017 , ISBN No. 819070985-2 90 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

II. BMP 180: Altitude=4430*(1-()) B. C protocol: The C interface protocol has special bus signal The BMP180 is the function compatible successor of conditions. Start (S), stop (P) and binary data conditions are the BMP085, a new generation of high precision digital shown below. At start condition, SCL is high and SDA has a pressure sensors for consumer applications. falling edge. Then the slave address is sent. After the 7 The ultra­low power, low voltage electronics of the address bits, the direction control bit R/W selects the read or BMP180 is optimized for use in mobile phones, PDAs, GPS write operation. When a slave device recognizes that it is being navigation devices and outdoor equipment. With a low altitude addressed, it should acknowledge by pulling SDA low in the noise of merely 0.25m at fast conversion time, the BMP180 offers ninth SCL (ACK) cycle. At stop condition, SCL is also high, but superior performance. The C interface allows for easy system SDA has a rising edge. Data must be held stable at SDA when integration with a microcontroller. The BMP180 is based on SCL is high. Data can change value at SDA only when SCL is low. piezo­resistive technology for EMC robustness, high accuracy Even though can be powered on before , there is a chance of and linearity as well as long term stability. excessive power consumption (a few mA) if this sequence is The BMP180 consists of a piezo­resistive sensor, an used, and the state of the output pins is undefined so that the analog to digital converter and a control unit with E2PROM bus can be locked. Therefore, must be powered beforeunless and a serial I2C interface. The BMP180 delivers the the limitations above are understood and not critical. uncompensated value of pressure and temperature. The E2PROM has stored 176 bit of individual calibration data. This is used to compensate offset, temperature dependence and other parameters of the sensor. – UP = pressure data (16 to 19 bit) – UT = temperature data (16 bit)

Figure 1.3 Graph (BOSCH Data Sheet) C. Start temperature and pressure measurement: The timing diagrams to start the measurement of the temperature value UT and pressure value UP are shown above. After start condition the master sends the device address write, the register address and the control register data. The BMP180 sends an acknowledgement (ACKS) every 8 data bits when the data is received. The master sends a stop condition after the last ACKS.

III. MEDICAL USAGE OF RFID:

Figure 1.2 BMP 180 INTERNAL CIRCUIT (BOSCH BMP 180 We are critical of data monitoring and processing therefore Data Sheet) we take data such as temperature pH monitoring for sensitive The microcontroller sends a start sequence to start a pressure products like blood which can be automatically logged using or temperature measurement. After converting time, the result value RFID [6]tags. (UP or UT, respectively) can be read via the C interface. For Also one of the prime advantages of using an RFID tag is calculating temperature in °C and pressure in hPa, the calibration that unlike barcoding, there is no line of sight requirement to read data has to be used. These constants can be read out from the an RFID tag. The use of RFID tags permits reading orientation BMP180 EEPROM via the interface at software initialization. The directly through materials like boxes and textiles. But unlike any sampling rate can be increased up to 128 samples per seconds other component RFID tags have their own disadvantages such (standard mode) for dynamic measurement. In the case, it is as environmental conditions. Tag reliability can be impacted by sufficient to measure the temperature only once per 100 seconds humidity, metal surfaces, and more. Current RFID tags cannot and to use this value for all pressure measurements during the withstand extreme temperatures without temperature­resistant same period. housing. For that reason, using them for items like surgical A. Calculating Absolute Pressure: With the measured pressure instruments is complicated. But we have covered all our walls P and pressure P and the pressure at sea level e.g. 1013.25hPa, before using the component. We are concentrating here only on the altitude in meters can be calculated with the international the monitoring purposes and RFID may benefit healthcare is in barometric formula. improvement of patient safety. This may include patient bracelets embedded with RFID tags. RFID tags that have “write” capability

24th June 2017 , ISBN No. 819070985-2 91 91 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi can have key information written to the tag, including drug nearby metallic objects. In the vicinity of conductors, the antenna allergies, blood type and other important patient data. Which radiation parameters are modified; for example radiation efficiency makes it and even operation of the implant for the fraternity all is decreased. In addition, a metallic surface typically decreases along as the data gathered are constant in most cases but in the input impedance of the antenna (which makes that lower or some they may vary and this could be tracked. The current not enough power can be supplied to the IC chip, so the reading limitation of RFID is also over come since the IC within is range is reduced or even the tag is not read at all) and varies its commercially available RFID tags is based on the conventional resonance frequency. The electromagnetic wave is greatly Complementary Metal Oxide Semiconductor (CMOS) [1]. Unless reflected by the conductor surface yielding a significant reduction developed to military specifications, CMOS is not able to of the RFID tag operating distance or its total malfunctioning. withstand the high temperatures of the autoclave process. Overcoming these Issues[8]: Researchers have proposed Claiming several benefits over CMOS is Micro Electro Mechanical some different solutions but since we use a coating of Parylene Systems (MEMS), which is currently in research stage and is we do not have to take up solutions like Permanent Magnetic expected to be commercially available in 2007. MEMS­based RFID Conductors to be replaced by Artificial Magnetic Conductors. claims to withstand extreme temperatures. The main issue with Also some of the issues faced are tag cloning and data orthopedic implant is that they are not cost effective since these theft we can overcome these by blocking and killing the tag for also consist of circuitry they may cost even higher but with ISO reading purposes after they are being used. working with the supply chain management itself the cost of Encryption[7] is also one of the prime method to get hold RFID tags have been kept under control. on the data and over usage of RFID tag these also makes most of RFID Interference[7]: Like most electronic devices, RFID the cloned tags unusable since now they can be tracked by another systems generate electromagnetic waves, which can vary in method such as antenna frequency analysis. Which analyse the amplitude and frequency. The operating frequency chosen for a noise level caused in during reading of the tag since more the specific RFID system often depends on its application .Some distance between the tag and reader more will be the noise , RFID readers may potentially produce electromagnetic fields of hence protecting the actual card and not allowing the duplicity. sufficient amplitude and/or frequency to interact with an implanted cardiac device. Whether or not an RFID reader will interfere with IV. DESIGN OF ISFET an implanted pacemaker or defibrillator depends on a number of technical parameters (e.g. frequency, power, pulse repetition rate, The selectivity and chemical sensitivity of the ISFET pulse width, modulation, distance/location/orientation), most of [1] are controlled by the properties of the electrolyte or which are unknown to device patients in the vicinity of these insulator interface. Inorganic gate materials for pH sensing like systems. silicon oxide (), silicon nitride and aluminum oxide are used. In fabrication processes, these layers are deposited on top of the Precautions with RFID Tags[7]: Although implanted cardiac thermally grown silicon oxide gate by means of chemical vapour pacemakers and defibrillators are designed to function normally deposition (CVD). Of all materials mentioned, only silicon oxide around most appliances and equipment, patients and their and silicon nitride are two thin film membrane materials that cardiologists should be aware that RFID[6] readers may be a are compatible with the CMOS technology because they are potential source of EMI and could have temporary effects on commonly used in the fabrication processes. The proper implanted cardiac devices. Because the presence of RFID systems performance of ISFET sensors is strongly related to the may not always be apparent in public and occupational settings, process conditions by which the gate dielectrics of ISFET are patients who feel symptomatic (e.g., light­headed, fast heart rate) fabricated. The effects of processing parameters such as should move away from nearby electrical equipment (or the annealing treatment and gas flow ratio on the chemical identifiable RFID system), and call their physician to report the response of /Si/Si electrodes used in pH measurements were episode. studied. Experimental results based on capacitance voltage Issues faced with RFID[7]: Antennas do not operate measurements show that the voltage response and pH independently of nearby objects. On the contrary, these objects sensitivity depend on the gas flow ratio n=NH3/SiH4 during can ruin the radiation properties of the antenna to different extent. the nitride deposition and on the pre oxidation anneal time prior In RFID systems, the material of the objects the tags are attached to thermal oxidation of silicon (Si) wafers. The results were to should have minimum effect on tag antenna behaviour, so that interpreted in terms of chemical and physical properties of the reading performances of tags, such as readable range and nitride and oxide layers. pH sensor circuit is used for detecting reading stability, do not change. Metallic objects which are different readings of the pH change in the body. usually tagged in RFID applications seriously degrade the terminal impedance matching, bandwidth, radiation efficiency and readable V. ULTRA LOW POWER TRANSMISSION[3] range of the tag antenna. This is such a critical problem that global deployment of passive UHF RFID systems[7] is being The circuit after housing into the implant is connected hindered by the performance degradation of tag antennas placed wirelessly through RFID tags which not only provides the

24th June 2017 , ISBN No. 819070985-2 92 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi patient’s data but also with the data from test such as We measure the pressure on the body at different activities temperature, pressure and pH of the body without consuming and changing dynamics of the healing fractured bone. The much power and without any trace of heat exhibited from the temperature of the body also changes with change in bodily circuit due to hysteresis. The important aspect of the implant is functions and in case of infections due implantation. pH heat energy that will be exhibited through the implant during its measurement in such cases of chronic diseases also matters operation which we will be able to control to an extent where the since it indicated the medication one requires during the infection patient will not feel any circuitry being operated into them. The and whether the implant suits the body or not. In the unexplored pH of the blood will be tested using the epidermal tissue implant horizon of the biomedical such real­time monitoring of the injury of 1­3 nm housed on the implant. If the pH has any abrupt healing process by means of simple circuitry. The process of change from 7.35 then it will be reported and since we have only monitoring and receiving data signals complicates the process tested it into a sample of 3mL of blood no changes as such were but is made simple to use for the medical fraternity. The circuit recorded. footprint is kept minimal for further improvements on its data processing and data management. We are trying to improve on VI. IMPLANT the monitoring process of patient’s injury with state of the art The implant[5] is designed to replace the shin bone with prototype. The coating is proposedly done using Parylene for the implant bearable which is bearable for the patient in every overtaking the issues like corrosion and other electronic errors. manner. The implant is in the Parylene coated lid which houses A. Acclerometer: implant circuitry. The implant plates are made up from AISI 316L Wearable embedded system technology has resulted in stainless steel/alumina joints which are produced by an active utilization of body­implantable sensor networks for remote health metal brazing technique. Alumina of a commercial grade, and activity monitoring. Therefore, body­implantable network according to DIN 40685 standards, has been selected. Stainless enables a personalized approach to health and wellness. It also steel metal sheets and laser cut rods for insertion. Two different has a promising application in medical system to enhance people’s brazing alloys within the Cu–Ag–Ti system were prepared with quality of life, to facilitate independent living, and even to save the following composition (wt%): the lives of people having implantations. O –71% Ag –26% Cu –3% Ti (L1); The essential idea behind the on­body localization is to O –48% Ag –46% Cu –6% Ti (L2). analyze the acceleration data when the user is performing day to The electronic components of the implant are sealed in a day activity. In the last few years, accelerometer­based health Parylene layer packaging for lighter and safer operation even at monitoring applications have been receiving growing attention high temperature. in the research and commercial communities. Surprisingly, delicate The implant designed is of first generation typically accelerometers are also being used to monitor animals, offering consisting of a single sensing modality with wireless insight into a wide range of biological questions. However, the connectivity for being able to monitor the activity and health effect of accelerometer placement on different parts of the body, status. Notable that first generation devices application include for making error free judgments despite for the fact that its daily monitoring with motion sensors for day to day activity apparent significance is high in terms of finding the movement but implant do not consist of such type of motion sensors rather and displacement of the implant from the position inside the body they have less number of sensors required only for monitoring is significant, but has received little consideration. purposes during the calcification of bone after the fracture. Since the implant has tested when the hematoma process of formation VII. MICRO-ELECTRONICS AND FABRICATION of blood clot at the fractured cavity. When this process completes Using Application Specific Integrated Circuit (ASIC)[1] the change in pressure is recorded on the implant due to initiation technology to integrate and form a circuit using AtMEGA of calcification and the design of implant should withstand this BMP180 ISFET[4] RFID accelerometer has paved way for wireless excess pressure. sensing platform development towards minimum size, minimum Advance Sensing and Hardware Design: power consumption as well as minimizing measurement The main application of the implant is to fulfill the uncertainty. A typical System­on­Chip ASIC technique consists requirement of transferring data efficiently and quickly. In of sensor signal conditioning circuit, microcontroller, and radio addition to wearable sensors implantable sensors and ingestible communication circuitry. This leaves the onsite circuitry wireless sensing hardware are also necessary. From detecting footprint very less. The accelerometer which is interfaced with it the body temperature to the pH of the blood all has relevance in refers to the amount of displacement the implant has gone monitoring the patient after implantation. These implantable through after being housed inside the body. Since we have sensors act as a loss­of­function replacement prosthesis or for tested it with a setup to test whether the accelerometer will chronic diseases management. A range of sensors including pH behave in similar manner when housed or not. temperature strain ECG PPG are integrated with microelectronics to provide electrical thermal and optical stimulation.

24th June 2017 , ISBN No. 819070985-2 93 93 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

A. Wearable to implantable: VIII. SUMMARY The deployment of implants helps in better monitoring, In the unexplored horizon of the biomedical the application understanding modeling predicting and ultimately minimizes such as real­time monitoring of the injury healing process by post­operative complications and avoids patient readmission. means of simple circuitry is attempted here. The process of For active implants requiring an energy source, wireless power monitoring and receiving data signals is a complicated process transmission ultras ultra or ultrasonic links doubling as a data but is made simple for the use of medical fraternity. The circuit communication path as a deployment. footprint is kept minimal for further improvements on its data To reduce the power consumption we make the clock cycle processing and data management. The battery and power of data transfer higher that the standard mode that is increasing consumption issue are kept in mind so that the operation of the the time period from per second to per 100 seconds. prototype does not have any heating or backup issues. The The small changes in programme results in less processing coating is proposedly done using Parylene for overtaking the done by the microcontroller which then has less operational issues like corrosion and other electronic errors such as temperature. Implant packaging is one the big issues to house temperature during operation, hysteresis, magnetic interference. the implant in a biocompatible material such as Parylene can be A. RESULT used to encapsulate the sensor circuitry so that we do not have The results below are an accomplishment of the radio wave leakage. Since, till now wearables are preferred over experiments conducted on the Implant prototype. They are implants due to the complications mentioned, we have attempted varying according to the environment in which the experiments to designed the implant to work in an alternate manner just to are conducted. monitor the healing process dynamics. B. Parylene: TABLE I. Parylene[11] has an outstanding electrical insulation COMPUTED P pH of Tilted Absolute Temperature characteristics, as well as its excellent barrier protection, which Blood with Pressure makes it an enabling solution for precision applications Degree demanding the highest levels of protection in rigorous biological 1655 7.35 5.2 847.2 25.39 condition. Parylene creates an unmatched barrier layer and which is truly conformal, implantable, bio stable, and biocompatible. 1660 7.43 4.7 846.82 25.48 Parylene is a truly conformal coating that is typically deposited 1657 7.41 9.6 847.16 25.48 between 1­50 microns, it is pinhole free and it has excellent moisture, chemical and dielectric barrier properties. Poly Xylylene Initial Test result of the mimic Implant has a capability of keeping the circuitry corrosion free for a longer Acknowledgment period of time Vapour deposition has the added benefit of being solvent­free, and it doesn’t require a curing cycle after coating. We owe a special debt of gratitude towards our mentor Mr. Some of the benefits of Parylene : Sandeep P Jogi who is also involved with us in this paper and it • Parylene[12] is deposited at micron thicknesses, typical is his constant support and guidance sincerity and perseverance applications range from 1­50 microns. along with our Dept. of Instrumentation and Control and our institution JSS Academy for Technical Education for their constant • Delicate components can be coated because there is no support throughout our peaks and troughs during the time of thermal cycling and no fluid contact. experimentation. We are also thankful to our parents for the • Act as a barrier to oxygen, moisture, chemicals, solvents constant support. and Carbon dioxide . • Thermal mechanically stable between ­200°C and 150°C AUTHORS BIOGRAPHY • Extremely high dielectric 5,000 volts per 0.001" minimum. Sandeep Panwar Jogi (2016­present): Sandeep completed • Parylene is Hydrophobic having chemical and fungal his B.Tech in Biomedical Engineering from GJUST, Hisar, Haryana resistance. and M.Tech. in Instrumentation and Control Engineering from • Low stress coating that does not form sites prone to crack COEP, Pune. He is working as assistant professor in JSSATE, initiation. Noida since 2012. He pursuing his PhD in IIT Delhi. Biologically compatible material for coating implants that is Research Interests: Medical Image Processing, MRI to be housed inside the patient body. Quantitative Analysis, Solid Modeling, FEA Analysis and Experimental setup design. He is also working on orthopaedic implants and design. He is interested in Innovation and Creative activity.

24th June 2017 , ISBN No. 819070985-2 94 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Yashank Tiwari : Completed his XII from Dayawati Modi 4. Ion sensitive field effect transistor for Biological Sensing ISSN Academy 2012. Currently finished his Bachelors (B.Tech) from 1424­8220. Instrumentation and Control JSS Academy for Technical 5. Concept, design and fabrication of smart orthopaedic implants. F Burny M Donkerwolcke F Moulart R Bourgois R Puers K Van Education Noida. Schuylenbergh M Barbosa O Paiva F Rodes J B Begueret P. Lawes. Research Interests: Orthopedic Implants, machine learning, ISSN 12165184 artificial intelligence, robotics. 6. Health Industry Business Communications Council Paper RFID 2013 7. Simpson L. Garfinkel, Ari Juels, Ravi Pappu “ RFID Privacy An References Overview of Problems and Proposed Solutions”. 1. A. Morgenshtein, U. Dinnar, C. G. Jackobson, and Y. Nemirovsky, 8. Ma Elena de Cos, Fernando Las­Heras “Troubleshooting RFID Tags “A Microsystem for ISFET­Based pH Measurement in CMOS with metallic objects”. Technology,” in Proc. 16th European Conference on Solid 9. Data Sheet Bosch BMP180 Pressure and Temperature Sensor. StateTransducers, Prague, Czech Republic, pp. 360­363, 2002 10. AtMEGA 328p Uno Genuino Data Sheet. 2. Biomedical Instrumentation Leslie Cromwell 1980:316­340. 11. Joerg Lahann Review Vapour Based Polymer coatings for Potential 3. Ledet EH, D’Lima DD, Westerhoff P, Szivek JA, Wachs RA, Biomedical Applications. Bergmann G. Implantable Sensor Technology: From Research to 12. VSI Parylene Biocompatible Medical Device Coating. Clinical Practice. Journal of the American Academy of Orthopaedic Surgery. 2012; 20:383–392.

24th June 2017 , ISBN No. 819070985-2 95 95 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi OPTIMIZATION OF ENGINE MOUNTING DESIGN BY VARIOUS MODEL CASE STUDY

Harichand Deputy Manager – Research & Development (R&D) Bridgestone India Automotive Products Pvt. Ltd. Gurgaon, India. [email protected]

ABSTRACT : Engine mountings are interface between engines & the Purpose of flexible mounts is to reduce fatigue failure of engine frame of the vehicle. It is very important to determine vibration isolation & gearbox, which may be caused by dynamic disturbance. To characteristics for vehicles. For this research work I have selected reduce amplitude of engine vibration & human body discomfort elastomeric mount. Elastomeric mounts are made up of rubber which vibrations are transmitted through elastomeric media like rubber. can withstand large amount of deformation under load with ability to almost retain its original shape when the load is removed. Rubber is used for elastomeric mounts because of its inherent property. Rubber is a viscoelastic material which enables it to be used as an isolator and as a damper. An automotive engine­body­chassis system is typically subjected to unbalanced engine Forces, uneven firing forces especially at the idling speeds, dynamic excitations from gearboxes sand accessories, and road excitation. Since design trends have been towards compact and efficient automobiles, engine­to­frame weight ratio and engine force densities have increased. Consequently, recent research and development efforts have been focused on improving engine mounting technology to achieve better vibration isolation, smooth vehicle movement, and noise reduction. Fig 1 - Mounting Location Purpose of this work is to optimize engine mounting design for better cabin space utilization & improved vehicle performance, for this Thus engine mounting design must be done with care to purpose various models to be studied & optimize Engine mounting ensure engine mounting functions within performance parameter designs. range. Keywords: Modeling, Optimization An engine mounting system consists of three or four engine mounts. The behavior of engine mounting system not only Introduction depends on the performance of individual mount but also on complete system. Traditionally mount design was only based on Engine mount is purposed to control an excessive motion experience & extensive analysis procedure. generated from powertrain system and to isolate vibration and noise to be transmitted to main system. As vibration design of 2. Methodology engine mount is one of the main items on the phase of vehicle In this paper, various model analysis studied to obtain development, the design should be optimized considering various optimize engine mountings. to develop a complete mounting design variables and uncertainties. Requirements of vibration system such that the transmitted forces to/from the engine to the and noise isolation for passenger cars are increased. The second supporting frame are minimized. The loads can be described as reason is that the modern car designs have a trend for lighter car external or internal. The external loads are due to external bodies and more power­intensive engines. The comfort disturbances from the environment such as irregularities in the requirements, the weight reduction and the increased engine road profile and road bumps. These disturbances can be power sometimes have adverse effects on vibratory behavior. transmitted through the tire patch to the engine causing it to hit These aspects are often conflicting. Substantial improvement in nearby components. The engine needs to be constrained due to the performance of engine mounting systems definitely plays an packaging space limitations surrounding the engine. This paper important role in resolving such conflicting requirements. is based on case study of various research papers. A perfectly balanced engine for moment & forces will have 3. Modeling of Engine Mounts no tendency to move or transmit vibration to frame to which A typical mounting system consists of powertrain and a engine is attached. In actual there is not any engine perfectly number of mounts that connect the powertrain to the supporting balanced. So flexible mounts are required for automotive engines. frame. The major objective of the engine mountis to isolate the 24th June 2017 , ISBN No. 819070985-2 96 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi engine disturbances from being transferred to the supporting The main component in designing a mounting system is structure. These disturbances will excite the engine 6 DOF the design of the mount itself. Identifying the mount parameters vibration modes shown in Fig. 2. For example, the torque caused such as the mount stiffness and damping is a crucial step in the by the firing pulse will cause engine pitch vibration. To isolate process of designing an appropriate mounting system. There are vibrations caused by engine unbalanced disturbances, low elastic four candidate models that are used to represent the mounting stiffness as well as low damping are used since the transmitted system, all of which are assumed to be elastomeric isolators. forces depends on the values of the stiffness and damping of the 3.1 Model 1 - Voigt Model mounts. The mounts are modeled as a spring and hysteresis The model consists of a single degree of freedom system damping or viscous damping along each of the three principal where the spring and damper are represented by the stiffness k1 directions .The mounts used herein are elastomeric mounts in and damping coefficient b1. The snubbing effect is taken into which the stiffness, orientation and location are the main variables account by adding additional two linear springs k2 and k3 that that need to be determined in order to achieve the desired will be engaged when the displacement amplitude x of the isolated isolation. This type of engine mount is modeled as Voigt Model . mass exceeds the snubbing gap xo . The equations of motion for The frame is always modeled as a rigid body thorough out this model 1 are as follows: study.

In the equation above, m represents the mass of the isolated system and f is the excitation force acting on the system. The system of 2nd order linear differential equations in Eq. (1) can be converted into a system 1st order linear differential equations as follows:

,,, 2

The natural frequency of the mounting system should be lower than the engine disturbance frequency to avoid the excitation of the mounting system resonance. six degrees of freedom that will be excited as result of the ,,, 3 inertia forces acting on the its block and the oscillator torque acting about the crankshaft.

,,, 4

In the above equations, x1 = x and x2 = x฀. Eq. (2) is the governing equation of motion for the system shown in Fig. 3 when |x| < xo. Eq. (3) is the governing equation of motion when x  xo and Eq. (4) is the governing equation of motion when x  –xo. To accommodate varying stiffness in different directions of motion, the snubbing stiffness k2 and k3 is assumed to be asymmetrical. This assumption can be relaxed for symmetric systems by making the snubbing stiffness equal for both motion directions. Fig 3 – Mount system Layout

24th June 2017 , ISBN No. 819070985-2 97 97 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

In Eq. (5) through Eq. (6), k and b represents the stiffness and damping of the additional spring and the damper added to the Maxwell model as shown in Fig. 4. Eq. (5) through Eq. (6) can be expressed as system of 1st order differential equation as follows:

... 9

Fig 3 – Voigt Model 3.2 Model 2 - Maxwell-Voigt Model

... 8

3.3 Model 3 - Voigt Model with Bouc-Wen Element Fig. 5 shows the configuration of model 3. This model is similar to model 1. In order to capture the hysteretic behaviour over large range of operating frequencies, a Bouc­Wen

Fig 4 – Maxwell Voigt Model Fig. 4 shows the configuration of model 2. This model consists of a single degree of freedom system where the spring and damper are represented by stiffness k1 and damping b1 just like in model 1. However, there is an additional spring with stiffness k and a damper with damping coefficient b connected in series in Fig 5 – Voigt Model with Bouc­Wen Element & non linear reference to Maxwell­ Voigt model. The snubbing effect is modeled Stiffness just like the one presented in model 1. The equations of motion element is added (Ikhouane, 2006). The Bouc­Wen element for the system shown in Fig. 4 are as follows: is a nonlinear element that is added to the model to capture the time dependence by adding the time dependent parameter (z). , , , A and n are the set of Bouc­Wen element parameters that ... 5 need to be defined. The model that incorporates the Bouc­Wen element is shown in Fig. 5 and can be expressed as a system 1st order differential equations as follows: ... 6

... 7 ... 10

24th June 2017 , ISBN No. 819070985-2 98 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The nonlinear system shown above in Eq. (10) holds when there is no snubbing effect i.e. |xx| < xo, x1 = x and x2 = x฀. , , , A and n are constants referred to as Bouc­Wen parameters. z is the time varying constant ... 13 introduced by Bouc­Wen element. When xx  xxooo, the equations of motion (EOM) are as follows: In Eq. (3.21), k2 represents the snubber stiffness which is modeled as a cubic nonlinear relationship instead of the linear snubber stiffness used ... 11 in the previous models. The EOM of for xx xxoo are as follows: and finally when x  –xo the equations of motion are as follows:

...14

...12 4. Results & Discussion The optimization problem is solved using the method of Sequential Quadratic Programming. The objective function that 3.4 Model 4 - Voigt Model with Bouc-Wen Element and is used in this work is the weighted sum of the transmitted force Nonlinear Stiffness through each individual mount. The transmitted forces through the mounts are due to the shaking forces generated inside the engine and/or the forces generated from the varying road profile. Loads calculated at several steady speeds can be used to construct the objective function.

Fig 6 – Voigt Model with Bouc­Wen Element & non linear Stiffness Fig. 6 shows the configuration of model 4. This model is modeled like model 3. However, in all of the models mentioned above, the snubbing is represented as a linear spring. In model 4, snubbing is represented by a nonlinear stiffness to capture the progressive stiffening behaviour when the snubber is engaged. The governing EOM for model 4 are the same as defined in Eq. (13) when the snubber is not engaged i.e. |x|

24th June 2017 , ISBN No. 819070985-2 99 99 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Fig. 7 Initial Design

Fig. 8 Optimized Designs The optimization problem is solved using the SQP technique that employs a function to minimize the value of the objective function. The force vector corresponding to different engine steady speeds is shown in Table 5.1. The design variables resulting from the optimization process are shown in Table 5.2 to Table 5.4. The resulting force plots in the x and y directions for different engine speeds are shown in Fig. 5.4 to Fig. 5.6 and the resulting torque plots for different engine speeds are shown in Fig. 5.7 to Fig. 5.9.

24th June 2017 , ISBN No. 819070985-2 100 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

The major role of the mounting system in addition to Society of Automotive Engineers, technical paper series 01­2528. physically mount the powertrain to the vehicle frame is to provide 2. Akanda, A. and Adulla, C., 2006, “Application of Evolutionary vibration isolation. It is important to insure sufficient clearance Commutation in Automotive Powertrain Mount Tuning,” Shock and Vibration, Vol. 13, pp. 85­ 102. between the powertrain and the surrounding components. This 3. Ali, A., Hosseini, M and Sahari, B. B., 2010, “A Review of is achieved by imposing the appropriate boundaries when Constitutive Models for Rubber Like Materials,” American Journal designing the mounting system.The mounting system should be of Engineering and Applies Science, Vol. 3, pp. 232­239. able to isolate the frame under steady state loading conditions at 4. ANSYS 12.0, Help Documentation, 2009, ANSYS Inc. the same time l imiting the maximum excursion of the powertrain 5. Atkinson, A. C. and Donev, A. N., 1992, Optimum Experimental under transient loading conditions. Design, Oxford Science Publications. 6. Bretl, J., 1993, “Optimization of Engine Mounting Systems to In chapter 4, the mount models were developed to determine the Minimize Vehicle Vibration,” SAE, paper no. 931322, pp. 475­ optimum mounting system characteristics by minimizing the load 482. transmitted from the engine to the frame through the mounting 7. Carfagni, M., Lenzi, E. and Pierini, M., 1998, “The Loss Factor as system under multiple loading conditions. This objective was a Measure of Mechanical Damping,” Proceedings of the 16th achieved while satisfying the displacement constraints to limit International Modal Analysis Conference, pp. 580­584. the maximum excursion at specific locations on the powertrain. In 8. Chen, C. T., 2001, Digital Design Processing – Spectral Computation and Filter Design, Oxford University Press, Chapters 2, 3 and 4. the design process, the mount location, orientation and stiffness 9. Cocco, G., 2001, Motorcycle Design and Technology, Giorgia Nada. parameters were used as the design vector. It was found that the 10. Courteille, E. and Mortier, F., 2005, “Multi­Objective Robust Design mount orientation is significant and very important in achieving Optimization of an Engine Mounting System,” SAE, paper no. 01­ enhanced vibration isolation. The optimization problem was 2412. solved using MATLAB®. 11. Crede, C. E., 1965, Shock and Vibration Concepts in Engineering Design, Prentice Hall Inc Englewood Cliffs, N.J. References 12. Techniques for Engine Mount Modeling and Optimization (Fadi Alkhatib ­University of Wisconsin­Milwaukee) 1. Akanda, A. and Adulla, C., 2005, “Engine Mount Tuning for Optimal Idle and Road Shake Response of Rear­Wheel­Drive Vehicles,”

24th June 2017 , ISBN No. 819070985-2 101 101 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi An artificial bee colony algorithm for data collection path planning in sparse wireless sensor networks

Mr. R. V. Deshmukh 1Post Graduate Student Department Computer Science & Engineering, CSMSS Chh.Shahu College of Engineering , Aurangabad, Maharashtra, India

Abstract :­In sparse wireless sensor networks, a mobile robot is The robot must be within a sensor’s communication range usually exploited to collect the sensing data. Each sensor has a limited before it starts to collect the desired sensing data. The coverage transmission range and the mobile robot must get into the coverage of of a sensor can be specifiedby a disk with radius equal to the each sensor node to obtain the sensing data. To minimize the energy sensor’s transmission range. Therefore, the mobile robot must consumption on the traveling of the mobile robot, it is significant to reach all the disks in the WSN to complete the sensing task. plan a data collection path with the minimum Figure 1.1 shows a sparse WSN instance with five sensor nodes length to complete the data collection task. In this paper, we observe and amobile robot. Beginning at the starting point, the mobile that this problem can be formulated as traveling salesman problem with neighborhoods, which is known to be NP­hard. To address this problem, robot must visiteach disk at least once before it gets back to the we apply the concept of artificial bee colony (ABC) and design an starting point. Motivated by the high efficiency of artificial bee ABC­based path planning algorithm. Simulation results validate the colony (ABC) algorithm [10] in solving combinatorial optimization correctness and high efficiency of our proposal. problem, we apply the concept of ABC and propose an ABC­ Keywords:­Sparse wireless sensor network Artificial bee colony based TSP algorithm. However, DCPP is not apure combinatorial algorithm,Traveling salesman problem with neighborhoods optimization problem since it also includes the decisionon meeting points. We carefully design a meeting point selection strategy d I.INTRODUCTION integrate it into different phases of our ABC­based TSP algorithm. Throughextensive simulation results, the high energy efficiency Wireless sensor networks (WSNs) play an important role that can be achieved by our proposal is validated. in the cyberphysica system as they allow us to get the physical world information, e.g., temperature, sound, pressure, etc. A special II. Literature Survey kind of WSN is characterized by nodes geographical sparsity and therefore are usually referred as sparse WSN , where the To lower the energy consumption of data collection in sparse sensor nodes cannot directly communicate with each other WSN using mobile robot, considerable efforts have been or with the sink node. In this case, we usually explore a mobile devoted to finding the shortest robot travelling path. Yuan et al. robot to collect the sensing data. [19] use an evolutionary algorithm which first constructs the path by sensors coordinates and then fix the meeting point in each sensor by a given angle to the coordinate. Comarela et al. [3] combine greedy and ant colony optimization (ACO) [6] algorithm to solve the traveling path planning problem. They first construct the initialsolution by greedy algorithm and use ACO to shorten the path by adjusting meeting points’ permutation. Tekdas et al. [17] consider a scenario where multi­ robots are exploited to collect data from sensors. They split the network into different regions according to the number of robots and then find the travelling path for each region. Recently, Chiu et al. [2] consider situations involving sensors with overlapping communication ranges and propose a clustering­based parallel genetic algorithm to plan the traveling path.Many studies formulate the robot path planning into a TSPN problem,which also has attracted much attention in the literature. Elbassioni et al.[7] propose an approximate algorithm which first find a set of meeting points and then permutate them to produce a TSPN route by greedy algorithm. Gentilini et al. [9] formulate TSPN into a Figure 1.1: Example of robot routing in a network with five nonconvex mixed­integer nonlinear program (MINLP) and then sensors. transform it a convex nonlinear program by fixing all the integer 24th June 2017 , ISBN No. 819070985-2 102 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi variables. A special case of TSPN is known as TSP,which also save the energy usage and thus to minimize energy consumption. has been widely studied in the literature. Many swarm intelligence 2. Find a path of minimum length for sensing data collection by algorithms (e.g., ABC) based solutions have been proposed. Li using ABC algorithm et al. [12] propose a discrete ABC algorithm combining the The next problem goes with the collection of sensing data destruction and construction phases of iterated greedy algorithm from nodes.As per the assumptions the sensor nodes are not to solve TSP with time windows. Karaboga et al. [11] recently able to communicate with each other or any sink node to transfer show that ABC algorithm is suitable for the combinatorial or share the sensing information.Motivated by the high efficiency optimization problems like TSP. However, how to apply ABC for of artificial bee colony (ABC) algorithm in solving combinatorial more general TSPN that beyond pure combinatorial optimization optimization problem, we apply the concept of ABC and propose is still under­investigated and therefore we are motivated to study an ABC­based TSP algorithm. this issue. 3. To minimize network traffic III. Research Work The objective of our project is to minimize the network traffic in Wireless Sensor Networks (WSNs). As the sensor network In this, an extensive study of challenges/issues in Routing goes on increasing network traffic becomes a bottleneck for data for path calculation has been carried out. Path planning of mobile transfer. It becomes necessary to remove this bottleneck as to node to collect sensor node data with shortest path is an a major improve the performance of our project. issue. In simple routing methods, the mobile robot crosses the 4. To maximize sensor network lifetime region of the sensor node to collect the data. Due to this routing overhead is increased. An efficient mechanism is needed to reduce Sensor network lifetime depends upon the battery usage of such problem by collecting the data of sensor nodes at border of sensor. Thus to maximize sensor network lifetime it becomes the sensor node. By traditional routing algorithms the mobile necessary to minimize the battery usage. Minimizing the energy robot crosses the region of the sensor nodes. The central thrust consumption of sensor node reflects in maximizing the network of this dissertation is to study, implement and analyze Artificial lifetime. Bee Colony(ABC) based Travelling Salesman Problem(TSP) for • Scope of Research Work calculating the best routing path for mobile node to collect data Path finding is the effective mechanism but causes problem in Wireless Sensor Network(WSN). when it collects data from sensor nodes. The main purpose of the (i) Motivation of the Research Work proposed system is to overcome the problem i.e routing of mobile Wireless Sensor networks contains a base station and the node. Artificial Bee Colony(ABC) based Travelling Salesman sensor nodes,where we assume that the sensor nodes are not Problem(TSP) is used to improve the performance in terms of able to communicate with each other. In terms, it specifies that finding the shortest path of mobile node.The proposed system is the Wireless Sensor network is a Sparse Wireless Sensor compared with Greedy Approach to compare its feasibility and Network.In such situation we have to implement a mobile node accuracy of path finding. which is going to collect the data from such sensor nodes in iv. Major constraints Sparse Wireless Sensor Network. Such conditions of Sparse 1. Mobile node Wireless Sensor network may occur in military application.The The mobile nodes is assigned to collect the data from the motivation of this dissertation work is to discover the minimum sensor nodes in the field. It has to collect the data from the or best routing path for mobile node to collect the data from shortest path as to save the energy of the mobile node. If the sensor nodes.Idea of this dissertation is performance analysis path is not the shortest path then it degrades the system and performance improvement. A new routing protocol with ABC performance. based TSP algorithm is implemented. 2. Sensor Nodes Designing a efficient algorithm with the help of Artificial It is assumed that the sensor nodes are not able to Bee Colony algorithm and Travelling salesman problem to communicate with each other to pass the data for base station. calculate the best routing path for mobile robot. The major issue Mobile nodes is going to collect the data from sensor nodes. of mobile robot is to collect data from sensor node in its path with Sensor nodes must be plotted in between the sensor field other shortest path. We are going to collect the data as soon as mobile wise the mobile node may not be able to reach the sensor node. robot enters the region of the sensor node and would travel for 3. Artificial Bee colony(ABC) based Travelling Salesman further path. Problem(TSP) algorithm. (ii) Objectives Artificial Bee colony(ABC) based Travelling Salesman 1. To minimize energy consumption Problem(TSP) algorithm is used to calculate the shortest path of The main problem in Wireless Sensor Networks (WSNs) is mobile node. The Simulation result shows the accuracy of system energy consumptions by the sensor nodes. The energy resource to calculate the shortest path for mobile node. provided to WSN’s are limited. Thus the main objective is to

24th June 2017 , ISBN No. 819070985-2 103 103 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi v. Approaches for solving the problem and efficiency issues V. Result and Discussion ABC based TSP routing scheme is one of the approaches to solve the problem and efficiency issue. In Greedy approach, • Routing Distance of Mobile node the minimum distance is calculated between all nodes and path is formed. It increases the routing overhead. So instead of using Greedy approach, ABC based TSP routing scheme is used. In ABC based TSP routing scheme the shortest path is calculated considering three nodes, the present node, previous node and next node. Thus the routing path is so optimized that we get the shortest path for mobile node. • Outcomes Research work • The Best Routing path for mobile robot. • Increase the network and mobile lifetime.

IV. Artificial Bee Colony algorithm Routing problem is caused due to sensor nodes in wireless sensor networks are not able to communicate with each other.This routing problem thus degrades the mobile node performance.By implementing Artificial Bee Colony algorithm based on Travelling Salesman Problem,which reduces the routing path of mobile node, thus it helps to reduce routing overhead and increases routing performance. • Accuracy of the routing path finding algorithms. According to the principle of ABC algorithm, our algorithm consists of four phases, the initialization phase, the employed bees phase, the onlooker bee’s phase and scout bees phase. After the initialization phase, the employed bees phase, the onlooker bee’s phase and the scout bee’s phase are invoked iteratively for M cycles. The best solution after each cycle is registered after each iteration. The four phases are detailed as follows.

 Fitness of the routing path finding algorithms.

Figure 5.1: ABC­TSP Architectural design

24th June 2017 , ISBN No. 819070985-2 104 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

node in WSN and also improves the efficiency of the mobile node in terms of routing overhead, to collect data from sensor nodes in the wireless sensor network. In this paper, we present an ABC­based algorithm to solve DCPP problem in sparse WSNs. To suit ABC concept for the DCPP problem, we novelly design both the meeting point selection and the point permutation eneration strategies for different phases in our ABC­based algorithm. Through extensive simulations, the high efficiency of our proposal is validated. In the future, we will further extend our work to more general network model with multiple mobile robots. Conclusion New algorithm with the joint consideration of mobile robots In WSNs with large number of nodes, a path of minimum cooperation and travelling path planning will be proposed. length for sensing data collection by using ABC­TSP algorithm can be used. It helps to minimize the routing path of the mobile

24th June 2017 , ISBN No. 819070985-2 105 105 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi REAL TIME MONITORING SYSTEM FOR RAIL BY WIRELESS TECHNOLOGY

1Dr Sunil Jacob , Professor, ECE Dept 2Muhammed Sadiq, Student SCMS school of Engineering and Technology SCMS school of Engineering and Technology Karukutty Angamaly Kerala,India Karukutty Angamaly Kerala India [email protected] [email protected] 3 Dr Sheeja Janardhanan, Professor, Mechanical Engineering Dept SCMS School of Engineering and Technology [email protected]

Abstract—In Indian railway rail inspection is operated manually shadowing, where small shallow cracks can cast a “shadow,” or by trained human operator walking along the track with an dead zone, that potentially limits detection of more severe cracks ultrasonic testing instrument using single rail or double rail tester. by reflecting the ultrasonic beams, hence preventing the detection In our proposed system, we keep a vibration module and a wireless of deeper defects [3]. There is also the challenge of an automated transmitter system on the railway track. System can communicate system which gives a “false” call, where there is a report that of with the receiver system via a X-bee module. By considering vibrations of all bogies of train, a threshold value is set and any defect, which proves not to be there when a hand inspection for change noticed from threshold value during operation is analysed defect verification is performed. In order to overcome these by the vibration analyzer. Based on the output from the analyzer, restrictions various new methods have been examined, including the GPS module at the receiver section finds the location of fault. using ultrasonic surface and guided wave [4]. Guided and surface waves can be set to propagate along rather than across the rail, Keywords— Piezo electric vibration sensor;Arduino;ARM and are thus ideal for detecting critical transverse defects. In processor; GPS module addition, guided waves are less sensitive to surface shelling because they can run underneath these discontinuities [5]. The I. INTRODUCTION major challenge then becomes providing systems with the sensors and electronics needed for transmission and reception for the Railway transport being one of the most important ultrasonic waves that also provide both adequate sensitivity and commercial transportation system of India, it has greater influence transduction speed [6]. There are several technologies that can on socio­economic structure of our country. Therefore a little be used to transmit and receive ultrasonic waves, and these impairment to our long railway network has a heinous impact on include: EMATs for the guided wave methods [7], combined air­ the entire Indian society. The most advisable way to reduce this coupled and a pulsed laser methods, and wheel probes for guided damage is inspection of our rails frequently so that its quality is wave methods [8]. maintained to avoid major setbacks. The major challenge faced by one eminent scientists one the proper detection of the cracks The Indian Railway network has a track length of 113,617 and development of a reliable and repeatable crack detection kilometres over a route of 66,687 kilometres and 7,216 stations at technique. According to data from rail accidents survey we have the end of 2015­16[9]. Due to the, long structure in rails there are found that 2016 proved to be more dangerous for trains than limitations for applying continuous health monitoring in railways. 2015 which had only seven collisions and derailment in which 65 It means that, this kind of engineering structure has a very long people were killed. In 2016, nearly 150 people were killed in Indore­ length and due to that, the array of sensor as a receiver or Patna Express derailment alone [1]. Various defects that have transmitter shows difficulty [10]. New development in sensors been formed either during the manufacture or due to fatigue and and networks are trying to solve this problem. other failure mechanism can be considered as the major threat to Through this paper we are trying to draw attention towards the safe and sound operation of the railway system. On Indian the continuous monitoring of rail by wireless sensors. The Railways, flaw detection by ultrasonic is carried out with the help advantage of a wireless sensor is that it rules out human of two different types of equipment’s viz. Single rail tester and intervention in monitoring structure of rail at any time and place double rail tester [2]. These methods do have several drawbacks, for a long period. This device helps in transmission and most significantly the limited inspection speeds. From a technical acquisition of sensor data in a real­time mode and hence analyse outlook, there are additional challenges faced by the ultrasonic the signal over the tested structure. Wireless sensor modules NDT testing and these include issues relating to shallow crack that are powered and operated from to very low power has been

24th June 2017 , ISBN No. 819070985-2 106 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi proposed by Mascarenas[11].This is known to be thinner. Later The proposed system consist of Vibration module­X­bee on due to the advancement in technology an improved version transmitter module and Arduino UNO microcontroller in transmitter of wireless impedance sensor node with both functions of system and X­bee receiver module, ARM processor in receiver structural damage identification and sensor self­diagnosis have system. Piezo electric vibration sensor is used as vibration module. been developed by Park[12].Therefore wireless sensors are be Piezoelectric materials have useful mechanical and electrical considered as one of the best techniques to detect the rail damage. properties. In general, when an electric field is applied to the Our attempt is to develop and implement a real­time monitoring piezoelectric material, the material produces mechanical strains system for rail by wireless technology. This paper presents design, proportional to the electrical field (actuators); conversely, when construction and development of real time monitoring system of a mechanical pressure is applied, the material develops a voltage rail that will detect the position crack. proportional to the pressure (sensors)The sensor is connected to the analog input pins in the Arduino. Arduino UNO I. METHOLOGY microcontroller is used to control the process of the system. In our proposed system, we keep a vibration module and a Arduino UNO is an open source physical computing platform wireless transmitter system on the railway track. Vibration module based on simple I/O boards and a development environment that is a Piezo electric sensor, to measure change in vibration’s X­bee implements the processing or wiring language. This is a module act as a transmitter system. System can communicate microcontroller board based on ATMega 328. It has 14 digital with the receiver system via a X­bee module. The Arduino UNO input/output pins (of which 6 can be used for PWM outputs), 6 micro controller which is the processing and control unit receives analog inputs, a 16Mhz ceramic resonator, a USB connection, a the inputs from the sensors and operate the accordingly. Above power jack, an ICSP header, and a reset button .X­bee module is described system is placed on the railway track by keeping embedded in this system to communicate between transmitter distance between them. Point A,B,C in below figure[1]represent and the receiver system. Battery is used as an energy source, various points where transmitter system can be placed. By usually a battery Receiver system consist of X­bee receivers of considering vibrations of all bogies of train and vibration in the various transmitter systems, a Signal Processing Module and a railway track, a threshold value is set and any change noticed ARM processor to control the various X­bee receivers. Signal from threshold value during operation is analyzed by the vibration from X­bee receiver is processed by a Signal Processing Module analyzer. Based on the output from the analyzer, the GPS module ARM is advanced RISC machine. RISC processors are designed mounted on the train finds the approximate location of fault. to perform a smaller number of types of computer instructions so that they can operate at high speed, more millions of instructions per seconds. Fast response, optimised for high performance, hard real time application, low power consumption, optimised for security applications are main reasons for usage of ARM.

Fig1:Proposed Setup for continuous rail monitoring system

I. HARDWARE IMPLEMENTATION

Fig 3: Real time Crack detection Monitoring system

Fig 2:Analysis of vibration sensor in rail

24th June 2017 , ISBN No. 819070985-2 107 107 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

I. CONCLUSION 5. F. Lanza di Scalea, P. Rizzo, S. Coccia, I. Bartoli, and M. Fateh, “Laser–Air­Coupled Hybrid Noncontact System for Defect Continuous monitoring of rail by wireless sensor is Detection in Rail Tracks,” J. Transportation Research Board, 1943, implemented on the hardware. Prototype is developed and tested 2006, pp. 57–64 6. Assessment of Ultrasonic NDT Methods for High Speed Rail for real time monitoring of crack detection. Using vibration sensor Inspection By Jianzheng Cheng and Leonard J. Bond in the track and GPS mounted in the train we we can find the 7. R. S. Edwards, Y. Fan , M. Papaelias, S. Dixon, C. L. Davis, and C. approximate position of crack. Through this we can rule out human Roberts, “Ultrasonic Detection Of Surface­Breaking Railhead intervention in rail monitoring. Defects,” in Review of Progress in Quantitative Nondestructive Evaluation, 27, 975, edited by D. O. Thompson and D. E. Chimenti, Acknowledgment American Institute of Physics, Melville, NY, 2008, pp. 602­609. 8. D. Hesse and P. Cawley, “Excitation Of Surface Wave Modes In The authors would like to thank Mr Raju Francis(Senior Rails And Their Application For Defect Detection”, in Review of Section Engineer, Chalakudy) and Mr. Jose Sheril D’cotha Progress in Quantitative Nondestructive Evaluation, 25, 820, edited (Assistant professor, Department of Mechanical Engineering by D. O. Thompson and D. E. Chimenti, American Institute of Physics, Melville, NY, 2006, pp. 1593­1600. ,SSET) for giving invaluable comments for the experiments. 9. “Indian Railways statistical publications 2015­16:stastical summary” Ministry of railway.Retrived 26 febuary 2017 References 10. Rail inspection technique employing advanced nondestructive testing 1. Indian Railway statistical year book India 2016.(references) and Structural Health Monitoring (SHM) approaches­ A review by Firouz Fadaeifard, Meysam Toozandehjani, Faizal Mustapha, 2. Revised USFD Manual 2012 final incorporated A&C_no.9 Khamirul Amin B. Matori1, Mohd Khairol Anuar b. Mohd Ariffin, 26.06.2012­1 Nur Ismarrubie bt. Zahari, Amir Abbas Nourbakhsh 3. R. Clark, “Rail Flaw Detection: Overview and Needs for Future 11. Mascarenas, D., Flynn, E., Todd, M., “Wireless sensor technologies Developments,” NDT&E International, 37, pp. 111–118 (2004). for monitoring civil structure”, Sound and Vibration, (2008),16­20. 4. D. Utrata and R. Clark, Groundwork For Rail Flaw Detection Using 12. Park S, Shin H. H,Yun C. B., “Wireless impedance sensor nodes for Ultrasonic Phased Array Inspection, in Review of Progress in functions of structural damage identification and sensor self­ Quantitative Nondestructive Evaluation, 22, 657, edited by D. O. diagnosis” , Smart Materials and Structure ,18 (2009), 1­11 Thompson and D. E. Chimenti, American Institute of Physics, Melville, NY, 2003, pp. 799­805.

24th June 2017 , ISBN No. 819070985-2 108 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi AN EXPERIMENTAL STUDY OF AUTHENTICATION USING IRIS IN DIFFERENT VIEW

Mrinal Manjari Nitu Chauhan Assistant Professor, ECE Department Assistant Professor, ECE Department Echelon Institute of Technology, Faridabad Echelon Institute of Technology, Faridabad [email protected]

ABSTRACT: In this paper provides one of the most secure methods of morphogenesis that occurs during the seventh month of authentication and identification thanks to its unique characteristics. gestation, which means that even identical twins have differing Once the image of the iris has been captured using a standard camera, irises. The iris has in excess of 266 degrees of freedom, i.e. the the authentication process, involving comparing the current subject’s number of variations in the iris that allow one iris to be iris with the stored version, is one of the most accurate with very low distinguished from another. The fact that the iris is protected false acceptance and rejection rates. This work proposes two alternative algorithms for iris recognition. The first involves the arrangement of behind the eyelid, cornea and aqueous humor means that, unlike spatial patterns of the iris image, and is detected by application of canny other biometrics such as fingerprints, the likelihood of damage edge detector. The second algorithm describes the use of an Iris Signature and/or abrasion is minimal. The iris is also not subject to the which employs discrete wavelet transform for the same. The results of effects of ageing which means it remains in a stable form from authentication for the two algorithms have been obtained and compared. about the age of one until death. The use of glasses or contact Further, noise caused in the image due to variant illumination and lenses (colored or clear) has little effect on the representation of eyelashes were also removed successfully. In the later phase of the the iris and hence does not interfere with the recognition paper, we extracted iris as an ellipse instead of a circle, and concluded technology. that this approach enhanced the accuracy of authentication considerably. Keywords: Iris, image, ellipse, recognition, Significance INTRODUCTION Now a day’s biometric identification utilizes physiological and behavioral characteristics to authenticate a person’s identity. Some common physical characteristics that may be used for identification include fingerprints, palm prints, hand geometry, retinal patterns and iris patterns. Behavioral characteristics include signature, voice pattern and keystroke dynamics. A biometric system works by capturing and storing the biometric information and then comparing the scanned biometric with what is stored in the repository. Out of all the various physical characteristics available, Figure 1: The structure of the human eye irises are one of the more accurate physiological characteristics Advantages of Iris Recognition that can be used. The physiological properties of irises are major advantages In information technology world, security for systems is for using them as a method of authentication. As discussed earlier, becoming more and more important. The number of systems that the morphogenesis of the iris that occurs during the seventh have been compromised is ever increasing and authentication month of gestation results in the uniqueness of the iris even plays a major role as a first line of defence against intruders. The between multi­birth children. These patterns remain stable three main types of authentication are something you know (such throughout life and are protected by the body’s own mechanisms. as a password), something you have (such as a card or token), This randomness in irises makes them very difficult to forge and and something you are (biometric). hence imitate the actual person. The Iris Scalability and speed of the technology are a major advantage. The iris has many features that can be used to distinguish The technology is designed to be used with large­scale one iris from another. One of the primary visible characteristic is applications such as with ATMs. The speed of the database iris the trabecular meshwork, a tissue which gives the appearance of records are stored in is very important. Users do not like spending dividing the iris in a radial fashion that is permanently formed by a lot of time being authenticated and the ability of the system to the eighth month of gestation. During the development of the scan and compare the iris within a matter of minutes is a major iris, there is no genetic influence on it, a process known as chaotic benefit [1].

24th June 2017 , ISBN No. 819070985-2 109 109 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Disadvantages of Iris Recognition would result in faster transaction times that leave the bank teller As with any technology there are challenges with iris with more time to concentrate on the level of service provided to recognition. The iris is a very small organ to scan from a distance. the customer [1,7]. It is a moving target and can be obscured by objects such as the IRIS RECOGNITION eyelid and eyelashes. Subjects who are blind or have cataracts Iris Image Acquisition can also pose a challenge to iris recognition, as there is difficulty It is to capture a sequence of iris images from the subject in reading the iris. using a specifically designed sensor. Since the iris is fairly small The camera used in the process needs to have the correct (its diameter is about 1 cm) and exhibits more abundant texture amount of illumination. Without this, it is very difficult to capture features under infrared lighting, capturing iris images of high an accurate image of the iris. Along with illumination comes the quality is one of the major challenges for practical applications. It problem with reflective surfaces within the range of the camera is of prime importance to have adequate hardware set­up to as well as any unusual lighting that may occur. All of these impact capture iris image with sufficient precision. For our purpose, we the ability of the camera to capture an accurate image. The system have taken our database from the site: http://phoenix.inf.upol.cz/ linked with the camera is currently only capturing images in a iris/ [9]. monochrome format. This results in problems with the limitations A sample from the database is shown: of grayscale making it difficult to distinguish the darker iris colorations from the pupil [1, 2]. Applications of Iris Recognition The most obvious use of iris recognition technology is within the computing environment. There is a lot of valuable data stored on a company’s network and being able to access the network with a username and password is the most common method of authentication today. If a username and password is stolen then this gives the thief all of that person’s access privileges and this can be detrimental to a company in today’s Figure 2: Sample of iris competitive environment. Implementing an iris recognition system Pre-Processing (Noise Removal) to authenticate users on the network means that there are no Variant illumination can be taken care by simple image passwords to steal and no tokens to lose. Users are only able to processing methods such as Histogram Equalization and access the systems they have privileges to access and it’s very Adaptive Quotient Thresholding. difficult for someone to replicate an iris for authentication. The For eyelashes, it can be detected and the relate pixels labelled technology can not only be used for securing log on but also in as noise pixels. These pixels are rendered redundant using Iris areas such as file and directory access, web site access and key Binarization[11,3]. access for file encryption and decryption. In a network Histogram Equalization environment, a system may be configured to compare the live template to the stored template and if a match is found then the This method usually increases the global contrast of many user’s access privileges are passed back to the client. In other images, especially when the usable data of the image is implementations, after a match is found, the server returns a represented by close contrast values. Through this adjustment, username and password to the client, which then transmits this the intensities can be better distributed on the histogram. This information to the network server to allow access to the systems allows for areas of lower local contrast to gain a higher contrast the user has privileges to. Enterprise applications are also being without affecting the global contrast. Histogram equalization worked on in the areas of e­commerce, healthcare applications accomplishes this by effectively spreading out the most frequent for medical records protection, insurance and brokerage intensity values as shown in Figure 3 [10, 6]. transactions [1,8]. Results: Iris recognition is also being utilized or considered in other areas of daily life. ATMs are a major area where iris recognition is being trialled. The use of this technology with ATMs means that customers can discard their plastic cards and PINs thus eliminating the possibility of having cards and/or PINs stolen or lost. The banking industry is also involved in looking at implementing the technology in over the counter transactions with customers. This would reduce the requirement for customers to produce identification, bank books, account numbers etc and Before

24th June 2017 , ISBN No. 819070985-2 110 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

threshold are made black, and similarly all those with intensity lower than the threshold are made white. The threshold used is in direct relation with the average intensity of the image. The coefficient that we have used is 0.52. Significance of Binarization: The significant advantage that Iris Binarization has is that it eliminates the noise added by eyelashes. It is strikingly efficient in encountering the noise caused due to the reflection of After eyelashes on the eye, while taking the image. These reflections Figure 3: Images before and after Histogram Equalization may or may not be present in different sets of images. Figure 5 Adaptive Quotient Thresholding shows two images of the same eye of the same person. As is The adaptive method computes several histograms, each evident from the images, the first image hardly has any eyelash corresponding to a distinct section of the image, and uses them reflections, while the same is reasonably visible in the second to redistribute the lightness values of the image. Ordinary one. histogram equalization simply uses a single histogram for an entire image. The quotient thresholding partitions an image in a database into foreground and background such that a ratio between the foreground and background of all images in the database are Figure 5: Images without and with reflection of eyelashes maintained [10]. Results: Consequently, adaptive histogram equalization is considered an image enhancement technique capable of improving an image’s local contrast, bringing out more detail in the image (Figure 4). Results:

Before

Before

After Figure 6: Images before and after Iris Binarization As we can see in Figure 6, the noise has been significantly captured in the pixels that are black in the binarized image. After Specifically, in our area of interest that is the iris region. Being Figure 4: Images before and after Adaptive Quotient aware of the outer radius of the circular iris, we come to know Thresholding about the noise pixels within the boundary. Iris Binarization ELLIPTICAL DETECTION Iris Binarization is a method to remove the noise pixels, The eye is assumed to cover a significant portion of the image which are infact effect of eyelashes, from the image before acquired by a standard video camera. The system must be robust preceding further to implement the localization algorithm. This to occlusion (e.g. eyelids), skin and eye shape variations, image ensures increase in the efficiency of the verification [18]. quality, and perform reliably in unstructured, general illumination conditions. Gaze and iris position within the image are The grayscale image is transformed into a binary image by unconstrained. The primary target is the determination of the iris thresholding. That is, all pixels having intensity greater than the

24th June 2017 , ISBN No. 819070985-2 111 111 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi centre with an accuracy of 5 pixels in a 360x280 image [8]. of 50 different individuals, each having three images for the left The above mentioned techniques can be easily used in these eye and three for the right. Each eye was considered as “of a images. different person”; i.e., each person has two identities, the one of the left eye and the one of the right one. That makes 100 “virtual” different users. The system was so trained to two images, that is to say that their information was extracted and stored separately initially. And, the remaining image is used as test sample which is fed to the system to draw results for authentication. The results are tabulated in the chronological order of our approach. The results for the elliptical and circular approach as well as those for the three different feature matching techniques have been compared. Results in verification using Elliptical Detection Figure 07: Examples of low-difficulty images [15] However, Figure 08 shows a set of images have a heavily occluded iris, and the image quality is also low in aspects of blur, motion etc, and more importantly the eye is looking elsewhere in most of the images. These images thus form challenging images and considering the iris as a circle becomes unjustified. Thus, elliptical detection is essential in these situations.

Figure 09: Graph for results in verification using Iris Code

Figure 08: Examples of detection for challenging images, includingheavily occluded iris, lower image quality (e.g. blur, motion) [15]

EXPERIMENTAL RESULTS Figure 10: Graph for results in verification using Iris Signature The experimental results of iris recognition are shown and compared using two standard error rates False Acceptance Rate and False Acceptance Rate. • False Accept Rate or False Match Rate (FAR or FMR) – the probability that the system incorrectly declares a successful match between the input pattern and a non­matching pattern in the database. • False Reject Rate or False Non­Match Rate (FRR or FNMR) – the probability that the system incorrectly declares failure of match between the input pattern and the matching template in the database. It measures the percent of valid inputs being rejected. Figure 11: ROC curve for verification using Iris Code • Genuine Acceptance Rate (GAR) = 100­ FRR In our work, we have used a database comprising of images

24th June 2017 , ISBN No. 819070985-2 112 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

CONCLUSION

In this paper, we have developed several iris recognition approaches and obtained several results to show the performance of each approach. Firstly, as a constituent of pre­processing, the inherent noise on the irises was removed using three different approaches: Histogram Equalization, Adaptive Quotient Thresholding and Iris Binarization. Thereafter, two different feature extraction algorithms have been used: one of them based on edge detection generating Iris Codes and the second based on discrete wavelet transform generating Iris Signatures. Also, Figure 12: ROC curve for verification using Iris Signature these algorithms have been tested with three different pattern From Figures 09 and 10, it can be seen that for detection recognition methods, based on two distances: Euclidean and using iris codes, the area under the intersection region of the Hamming. Finally, the iris was mapped onto an ellipse instead of FAR and FRR curves is greater compared to the area in case of a circle. detection using iris signatures. The area of intersection refers to Experimental results have shown that the best metric in all the region where both false acceptance and false rejection is cases turns out to be Iris Signature. It obtains exceptionally good occurring. And therefore a greater area will essentially imply higher results for feature extraction algorithm. It is also important to probability of error in the algorithm. Thus, the two curves indicate emphasize that elliptical detection is a more preferred and that the iris signature algorithm is a better approach than the iris enhanced outlook to the problem than circular detection as it code algorithm. takes into consideration the extra information that is left out in The same result can be observed from Figures 11 and 12, the latter. The same is evident from the results. which show the ROC curves for the two algorithms. For iris codes, 100% recognition is achieved at a FAR of 1%, where as the same REFERENCES is achieved for iris signatures at a FAR of 0.111%. Also, the value 1. Penny Khaw, “Iris Recognition Technology for Improved of GAR at a FAR of 0.01% has been obtained to be 60% for iris Authentication”, SANS Security Essentials (GSEC) Practical codes and 90% for iris signatures. This also emphasizes that Assignment, Version 1.3, 2002 detection using iris signature is better than iris codes. 2. L. Flom, A. Safir, “Iris Recognition System”, U.S. Patent No. 4641349, U.S. Government Printing Office, Washington DC, 1987 3. John Daugman, “High Confidence Recognition of Persons by IrisPatterns”, Security Technology, IEEE 35th International Carnahan Conference on, 2001, pp 254­263 4. W.W. Boles, Boashash, “A Human Identification Technique Using Images of the Iris and Wavelet Transform”, IEEE Trans on Signal Processing, 1998, 46(4), pp 1185­1188 5. R.P.Wildes, J.C. Asmuth, et. al, “A System for Automated Iris Recognition”, Proc of the Second IEEE Workshop on Application of Computer Vision, 1994, pp 121­128 6. S. Tsuji and F. Matsumoto, “Detection of ellipses by a modified Hough transformation,” IEEE Transactions on Computers, pp. 777–781, 1978. Figure 13: ROC curve for circular detection using iris 7. J. Canny “A Computational Approach to Edge Detection”, IEEE signatures Transaction on Pattern Analysis and Machine Intelligence Vol. 8, Figure 13 shows the ROC curve for circular detection using 679­ 714,1986. iris signatures. Comparing this with Figure 32 which shows the 8. Alex Yong Sang Chia, Maylor K. H. Leung, “Ellipse detection with Hough Transform in one dimensional parametric space”, ICIP, pp. curve for elliptical detection, it is observed that the value of FAR 333–336, 2007 for which the curve jumps to 100% genuine acceptance is larger 9. http://phoenix.inf.upol.cz in case of circular detection. In case of circular detection, 100% 10. Ya­Ping Huang, Si­Wei Luo, En­Yi Chen, “An Efficient GAR is obtained at 0.133% FAR, while for elliptical detection, it is IrisRecognition System”, Proceedings Of The First International obtained at 0.111% FAR. These results back our literature review Conference On Machine Learning And Cybernetics, Beijing, pp. 450­455, 4­5 November 2002 and highlight the face that elliptical detection is an enhanced 11. Wai­Kin Kong, David Zhang, “Detecting eyelash and reflection way of approaching the iris recognition problem than circular foraccurate iris segmentation”, International Journal of Pattern detection. Recognition, Vol. 17, pp. 1025­1034, 2003

24th June 2017 , ISBN No. 819070985-2 113 113 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Innovations are really bridging the gaps in Translation Translations and Innovations

Sonali Misra School of Translation Studies and Training Indira Gandhi National Open University Delhi [email protected]

Abstract—How the innovations and techniques are creating the can understand the great works of our own saint scientists, impacts in the human process like translation and they are washing mathematicians. In today’s world of globalization, translation the hurdles away from this mode of communications. does matter, where nations and language interact with each other in daily basis, where they exchange the techniques, where they I. TRANSLATION exchange their innovations. As soon as we heard the word translation, automatically Translation: History and Process we understand the process easily, to transfer the words from one Though translation is very much present in our history and language to another language. According to some people this is we can see it in the field of literature and mythology. The entire very simple process, only you must have the knowledge of the Bhakti Yug literature is nothing but a sort of translation and re­ source language as well as the target language. We take the creation. We can take the example of Rama and Ramayan. We words from source language and translate the same in target have lots of Ramayan in our country, and not in our country, the language. But translation is not as simple as this definition. As Ram katha is almost available everywhere in this subcontinent, George Steiner says in his study of translation, After Babel: but in the respective language. Where ever Indians went for Aspects of Language and Translation: “All acts of their livelihood, they took their Rama along with them and then 1 communication are acts of translation.” This is true, whatever they translated the Ramakatha in their own words, they localized we speak, whatever we think and whatever we presume is nothing the Ramakatha in the local language. Today we can see the but a sort of translation. We see a picture and we translate the Ramakatha manchan in Indonesia, Malaysia. Rama is there, Sita image of the picture in our mind, we analyze the same and then is there, the entire story is there, the values that Ramkatha owns only we appreciate the work of the artist. When we communicate are there, but they are in the new form, new language structure. to other person we translate his sound and body language to Even today, people used to trace the link between the countries understand him or her. We can get the glimpse of his or her on the basis of Ramayana, as we can see lots of stories emerging personality through the translation. We can judge the film or the like Sita belongs to Korea. play only by translating the acting of the actor. So, translation is This is nothing but translation. Translation is the most not only the process of bring the words of one language in to important tool to not to create our own identity, but it is the most other language, in broader context, it is an art of communication. important tool to get our identity back, to get our pride back. We are engaged in translation in every moment of our life. We Because of translation we can say the communication gap can do any innovation only after analyzing the old innovation disappears. And as a bridge translation not only bridges the gap and translate it in our imagination. of two countries and two cultures, but it is very important for our As we can see from the journeys of computer from its origin historical achievements. to today, Airplane or the telephone or any other machine When we talk about the translation, we stuck to the process. invention. What process does the person follow to bring the whole story in So when we say What is translation, we can immediately his or her own language? What are the strategies of translation? connect to the other question “why is translation important? There is three way strategy. First the translator has to read the Why does it matter?” text and then understand as well as analyze and then translate in In the field of literature and history, we really bother about his own language. According to Peter Newmark the translation translation, as translation is the only tool to understand the history strategy can be: and culture of the new land. But same this applies in the field of science and technology. Only through the art of translation we

24th June 2017 , ISBN No. 819070985-2 114 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

translation better and it has used the feature suggest and edit, and contribute, as we can see in the below example,

2

Machine Translation: History and Challanges Here the word power is being used for  and not for  Now in the digitalized world, question arises, can a human process like translation can be done by machine? Can machine Anybody can contribute the word lÙkk and edit it. and later it translate the values of Rama in the same manner it is being can be used by Google. translated by human? Can the works of Shakespeare be translated in Hindi by the help of software and create the impact as it was being created by Bhartendu Harishchandra or Harivansh Rai Bachchan? Now a days we can see lots of translation tools available in the market and they are making the process easy for the translators. Since the translator analyze the source text in his mind and then able to communicate the same in his own language, so can the same process be applied in a software? Can the level So here we can see that though the translation process is of equivalence be achieved through the machine translation? being made easy by the automation, but human intervention is Can the philosophy of Kabir or Rahim or the ideological poems still required. of Pable Neruda can be understood by the machine? Or they are There are lots of works being carried by the Indian just the helping tools for the human translation? There are lots of Government also for machine translation, like MANTRA questions and challenges in the digital world’s translation. Rajbhasha, is a MachiNe assisted Translation tool, which is based If we look in to the machine translation, it was started in the on the MANTRA Technology designed and developed by the 1950s. We can divide the machine translation in two types. One Applied Artificial Intelligence Group (AAI), C­DAC, Pune and is with the help of Computer Aided Tools and other is automatic sponsored by the Department of Official Language, Ministry of translation. There is always need of the publishable quality, Home Affairs, Government of India . It translates documents particularly the production of multilingual documentation for large pertaining to Personal Administration such as gazette notification, corporations. Here these tools can be used as the helping tools office order, circular, office memorandum and Finance domains and later translation can be edited as per the demand. In this from English to Hindi and is being expanded to cover the other process we don’t get the accuracy of the human translation from prominent domains of agriculture, information technology and the machine. But here lots of time can be saved; this process is education. 3 called human­aided machine translation (HAMT). But now a days We can say that though the process of translation is human there is a growing demand for the instant translation, like in process, still the innovation and new techniques are making this travelling, common visiting places, social interchange, where high process easy. But one thing is sure that all this machine process quality is not necessary, we can see lots of technical innovations is being done with the help of human. Techniques cannot tell the in translation. In a mobile, you can get the words of any language. person the art of translation, nor they can provide you the skill of We can take the example of Google translation. The translation, but they can give you the tools so that a translator translation is very useful if we need for one word or two or the can brush up his or her skills, can store the words in the memory technical translation. But the accuracy is still far short of quality of the software and fast up the speed of translation. translation. It is because of the fact that translation is the human Sonali Misra process, machine or software can use the words, but one word Research Student has different meaning in the same article or in the same report.        And words are being used as per the context and reference. Any machine can never understand the native references. So the need School of Translation Studies and Training of the native speakers is still there for the translation, in spite of Indira Gandhi National Open University lots of translation software. But Google is trying to make its Delhi

24th June 2017 , ISBN No. 819070985-2 115 115 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi Paradigm Shift in Media Pramod Kumar, Research Scholar, Dept of Journalism & Mass Communication, VMOU, Kota Dr Subodh Kumar, Associate Professor, VMOU, Kota, Rajasthan

Abstract : Apple’s Chief Executive, Steve Jobs, while introducing stands at 53%). Along with it, today India has over 390 million his first smartphone in January 2007 had proudly claimed: “This will internet users8 (as on December 31, 2016) and 24.33% of them use 1 change everything”. Now after 10 years, Apple’s iphone exemplified internet on their mobile phones. By the year 2020, there will be st the early 21 century defining technology. “Today smartphones have 730 million internet users in the country. India has become larger become the fastest selling gadgets in history. About half the adult than the U.S. in terms of number of internet users. Internet and population owns a smartphone and by 2020, 80% will.2” As the young population seems mad after smartphone, even the leading media houses Mobile Association of India (IAMAI) claims that India will have are ready to go any extent to trap them by offering content of their 420 million mobile Internet users by June 2017. Of the 420 million, interest on smartphone only. It has completely shifted the focus from about 250 million users are expected to come from urban India, print or broadcast to web. The Hindustan Times closed down its four while the remaining 170 million would be in rural parts of the editions in January 2017, while Times Group sold its Gujarati newspaper country. Apart from it, India has 142 million (as on March 11, in March 30, 2017 just to focus on web editions only. Not only Hindustan 2016) Facebook users (1.59 billion at global level as on January Times and Times of India, but The Indian Express too has decided to 27, 2016)9—second largest market worldwide. 133 million of these focus only on web editions in future and wind up the print editions users access FB on their mobile phones. Similarly, for LinkedIn, gradually. This shows how the print media is losing ground to web. India is the second­largest market with more than 30 million users, Key words: Smartphone, social media, netizens, paywall while Twitter India is set to be the third­largest market in terms of Introduction user base with more than 23.2million10 users, as on December When Alan Rusbridger3, the then editor­in­Chief of ‘The 2016. Not only this, there are over 1billion WhatsApp11 global Guardian’ while delivering annual Hugh Cudlipp (founder editor users as on January 2016. Twitter is now the top source of breaking of ‘The Mirror’) Lecture at London College of Communication on news12 even in mainstream media, both print and electronic. January 25, 2010, said “most scoops have a life expectancy of Instagram has also captured big market in India with 33 million about three minutes,” majority media planners laughed at him. users as on April 201713. They were not ready to accept the growing influence of social India is now the second­biggest smartphone market in terms media. Now, as the prerogative of breaking the news has shifted of active unique smartphone users, crossing 220 million users, from mainstream media to the social media users, Alan has proved surpassing the US market14". As the number of mobile internet correct. Some media experts, however, see it as “democratisation users is increasing with each passing year, mobile users are of news”, majority look at it as “a warning bell for the mainstream becoming more data hungry. In 2015, the share of mobile internet media”. Loss of ‘exclusiveness’ in news is just one aspect, the spend in average monthly bill rose to 64% from 54% in the previous crisis is far deeper. Majority media planners have started accepting year. However, this has a clear impact on the cost of accessing that the prediction by US scholar Philip Meyer that “the last mobile data that fell about 18% in 2015. These changes can be newspaper in the US will be printed in first quarter of 2043” may attributed to the fact that with the improving mobile infrastructure prove to be correct in Indian context also around the same time. and the availability of improved high­speed 3G and 4G They have visualised that the critical situation faced by the print connectivity, people are shifting to apps and internet for most of media of the US or other Western countries is soon going to their activities. The dependency on voice call has been reduced develop before the Indian print media also. and people rather prefer internet on their mobile phone to make Strength of Digital more informed decisions. Digital revolution has armed the common man with Shift to Web ‘powerful’ weapons in the form of mobile phone and social media The growing influence of social media in the West has forced platforms to challenge the unquestionable monopoly of the many leading newspapers and magazines to close down their 1,05,443 registered newspapers4 (as on March 31, 2015) and 832 print editions. ‘Newsweek’ stopped print edition in December (403 news and current affairs and 429 non­news channels) 2012. ‘The New York Times’ of the US and ‘The Independent’ of permitted television channels5 (as on December 2015) in India. In UK have also announced to opt for web editions only. Those India, as on June 30, 2016, a total 103.5 crore mobile phone who had put paywall have also been forced to withdraw it. UK’s connections are used6 and 23% of the users use Smart Phones. ‘The Sun’ tore down its online paywall to gain a larger audience. The figure of smart phones is expected to rise up to 37 per cent ‘The Guardian’, in spite of its own huge online following of 158 by the year end 2017.7 Google India claims that around 94% Indian million browsers, now says to “cut costs by 20%”15. ‘The smartphone users use the device to access internet and 56% of Guardian’ editor Katharine Viner was reported saying they ‘are them access internet multiple times a day (in US, the number 24th June 2017 , ISBN No. 819070985-2 116 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi not looking at an online paywall’16. Instead of thinking about magazines that shift to web will survive. However, 88% earning money by imposing paywall ‘The Sun’ is looking towards commented that web’s emphasis on speed and immediacy poses other money making ventures that fit with its brand. It already a danger to accuracy, quality and journalistic values of made huge profit from Dream Team, a fantasy football game, and newspapers or channels. 89% believe that after the arrival of soon it will become a bookmaker, with Sun Bets expected to launch digital media the verification of facts before publishing the story this year. “Look, I think the future for news brands is going to be has decreased. a variety of revenue streams and it’s not just going to be cover Reader is the King price any more than it’s going to be advertising and ... as Katherine The newspapers or TV channels worldwide have Viner highlighted, we all need to look to our strengths to see that undisputedly lost the prerogative of what to censor and what to there are areas that we can play in to be successful for a long time serve. They are finding it difficult to save their reader or viewer 17 in a sustainable future,” said ‘The Sun’ editor Tony Gallagher . base and are even ready to change their editorial policies as per Readers Reject Paywall the readers’ wishes. Questioned by its majority online readers, Panicked Indian media houses including big brands like ‘Playboy’ has started putting clothes to the women photos. Since The Time of India, The Hindustan Times, The Indian Express, etc March 2016 issue, it abandoned full­frontal nudity, which has are finding it tough to put paywall on their web editions. Many of been the core of the brand’s identity since its beginning in 1953, the leading newspapers are internally planning to have only online with a centerfold of Marilyn Monroe and lots of pathbreakingly editions as their print circulation is decreasing. The owners of candid talk about sex. Interestingly, the ‘new version of Playboy’ media houses who have visualised the threat are trying hard to has been liked by 400% more readers. “A year and a half ago, we find the ways to survive. The Hindustan Times closed down four relaunched www.playboy.com, and traffic skyrocketed 400%,” editions18 this year and The Times of India sold out its Gujarati Cory Jones20, Playboy’s chief content officer said adding that newspaper on March 30, 2017. The Indian Express has “the average age of our visitors dropped from 47 years old to 30”. permanently dropped the idea of launching any new edition. There is an opposite trend also. Faced with tough competition to Rather it has launched its Malayalam edition on web on January win over audiences, an Albanian TV channel in the Balkan 30, 2017 and is in the process of launching about seven more country took a literal approach towards giving viewers the ‘naked’ editions in different languages like Bangla, Tamil, Telugu, etc. truth—by employing almost­topless newsreaders21. Wearing The Times of India had dropped the idea of launching any new open jackets and nothing underneath, the young women are print edition about four years back when it launched reading the headlines on ‘Zjarr TV’ for over a year. The channel’s 22 www.samayam.com to woo the online readers in Tamil, Telugu, owner says audiences haven’t stopped growing since . But such Malayalm. The strategy behind launching web editions only is tricks are not going to help for long. to basically trap the worldwide readers of that particular language Stakeholders Turn Competitors and encash the user base involving advertisers. Dainik Bhaskar The skyrocketing impact of social media on real time and Amar Ujala had conducted this experiment about six years journalism can be understood from one more fact that top stories years back and that model has proved to be a big hit. Dainik in both newspapers and news channels are now decided Bhaskar conducted this experiment in Indore to attract the people according to the trending stories on social media. In this way, the of Indore living anywhere in the world. The idea clicked perfectly. news gathering has shifted to public domain. A vast pool of “This trend will stay and not only the big newspapers but also news, views, opinion and ideas is available in public domain and the leading news channels will shift to web and gradually they even the big media houses take good quantity of input out of will close down their print editions or satellite broadcast” this pool. Even the news from political parties, leaders or Parliament (Upasane19 2017). is no more exclusive. The press releases or tweets by leaders or During a study conducted by the researchers in April 2017, parties become public within seconds. Not only this, the people 60% newspaper readers, TV news viewers said the newspapers/ in distress prefer to contact government agencies for help through magazines in print form would vanish in near future. Equally, 51% the social media networks than through the mainstream media. believe that the present satellite TV channels will be web based Finding no way out the media now take news from citizens, only in near future. 84% newspaper readers find the news in television, internet, micro blogging sites, twitter, Facebook, etc audio and video form more convenient. 70% believe that without hesitation. Interesting part of this change is that media imposition of paywall on websites by media houses would houses invest huge amount on creating infrastructure, while the adversely affect their readership/viewership. Additionally, 72% netizens do it free of cost. “A media house can claim exclusiveness desire personalised content in their newspapers or TV news of any news only in case if it is done by its own correspondent and is kept away even from its own website before going to channels because the life today is getting more busy. press. However, it is difficult to claim whether the news termed In another study conducted in April 2017 among journalists ‘exclusive’ is really exclusive and is not already available in public in New Delhi and NCR, 75% journalists feel that as the digital domain like Facebook, blog, etc,” says Jagdish Upasane23, former media is getting stronger day by day, only the newspapers/ editor of ‘India Today’. 24th June 2017 , ISBN No. 819070985-2 117 117 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

Considering the readers as their competitors in news publications­in­India­increase­58­report.html gathering, a number of newspapers and news channels have 3. Television Post Team (2015, 22 July). India has 832 TV been trying to engage them in the name of ‘citizen journalism’. channels as MIB issues six new lincences. Television Post. The Facebook put another challenge before the mainstream media Retrieved on June 21, 2017 at 8.49 am from http:// by launching ‘Notify’ app24 in November 2015 to keep its users www.televisionpost.com/television/india­has­832­tv­ world over update of the latest news. A similar, rival service called channels­as­mib­issues­six­new­licences/ the Accelerated Mobile Pages (AMP) initiative was launched by 4. Rai, Saritha. (2016, January 6). India Just Crossed 1 Billion Google and many other web firms in October 2016. Mobile Subscribers Milestone And The Excitement’s Just The Audit Bureau of Circulation latest report released in Beginning. www.forbes.com. Retrieved on March 12, 2016 May 2017 shows rise in print circulation. However, the Indian from http://www.forbes.com/sites/saritharai/2016/01/06/ Readership Survey (IRS) for the fourth quarter in 2012­13, shows india­just­crossed­1­billion­mobile­subscribers­milestone­ that the average issue readership (AIR) of the top 10 Hindi dailies and­the­excitements­just­beginning/#423fae185ac2 declined by 6.12%. For English dailies, the decline was 4.75%. A 5. Bhardwaj, Supriya. (2017, 27 March). Internet users in India cumulative decline of 30.15% was seen in the readership of the to reach 730 million by 2020: Govt. India Today. Retrieved top 10 magazines. However, there are question marks over both on June 21 at 9.01 am from http://indiatoday.intoday.in/story/ the ABC Report and the Readership Survey. “When it comes to digital­india­internet­users/1/913797.html receive advertisements from government or the private agencies, 6. Khan, Sami. (2016, March 11). Facebook reaches 142M users the media houses show the ABC data showing substantial in India, crosses 100M users for ‘Lite’ app globally. increase in their circulation. But when it comes to pay to their www.ibtimes.co. Retrieved on March 12, 2016 from http:// employees, they even plead in the Supreme Court that they are www.ibtimes.co.in/facebook­reaches­142m­users­india­ making huge losses and cite the Indian Readership Survey reports crosses­100m­users­lite­app­globally­670276 to justify their losses” (Prabhu 2017)25. Such tricks are not going to work now. The manipulations done by majority media houses 7. Number of Twitter users in India from 2012 to 2019 (in in their circulation figures is no more a secret. Social media is millions). Retrieved on March 12, 2016 from http:// going to close down all such ‘shops’ shortly. www.statista.com/statistics/381832/twitter­users­india/ Conclusion 8. GIBS, SAMUEL. (2016, FEBRUARY 2, 2016). WHATSAPP AND GMAIL JOIN THE 1 BILLION USER CLUB. WWW.THEGUARDIAN.COM. As the Government of India is strengthening digital network RETRIEVED ON FEBRUARY 7, 2016 FROM HTTP:// up to village level under its ambitious Digital India scheme, the WWW.THEGUARDIAN.COM/TECHNOLOGY/2016/FEB/02/WHATSAPP­ involvement of common man in social media is expected to rise GMAIL­GOOGLE­FACEBOOK­USER­APP substantially. Wi­fi zones are being created on war footing. 4G has already been introduced in many cities and the 5G network is 9. PTI. (2015, September 3). Twitter top source of breaking expected to be launched by 2018. Launched on December 27, news: Study. www.timesofindia.indiatimes.com. Retrieved 2015 Reliance Jio revolutionised digital communication beyond on September 22, 2015 from http:// expectations. It provided free data and voice calling to its users timesofindia.indiatimes.com/tech/tech­news/Twitter­top­ for about one year and now too the money it charges is below Rs source­of­breaking­news­Study/articleshow/48790422.cms 100 per month for unlimited voice calling and internet. All these 10. Sheth, Reena. (2017, 2 May). Mind­blowing Stats about initiatives are going to further empower the common man and put Indians on Instagram in 2017. Retrieved on June15, 2017 at bigger challenge before the mainstream media. Only the 11.36 pm from http://www.socioadvocacy.com/blogs/ newspapers, news magazines and the news channels, which instagram­audience­in­india­2017/ change with the time and taste of the readers will survive, rest are 11. Special Correspondent. (2016, February 3). With 220mn bound to become history. users, India is now world’s second­biggest smartphone market. www.thehindu.com. Retrieved on March 12, 2016 References from http://www.thehindu.com/news/cities/mumbai/ 1. Does Journalism Exist? Alan Rusbriger at Hugh Cudlipp business/with­220mn­users­india­is­now­worlds­ Lecture on January 25, 2010, retrieved from https:// secondbiggest­smartphone­market/article8186543.ece blogs.commons.georgetown.edu/journalism/2010/10/22/ 12. Heilpern, Will. (2016, March 2). What the editors of The alan­rusbriger­hugh­cudlipp­lecture/ on December 14, 2014 Sun and The Guardian think about the future of at 5.30 newspapers. www.businessinsider.in. Retrieved on March 2. Jha, Lata. (2015, December 29). Print media publications in 2, 2016 from http://www.businessinsider.in/What­the­ India increase 5.8%: report. www.livemint.com. Retrieved editors­of­The­Sun­and­The­Guardian­think­about­the­ on February 7, 2016 from http://www.livemint.com/ future­of­newspapers/articleshow/51225558.cms Consumer/tdOUNyYANZx60LpzXau6wM/Print­media­ 13. ibid

24th June 2017 , ISBN No. 819070985-2 118 Proceeding of National Conference on “Design & Innovation” organized by Dialogue India held at IIT, Delhi

14. ibid — by employing almost­topless 15. Roushan, Rahul. (2017, 7January). Hindustan Times newsreaders.www.youtube.com. Retrieved on March 12, Shutting Down Editions. Retrieved on June 15, 2017 at 8.29 2016 from https://www.youtube.com/watch?v=YO­ am from http://www.opindia.com/2017/01/hindustan­times­ 8y39c3ZA shutting­down­editions­its­dangerously­lazy­to­blame­ 19. AFP. (2016, February 28). A TV station in Albania is demonetisation/ employing almost­topless news anchors to boost its 16. Upasane, Jagdish. (2017, June 15). Group Editor, Panchjanya audience.www. in.news.yahoo.com. Retrieved on March 12, & Organiser. Interview in New Delhi on June 15, 2017 2016 from https://in.news.yahoo.com/tv­station­albania­ 17. Segal, David. (2016, February 4). The New York Times. New employing­almost­131100709.html York. Retrieved on March 12, 2016 from http:// 20. Interview in New Delhi on March 9, 2016 www.nytimes.com/2016/02/04/business/media/playboy­ 21. Technology. (2015, November 12). Facebook launches puts­on­some­clothes­for­newly­redesigned­ Notify news app. www.bbc.com. Retrieved on March 12, issue.html?_r=0 2016 from http://www.bbc.com/news/technology­34797348 18. AFP. (2016, February 27). Faced with tough competition to 22. Prabhu, Rajendra. (2017, May 15). Personnel interview at win over audiences, an Albanian TV channel is taking a Press Club of India in New Delhi at 3.00 pm. literal approach towards giving viewers the “naked” truth

24th June 2017 , ISBN No. 819070985-2 119 119