International Journal of Science, Engineering and Technology

Print Version- Volume 3 Issue 6

Nov- Dec 2015 Edition

ISSN (Online): 2348-4098

ISSN (Print): 2395-4752

Published by: IJSET Journal Publication

Website: www.ijset.in

E-mail: [email protected] International Journal of Science, Engineering and Technology

General Information:

IJSET, International Journal of Science, Engineering and Technology publish Bi- Monthly Journal under ISSN (Online): 2348-4098 and ISSN (Print): 2395-4752.

Online Version http://www.ijset.in/volume-3-issue-6-nov-dec-2015/

Print Version (E-Book) http://www.ijset.in/print-journal-2/

All the respective authors are the sole owner and responsible of published research and research papers are published after full consent of respective author or co-author(s).

For any discussion on research subject or research matter, the reader should directly contact to undersigned authors.

Copyright

Copyright ©2016 IJSET Journal Publication

All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as described below, without the permission in writing of the Publisher.

Copying of articles is not permitted except for personal and internal use, to the extent permitted by national copyright law, or under the terms of a license issued by the national Reproduction Rights Organization.

All the published research can be referenced by readers/scholars/researchers in their further research with proper citation given to original authors.

Disclaimer

Statements and opinions expressed in the published papers are those of the individual contributors and not the statements and opinion of IJSET. We assumes no responsibility or liability for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained herein. We expressly disclaim any implied warranties of merchantability or fitness for a particular purpose. If expert assistance is required, the services of a competent professional person should be sought.

Contact Information: E-mail: [email protected] Website: www.ijset.in Editorial Board

Editor-in-Chief

Dr. Kavita Sharma

Deputy Editor-in-Chief

Dr. R. Guruprasad Scientist, Knowledge and Technology Management Division, CSIR- National Aerospace Laboratories, Bangalore,

Dr. Subha Ganguly BVSc & AH (Gold Medal), MVSc, Ph.D (Microbiology), EMBA (HRM), DSc (Hons. Causa), Scientist (Food Microbiology) & Scientist in-charge, Sub-Projects, AICRP on Post Harvest Technology (ICAR), Department of Fish Processing Technology, Faculty of Fishery Sciences, West Bengal University of Animal and Fshery Sciences, Kolkata, INDIA

Editorial Board Members

Dr. Mohd. Hamraj, Professor, Civil Engineering, MJ College of Engineering and Technology, Hyderabad, India

Dr. Md Enamul Hoque, Associate Professor, University of Nottingham, Malaysia Campus

Dr. S. Kishore Reddy, Adama Science and Technology University, Adama, Ethiopia

Dr. Deborah Olorode, University of Lagos, Nigeria

Dr. Shamama Ahmed, Director, School of Engineering and Technology, Noida International University, India

Mohammed Irfaan, Assistant Professor, Adigrat University, Ethiopia

S.K. Nagaraju, Assistant Professor, Construction of Technology & Management, Adigrat University, Ethiopia

Saurabh Shukla, Scientist, Defence Research & Development Organization (DRDO), India

Parvin Kumar, Scientist, Defence Research & Development Organization (DRDO), India

Dr. Sanjay Kumar, Scientist, Defence Research & Development Organization (DRDO), India

Dr. Raghvendra Kr. Mishra, Assistant Professor

Reviewer Board

Prof. (Dr.) Syeed Abdel-Hamid El-Sayed Dr. Chin Ching Sarn

Prof. (Dr.) Burkhan Turkes Mr. Narendra Singh Rathore

Dr. M. Masood Jamal Khan Dr. Sergie A. Bukray Vinchi

Prof. (Dr.) Maitti Jaffar Dr Niroshin Nirmal

Prof. (Dr.) Md Omil Ahmed Dr. Li Chi Keonge

Dr. Mahed Ahmadi Prof. Deborah Granam

Prof. (Dr.) Zaininul Arifin Dr. Omotosho Elice

Dr. Salvotore Galline Dr. Abraham Goodnick

Prof. (Dr.) Arun K. Gupta Dr. Md Abdul Mandsour

Dr. Eman Salah Dr. Md. Yasser Sud Elswin

Dr. Xiyan Jang Dr. Ahmed Atta Sobhi

Dr. Al Maloom Dr. Marie Angelina Larrain

Dr. Anil Gupta, Associate Professor Dr. Dawood Kabani

Dr. Priyanka Gupta, Associate Professor Prof. (Dr.) Mohamed Audi

Prof. Marie George Prof. Mohsin Jamal, Assistant Professor

Dr. Paolo Domino Parshi Mr. Ram Bhool, Assistant Professor

Dr. Fransisco A Bianchi Mr. Ashish Kumar, Assistant Professor

Dr. Ling Nyuyen Dr. Ayotunde Olalande

Dr. Ashish Kr. Sharma, Dr. Rajendra Muthoo

Table Of Contents

S. Manuscript Title Page No. Author No. 1. Performance Analysis of Vertical Handoff in Heterogeneous Wireless Networks Based On 7- 13 Game Theory

Suresha V., Dr. Shankaraiah 1. Performance Analysis of Varying Cyclic Prefix Length on M-Ary PSK, QAM and PAM 14- 18 Based OFDM Systems under Fading Channel Conditions

Anita Jamliya, Ashish Kumar Parashar 2. Comparison of Seismic Susceptibility Assessment of Low to Medium Rise RC Buildings by 19- 29 Considering the Effect of Shearwall

Mr. Muralidhar G.B, Mrs. Swathirani K.S 3. Analysis of Dual Buck Half Bridge Voltage Balancer 30- 33

Nikunj N Dave, Raj J Patel 4. Wind Energy Inverter with Facts Capability for Control of Power Factor In Distributed 34- 42 Energy Systems

V. P. N. Prasad, Dayakar Kande 5. Antioxidant and Antifungal Potential of Morus Alba Leaf Extract Mediated Synthesis of 43- 50 Gold Nanoparticles

K. Adavallan, N. Rajendra Prasad, N. Krishnakumar 6. Micropile for Embankment Foundation- An Innovative Technique 51- 53

Dipali P. Doshi, Dr. Atul K. Desai, Dr. C. H. Solanki Some Quadrature Methods for Approximate Evaluation of Definite Integrals for Real 54- 57 Variables

Kishor kumar Prusty 7. Seismic Appraisal of Performance of RC Building with Immense Irregularity in Floor 58- 67 Masses

Muralidhar G.B, Swathi Rani K.S, Pradeep Kote R 8. The Impact of Values-Based Branding (VBB) On the Strategic Sustainability Decision of 68- 74 the Supply Chain Management as A Superior Competitive Advantage

Mahmoud Ahmady Ramadan 9. Simultaneous Face Detection and Recognition using Artificial Neural Networks for 75- 78 Identity Verification: A Survey

Bipin Kumar Yadav, Kanak Kumar, Sanjay Sharma 10. Impedance Based Image Analysis of Field Distribution inside a Closed Phantom Using 79- 84 EIDORS

Prabhakar S. Manage 11. Water Distribution Network’s Modelling and Calibration 85- 91

Snehal Kadgaonkar, P. T. Nimbalkar, D. R. Kulkarni

12. Integrated Action Plan for Improvement of Drainage Congested Areas and Mitigation of 92- 114 Flood and Waterlogged areas using Geoinformatics: A Case Study of ,

Karunesh Kumar Shukla, Purnima Sharma, A. K. Agarwal 13. Strength Evaluation of Cement Concrete Using Bottom Ash as a Partial Replacement of 115- 120 Fine Aggregates

Abhishek Sachdeva, Gobind Khurana 14. Data Transmission and Reception Using Text Steganography with Error Detection 121- 126

Ankita Sharma, Anjana Sangwan 15. A Geographical Study of Keoladeo National Park, Bharatpur (Rajasthan) with Using 127- 136 Remote Sensing and GIS

Ashish Sharma

Suresha V. et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Performance Analysis of Vertical Handoff in Heterogeneous Wireless Networks Based On Game Theory

1Suresha V., 2Dr. Shankaraiah

Abstract

Future generation wireless networks are heterogeneous that will coexist and need a common IP core

to offer a distinct range of high data rate multimedia services to end users since the networks have characteristics that complement each other. Users need a various multi-homed personal wireless devices will have the option of accessing their desired services via different available Networks. A major issue is need a seamless vertical handoff across the multi-service heterogeneous wireless access networks therefore mobile users roaming across different wireless networks. Network selection is a challenging task and is necessary when users want to migrate between heterogeneous networks and will influence the performance metrics of importance, for both service provider and subscriber. In this

paper game theory based performance analysis of Vertical Handoff between WLAN-WiMAX integrated networks using Boltzmann-Gibbs based CODIPAS-RL algorithm through which better performance is obtained. The performance parameters such as Packer Error Rate (PER), throughput and delay for selecting a network are obtained.

Keywords- Game Theory, AODV, WLAN Heterogeneous Networks, WiMAX, LTE, UMTS, Boltzmann- Gibbs, CODIPAS-RL.

Introduction Wireless Networks include high bandwidth, low latency, and ubiquitous coverage. However, none of There is an enormous and fast development in the the current wireless technologies can simultaneously wireless communication nowadays because there is satisfy these needs at low cost. Intuitively, the larger an increase in number of mobile and internet users. bandwidth and ubiquitous coverage is desirably Beyond third generation (3G) is expected to include need of a mobile user are well satisfied if it can freely heterogeneous wireless networks that will coexist. hand over to any discovered networks to maintain its One such new technology is the heterogeneous services at all times. network which refers to the integration of different Radio Access Technology (RAT) such as Bluetooth, The architecting and implementation of IP core WLAN, WiMAX, UMTS, LTE, WBAN etc. These diverse multiple service wireless networks will allow seamless wireless networks have its own bandwidth, coverage intersystem roaming between heterogeneous area, data rate, mobility, Received Signal strength wireless access networks and packet data-switched (RSS), technology etc. The evolution of wireless communications. A major challenging issue heterogeneous networks will increase the growth in in the IP core networks is seamless vertical handover development of a diverse range of high-speed across wireless networks. Here vertical handoff is the multimedia services, such as location-based basis for providing continuous wireless services to information services, mobile entertainment mobile users roaming between the heterogeneous multimedia services, e-commerce, and digital wireless networks. Hence multimode mobile multimedia broadcasting.1 terminals will have to seamlessly roam across the various access networks and maintain network

1 connectivity since no single network can provide Corresponding Author E‐mail:[email protected] ubiquitous coverage and high Quality-of-Service

© 2015 Suresha V. et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 7 Suresha V. et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

(QoS) provisioning of applications. Basically there are attachments. They are relative RSS, RSS with two approaches for selecting a network. In Network- hysteresis, and RSS with hysteresis plus dwelling Centric Approach (NCA) [1], a common centralized timer method. Relative RSS is not applicable for VHD, controller allocates network resources to the since RSS from various types of networks cannot be connections in the service area. Moreover, the users compared directly for handoff decision due to the should act in a mutually cooperative and obeying the disparity of the technologies involved. decision made by the central controller. Hence, to have a better performance, network selection can be In RSS along with hysteresis type, handoff is performed by User Centric Approach (USA). In this performed whenever the RSS of new BS is larger than approach, game theory based network selection the RSS of old BS by predefined threshold value. In algorithms are used at the user terminal. This RSS with hysteresis plus dwelling timer method, approach is distributed in nature and has low whenever the RSS of new BS is higher than the RSS implementation complexity and low communication of old BS by a predefined hysteresis, a timer is set. overhead. In user centric approach users they can When it reaches a certain specified value, handoff is select the network according to their level of processed. This type minimizes Ping pong handoffs. satisfaction. In this proposal other criteria have not been considered. In the papers [11, 12] proposed a Related Works Bandwidth based algorithms for vertical handover. Here handoff decision is made based on available Several challenging research has been done related bandwidth for mobile terminal. to the network selection during handoff mechanism for heterogeneous networks. The limitation in the A bandwidth based VHD method is mainly presented traditional selection has been studied extensively in between WLANs and WCDMA network using Signal the past. The current trend is Self-Selection Decision to Interference and Noise ratio (SINR). This approach and Game based algorithms [2, 3] for network provides higher throughput than RSS based handoffs selection and for efficient handoff. Cost function since the available bandwidth is directly dependent based algorithms [4, 5, 6] have been proposed to on the SINR. But it may add excessive handoffs with combine the metrics such as monetary cost, security, the variation of the SNR. These excessive handoffs power consumption and bandwidth in cost function. may reduce by use of heuristic based VHD on the The handoff decision is made by comparing the Wrong Decision Probability (WDP) prediction result of the function for candidate networks. algorithms [13]. The WDP is calculated by combining Different weights are assigned to different input the probability of unnecessary and missing handoffs. metrics depending on the network conditions and user preferences. Heterogeneous Wireless Access Networks

A better and improved velocity and position based The future generation wireless heterogeneous handover algorithm [7, 8] has been presented to networks are expected to be exclusively IP-based and decrease the number of unnecessary handoffs by converged core network. The evolving of these using geographical position and velocity information networks will seamlessly integrate various types of estimated from GSM measurement data of distinct wireless access networks including the following: signal strengths at Mobile Station(MS) received from  Wireless Body Area Networks (WBANs), Base Station(BS). In user mobility based algorithms subcategory of wireless sensor network technology [8, 9] use velocity information is a critical one for targeted at monitoring physiological and other handoff decision. In the overlay network systems, to parameters surrounding human beings and animals. increase the system capacity, umbrella cell approach  Wireless Personal Area Networks (WPANs), is used It consists of micro or pico cells are allocated such as Ultra Wide Band (UWB) and Bluetooth, that for slow moving users and a bigger macro cells are provides range-limited Ad hoc wireless service to assigned for fast moving users by using velocity users. information. It decreases the number of dropped  Wireless Local Area Networks (WLANs), such calls. Received Signal strength (RSS) based VHD as 802.11x (Wi-Fi), that provide high-throughput algorithms [9, 10, 12] proposed and developed connections for stationary or quasi-stationary various schemes to compare RSS of the current point wireless users without need of costly infrastructure. of attachment with that of the candidate point of

Page 8 Suresha V. et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

 Wireless Metropolitan Area Networks Selecting a required network from the converged (WMANs), such as 802.16x (WiMAX); offer mobile overlay networks according to the user’s wireless services requiring high data rate requirements is called network selection. Fig 1 is an transmission and strict maintain QoS requirements in improved proposed model for vertical handoff. The both indoor and outdoor environments. dynamic decision for handoff mainly on the outcome  Wireless Wide Area Networks (WWANs), an of the network selection or discovery and network example Universal Mobile Telecommunications analysis based on the several desirable input System (UMTS), offer relatively long-range cellular parameter like RSS, velocity, bandwidth, power voice and limited-throughput data services to users consumption, location etc. This paper presents the with high mobility. . network discovery between WLAN and WiMAX.  WLAN network is basically 802.11 standards Initially the user device faces the problem of which provide less coverage and high data rates selecting a network from a number of RANs [15] that (54Mbps).In WiMAX , larger coverage and good data differ in technology, coverage, bandwidth, pricing rates. The design goal is to provide the user the best scheme, etc., belonging to the same or different available QoS at any time. The main benefit of service providers. Network selection process is heterogeneous networks is the effective utilization of usually carried out in three levels. It starts with available bandwidth to meet demands for high collecting the required information that really impact performance applications such as multimedia, video, on the final decision. The information might be user video-conferencing, global mobility and service preference, service application, and network status. portability. Mobility management is the main In the second step is using the collected information essential issue that supports the roaming of users as inputs to an efficient handoff algorithm that aims from one system to another. So, the mobility to keep the user always best connected? The last management process strongly considers the dynamic step is making handover decision according to the reselection of network as its major task. Multi mode algorithm’s output. mobile terminal is used to select a network from the converged networks. Some of the approaches used Game theory based selection algorithms are used for for better network selection process are Multi network selection to initiate hand off decision in a Attribute Decision Making (MADM) algorithm, fuzzy dynamic environment. The network selection logic based approach, mathematical approaches algorithms used in this paper are Bush Mosteller such as Analytical Hierarchy Process (ARH) and Grey based CODIPAS-RL and Boltzmann Gibbs based Relational Analysis (GRA). CODIPAS-RL. Network selection using Bush Mosteller based CODIPAS-RL was discussed in [3]. Boltzmann Proposed Dynamic Decision Model for VHO Gibbs based CODIPAS-RL is implemented for routing in dynamic environment and its performance is found to be better than Bush Mosteller based COPIPAS-RL. Hence in this paper Boltzmann Gibbs based CODIPAS-RL is used for network selection process.

Network Selection Algorithms

Game theory is the study of mathematical models of conflict and cooperation between intelligent rational decision-makers. This tool used in understanding and modeling competitive situations. The main elements of a game are: the set of players, the set of actions, and the set of payoffs. The players in the game are the mobile users and/or the networks. Players seeking to maximize their payoffs can choose Fig1: Proposed Dynamic Decision Model (DDM) For between different strategies, such as: available Vertical Handoff bandwidth, subscription plan. The payoffs can be estimated using utility functions based on various

Page 9 Suresha V. et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

decision criteria: monetary cost, energy conservation, knowledge of their opponents. The Boltzmann-Gibbs network load, availability, etc. distribution is given by

Bush Mosteller based CODIPAS-RL

Reinforcement learners’ use their experience to choose or avoid certain actions based on their consequences [3].Actions that led to satisfactory eqn.(4) attains equilibrium when 1/ej is large which outcomes will be repeated in the future, whereas denotes the rationality level of player j. The actions that led to unsatisfactory experiences will be probability of selecting an action aj is given in eqn. avoided. In Bush and Mosteller based reinforcement (5) learning, players will decide the actions i.e., the strategy of each player is defined by the probability of undertaking each of the two actions available to them. Based on the action, each player determines

the corresponding payoff (utility) and updates the action. Based on the action in (5), each player determines their payoff given in eqn.(6) and updates the action, The probability of selecting an action aj is given in eqn.(1). Where is the player j’s learning rate j

(0 <λ<1),Si,x is the stimulus for the action aj,t given Assuming that each player does not know their in eqn. (2) and its value lies in the range [-1, 1]. The payoff, but only knows the estimation of average increase in values of stimulus or learning rate will payoff of other actions. Hence the user takes a increase the changes in network selection decision based on the average payoff to update the probability. action. The steps for selecting a network are given as follows:

Step 1: Assume users are initially connected to a network and calculate the payoff in current network

Where, Uj,t denotes the perceived utility at time t of Step 2: Check for the alternate networks where users

player j ,Mj is aspiration level of player j. Based on the can connect action, payoff of user is determined using eqn. (3) Step 3: Determine the payoff and action of the users based on Boltzmann-Gibbs CODIPAS-RL.

Simulation Results Bush Mosteller based CODIPAS-RL considers present action of user j as well as the actions of other users. Simulation for integrated WLAN-WiMAX network So it requires more memory and hence the time using CODIPAS-RL is carried out for the required for network selection using Bush-Mosteller specifications as shown in the Table 1 based CODIPAS-RL is high. Table 1 Simulation settings of WLAN-WiMAX Boltzmann Gibbs based CODIPAS-RL networks The Boltzmann-Gibbs based learning scheme [3] Medium Access Protocol MAC/802.11 (also called softmax) achieves equilibrium in small number of iterations itself i.e., time taken for network Radio Propagation Model Two Ray Ground selection is less when compared to Bush Mosteller based CODIPAS-RL also computational capabilities Routing protocol CODIPAS-RL and memory requirements are less. This is because Boltzmann Gibbs based CODIPS-RL produces the Bounding box size 537 by 100 expected utility and makes decisions without the Packet size 256 bytes

Page 10 Suresha V. et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Interface Queue(WLAN) Queue/Drop tail /Priqueue

Interface Queue(WiMAX) Queue/Drop tail

Queue Length 50

Based on the specification simulation setup has been done in NS2. The performance of the system (WLAN and WiMAX) has been carried out in isolated mode and integrated mode. The Packet Arrival Rate (PAR) as shown in the fig 2 Fig 4: Comparison of WLAN, WiMAX, CODIPAS-RL Delay Parameter

Fig 2: Packet Arrival Rate of integrated WLAN- Fig. 5: Comparison of WLAN, WiMAX, CODIPAS-RL WiMAX CODIPAS-RL Packet Arrival Rate Parameter Fig.3 and 4 show the throughput of the system before and after integration.

Fig 6: Comparison of WLAN, WiMAX, CODIPAS-RL Packet Error Rate Parameter Fig 3: Packet Error Rate of Integrated WLAN-WiMAX Network (CODIPAS-RL)

Page 11 Suresha V. et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

References

[1] Manzoor Ahmed Khan, Hamidou Tembine and Athanasis V.Vasilakos, “ Game Dynamics and cost of Learning in Heterogeneous 4G Networks”, IEEE Journal on Selected Areas in Communications,vol. 30, no. 1, pp.198- 214, Jan. 2012.

[2] Wang, S. Fan, C. Hsu, C. H. Sun, Q. Yang, F. “ A Vertical Handoff Method via Self-Selection Decision Tree for Internet of Vehicles” IEEE Journal ,Volume:PP, Issue: 99 pp 1 to 10, March 2014

[3] H. Tembine and A. P. Azad, “Dynamic Routing Games: An Evolutionary Game Theoretic Approach”, IEEE Fig. 7: Comparison of WLAN, WiMAX, CODIPAS-RL conference on decision and control and European Control Throughput Parameter Conference, pp.4516- 4521, Dec.2011

Throughput Comparison of Proposed Algorithm [4] F. Zhu, J. McNair, “Multiservice vertical handoff decision between Static and Mobile Environment as shown in algorithms”, EURASIP Journal on Wireless table 2 Communications and Networking, 2006. [5] N. Nasser, A. et al, “Handoffs in fourth generation Table 2: Performance Comparison of Throughput heterogeneous Networks”, IEEE communications magazine, pp 96– 103, 2006. Throughput [6]. N. Nasser, S. Guizani, E. Al-Masri, “Middleware vertical INTEGRATED handoff manager: a neural network based solution” WLAN WiMAX Proceedings of the 2007 IEEE International Conference on WLAN-WiMAX Communications (ICC’07), Glasgow, Scotland, pp 56 71– 5676, June 2007. STATIC 185.25 298.38 1549.09 [7] Nilakshee Rajule et al, “Survey of vertical Handover MOBILE 92.02 34.85 410.05 Decision Algorithms, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2, pp 362-368, 2013.

Conclusion [8] F. Zhu, J. McNair, “Optimizations for vertical handoff decision algorithms” IEEE Wireless Communications and Network selection is performed using the proposed Networking Conference (WCNC’04), pp 867– 872, 2004. Boltzmann Gibbs based CODIPAS-RL because this algorithm performs network selection faster than the [9] C. Chi, X. Cai, R. Hao, F. Liu. Modeling and analysis of existing Bush Mosteller based CODIPAS-RL. i.e., handover algorithms, Proceedings of the 2007 IEEE Global Boltzmann Gibbs based CODIPAS-RL takes 60 Telecommunications Conference (GLOBECOM’07), Washington, DC, USA, pp 4473–4477, 2007. iterations whereas Bush Mosteller based CODIPAS- RL requires 200 iterations for selecting a network. [10] Juang. R. T, H. P. Lin and D. B. Lin, “An improved The simulation results show that the network in location-based handover algorithm for GSM Systems”, integrated mode outperforms the network in isolated Wireless communications and networking conference, pp mode for the QoS parameters Packet Error Rate 1371-1376, 2006. (PER), Delay and Throughput. [11] Q. Y. Song and Abba S Jamalipour, “ Network Selection In static environment, the compared results shows in an Integrated Wireless LAN and UMTS environment using mathematical modelling and computing techniques”, that the throughput related to the integrated WLAN- IEEE Wireless Communications Magazine, pp.42-48, June WiMAX Wireless networks using CODIPAS-RL is 2005. more than the isolated WLAN, WiMAX networks. In mobility environment the throughput is relatively less [12] D. E. Charilas and A. D. Panagopolous, “Multiaccess than the static environment. Radio Network Environments,” In IEEE Vehicular Techology Magazine, vol.5, no.4, pp.40-49, Dec 2010.

Page 12 Suresha V. et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

[13] Q. T. Nguyen- Vuong, Y. Ghami- Doudane and N. Agoulmine, “On utility models for access network selection Copy for Cite this Article- Suresha V. and Dr. Shankaraiah, ‘Performance Analysis of Vertical Handoff in in wireless heterogeneous networks,” In IEEE Network Heterogeneous Wireless Networks Based On Game Theory’, Operations and Management Symposium (NOMS), 2008. International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 31-37. [14] H. Tembine and A. P. Azad, “Dynamic Routing Games: An Evolutionary Game Theoretic Approach,” IEEE conference on decision and control and European Control Conference, pp.4516-4521, Dec.2011. Submit your manuscript to International [15] H. Tembine, “Dynamic robust games in MIMO systems,” IEEE Transactions on systems Man and Journal of Science, Engineering and Cybernetics, vol.99, no.41, pp.990-1002. Aug. 2011. Technology and benefit from:

[16] Ramona Trestian, Olga Ormond and Gabriel-Miro  Convenient Online Submissions Muntean,“ Game Theory- Based Network Selection:  Solutions and Challenges”, IEEE communications surveys Rigorous Peer Review and tutorials ,pp.1-20, May 2011.  Open Access: Articles Freely Available Online

Author’s Affiliation  High Visibility Within The Field

1  Inclusion in Academia, Google Scholar and Research Scholar, Department of Electronics and Cite Factor. Communication, SJCE, Mysuru-570 006.Visvesvaraya Technological University, Belagavi, Karnataka, INDIA. E- mail: [email protected]

2Professor, Department of Electronics and Communication, SJCE, Mysuru-06, E-mail: [email protected]

Page 13 Anita Jamliya et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Performance Analysis of Varying Cyclic Prefix Length on M-Ary PSK, QAM and PAM Based OFDM Systems under Fading Channel Conditions

1Anita Jamliya, 2Ashish Kumar Parashar

Abstract

In this paper, impacts of cyclic prefix (CP) are researched for M-ary PSK, QAM and PAM for used in Orthogonal Frequency Division Multiplexing (OFDM) systems under AWGN and Fading channels. Utilization of CP as the guard interval is a fundamental approach to avoid the inter-symbol interference

(ISI) and the inter-carrier interference (ICI). However the CP also has adverse impact that it reduces the transmission efficiency because some extra bits are needed for such transmission, and the length of these bits increases for channels showing long channel-impulse response (CIR), furthermore these channel also increases the ICI. In this paper we analyze the bit error rate (BER) performance for different modulation schemes used in OFDM with different CP length and channel conditions by simulating these systems under Matlab environment.

Keywords- Orthogonal Frequency Division Multiplexing (OFDM), cyclic prefix (CP), AWGN.

Introduction brought on by the channel impact can be adjusted only by equalizer on each subcarrier. The robustness The orthogonal frequency-division multiplexing against frequency-specific channel makes OFDM a (OFDM) is a favorable modulation technique key wireless technology for present day wireless fundamentally because of its strength against communication systems, for example, digital video frequency-selective fading channels. The primary broadcasting (DVB), Long Term Evolution Advanced idea behind the OFDM is to partition a broadband (LTE-A), and wireless local area networks. frequency-specific channel into various sub-channels. In OFDM system, a guard interval is important, since The remainder of this paper is organized as follows. there is always a possibility of inter-symbol Section II presents a brief review of related interference (ISI) and inter-carrier interference (ICI). literatures. The Section III, introduces the system This guard interval is obliged to be of length model followed by channel models in section IV. equivalent to or more than the channel's impulse Next, in Section V, presents the simulation results. response (CIR). Utilizing a cyclic prefix (CP) as the Finally, conclusions are drawn in Section VI by guard interval is a straightforward approach to battle analyzing the results in detail. the ISI and ICI. Hence the embedding of cyclic prefix (CP) before transmission avoids the inter-symbol Literature Review interference (ISI) and maintains the orthogonality To battle the ICI impact caused by non-ideal channel, among subcarriers. However the expense is a various ICI alleviation techniques were proposed [2]. diminishing in limit, particularly for the rural sloping In [4], direct equalizers in view of least mean-square- environment that has the long CIR. 1As the ISI is slip and minimum squares (LS) criteria were avoided by insertion CP the simple distortion proposed. In [9], techniques in view of progressive interference cancelation were proposed to further

1 enhance the execution. A most extreme from the Corresponding Author- Dept. of Electronics, UITBU Bhopal, Email: [email protected] earlier/greatest probability based joint channel incline estimation and information identification

© 2015 Anita Jamliya et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 14 Anita Jamliya et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

system utilizing a desire amplification calculation was proposed in [3]. Choice criticism equalizers were proposed in [6]. In [11], a system that uses a Q-tap equalizer rather than a conventional one-tap equalizer to stifle the ICI force was proposed. In [5], channel estimation and ICI relief routines that use CP or adjoining OFDM symbols were proposed. In [7], time-area windowing strategies for amassing ICI into its principle band were proposed. This system is additionally called an ICI shortening method, and it can collaborate with other evening out procedures, Figure 1: Bandwidth division comparison for FDM for example, in [8]. In [10], low-multifaceted nature and OFDM. joint evening out and channel coding calculations The figure demonstrates the contrast between the were proposed. In [1] author proposed a pioneer ordinary non-covering multicarrier system and work by expanding the length of a CP. He proposed covering multicarrier modulation strategy. Utilizing a novel ICI self-cancelation plot and demonstrated the covering multicarrier modulation system, we that if the length of a CP is broadened sufficiently spare just about half of data transmission. To long so that the length of sans isi tests in the CP is understand the covering multicarrier system, then equivalent to the length of the OFDM symbol, the ICI again we have to diminish crosstalk between impact can be totally uprooted with direct time- subcarriers, which implies that we need orthogonality differing channel suspicion. (This suspicion is by and between the distinctive regulated carriers. large legitimate at sensible vehicular velocity [7].) Since it needs to alter the transmit signal OFDM Signal Model arrangements, this strategy is not versatile to all the present day remote correspondence systems. The baseband system model of an OFDM system in Practically speaking, there are just constrained sans the presence of phase noise is illustrated in Fig. 2. isi tests in a CP, whose length is much shorter than the OFDM symbol length. In this circumstance, the work in [2] recommended to set the joining weights consistently, yet this is obviously a suboptimum arrangement in the feeling of ICI minimization. A while later, in [3], heuristic calculations were proposed to pick better consolidating weights to enhance the execution of [10]. In a parallel work [11], a designing instinct that Frank capacity window may be the ideal consolidating window was shown. Figure 2. Block diagram of the OFDM transceiver system model. The OFDM System Model

Orthogonal Frequency Division Multiplexing (OFDM) is a multicarrier transmission strategy, which divides is used to represent the transmit information the transfer speed into numerous carriers; everyone symbol vector, where is the OFDM symbol length. is adjusted by a low rate information stream. In term Each entry of is independently drawn from a finite of various access procedures, OFDM is like FDMA in alphabet . Without loss of that the numerous client accesses is accomplished by generality, we normalize the average transmit power subdividing the accessible data transfer capacity into to unity; hence, . To generate an ordinary different channels that are then distributed to clients. OFDM symbol, the information symbol vector s is On the other hand, OFDM utilizes the spectrum more transformed into time domain via an N-point Inverse efficiently by separating the channels much closer Fast Fourier Transform (IFFT) operation, and then a together. This is accomplished by making every one CP with size is inserted to prevent ISI. The time- of the carriers orthogonal to each other, avoiding domain baseband transmitter output interference between the firmly separated carriers.

Page 15 Anita Jamliya et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

be arbitrarily, or blur, as indicated by a Rayleigh mathematically described as dissemination — the spiral segment of the aggregate of two uncorrelated Gaussian arbitrary variables. Rayleigh fading is seen as a sensible model for

tropospheric and ionospheric signal propagation and Where is the CP-inserting matrix define as: in addition the impact of intensely based up urban situations on radio signals.[1][2] Rayleigh fading is most appropriate when there is no prevailing

propagation along an observable pathway between And is the matrix collecting the last rows of the transmitter and receiver. the identity matrix . The transmitted signal is Rayleigh fading is a sensible model when there are then passed through the multipath channel whose numerous obstacles in the environment that diffuse channel impulse response is mathematically define the radio signal before it lands at the receiver. As far as where is the as possible hypothesis holds that, if there is maximum path delay. We assume that the CP length adequately much diffuse, the channel drive reaction is longer than the maximum multipath delay, that will be very much modeled as a Gaussian prepare is, , we define regardless of the singular's conveyance parts. On the as off chance that there is no predominant segment, then such a procedure will have zero mean and stage the convolution of the transmitted signal and equally appropriated somewhere around 0 and 2π channel impulse response. radians. The channel's envelope reaction will in this The Channel Model way be Rayleigh appropriated. Calling this random variable R, it will have a probability density function: In a multipath domain, a transmitted symbol takes [1] distinctive times to achieve the beneficiary through diverse engendering ways. From the receiver’s perspective, the channel presents time scattering in which the length of time of the got symbol is extended. Expanding the symbol length of time causes the current got symbol to cover past got Generally, the gain and stage components of a symbols and results in intersymbol interference (ISI) channel's mutilation are helpfully spoken to as an [9]. In OFDM, ISI normally alludes as interference of unpredictable number. For this situation, Rayleigh an OFDM symbol by past OFDM symbols. fading is shown by the suspicion that the genuine and fanciful parts of the reaction are modeled by free Additive White Gaussian Noise (AWGN) and indistinguishably conveyed zero-mean Gaussian Zero-mean white Gaussian Noise (WGN) has the processes so that the amplitude of the response is same power spectral density for all frequencies. The the sum of two such processes. descriptive word "white" is utilized as a part of the Simulation Results feeling that white light contains equivalent measures of all frequencies inside of the noticeable band of The discussed system is simulated under Mat lab electromagnetic radiation. The frequency spectrum environment and the configuration of system is of WGN has a Gaussian probability distribution. presented in table 1

Rayleigh Fading Table 1: The model configuration

Rayleigh fading is a statistical model for the impact Parameter Value of a propagation situation on a radio signal, for example, that utilized by wireless gadgets. Rayleigh Number of Frames 1000 fading models accept that the magnitude of a signal Number of Sub-Carriers 128 that has gone through such a transmission medium (likewise called a communications channel) will shift Number of Pilot Carriers 4

Page 16 Anita Jamliya et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

SNR (Min.) 0 dB

SNR (Max.) 20 dB

Number of Paths 4

Doppler Shift 0

Table 2: Path Characteristics

Path Gain Path Delay

0 0

-1 0.001 Figure 5: BER performance for 2-PAM-OFDM for -2 0.0350 different CP-lengths.

-3 0.0120

Figure 6: BER performance for PSK-OFDM for different Bits/Symbol.

Figure 3: BER performance for 2-PSK-OFDM for different CP-lengths.

Figure 7: BER performance for QAM-OFDM for different Bits/Symbol.

Figure 4: BER performance for 2-QAM-OFDM for different CP-lengths.

Page 17 Anita Jamliya et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Prefix For Ofdm Systems”, Ieee Transactions On Vehicular Technology, Vol. 58, No. 4, May 2009.

[5] Tony Ottosson, Mikael Sternad, Anders Ahlen And Arne Svensson “Impact Of Multiuser Diversity And Channel Variability On Adaptive Ofdm”, Vehicular Technology Conference, 1988, Ieee 38th November 2003.

[6] Fuqin Xiong” M-Ary Amplitude Shift K Eying Ofdm System”, Cleveland State University Engagedscholarship@Csu Electrical Engineering & Computer Science Faculty Publications, Electrical Engineering & Computer Science Department 2003.

[7] Wasiu Lawal, Adewuyi,S.O, Ogunti,E.O “Effect Of Cyclic Prefix On Ofdm Over Awgn Channel”, International Journal Figure 8: BER performance for PAM-OFDM for Of Innovative Research In Advanced Engineering (Ijirae) different Bits/Symbol. Issn: 2349-2163 Volume 1 Issue 9 (October 2014).

Conclusion [8] Rich Z¨Ochmann, Stefan Pratschner, Stefan Schwarz And Markus Rupp “Mimo Transmission Over High Delay We compared M-ary, PSK, QAM and PAM based Spread Channels With Reduced Cyclic Prefix Length”, Wsa OFDM system for different CP lengths under fading 2015 • March 3-5, 2015, Ilmenau, Germany. environment. For that we modeled a simulation environment under Mat lab computing software to [9] Timothy M. Schmidl And Donald C. Cox “Robust Frequency And Timing Synchronization For Ofdm”, Ieee combine the effect of all parameters/variables. The Transactions On Communications, Vol. 45, No. 12, simulation result shows that OFDM, CP length December 1997. displays the same sensitivity to some parameters, such as noise and modulation technique. However, [10] Jan Tubbax, Boris CˆOme, Liesbet Van Der Perre, Luc the length of CP drastically increases the BER Deneire, Marc Engels “Ofdm Versus Single Carrier With performance, while preserving the data rate. Cyclic Prefix: A System-Based Comparison For Binary Therefore, we can conclude that length of CP is a Modulation”, Vehicular Technology Conference, 2001. Vtc 2001 Fall. Ieee Vts 54th (Volume: 2). very good candidate with low complexity to improve the performance instead of experimenting with [11] Lan Yang, Shixing Cheng, Haifeng Wang “Effects Of modulation techniques and other parameters. Cyclic Prefix On Ofdm Systems Over Time-Varying Channels”, 2005 Ieee 16th International Symposium On References Personal, Indoor And Mobile Radio Communications.

[1] Xiang-Gen Xia “Precoded And Vector Ofdm Robust To Author’s Affiliation Channel Spectral Nulls and With Reduced Cyclic Prefix Length In Single Transmit Antenna Systems”, Ieee 1Department of Electronics, UITBU Bhopal, Email: Transactions On Communications, Vol. 49, No. 8, August [email protected] 2001. 2Department of Electronics, UITBU Bhopal, Email: [2] Chun-Ying Ma, Chun-Yen Wu, and Chia-Chi Huang “A [email protected] Simple Ici Suppression Method Utilizing Cyclic Prefix For Ofdm Systems In The Presence Of Phase Noise”, Ieee Transactions On Communications, Vol. 61, No. 11, Copy for Cite this Article- Anita Jamliya and Ashish Kumar November 2013. Parashar, ‘Performance Analysis of Varying Cyclic Prefix Length on M-Ary PSK, QAM and PAM Based OFDM Systems [3] Chun-Ying Ma, Sheng-Wen Liu, And Chia-Chi Huang Under Fading Channel Conditions’, International Journal of “Low-Complexity Ici Suppression Methods Utilizing Cyclic Science, Engineering and Technology, Volume 3 Issue 6: Prefix For Ofdm Systems In High-Mobility Fading 2015, pp. 38-42. Channels”, Ieee Transactions On Vehicular Technology, Vol. 63, No. 2, February 2014.

[4] Shaodan Ma, Xinyue Pan, Guang-Hua Yang, And Tung- Sang Ng “Blind Symbol Synchronization Based On Cyclic

Page 18 Muralidhar G.B et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Comparison of Seismic Susceptibility Assessment of Low to Medium Rise RC Buildings by Considering the Effect of Shearwall

1Mr. Muralidhar G.B, 2Mrs. Swathirani K.S

Abstract

This paper summarizes state-of-the-art of the review in the seismic vulnerability assessment of buildings consisting of low rise, medium rise and high rise building frames. These building frames are designed for gravity load combinations as per IS 456-2000. Detailed seismic vulnerability evaluation is a technically complex and expensive procedure and cannot be identified the deficiencies using qualitative methods. Hence in order to account for the exact behavior of buildings with shear wall, it is mandatory to perform the various available analytical tools. Buildings with and

without shear wall may have varied seismic performances. In the present analytical investigation two kinds of models are considered, namely bare frame and building with shear wall consisting of G+2 to G+8 storey buildings frames. The various analytical approaches (linear and non-linear analysis) are performed on these models to identify the seismic demands. It is also examined that the effect of shear wall on the seismic performances of low, medium and high rise RC (reinforced concrete) buildings have been investigated using pushover analysis at different performance levels. The comparison of both the analysis for the considered models by using finite element software package

ETAB’s 9.7 version has been illustrated, detailed and tabulated in this report. Also the models are analyzed for buildings located in seismic zone V as per IS 1893:2002(Part 1). Load combinations considered in the analysis are as per IS 456:2000 and IS 1893:2002 (Part 1). For comparison purpose, same storey stiffness and loads have been maintained throughout and tabulated the obtained results in terms of variations of time period, story drift, base shear, and top roof drift and performance points.

Keywords: Story drift, Base Shear, Stiffness.

Introduction designed to resist lateral loads due to seismic forces which would consist of distribution of mass and Earthquakes are the most ruinous of all natural stiffness in plan at every storey and a sustained calamities, which cause large release in strain energy distribution along the height of the building at the fault and travels as seismic waves through the symmetrically. Such a building would respond only Earth’s layers this leads to shaking of ground. These laterally and is considered as torsionally balanced seismic waves arrive at various instants of time, have building. But it is very difficult to achieve restrictions different amplitudes and different energy levels. such as architectural essentials and functional When an earthquake occurs, there can be a demand. Hence it is need to examine and design difference in the execution levels qualified by buildings to attain safety, serviceability and to be different buildings located on the same site. This economical. In 1940 and 1950 shear walls were came difference can result from a number of factors like into existence as an economical efficient bracing differences in material strength, and structure system for multistoried buildings. Patently, the 1 condition etc., An ideal multi storey building foremost concern of the structural engineer is to provide structurally safe and strong to support loads 1 Lecturer, Civil Engineering Department, University of Gondar, without excessive deflection and should be stable Ethiopia, [email protected] under the largest specified loads.

© 2015 Muralidhar G.B et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 19 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Shear Wall building models. The building is considered to be located in the seismic zone V and intended for Shear walls are vertical elements of the horizontal commercial purpose. force resisting system. The forces in these walls are predominantly shear forces in which the fibers within Model-I – Building without shear wall for the full the wall try to slide past one another. Shear walls storey and one full brick masonry wall in the upper contribute large strength and stiffness to buildings in storey. The building is modeled as bare frame, the direction of their alignment, which notably however the masses of the walls are included, and reduces lateral sway of the building. Shear walls stiffness of the wall is not considered Fig 1. should be provided along ideally both length and width. However, if they are provided along only one Model-II –Building with shear walls, for the full storey direction, a proper grid of beams and columns in the and one full brick masonry wall in the walls are vertical plane (called a moment-resistant frame) must included; stiffness of the wall is not considered Fig 2. be provided along the other direction to resist strong earthquake effects. To control ill-effects of twist in structures, Shear walls are to be placed symmetrically in plan also along one or both directions in plan and more effective when placed along exterior perimeter of the structure. Shear walls resist shear and uplift forces.

Pushover Analysis

The pushover analysis of a structure is a static non- 3-Storey to 9-Storey linear analysis under permanent vertical loads and gradually increasing lateral loads. The load is Figure 1: Three Dimensional view of bare frame increased in accordance to a certain predefined building pattern. The purpose of pushover analysis is to analyze the expected performance of structural systems by estimating its strength and deformation demands in design of earthquakes by means of static inelastic analysis and comparing these demands to available capacities at the performance levels of interest. The evaluation is based on an assessment of important performance parameters, including global drift, inter-storey drift, inelastic element deformations, deformations between elements, and element connection forces. 3-Storey to 9-Storey

Illustrative Example of Structural System Figure 2: Three dimensional view of building with shear wall In the present study reinforced concrete moment resisting frame building of three storey, four storey, five storey, six storey, seven storey, eight storey and nine storey are considered. The plan layout, elevations and 3D view of all storey buildings with and without shear wall are as shown in the below Figures. The different configurations of buildings are modeled by considering only mass of the infill i.e. stiffness of the infill is neglected in order to account the nonlinear behavior of seismic demands. The bottom storey height is kept 1.5m and height of 3.5m is kept for all other storeys for all kind of Figure 3: Plan of Building Model

Page 20 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

In Nonlinear analysis the pushover method is adopted and all the models are pushed in three different lateral load patterns in order to obtain more hinges and critical performance point.

Natural Periods

The natural time periods obtained from seismic code IS 1893 (Part 1) -2000 and analytical (ETABS v 9.1.1) are given in Table-1 Codal and analytical values do not tally with each other. It can be observed that Figure 4: Plan of Shear wall Building Model models with equivalent diagonal struts significantly affects fundamental natural period, which is a Detailed Data of the Buildings function of mass, stiffness and damping characteristics of the building. The plot of building General details of building versus time period is shown in Chart-1

. No. of Storey’s : G+2 to G+8 Table 1: Codal and Analytical Fundamental Natural . Storey height: 3.5 Periods for Building Models in sec . Building frame system: Special Moment Resisting Frames (SMRF) . Building use: Commercial . Foundation Type: Isolated footing . Seismic zone: Zone V (factor 0.36) . Soil type: Medium soil

Material Properties

. Grade of Concrete for column: M35 . Grade of Concrete for beam: M30 . Grade of Steel: Fe 415 . Modulus of Elasticity of concrete, E for M30: 27386.1278 N/mm2 . Modulus of Elasticity of concrete, E for M35: 29580.398 N/mm2 . Density of Concrete: 25 KN/m3 . Poisson’s ratio of Concrete: 0.175

Load Intensities

. Roof and floor finish: 1 KN/m2 . Live Load at Roof: 2 KN/m2 . Live Load at Floor: 3 KN/m2 . Wall Load: 12 KN/m

Results and Discussions

Here in the present study, the behavior of each models are captured and the results are tabulated in the form of Time period, Base shear, top displacements and inter storey drifts in linear analysis. Where as in nonlinear, the performance of all models are observed in terms of Hinge formations, Capacity curves and Performance point.

Page 21 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Chart-1: Natural time period profile for all Storey The base shear obtained from equivalent static building for gravity and seismic combination method and response spectrum method with scaling factor for both gravity as well as seismic analysis is 4.2 BASE SHEAR given in Table-2

Table 2: Base shear and scaling factors for all models

In the response spectrum method the design base

shear (VB) is made equal to the base shear obtained from equivalent static method V B as per clause 7.8.2 of IS: 1893 (Part 1):2002 by applying the scaling factors calculated as shown in Table-2. The base shear is a function of mass, stiffness, height, and the natural period of the building structure.

4.3 LATERAL DISPLACEMENT

The lateral displacements obtained for equivalent static method (EQS) and response spectrum method (RSP) for 3 to 9 storey building models, along both X and Y directions are listed in the tables below. In order to account the effect of torsion the displacements are captured in both directions when force is acting in particular direction.

Table 3: Lateral displacements (m) of 3 storey building models for seismic analysis

Chart-2: Lateral displacement (m) profile for 3 storey in longitudinal direction by EQX and RSX

Page 22 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Chart-4: Lateral displacement (m) profile for5 storey in longitudinal direction by EQX and RSX

Chart-3: Lateral displacement (m) profile for 3 storey in Transverse direction by EQY and RSY

Table 4: Lateral displacement (m) of 5 storey building models for seismic analysis Chart-5: Lateral displacement (m) profile for 5 storey in Transverse direction by EQY and RSY

Table 5: Lateral displacement (m) of 7 storey building models for seismic analysis

Page 23 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Chart-6: Lateral displacement (m) profile for7 storey in longitudinal direction by EQX and RSX

Chart-7: Lateral displacement (m) profile for7 storey in Transverse direction by EQY and RSY

Table 6: Lateral displacement (m) of 9storey building models for seismic analysis

Chart-8: Lateral displacement (m) profile for 9 storey in longitudinal direction by EQX and RSX

Chart-9: Lateral displacement (m) profile for 9 storey in longitudinal direction by EQY and RSY

4.3 STOREY DRIFTS

According to IS 1893(Part 1):2002 clause 7.11.1 Storey drifts limitations are explained that the Storey

Page 24 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

drifts in any storey due to the minimum specified design lateral force, with partial load factor of 1.0 shall not exceed 0.004 times the storey height. 3.5 m storey height has got 14 mm. Table-7 to 10 shows the inter storey drift of G+2 to G+8 storey building with and without shear wall, by load combinations in consideration. Similarly Chart-10 to 17 indicates the plot inter storey drift versus storey number for the various load combinations.

Table 7: Inter storey drift (m) of 3 storey building models for seismic analysis

Chart-11: Storey drifts profile in longitudinal direction by EQY and RSY

Table 8: Inter storey drift (m) of 5 storey building models for seismic analysis

Chart-10: Storey drifts profile in longitudinal direction by EQX and RSX

Page 25 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Chart-12: Storey drifts profile in transverse direction by EQX and RSX

Chart-13: Storey drifts profile in transverse direction by EQY and RSY

Table 9: Inter storey drift (m) of 7 storey building Chart-14: Storey drifts profile in transverse direction models for seismic analysis by EQX and RSX

Chart-15: Storey drifts profile in transverse direction by EQY and RSY

Page 26 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Table 10: Inter storey drift (m) of 9 storey building models for seismic analysis

Chart-16: Storey drifts profile in transverse direction by EQX and RSX

Chart-17: Storey drifts profile in transverse direction by EQY and RSY

4.4 PUSHOVER ANALYSIS RESULTS

Table 11: Performance point and Hinge status in longitudinal direction for all building for gravity analysis

Page 27 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Table 12: Performance point and Hinge status Transverse direction for all building for gravity analysis PUSHY

CONCLUSION drifts for the considered building models .The capture of plastic hinges and its status were The present work focuses on study of seismic observed by performing Non linear static analysis. performance evaluation of RC buildings comprising The usage of pushover analysis identifies highlights of low rise, medium rise and high rise buildings, and emphasis the effect of correct lateral load which are located in medium soil i.e. seismic zone- V pattern, which can regulate detrimental influence on of IS 1893-2002 (part-1) using analytical methods. seismic performance of buildings with and without The Performances were noted in terms of time shear walls. The following are the conclusions which period, base shear, lateral displacements and storey

Page 28 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

can be drawn from the present investigation, which construction of shear wall in the building will are as follows increases the performance of the building.

1) The obtained analytical value of natural The result also shows that, Capacity of the buildings periods do not agree with the natural periods may be significant but the seismic demand varies obtained from the empirical expressions of the code with respect to the buildings with and without shear for regular buildings, therefore to design such walls. buildings dynamic analysis should be required. References 2) The fundamental natural period of the [1]. Agarwal P and Shrikhande. M., 2006 “Earthquake structures decreases with increase in storey stiffness resistant Design of Structures’ Prentice-Hall of India Private due to the presence of shearwall. Limited New Delhi India [2]. Andreas J Kappos , Georgios Panagopoulos (2004), 3) Base shear increases with the increase in “Performance-based seismic design of 3D R/C buildings mass and stiffness of building; hence for the using inelastic static and dynamic analysis procedures”, buildings with shearwall base shear is more than ISET journal of earthquake technology, paper no. 444, vol. regular buildings. 41, no. 1, pp. 141-158. [3]. Ashraf Habibullag, S.E. and Stephen Pyle S.E. “ Practical 4) Addition of shear wall in the building will Three Dimensional Nonlinear Static Pushover Analysis” results in the drastic reduction of lateral published in Structural Magazine, Winter, 1998. displacement of the building there by in turn assures [4]. ATC-40 (1996), “Seismic Evaluation and Retrofit of the safety of the structure. Concrete Buildings”, Applied Technology Council, Seismic Safety Commission, Redwood City, California, Volume 1&2. 5) The inter storey drift of both buildings i.e. [5]. FEMA-356 (2000), “Prestandard and Commentary for bare frame and building with shear wall are within the Seismic Rehabilitation of Buildings”, Federal Emergency the limiting value i.e.0.004xh, where h is the storey Management Agency, American society of civil engineers. height but addition of shearwall in the building [6]. Meher Prasad. A, “Pushover Analysis”, IIT Madras [7]. Kadid. A, Boumrkik. A (2008),“Pushover analysis of drastically reduces the inter storey drift when reinforced concrete frame structures”, Asian journal of civil compared to that of building without shear wall. engineering (building and housing) vol. 9, no.1, pages 75- 83. 6) Performance of concrete infill of shear wall [8]. Katrin beyer,Alessandro dazio, and m. j. Nigel priestley: depends on adjacent elements especially columns, so Shear deformation of slender reinforced concrete wall premature failure due columns due to the under seismic loading ACI Structural Journal, V.108, No. 2, consideration of more axial load March-April 2011. [9]. Lain A.Macleod: A design aid of Shear Wall-Frame 7) Increase in the stiffness of the building will Interaction (PORTLAND CEMENT ASSOCIATION 1970). increases the seismic performance of the building. [10]. Manoj S. Medhekar and Sudhir K.Jain: Seismic behavior, design and detailing of RC shear wall, part II The 8) The performance level of all the models were Indian concrete journals July 1993. found between life safety and collapse prevention Author’s Affiliation level 1Lecturer, Civil Engineering Department, University of 9) The obtained result shows the amount of Gondar, Ethiopia, Email: [email protected] information given by the linear analysis was limited up to certain extent. Whereas the nonlinear analysis 2Asst.Prof, Civil Engineering Department, East West provides the exact stiffness and strength of the Institute of Technology, Karnataka, India, Email: building. [email protected]

10) As the number of plastic hinges for both Copy for Cite this Article- Muralidhar G.B and Swathirani buildings i.e. with and without shear wall are same, K.S, ‘Comparison of Seismic Susceptibility Assessment of but the performance base shear found to be more in Low to Medium Rise RC Buildings by Considering the Effect the building with shear wall than in bare frame, with of Shearwall’, International Journal of Science, Engineering decrease in performance displacement. So and Technology, Volume 3 Issue 6: 2015, pp. 43-53.

Page 29 Nikunj N Dave et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Analysis of Dual Buck Half Bridge Voltage Balancer

1Nikunj N Dave, 2Raj J Patel

Abstract

In this paper, a dual-buck half-bridge voltage balancer and a control strategy are proposed, which can avoid the shoot-through problem. The current relationships of the inductors; the capacitors are analyzed particularly. Micro-dc grid is a novel power system focused on the development of renewable resources.

However, two-wire transmitting power mode is generally accepted in a micro-dc grid, which is usually not suitable for the requirements of the input voltage levels of different power converters and loads. In order to meet the requirements, a half-bridge voltage balancer was introduced in a micro-dc grid, which can convert a two-wire mode into a three-wire mode in a micro-dc grid via a neutral line.

Keywords: Buck Converter, DC Distribution System, Half Bridge, Micro-DC grid, Voltage Balancer.

Introduction

The increasing demand for development of power from renewable energy has lead to creation of Micro-dc grid.[1] Micro grid is defined as a cluster of distributed loads, distributed storage devices and distributed generation sources that operate to improve the reliability and quality of the local power supply in a controlled manner. A micro-dc grid based on distributed generation system, which can supply Figure 1: Typical structure of micro-dc grid super high-quality electric power. However, a micro- dc grid usually has only one voltage level in two-wire Advantage of Micro DC Grid [4] dc distribution system, and it is impossible to supply some types of loads at half voltage such as dc/ac 1) The system efficiency becomes higher because of inverters needing a neutral line [1], converters with the reduction of conversion losses of inverters input voltage balancing like half- bridge converter between dc output sources and loads. and three-level half-bridge converter, and so on. In particular, when a micro-dc grid is used in domestic 2) There is no need to consider about and office places, a neutral line connected to ground synchronization with the utility grid and reactive is favorable to the security of person. power.

Micro DC Grid 3) Higher efficiency than ac micro grid. [10]

A typical structure of a micro-dc grid[1] with a Voltage Balancer and Controlled Strategy voltage balancer is shown in Fig.1, where the voltage A Dual-buck half bridge voltage balancer is shown in balancer is used to construct a neutral line achieving figure 2[1], consists of two legs namely left bridge two same voltage levels for achieving requirements and right bridge. The neutral line LN connected to of different types of loads, such as unbalanced loads, 1 the earth ground. Each bridge consists of switch, half-bridge converter and inverter, and so on.[6] diode and inductor. The inductor currents will cause additional power losses. The control strategy that drive two bridges, based on different power quality 1Corresponding Author- M.E. (Electrical Engineering), H.G.C.E, of the unbalanced loads. Hence voltage balancer is Vehlal, Ahmedabad, Email: [email protected] placed near a converter to balance positive and

© 2015 Nikunj N Dave et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 30 Nikunj N Dave et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

negative voltages. It is also possible to place it near b) All inductors and capacitors are ideal. load side. C = C1 = C2 and L1 = L2 = L

c) The output voltages are not changed during each switching process. The analyzing principles of left bridge are given as right bridge has same procedure.

CCM Operation

1) Mode 1: During this time interval [t0, t1] the switch S1 is on at t=0 and the current iL1 increases linearly. The input current which rises flows through filter Figure 2: Proposed dual buck half-bridge voltage inductor L, filter capacitor C, and load resistor. The balancer voltage stress of the freewheeling diode D1 is the input voltage. Controlled Strategy L1 (di L1/ dt) = Uin − Uout2 = Uout1 The control strategy is presented in figure 3[1]. The output signal of voltage regulator i,e PI controller is 2) Mode 2 : During this time interval [t1, t2] the directly sent to switches. The PI algorithm used for switch S1 is turned off at t = t1 and the current iL1 feedback of current controller. Left bridge will on if decreases linearly. RLoad1 is greater than RLoad2 while right bridge is L1 di L1/dt = −Uout2 off. Right bridge will be on if RLoad1 is lower than RLoad2 when left bridge is off. This indicates only The freewheeling diode D1 conducts due to energy one of the two bridge legs will work for every stored in the inductor, and the inductor current switching period. continuous to flow through L,C, load and diode D1. The inductor current falls until switch S1 on again in next cycle. Depending on switching frequency filter inductance and capacitance, the inductor current could be discontinuous.The time (t1-t0 ) is equal to the time (t2-t1) , i,e the turn on time is equal to the turn off time.

Uout1 (t1 − t0) = Uout2 (t2 − t1)

Figure 4: Driving signal and inductor current waves Figure 3: Proposed dual buck half-bridge voltage under CCM [3] balancer DCM Operation Each bridge operates in continuous conduction mode (CCM) and discontinuous conduction mode There are three operating modes. It can be known (DCM). For analysis following assumptions are given. that mode1 and mode 2 are in accordance with the two modes under CCM. Therefore, only the mode3 a) All power switches and diodes are ideal with [t2,t3] is given. ignored switching time and conduction voltage drop.

Page 31 Nikunj N Dave et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Mode 3: During this time interval [t2,t3] ,the loads RLoad1 and RLoad2 are supplied by the voltage sources Uout1 and Uout2 because energy stored in inductor is zero. The energy stored in the capacitor is discharged to the load.

Uout1(t1 − t0) = uout2(t2 − t1)

Here time, turn on time (t1-t0) is smaller than the turn off time (t3-t1). Figure 7: Output signal which is measure across the load i.e. Rload2 & Rload1

Figure 5: Driving signal and inductor current waves under DCM.[3]

Controlled Strategy Figure 8: Current waveform of Inductor L1 i.e. Il1 and L2 i.e. Il2 In order to confirm the analysis, the computer simulations of the main current relationships and the loads transiently changing are carried out by using MATLAB. Considering single phase 110 V for a half- bridge inverter and single phase 220 V for a full- bridge inverter, the dc bus voltage (input voltage uin) is selected to be 360 V. The other main simulation parameters are listed: switching frequency of 25 kHz, L1 =L2 = 230μH[1], and C1 = C2 = 470μF. In this section, only the simulation results of the current relationships of the left bridge leg are given. The Figure 9: Capacitor Current waveform i.e.Ic1 and Ic2 simulation results of the current relationships are References given below. In figure it includes CCM [RLoad1 = 100 Ω and RLoad2 = 10 Ω ] and DCM [RLoad1 = 40 Ω [1].Dual-Buck Half-Bridge Voltage Balancer Telugu Siva and RLoad2 = 30 Ω].[1] Sai1 And P. Sai Sampath Kumar, International Journal Of Innovative Research In Science & Engineering, Issn (Online) 2347-3207

[2].H. Kakigano, Y. Miura, T. Ise, And R. Uchida, “Dc Voltage Control Of The Dc Micro-Grid For Super High Quality Distribution,” In Proc. Ieee Power Electron. Spec. Conf., Jeju, Korea, 2006, Pp. 518–525

[3]. Xianjin Zhang And Chunying Gong, Member, Ieee “ Dual-Buck Half-Bridge Voltage Balancer”. Ieee Transactions On Industrial Electronics, Vol. 60, No. 8, August 2013 Figure 6: Simulation result of control strategy o/p of [4]. Dc Microgrids: Benefits And Barriers Paul Savage, switch 1(MOSFET) Pitch and Pitch-to-Width Ratio Robert R. Nordhaus, And Sean P. Jamieson

[5]. Kakigano, A. Nishino, And T. Ise, “Distribution Voltage Control For Dc Micro Grid With Fuzzy Control And Gain-

Page 32 Nikunj N Dave et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Scheduling Control”, 8th International Conference On Power Electronic Ecce Asia May 30- June 3, 2011, The Shilla Jeju, Korea

[6]. Wang, Q. H. Wu, Fellow, Ieee, W. H. Tang, Senior Member, Ieee, And Y. K. Tao1 “ Half Load- Cycle One- Cycle Control For Inverter” , Ieee-Appeec 2013, Hong Kong, 8-11 December, 2013

Author’s Affiliation

1M.E. (Electrical Engineering), H.G.C.E, Vehlal, Ahmedabad

2Assistant Professor, M.E. (Electrical Engineering) H.G.C.E, Vehlal, Ahmedabad

Copy for Cite this Article- Nikunj N Dave and Raj J Patel, ‘Analysis of Dual Buck Half Bridge Voltage Balancer’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 54-57.

Page 33 V.P.N. Prasad et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Wind Energy Inverter with Facts Capability for Control of Power Factor In Distributed Energy Systems

1V. P. N. Prasad, 2Dayakar Kande

Abstract

In this paper, a new single-phase wind energy inverter (WEI) with flexible AC transmission system (FACTS) capability is presented. The proposed inverter is placed between the wind turbine and the grid, same as a regular WEI, and is able to regulate active and reactive power transferred to the grid. This inverter is equipped with distribution static synchronous compensators option in order

to control the power factor (PF) of the local feeder lines. Using the proposed inverter for small-to medium- size wind applications will eliminate the use of capacitor banks as well as FACTS devices to control the PF of the distribution lines. The goal of this paper is to introduce new ways to increase the penetration of renewable energy systems into the distribution systems. This will encourage the utilities and customers to act not only as a consumer, but also as a supplier of energy. Moreover, using the new types of converters with FACTS capabilities will significantly reduce the total cost of the renewable energy application. In this paper, modular multilevel

converter is used as the desired topology to meet all the requirements of a single-phase system such as compatibility with IEEE standards, total harmonic distortion (THD), efficiency, and total cost of the system. The proposed control strategy regulates the active and reactive power using power angle and modulation index, respectively. The function of the proposed inverter is to transfer active power to the grid as well as keeping the PF of the local power lines constant at a target PF regardless of the incoming active power from the wind turbine. The simulations for an 11-level inverter have been done in MATLAB/ Simulink. To validate the simulation results, a scaled

prototype model of the proposed inverter has been built and tested. The function of the proposed inverter is to transfer active power to the grid as well as keeping the PF of the local power lines constant at a target PF regardless of the incoming active power from the wind turbine. The simulations for an11-level inverter have been done in MATLAB/ Simulink. To validate the simulation results, a scaled prototype model of the proposed inverter has been built and tested.

Keywords: modular multilevel converter (MMC), proposed control strategy and its detailed study.

Introduction applications, a back-to-back converter is normally utilized to connect the generator to the grid. A THE role of power electronics in distribution systems rectifier equipped with a maximum power point has greatly increased recently. The power electronic tracker (MPPT), converts the output power of the devices are usually used to convert the wind turbine to a dc power. The dc power is then nonconventional forms of energy to the suitable converted to the desired ac power for power lines energy for power grids, in terms of voltage and using an inverter and a transformer. With recent 1 frequency. In permanent magnet (PM) wind developments in wind energy, utilizing smarter wind energy inverters (WEIs) has become an important

1 issue. There are a lot of single-phase lines in the Corresponding Author- M. Tech, Power Electronics , Geethanjali United States, which power small farms or remote Engineering College, A.P, India, Email: [email protected] houses [1], [2]. Such customers Have the potential to

© 2015 V.P.N. Prasad et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 34 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

produce their required energy using a small-to- integration of wind and solar energy was presented medium-size wind turbine. Increasing the number of in [3]. In [4], new commercial wind energy converters small-to-medium wind turbines will make several with FACTS capabilities are introduced without any troubles for local utilities such as harmonics or power detailed information regarding the efficiency or the factor (PF)issues A high PF is generally desirable in a topology used for the converters. power system to decrease power losses and improve voltage regulation at the load. It is often desirable to adjust the PF of a system to near 1.0. When reactive elements supply or absorb reactive power near the load, the apparent power is reduced. In other words, the current drawn by the load is reduced, which decreases the power losses. Therefore, the voltage regulation is improved if the reactive power compensation is performed near large loads. Traditionally, utilities have to use capacitor banks to compensate the PF issues, which will increase the total cost of the system. The modern ways of Figure 1: Complete configuration of the proposed controlling the PF of these power lines is to use small inverter with FACTS capability distribution static synchronous compensators (D- STATCOMs). The D-STATCOMs are normally placed In [5] a complete list of the most important multilevel in parallel with the distributed generation systems as inverters was reviewed. Also, different modulation well as the power systems to operate as a source or methods such as sinusoidal Pulse width modulation sink of reactive power to increase the power quality (PWM), selective harmonic Elimination, optimized issues of the power lines. Using regular STATCOMs harmonic stepped waveform technique, and space for small-to-medium size single-phase wind vector modulation were discussed and compared. applications does not make economic sense and Among all multilevel topologies [6]–[9], the cascaded increase the cost of the system significantly. This is H-bridge multilevel converter is very well known for where the idea of using smarter WEIs with FACTS STATCOM applications for several reasons [10]–[12]. capabilities shows itself as a new idea to meet the The main reason is that it is simple to obtain a high targets of being cost-effective as well as compatible number of levels, which can help to connect with IEEE standards. The proposed inverter in this STATCOM directly to medium voltage grids. The paper is equipped with a D-STATCOM option to modular multilevel converter(MMC) was introduced regulate the reactive power of the local distribution in the early 2000s [13], [14]. Reference[15] describes lines and can be placed between the wind turbine a MMC converter for high voltage DC(HVDC) and the grid, same as a regular WEI without any applications. This paper mostly looks at the main additional cost. The function of the proposed circuit components. Also, it compares two different inverter is not only to convert dc power coming from types of MMC, including H-bridge and full-bridge dc link to a suitable ac power for the main grid, but sub modules. In [9] and [16], a new single-phase also to fix the PF of the local grid at a target PF by inverter using hybrid lamped topology for renewable injecting enough reactive power to the grid. In the energy systems is presented. The proposed inverter proposed control strategy, the concepts of the is placed between the renewable energy Source and inverter and the D-STATCOM have been combined the main grid. The main drawback of the proposed to make a new inverter, which possesses FACTS inverter is that the output current has significant capability with no additional cost. The proposed fluctuations that are not compatible with IEEE control strategy allows the inverter to act as an standards. Several other applications of custom Inverter with D-STATCOM option when there is power electronics in renewable energy systems exist, enough wind to produce active power, and to act as including [17] an application of a custom power a D-STATCOM when there is no wind. The active interface where two modes of operation including an power is controlled by adjusting. There are a large active power filter and a renewable energy number of publications on integration of renewable STATCOM. Another application [18] looks at the energy systems into power systems. A list of current source inverter, which controls reactive complete publications on FACTS applications for grid power and regulates voltage at the point of common

Page 35 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

coupling (PCC). The authors called their proposed system PV-STATCOM. Similar to wind farms (when there is no wind), solar farms are idle during nights. We proposed a control strategy that makes the solar farms to act as STATCOMs during night when they are not able to produce active power.

The main purpose of the PV-STATCOM system is to improve the voltage control and the PF correction on three-phase transmission systems.

In this paper, the proposed WEI utilizes MMC topology, which has been introduced recently for HVDC applications. Replacing conventional inverters with this inverter will eliminate the need to use a separate capacitor bank or a STATCOM device to fix the PF of the local distribution grids. Obviously, depending on the size of the power system, multiple inverters might be used in order to reach the desired PF. The unique work in this paper is the use of MMC topology for single phase voltage-source inverter, which meets the IEEE standard 519 requirements,

and is able to control the PF of the grid regardless of the wind speed Fig. 1 shows the complete grid- Figure 2: Structure of a single-phase MMC inverter connected mode configuration of the proposed structure. inverter. The dc link of the inverter is connected to the wind turbine through a rectifier using MPPT and The main benefits of the MMC topology are: its output terminal is connected to the utility grid modular design based on identical converter cells, through a series-connected second-order filter and a simple voltage scaling by a series connection of cells, distribution transformer. simple realization of redundancy, and possibility of a common dc bus. Fig. 2 shows the circuit Modular Multilevel Converter configuration of a single-phase MMC and the structure of its SMs consisting of two power switches MMC has gained increasing attention recently. A and a floating capacitor. number of papers were published on the structure, control, and application of this topology, but none The output voltage of each SM (vo) is either equal to has suggested the use of that for inverter + D- its capacitor voltage (vc) or zero, depending on the STATCOM application. This topology consists of switching states. The buffer inductors must provide several half-bridge (HB) sub modules (SMs) per each current control in each phase arm and limit the fault phase, which are connected in series. An n-level currents. To describe the operation of MMC, each SM single phase MMC consists of a series connection of can be considered as a two pole switch. If Sui, which 2(n − 1) basic SMs and two buffer inductors. Each SM is defined as the status of the ith sub module in the possesses two semiconductor switches, which upper arm, is equal to unity, then the output of the operate in complementary mode, and one capacitor. ith SM is equal to the corresponding capacitor The exclusive structure of MMC becomes it an ideal voltage; otherwise it is zero. Likewise, if Sli which is candidate for medium-to-high-voltage applications defined as the status of the ith sub module in the such as wind energy applications. Moreover, this lower arm, is equal to unity, then the output of the topology needs only one dc source, which is a key ith lower SM is equal to the corresponding capacitor point for wind applications. MMC requires large voltage; otherwise it is zero. capacitors which may increase the cost of the systems; however, this problem is offset by the lack Generally, when Sui or Sli is equal to unity, the i th of need for any snubber circuit. upper or lower SM is ON; otherwise it is OFF.

Page 36 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Therefore, the upper and lower arm voltages of the regular inverter to transfer active power from the MMC are as follows: renewable energy source to the grid as well as working as a normal

Where v11 and v12 are the voltages of the upper and lower buffer inductors, n is the number of voltage levels, and vci is the voltage of the ith SMs capacitor in upper arm or lower arm. A single-phase 11-level MMC inverter consists of 20 SMs which translates to 40 power switches, 20 capacitors, and 2 buffer inductors. The dc and ac voltages of the 11-level Figure 3: Schematic of the proposed controller MMC are described by system.

D-STATCOM to regulate the reactive power of the grid in order to control the PF of the grid.

2) When wind speed is zero or too low to generate active power: the D-STATCOM mode. In this case, the inverter is acting only as a source of reactive power to control the PF of the grid, as a D-STATCOM. This option eliminates the use of additional capacitor Proposed Control Strategy banks or external STATCOMs to regulate the PF of The proposed controller consists of three major the distribution feeder lines. Obviously, the device is functions. The first function is to control the active capable of outputting up to its rated maximum real and reactive power transferred to the power lines, power and/or reactive power, and will always output the second function is to keep the voltages of the all real power generated by the wind turbine to the SMs’ capacitors balanced, and the third function is to grid. The amount of reactive power, up to the design generate desired PWM signals. maximum, is dependent only on what the utility asks the device to produce. Fig. 3 shows the complete proposed controller system. The aim of the designed inverter is to Generally, (5) and (6) dictate the power flow between transfer active power coming from the wind turbine a STATCOM device and power lines as well as to provide utilities with distributive control of volt-ampere reactive (VAR) compensation and PF correction of feeder lines. The application of the proposed inverter requires active and reactive power to be controlled fully independent, so that if wind is blowing, the device should be working as a normal Where X is the inductance between the STATCOM inverter plus being able to fix the PF of the local grid (here as inverter) and the grid which is normally at a target PF (D-STATCOM option), and if there is no considered as output filter inductance added to the wind, the device should be only operating as a D- transmission line inductance. The root mean square STATCOM (or capacitor bank) to regulate PF of the (RMS) voltage of the STATCOM (= inverter) is given local grid. as Es and is considered to be out of phase by an angle of δ to the RMS line voltage E1. In the This translates to two modes of operation: proposed control strategy, active and reactive power 1) When wind is blowing and active power is coming transferred between the inverter and the distribution from the wind turbine: the inverter plus D-STATCOM grid is controlled by selecting both the voltage level mode. In this mode, the device is working as a of the inverter and the angle δ between the voltages

Page 37 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

of inverter and grid, respectively. The amplitude of the inverter with a reference value. A PI compensator the inverter voltage is regulated by changing the determines the desired value for the power angle. modulation index m and the angle δ by adding a delay to the firing signals which concludes

In this paper, m is the key factor to control the reactive power compensation and its main task is to make the PF of the grid equal to the target PF. δ is the control parameter to adjust the active power control between the inverter and the grid.

Several assumptions should be considered for the proposed controller which is as:

1) The load on the feeder line should be considered fixed for a small window of time and there is no change in the load during a cycle of the grid frequency; Figure 4: CPWM waveforms for an11-level MMC inverter, and the generated output voltage levels. 2) The feeder line can be accurately modeled as a constant P, Q load. This means that the power The second function of the controller systems is to produced by a wind turbine will displace other power keep the capacitors’ voltages balanced. In order to on the feeder line and not add to it; and do this, a carrier based pulse width modulation (CPWM) method is used. The top graph in Fig. 4 3) Although making a change in m or δ has effect on shows the reference signal and the carrier waveforms both (7) and (8), it is assumed that a change in the for an 11-level MMC inverter using CPWM technique. modulation index will predominantly affect Q, while a The bottom graph of Fig. 4 shows the output voltage change in delta will predominantly affect P. Any levels generated based on Table I. effect on Q from a small change in delta is thus ignored. This results in controlling P and Q In an 11-level CPWM technique, ten carrier signals independently. Equation (9) shows the relation are compared with a reference sinusoidal signal. In between the target reactive power and the target PF Fig 4, based on the phase of the reference signal (vr ), there are 11 operating regions where each region defines a voltage level in the output

Where PG is the amount of active power on the grid, QT is the target amount of reactive power, and PFT is the target PF desired by the utility. So, QT can be calculated as Where nupperArm and nlowerArm are the numbers of SMs which are ON (Sc is ON and Sm is OFF in Fig. 1) in the upper arm or lower arm, respectively.

In an 11-level MMC inverter, there are ten upper and Using (9) and (10), the target reactive power for the ten lower SMs where each SM has a capacitor. For grid is determined and is compared with the actual instance, in voltage level 1 of Table I, all the upper value of the reactive power of the grid. Using a PI SMs should be OFF and all the lower SMs should be compensator will determine the desired value for the ON, which translates to the fact that the main modulation index. The power angle is also switches Sm of all upper SMs and the auxiliary determined by comparing the actual dc voltage of

Page 38 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

switches (Sc) of all lower SMs have to be ON and all the capacitors, direction of the current flowing the other switches have to be OFF. In this case, the through the switches and using Table I, the controller input dc voltage is applied only to the ten lower generates the PWM signals in order to meet all the capacitors, so that the output voltage is vDC/2. Fig. 5 system requirements. illustrates the selection of capacitors for different voltage levels shown in Table I. Simulation Diagram, Results and Discussions The design of an 11-level MMC inverter was carried out in MATLAB/Simulink. The simulation is 20 s long and contains severe ramping and de-ramping of the wind turbine. The goal is to assess the behavior of the control system in the worst conditions. Table II shows the values of the parameters used for the simulation. Before t = 6 s, there is no wind to power the wind turbine; therefore, the dc link is open- circuited. At t = 6 s, the input power of the inverter is ramped up to 12 kW in 5 s, and then ramped down to 3.5 kW 4 s later.

Figure 5: Simulation diagram of the proposed model (Available in Last Page)

The most critical issue to control MMC is to maintain the voltage balance across all the capacitors. Therefore, the SMs’ voltages are measured and sorted in descending order during each cycle. If the current flowing through the switches is positive, so that capacitors are being charged, nupper Arm and nupper Arm and of the SMs in upper arm and lower arm with the lowest voltages are selected, respectively. As a result, ten capacitors with lowest

voltages are chosen to be charged. Fig. 6 shows the output active power from the wind Likewise, if the current flowing through the switches turbine. In the simulation, the local load makes the is negative, so that capacitors are being discharged, PF 0.82. When the simulation starts, the inverter nupper Arm and nupper Arm of the SMs in upper provides enough compensation to reach the target arm and lower arm with highest voltages are PF 0.90. selected, respectively. As a result, ten capacitors with highest voltages are chosen to be discharged. Consequently, the voltages of the SMs’ capacitors are balanced. Considering Table I and based on the direction of the current flowing through the switches, the proper algorithm will be selected to maintain capacitor balance.

The third function of the controller system is the Figure 6: simulated output active power from wind PWM generation block. In this block, based on the turbine desired modulation index, power angle, voltages of

Page 39 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Figure 10: simulated delta and modulated index of the 11-level inverter

Fig. 9 shows the PF of the grid. The PF of the grid is constant at 0.90 regardless of the active power from the wind turbine, showing that the main goal of the inverter is achieved. The set-point for dc link voltage of the inverter is 2000 V and the RMS value of the Figure 7: simulated active and reactive power of the output ac voltage is 600 V. The delta and modulation inverter (top graph) simulated active and reactive index graphs are shown in Fig. 10. As soon as the power of power lines (bottom graph). active power comes from the wind turbine, the controller system increases the value of the power angle in order to output more active power to the grid. Therefore, the active power provided from the feeder lines to the load is decreased, and as a result the reactive power from the feeder lines is decreased. Consequently, the modulation index is increased by the controller system to inject more

reactive power needed by the load. Figure 8: Output voltage of the 11-level inverter To validate the simulation results, a scaled version of Fig. 7 shows the output active and reactive power the proposed inverter has been built and tested. The from the wind turbine and the grid. After t = 6 s, the power rating of the scaled prototype model is 250 W output power of the wind turbine is increased, and as and/or VAR, which is limited by the rating of the a result the level of active power provided by the semiconductor devices. The experimental results feeder line is decreased by the same amount. The serve only as a proof-of-concept. In order to simulated output voltage of the inverter before the implement the control strategy and to handle the filter is shown in Fig. 8. feedback signals, two CLP 1104 dSPACE systems have been synchronized. A three-phase PM generator driven by a variable speed dc motor is used to emulate the wind speed change.

Conclusion

The concept of a new multi-level inverter with FACTS capability was presented in this dissertation. The proposed inverter represents a new way in which Figure 9 : PF of the grid=0.90 small renewable sources can provide control and support in distribution systems. The MMC inverter with D-STATCOM capability supplies utilities with capacitive VAR compensation. The unique contribution of this research is to combine the two concepts of D-STATCOM and inverter using the most advanced multi-level topology to create a single- phase wind inverter with FACTS capability. The proposed power electronics device acts as a

Page 40 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

renewable energy inverter with D-STATCOM option [9] C. Tareila, P. Sotoodeh, and R. D. Miller, “Design and with a hopefully lower total cost. The primary focus control of a single-phase D-STATCOM inverter for wind of this research was to demonstrate the application application,” in Proc. PEMWA, Jul. 2012, pp. 1–5. of custom power electronics in renewable energy [10] B. Gultekin and M. Ermis, “Cascaded multilevel systems. Increasing the number of small to medium converter-based transmission STATCOM: System design wind turbines can lead to several issues for local methodology and development of a 12 kV ±12 MVAr utilities, including harmonics or power factor (PF) power stage,” IEEE Trans. Power Electron., vol. 28, no. 11, complications. Currently, the PF of distribution power pp. 4930–4950, Nov. 2013. lines is controlled by utilizing small distribution static synchronous compensators (D-STATCOMs) or [11] K. Sano and M. Takasaki, “A transformerless D- STATCOM based on a multivoltage cascade converter capacitor banks. Using traditional STATCOMs for requiring no DC sources,” IEEE Trans. Power Electron., vol. small- or medium-sized single-phase wind 27, no. 6, pp. 2783–2795, Jun. 2012. applications is not economical, because the system cost increases [12] X. Liang, Y. Xu, X. Chen, and C. Guo, “The simulation research of STATCOM based on cascaded multi-level References converter,” in Proc. 4th Int. Conf. Electr. Util. DRPT, Jul. 2011, pp. 494–498. [1] U.S. Solar Market Insight, 2010 Year End Review Executive Summary, SEIA, Washington, DC, USA, 2011. [13] M. Davies, M. Dommaschk, J. Dorn, J. Lang, D. Retzmann, and D. Soerangr, HVDC PLUS Basic and [2] AWEA U.S. Wind Industry Annual Market Report Year Principle of Operation. Erlandgen, Germany: Siemens AG Ending 2010,AWEA, Washington, DC, USA, 2011. Energy Sector, 2009.

[3] S. A. Rahman, R. K. Varma, and W. H. Litzenberger, [14] B. Gemmell, J. Dorn, D. Retzmann, and D. Soerangr, “Bibliography of FACTS applications for grid integration of “Prospects of multilevel VSC technologies for power wind and PV solar power systems: 1995–2010 IEEE working transmission,” in Proc. IEEE Transmiss. Distrib. Conf. group report,” in Proc. IEEE Power Energy Soc. General Exposit., Apr. 2008, pp. 1–16. Meeting, Jul. 2011, pp. 1–17. [15] C. D. Barker and N. M. Kirby, “Reactive power loading [4] A. Beekmann, J. Marques, E. Quitmann, and S. Wachtel, of components within a modular multi-level HVDC VSC “Wind energy converters with FACTS capabilities for converter,” in Proc. IEEE EPEC, Oct. 2011, pp. 86–90. optimized integration of wind power into transmission and distribution systems,” in Proc. CIGRE/IEEE PES Joint Symp. [16] C. P. Tareila, “A single-phase D-STATCOM Inverter for Integr. Wide, Scale Renew. Resour. Power Del. Syst., Jul. distributed energy sources,” M.S. thesis, Dept. Electr. 2009, pp. 1–9. Comput. Eng., Kansas State Univ., Manhattan, KS, USA, Aug. 2011. [5] J. Rodriguez, J. S. Lai, and F. Z. Peng, “Multilevel inverters: Survey of topologies, controls, and applications,” [17] Z. Yang, C. Shen, L. Zhang, M. L. Crow, and S. Atcitty, IEEE Trans. Ind. Appl., vol. 49, no. 4, pp. 724–738, Aug. “Integration of a STATCOM and battery energy storage,” 2002. IEEE Trans. Power Syst., vol. 16, no. 2, pp. 254–260, May 2001. [6] F. Z. Peng, J. S. Lai, J. W. McKeever, and J. VanCoevering, “A multilevel voltage-source inverter with separate DC [18] S. Chakraborty, B. Kroposki, and W. Kramer, sources for static VAr generation,” IEEE Trans. Ind. Appl., “Evaluation of control and voltage regulation vol. 32, no. 5, pp. 1130–1138, Oct. 1996. functionalities in a single-phase utility-connected inverter for distributed energy applications,” in Proc. IEEE ECCE, [7] L. M. Tolbert and F. Z. Peng, “Multilevel converters as a Sep. 2009, pp. 1753–1759. utility interface for renewable energy systems,” in Proc. IEEE Power Eng. Soc. Summer Meeting, vol. 2. Jul. 2000, pp. Author’s Affiliation 1271–1274. 1M. Tech, Power Electronics, Geethanjali Engineering [8] S. Kouro, M. Malinowski, K. Gopakumar, J. Pou, L. G. College, A.P, India, Email: [email protected] Franquelo, B. Wu, et al., “Recent advances and industrial applications of multilevel converters,” IEEE Trans. Ind. 2Department of Electrical and Electronics Engineering, Electron., vol. 57, no. 8, pp. 2553–2580, Aug. 2010. Geethanjali Engineering College, A.P, India, Email: [email protected]

Page 41 V.P.N. Prasad et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Figure 5: Simulation diagram of the proposed model

Copy for Cite this Article- V.P.N. Prasad and Dayakar

Kande, ‘Wind Energy Inverter with Facts Capability for Control of Power Factor in Distributed Energy Systems’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 58- 66.

Page 42 K. Adavallan et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Antioxidant and Antifungal Potential of Morus Alba Leaf Extract Mediated Synthesis of Gold Nanoparticles

1K. Adavallan, 2N. Rajendra Prasad, 1N. Krishnakumar

Abstract

Biosynthesis of gold nanoparticles (AuNPs) using plant extract have been suggested as possible

eco-friendly alternatives to chemical and physical methods. Present study reports a green chemistry approach for the synthesis of AuNPs using the aqueous leaf extract of mulberry (Morus alba L.). The synthesized AuNPs were characterized by UV–Vis spectroscopy, high-resolution transmission electron microscopy (HR-TEM) and selected area electron diffraction (SAED) analyses. UV–visible spectroscopic studies confirm the formation of AuNPs through color conversion due to surface plasmon resonance band at 537 nm. The results obtained from HR-TEM revealed that the synthesized AuNPs were in the size range of 15-53 nm. Further, SAED pattern clearly show

the pure crystalline nature of the synthesized AuNPs. Furthermore, biosynthesized AuNPs nanoparticles exhibited strong antioxidant activity such as DPPH radical and hydroxyl radical scavengers compared to the mulberry leaf extract alone. In addition, the biosynthesized AuNPs shows good antifungal activity against human pathogenic fungi (Candida albicans and Candida glabrata). Therefore, the present study thus suggests that the preparation of AuNPs using mulberry leaf extract provides strong antioxidant and antifungal activity and it has great potential in the preparation of drugs for various diseases.

Keywords: Biosynthesis; Mulberry leaf extract; Gold nanoparticles

Introduction reducing agents applied for synthesis of AuNPs on environment, encouraged researchers to develop Noble metal nanoparticles such as gold, silver and eco-friendly methods for preparation of gold platinum are particularly interesting due to their size nanoparticles [7, 8]. Recently, a number of and shape dependent unique optoelectronic researchers are focusing towards the biosynthesis properties [1]. Among these, gold nanoparticles are methods, which can offer a reliable, non-toxic and the most extensively studied materials due to environmentally benign alternative to chemical and their unique and tunable surface plasmon physical methods. Among the biosynthesis methods, resonance (SPR) and potential applications in plant mediated synthesis of nanoparticles is gaining nonlinear optics, catalysis, electronics and other importance due to its simplicity and eco-friendliness domains of high technology and medicine [2-4]. The because it does not require the elaborate process of controlled synthesis of gold nanoparticles of well- maintaining cell cultures. The plant mediated defined size, shape and composition, to be used in synthesis of AuNPs attracts an increasing interest biomedical field is a big challenge [5]. The most due to their ease synthesis, simplicity, eco- common synthesis of AuNPs is the chemical friendliness and novel physico-chemical properties as reduction of a ionic gold in aqueous phase by a compared with those of bulk particles, that allow chemical reducing agent such as NaBH4, citrate, and AuNPs in various biomedical applications such as, 1 ascorbate [6]. But hazardous effects of such treatment of cancer and diabetes and also used as good source of antioxidant and antimicrobial agents 1Corresponding author E-mail: [email protected] [9-12].

© 2015 K. Adavallan et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 43 K. Adavallan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

In the present study, single step synthesis of the extract was stored in a refrigerator for further AuNPs is presented by reduction of chloroauric experiments as reducing agent and stabilizer.

acid (HAuCl4) at room temperature with mulberry (Morus alba L.) leaf extract. Mulberry leaves are rich Biosynthesis of Gold Nanoparticles in many nutritional components including flavonoid, For the biosynthesis of AuNPs, mulberry leaf extract which is known as a powerful polyphenol and (1 mL) was added to a vigorously stirred 10 mL antioxidant [13]. In addition, chemistry of mulberry aqueous solution of 2×10–4 M HAuCl. 3H O and leaves enumerate that it contains some antimicrobial 4 2 stirring continued for 1min. Reduction takes place agents like kuwanon G and leachianone etc [14]. In slowly at room temperature and the reaction rate previous reports, different parts of mulberry from the was completed in 4 h as shown by stable purple-pink root bark to the leaves have been extensively color of the solution. Appearance of purple-pink investigated for their health benefits, including anti- color (Fig.1) in the reaction confirmed the formation oxidative, hypo-lipidaemic, anti-hyperglycemic, anti- of MAuNPs and there was no further color change. atherogenic, anti-viral, and anti-microbial and neuro-protective effects [15]. Hence, the Characterization of AuNPs present study involves with the synthesis and characterization of Mulberry leaf mediated UV–Vis Spectral Analysis synthesis of AuNPs and evaluating the antioxidant 3+ (DPPH and hydroxyl radical scavenging assay) and The reduction of pure Au ions was routinely antifungal effect of biosynthesized AuNPs against monitored by visual inspection as well as the optical human pathogenic fungi such as Candida albicans absorption spectra of biosynthesized AuNPs. UV-Vis and Candida glabrata in comparison to the mulberry absorption spectrum of the biosynthesized AuNPs leaf extract. was done in UV-Vis spectrophotometer (Shimadzu UV-1650) in a wave length range from 200 nm to 800 Materials and Methods nm.

Materials Transmission Electron Microscopy

The mulberry (Morus alba L.) leaves were obtained The size and shape of the particles were measured from Sericulture Farmers Training Centre at with high resolution transmission electron Jayankondapattinam, Tamilnadu, India. Hydrogen microscope (HR-TEM) using PHILLIPS TECNAI G2 FEI

tetra chloroaurate (III) hydrate (HAuCl4.3H2O) was 12 Model equipped with selected area electron purchased from Sigma-Aldrich Chemicals, Bangalore, diffraction pattern (SAED) operating at an India and used as-received. Potato dextrose agar accelerating voltage of 200 kV. A specimen for HR- (PDA) for anti-fungal activity was purchased from Hi- TEM sample was made by placing a drop of Media, Mumbai, India. All other reagents used in the suspension on a carbon coated copper grid and the reaction were of analytical grade with maximum excess solution was removed by tissue paper and purity. All aqueous solutions were prepared using allowed to air dry at room temperature for overnight. de-ionized water. Free Radical Scavenging Activity Preparation of Leaf Extracts 1-Diphenyl-2-Picrylhydrazyl (DPPH) Assay The fourth and fifth leaves from the apex of the healthy plants were plucked and washed with de- Biosynthesized AuNPs and mulberry leaf extract ionized water until no foreign material remained. The were tested for the scavenging effect on DPPH leaves were shade-dried for 5 days and ground into radical according to the method of Blois [16]. fine powder using an electrical blender. The Different concentrations (50, 100 and 150 µ L) of powdered samples were stored in an air tight mulberry leaf extract and biosynthesized AuNPs container and protected from sunlight for further were added, in equal volume, to 0.1 mM use. 10 g of leaf powder was taken and mixed with methanolic DPPH solution. The reaction mixture 100 ml of de-ionized water and kept in a boiling was incubated for 30 min at room temperature water bath at 60 ºC for 15 min. The extracts were under shaking condition and the absorbance was filtered with Whatman filter paper no. 1. The filtered recorded at 517 nm. The synthetic antioxidant

Page 44 K. Adavallan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

butyl hydroxyl toluene (BHT) was used as plates. The discs of AuNPs (100µL), aqueous leaf positive control. All determinations were performed extract (100µL) and standard drug (Amphotericin-B) in triplicate. The DPPH radical scavenging activity (100µL) were placed on the PDA plates. (RSA) was expressed in percentage of inhibition Amphotericin-B was used as positive control to using the following formula compare the results. PDA plates were subsequently kept at 30 ºC for 48 hours. The antifungal activity was

 control  AA sample  evaluated by measuring the zone of growth RSA (%) =   x 100 inhibition surrounding the discs with the help of an  Acontrol  antibiotic zone reader.

Hydroxyl Radical Scavenging Assay Statistical Analysis Hydroxyl radicals were generated by a Fenton 3+ Data were analyzed by one-way analysis of variance reaction system (Fe -ascorbate -EDTA H2O2) and (ANOVA) and significant difference among treatment the scavenging capacity towards the hydroxyl groups were evaluated by Duncan’s multiple range radical was measured by using a deoxyribose test (DMRT) by using statistical package of social method (Halliwell) [17]. The reaction mixture science (SPSS) version 17.0 for windows. Values were contained 0.8 mL of phosphate buffer solution considered as statistically significant when p < 0.05. (50 mmol L−1, pH 7.4), 0.2 mL of a sample of different concentrations (50, 100 and 150 µL), Results −1 0.2 mL of EDTA (1.04 mmol L ), 0.2 mL of FeCl3 (1 mmol L−1), and 0.2 mL of 2- deoxyribose Characterization of Biosynthesized Gold (60 mmol L−1). The mixtures were kept in a water Nanoparticles (AuNPs) bath at 37 ºC and the reaction was started by −1 A band observed in UV–visible spectrum (Fig. 2) adding 0.2 mL of ascorbic acid (2 mmol L ) and −1 corresponding to the surface plasmon resonance 0.2 mL of H2O2 (10 mmol L ). After incubation occurs at 538 nm and clearly indicates the formation at 37 ºC for 1h, 2 mL of cold thiobarbituric −1 of AuNPs. The size and morphology of the acid (10 g L ) was added to the reaction as-synthesized AuNPs were analyzed by transmission mixture followed by 2 mL of HCl (25%). The electron microscope (TEM), which shows nearly mixture was heated at 100 ºC for 15 min and spherical particles and few irregular shaped particles then cooled down with water. The absorbance of with a diameter of around 15-53 nm (Fig. 3 (a)). SAED the solution was measured at 532 nm with a pattern shows (Fig.3 (b)) the diffraction ring from spectrophotometer. The hydroxyl radicals inner to outer which can be indexed as (1 1 1), scavenging capacity were evaluated with the (2 0 0), (2 2 0) and (3 1 1) reflections inhibition percentage of 2-deoxyribose oxidation on respectively of face centered cubic (fcc) gold. hydroxyl radicals. The scavenging percentage was calculated according to the following formula. Free Radical Scavenging Activity

% Scavenging = [A0 − (A1 − A2)] × 100/A0 DPPH Radical Scavenging Activity

where A0 is the absorbance of the control In the present study, the DPPH radical scavenging without a sample, A1 is the absorbance after assay was used to evaluate the anti-oxidant potential adding the sample and deoxyribose and A2 is the of of biosynthesized AuNPs and mulberry leaf extract in the sample without deoxyribose. a dose-dependent manner. Percent of inhibition for DPPH radical scavenging activity is presented in Fig. Antifungal Activity 4a. The results obtained in the DPPH assay showed The antifungal activity of biosynthesized AuNPs and maximum percent of (69 %) free radical inhibition by aqueous leaf extract were evaluated against two the biosynthesized AuNPs, whereas mulberry leaf human pathogenic fungi (Candida albicans MTCC extract exhibit ( 46 %) less inhibition. 227 and (Candida glabrata MTCC 3019) by disc Hydroxyl Radical Scavenging Activity diffusion method [18]. Potato dextrose agar (PDA) plates were prepared, sterilized and solidified. After solidification fungal cultures were swabbed on these

Page 45 K. Adavallan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

The dose-dependent inhibition of site specific eventually leading to many chronic diseases such as hydroxyl (•OH) radical-induced deoxyribose atherosclerosis, cancer, diabetics, rheumatoid degradation was observed in Fig. 4b. The data arthritis, post-ischemic perfusion injury, myocardial obtained in the •OH scavenging activities were infarction, cardiovascular diseases, chronic 23 ±1.86 , 35 ± 3.46 and 49 ± 9.74 % in 50, 100 inflammation, stroke and septic shock, aging and and150 µL for mulberry leaf extract, whereas they other degenerative diseases in humans [22, 23]. To were 37 ± 2.65 , 50 ±3.65 and 65 ± 6.53 % in 50, avoid the oxidative damage, antioxidant defences 100 and 150 µL for AuNPs, respectively. have evolved to remove most of these free radicals. 1’1-Diphenyl-2-picrylhydrazyl (DPPH) and Hydroxyl Antifungal Activity radical (•OH ) scavenging method is widely used to evaluate the free radical scavenging ability of The antifungal effect of biosynthesized AuNPs and antioxidants. DPPH is a stable nitrogen-centered free aqueous leaf extract in comparison to the standard radical. In the present study, the antioxidant activity drug (Amphotericin-B) were investigated against of leaf extract and AuNPs reacts with DPPH free human pathogenic fungi such as Candida albicans radical solution and the violet color of the DPPH and Candida glabrata (Table 1). Further, radical was reduced to yellow colored biosynthesized AuNPs show strong zone of inhibition diphenylpicrylhydrazine radical. Substances which against Candida albicans and Candida glabrata are able to perform this reaction can be whereas, crude leaf extract exhibit a fair zone of considered as antioxidants and therefore radical inhibition (Fig 5(a) and (b)). scavengers [24]. Discussion Hydroxyl radical is an extremely reactive free radical In recent years, plant-mediated biological synthesis formed in biological system and has been implicated of nanoparticles is gaining importance due to its as a highly damaging species in free radical simplicity and eco-friendliness. Interaction between pathology, capable of damaging almost every organic ligands and the surface of an inorganic molecule, proteins, DNA, unsaturated fatty acids and nanoparticle paves the way for the coupling of lipids in almost every biological membranes found in biomolecular recognition systems to generate novel living cells [25-27]. In this study, the •OH radical materials [19]. Based on the capping agents, scavenging assay was used to evaluate the environmentally benign AuNPs using biological antioxidant potential of biosynthesized gold components will have excellent effect in biomedical nanoparticle in comparison to the leaf extract. When applications. mulberry leaf extract and AuNPs were added to the reaction mixture they removed hydroxyl radical UV-Visible absorption spectroscopy is an important and prevented the degradation of 2-deoxy-2- technique to determine the formation and ribose. Over all, biosynthesized gold nanoparticles stabilization of biosynthesized AuNPs in aqueous (AuNPs) showed higher antioxidant activity than solution. The UV–Vis absorption spectra recorded the leaf extract in DPPH and •OH radical from the gold colloid after 24 h of reaction showed a scavenging assays, whereas various SPR band at about 538 nm confirm the formation phytochemicals (quercetin, rutin and isoquercitrin) and stability of AuNPs. The TEM studies showed the present in the mulberry leaf extract might get particles to be nearly spherical with few irregular adsorbed onto the active surface of the AuNPs shapes and particle size ranges from 15-53 nm. [14]. It is an obvious indication that the resulting Reactive oxygen species (ROS) are often simply enhanced antioxidant activity of the AuNPs is due to called “free radicals” because their majority is the capping agent (due to adsorbed antioxidant characterized by at least one unpaired electron in moiety onto the surface) and particle size (high their outer orbitals [20]. The most important oxygen- surface area to volume ratio of nanoparticles). containing free radicals in many disease states are Similar observations with enhanced DPPH and hydroxyl radical, superoxide anion radical, hydrogen Hydroxyl radical scavenging activity of peroxide, oxygen singlet, hypochlorite, nitric oxide biosynthesized AuNPs have been reported previously radical, and peroxynitrite radical [21]. [11, 28]. Overproduction of free radicals can cause oxidative damage to biomolecules (lipids, proteins, DNA),

Page 46 K. Adavallan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Fungal infection diseases are more rapid and severity higher antioxidant and antifungal activity. increases in patients with compromised immune Biosynthesis of AuNPs has encouraged scientist to function. Candida species are one of the most look into discover novel drugs for various biomedical important fungal pathogens which are responsible applications. for variant life-threatening disorders [29]. The infection caused by Candida fungi are more References common in people who have underlying risk [1]. Arvizo, R R., Bhattacharyya, S., Kudgus, RA., Giri, K., factors such as cancer, leukemia, diabetes Bhattacharya, R. and Mukherjee, P. (2012). Intrinsic mellitus, long-term antibiotic and corticosteroid therapeutic applications of noble metal nanoparticles: past, treatment, human immune deficiency virus (HIV), present and future. Chem. Soc. Rev, 41, 2943–2970. pregnancy, scorch, and transplant [30]. In the [2]. Wu, F. and Yang, Q. (2011). Ammonium present study, antifungal activity of biosynthesized Bicarbonate Reduction Route to Uniform Gold AuNPs, and aqueous leaf extract were tested against Nanoparticles and Their Applications in Catalysis and two human pathogenic fungi such as Candida Surface-Enhanced Raman Scattering. Nano Research, 4, 861-869. albicans and Candida glabrata at the concentration [3]. Haruta, M. (2003). When Gold Is Not Noble: of 100 μl by Kirby–Bauer disc diffusion method. The Catalysis by Nanoparticles. The Chemical Record, 3, AuNPs synthesized by mulberry leaf extract were 75-87. found to be highest antifungal activity against [4]. Sreeja, R., Aneesh, PM., Aravind, A., Reshmi, R., Candida albicans and moderate inhibition against Philip, R. and Jayaraj, MK. (2009). Size-Dependent Optical Candida glabrata. Leaf extract exhibit lesser Nonlinearity of Au Nanocrystals, Journal of the antifungal activity against Candida albicans and Electrochemical Society, 156, K167-K172. Candida glabrata. Biosynthesized AuNPs, showed [5]. Gericke, M. and Pinches, A. (2006). Biological efficient antifungal activity compared to leaf extract. synthesis of metal nanoparticles. Hydrometallurgy, 83, 132– 140. It is due to their particle size and capping agents, [6]. Binupriya, AR., Sathishkumar, M., Vijayaraghavan, which have great potential to kill the pathogens. The K. and Yun, SI. (2010). Bioreduction of trivalent aurum to possible mechanism of their antifungal activity nano-crystalline gold particles by active and inactive cells suggested that the smaller gold nanoparticles and cell-free extract of Aspergillusoryzae var. viridis. Journal might have diffused easily through the cell of Hazardous Materials, 177, 539–545. membrane to the inside of the cell. Since gold [7]. Maliszewska, I., Aniszkiewicz, L. and Sadowski, Z. being a soft acid might have interacted strongly (2009). Biological Synthesis of Gold Nanostructures Using with the soft bases like sulphur containing the Extract of Trichoderma koningii. Acta Phys. Pol. A, 116, proteins in the membrane or phosphorus S163-S165. [8]. Mukherjee, P., Senapati, S., Mandal, D., Ahmad, A., containing bases in the DNA, thus retarding their Khan, MI., Kumar, R. and Sastry, M. (2002). Extracellular normal functions like synthesis, repair and Synthesis of Gold Nanoparticles by the Fungus replication leading to the cell death [31]. Recently, Fusariumoxysporum, Chem. Biol.Chem, 3, 461-463. many reports are available in the literature on the [9]. Jain, S., Hirst. DG. and Sullivan, JMO. (2012). Gold good antifungal activity of biosynthesized AuNPs [12, nanoparticles as novel agents for cancer therapy. The 32]. British Journal of Radiology, 85, 101–113. [10]. BarathManiKanth, S., Kalishwaralal, K., Sriram, M., Conclusion Ram Kumar Pandian, SB., Youn, HS., Eom, SE. and Gurunathan, S. (2010). Anti-oxidant effect of gold Mulberry leaf extract is found to be an efficient nanoparticles restrains hyperglycemic conditions in candidate for biosynthesis of AuNPs due to its diabetic mice. J. Nanobiotechnol, 8, 16. controlled reducing power as well as presence of [11]. Nakkala, JR., Mata, R., Bhagat, E. and Sadras, SR. capping molecules. The UV–visible spectrum of the (2015). Green synthesis of silver and gold nanoparticles synthesized gold nanoparticles showed a surface from Gymnemasylvestre leaf extract: study of antioxidant and anticancer activities, J Nanopart Res, 17:151. plasmon resonance (SPR) around 538 nm after 24 h. [12]. Bankar, A., Joshi, B., Ravi Kumar, A. and Zinjarde, The results obtained from HR-TEM revealed that S. (2010). Banana peel extract mediated synthesis of gold the synthesized AuNPs were in the size range of nanoparticles, Colloids Surf. B: Biointerf, 80, 45-50. 15–53 nm. Crystalline nature of NPs is evident from [13]. Nigdikar, SV. Williams, NR., Griffin, BA. and bright circular spots in the SAED pattern. Further, Howard, AN. (1998). Consumption of red wine polyphenols mulberry mediated synthesis of AuNPs showed a reduces the susceptibility of low-density lipoproteins to oxidation in vivo. Am. J. Clin. Nutr, 68, 258−265.

Page 47 K. Adavallan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

[14]. Sadiqbutt, M., Nazir, A., Tauseef Sultan, M. and [31]. Wani, IA. and Ahmad, T. (2013). Size and shape Schroen, K. (2008). Morus alba L. nature’s functional tonic. dependant antifungal activity of gold nanoparticles: A case Trends Food Sci. Technol, 19, 505-512. study of Candida. Colloids Surf B, 101, 162– 170. [15]. Yang, NC. Jhou, KY. and Tseng, CY. (2012). [32]. Jayaseelan, C., Ramkumar, R., Rahuman, AA. and Antihypertensive effects of mulberry leaf aqueous extract Perumal, P. (2013). Green synthesis of gold nanoparticles containing c-aminobutyric acid in spontaneously using seed aqueous extract of Abelmoschus esculentus hypertensive rats, Food Chemistry, 132, 1796–1801. and its antifungal activity. Industrial Crops and Products, [16]. Blois, (1958). MS Antioxidant determinations by the 45, 423–429. use of a stable free radical. Nature, 181: 1199–200. [17]. B. Halliwell, B. (1987). Free radicals and metal ions in Author’s Affiliation health and disease. ProcNutrSoc, 46, 13–26. 1 [18]. Bauer, AW, Kirby, WMM., Sherris, JC. and Turck, Department of Physics, Annamalai University, M.(1996). Antibiotic susceptibility testing by a standardized Annamalainagar, Tamilnadu- 608 002, India single disk method. Am J ClinPathol, 45,493–496. 2Department of Biochemistry and Biotechnology, [19]. Niemeyer, CM. (2001). Nanoparticles, Proteins, and Annamalai University, Annamalainagar, Tamilnadu- 608 Nucleic Acids: Biotechnology Meets Materials Science. 002, India Angew. Chem. Int. Ed, 40, 4128-4158.

[20]. Görlach, A., Dimova, EY, Petry, A., Martínez-Ruiz, A.,

Hernansanz-Agustín, P., Rolo, AP., Palmeira, CM. and Copy for Cite this Article- K. Adavallan, N. Rajendra Prasad,

Kietzmann, T. 2015. Reactive oxygen species, nutrition, and N. Krishnakumar, ‘Antioxidant And Antifungal Potential Of Morus Alba Leaf Extract Mediated Synthesis Of Gold hypoxia and diseases: Problems solved? Redox Biology, 6, Nanoparticles’, International Journal of Science, Engineering 372–385. and Technology, Volume 3 Issue 6: 2015, pp. 67- 74. [21]. Lobo, V., Patil, A., Phatak, A. and Chandra, N. 2010. Free radicals, antioxidants and functional foods: Impact on human health. P H C O G R E V, 4, 118-126. [22]. Freidovich, I. (1999). Fundamental aspects of reactive List of Figures oxygen species, or what’s the matter with oxygen? Ann. N.Y .Acad. Sci, 893, 13. [23]. Yu, BP. (1994). Cellular defenses against damage from reactive oxygen species. Biol. Rev, 74, 139-162. [24]. Dehpour, AA., Ebrahimzadeh, MA., Nabavi, SF. and Nabavi, SM. (2009). Antioxidant activity of methanol extract of Ferula assafoetida and its essential oil composition, Grasas Aceites, 60, 405–412. [25]. Hochestein, P. and Atallah, AS. (1988). The nature of oxidant and antioxidant systems in the inhibition of mutation and cancer, Mutation Res, 202,363–375. [26]. Rollet-Labelle, E., Grange, MJ., Elbim, C., Marquetty, C., Goqgerot-Pocidalo, MA. and Pasquier, C. (1998). Figure 1: Photograph of colloids (a) Morus alba leaf -4 Hydroxyl radical as a potential intracellular mediator of extract, (b) 10 M HAuCl4 metal ion solution and (c) polymorphonuclear neutrophil apoptosis, Free Rad Biol purple pink color indicating the formation of Au-NPs. Med 24,563–572. [27]. Trease, GE. and Evans, MC. (1983). Textbook of Pharmacognosy, 12th edition. Balliere, Tindall, London, pp 343–383. [28]. Muthuvel, A., Adavallan, K., Balamurugan, K. and Krishnakumar, N. (2014). Biosynthesis of gold nanoparticles using Solanum nigrum leaf extract and screening their free radical scavenging and antibacterial properties. Biomed. Prev. Nutr, 4, 325–332. [29]. Kim, J., and P. Sudbery. (2011). Candida albicans, a major human fungal pathogen, J. Microbiol, 49, 171– 177. [30]. Gavanji, S., Zaker, SR., Nejad, ZG., Bakhtari, A., Bidabadi, ES. and Larki, B. (2011). Comparative efficacy of herbal essences with amphotricin B and Ketoconazole on Candida albicans in the in vitro condition. Integr med res, 4, 112–118.

Page 48 K. Adavallan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Figure 2: UV-Vis spectra of aqueous solution of chloroauric acid with Morus alba (mulberry) leaf extract at 24h.

Figure 3: (a) TEM images of gold colloid (b) selected area electron diffraction (SAED) pattern.

Figure 5: Anti-fungal assay of Morus alba leaf extract and biosynthesized AuNPs using disc diffusion test against Candida albicans (a) and Candida glabrata (b). Figure 4: Antioxidative properties of Morus alba leaf extract and gold nanoparticles (AuNPs): a: 1’1-diphenyl-2-picrylhydrazyl (DPPH) free radical scavenging assay; b: hydroxyl radical scavenging assay.

Page 49 K. Adavallan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

LIST OF TABLES

TABLE 1: Inhibitory action of control, Morus Alba leaf extract and biosynthesized Au-NPs against human pathogenic fungi.

Inhibition zone (mm)

Fungal AuNPs Standard Leaf extract species (100µl) Antibiotic Disk* (100µl) (100µl)

Candida albicans 12 22 24

Candida glabrata 11 16 19

*Amphotericin-B

Page 50 Dipali P. Doshi et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Micropile for Embankment Foundation- An Innovative Technique

1Dipali P. Doshi, 2Dr. Atul K. Desai, 3Dr. C. H. Solanki

Abstract

Many historic structures were built when there was less knowledge of seismic design, and building

codes were less restrictive. During earthquake they have damaged and the extensive damage of these structures motivated to find some retrofitting techniques which keep the structure safe. Micropiles are increasingly being used to retrofit this type of structures and deep foundations. They are gaining popularity for foundation support and slope stabilization due to their ready access to installation in locations with low headroom and restricted access. They can be used to drill through any type of soils, boulders and hard materials. They are installed without risking the stability of structure. Slope failures are significant hazards to public and private infrastructure, and their maintenance and repair is costly.

In this paper a modeling of an embankment under the static loading is done using the Midas GTS software. The embankment is reinforced with micropiles and a reduction in the settlement between the treated and untreated embankment at different depth of the embankment is presented in this paper. Here the micropiles having diameter 200mm and a length of 14m are used.

Keywords: Micropiles, Retrofitting, Midas GTS software, settlement.

Introduction the mid 1970’s and the mid 1980’s. But there has been a rapid growth in the specification and use of Many historic structures were built when there was micropiles in the United States since the mid 1980’s less knowledge of seismic design, and building codes to early 1990’s. were less restrictive. During earthquake they have damaged and the extensive damage of these Software Introduction structures motivated to find some retrofitting techniques which keep the structure safe. Micropiles In this paper MIDAS GTS software is used. This are increasingly being used to retrofit this type of software is basically a geotechnical and tunnel structures and deep foundations. They are gaining engineering software. 2D/3D Finite Element Analysis popularity for foundation support and slope is possible in this Software. It is useful for stabilization due to their ready access to installation geotechnical engineering applications including in locations with low headroom and restricted access. Tunneling, Mining, Foundations, Excavations, Soil- Structure Interaction, Different analysis like History settlement analysis, construction stage analysis, seepage (groundwater flow) analysis consolidation In early days timber piles were driven in to the analysis etc. In static analysis linear and non linear ground by hand or holes were dug and filled with analysis and in dynamic analysis with response sand and stones. But in 1950’s Italy has invented spectrum and time history analysis are possible in micropiles known as “Root piles” or “Pali Radici”. In MIDAS GTS. the past, micropiles were not used much because of the drilling and flushing process which might takes In this paper a modeling of an embankment under minutes or hour to complete. 1There was slow the static loading is done using midas software. The growth of the technology in the time period between construction stage analysis as well as linear static analysis has been done. Here it is assumed that the soil having a four strata and it is linear in nature. 1 Corresponding Author Email: [email protected]

© 2015 Dipali P. Doshi et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 51 Dipali P. Doshi et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Table -1: Soil Properties for embankment foundation (Wang Z. et.al (2009)) [10]

Saturated Young’s Poison’s Angle Soil unit Cohesion modulus ratio of type weight kN/m2 kN/m2 friction kN/m3

Fill 20 1 30 8000 0.3

Clay 18 5 25 10000 0.35 silt

Soft 18.5 7 20 5000 0.35 soil Figure 3: Settlement of embankment treated by Coarse 20 1 34 30000 0.3 micropiles Sand Table -2: Result comparison of displacement in embankment foundation

The micropile diameter is taken 0.2m and a length is Settlement in mm % 14m. In this study soil structure interaction is also reduction Description consider by interface element. Without With in micropiles micropiles settlement

At +2 m 32.41 10.50 67.60

At 0 m(GL) 28.35 7.88 72.20

At -1 m 26.33 5.91 77.55 depth Figure 1: Construction stage analysis of embankment At -13 m 2.02 1.31 35.14 treated by micropiles depth

Chart -1: Comparison of settlement in mm in Figure 2: Settlement of embankment without embankment foundation micropiles

Page 52 Dipali P. Doshi et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Conclusion [6] Sadek, M., (2002) “Three-dimensional finite element modelling of reinforced soil by micropiles” Ph.D. Major conclusions of this study are as follows. Thesis, University of Sciences and Technologies of Lille.

1. To reduce the settlement the embankment is [7] Shahrour et al. (2001) “Seismic behavior of treated with micropiles under the static load micropiles used as foundation support elements: Three- using midas gts software. dimensional finite element analysis”, Transportation Research Record No. 1772., Soil Mechanics 2001, pp.84-91. 2. Micropiles having a diameter 200mm and length [8] Shu Shanzhi and Muhunthan Balasingam (2006) “ are 14m upto the hard stratum is provided. Influence of Sand State on Network effect of Micropiles

3. There is a major reduction in settlement of [9] Wang M. and Han J. (2010) “Numerical modelling embankment in the soft soil stratum. But less % for ground improvement of batter micropile on liquefiable reduction in coarse sand. soil” Geo Shanghai 2010 international conference, copyright ASCE 2010. 4. Micropiles are very useful in loose sand or soft soil and less effective in coarse sand or dense [10] Wang Z et al. (2009) “ Dynamic finite element sand. analysis of micropile foundation in subgrade” Geo Hunan International Conference 2009 Copyright ASCE 2009. 5. Micropiles are basically a reinforcing element Author’s Affiliation improve mechanical and physical property of the soil. 1Lecturer, Applied Mechanics Department, The M. S. University, Vadodara, Gujarat, INDIA, Email: Acknowledgements [email protected] 2Professor, Applied Mechanics Deptt., S.V.N.I.T., Surat, I express my deep regards to my supervisor(s) Dr. A. K. Gujarat, India, Email: [email protected] Desai and Dr. C. H. Solanki for their help, encouragement 3Professor, Applied Mechanics Deptt., S.V.N.I.T., Surat, & valuable suggestion extended during my study. I also Gujarat, India, Email: [email protected] thankful to Midas GTs team to solve my difficulties during modeling. Finally I want to thank everyone, who helped me directly or indirectly during my work. Copy for Cite this Article- Dipali P. Doshi, Dr. Atul K. Desai and Dr. C. H. Solanki, ‘Micropile For Embankment References Foundation- A Innovative Technique’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: [1] Abusharar et al. (2008) “Finite element modeling 2015, pp. 81- 83. for the consolidation behavior of multi column supported road embankment” Elsevier, computers and geotechnics 36 (2009) pp 676-685.

[2] Lizzi, F. (1982) “The static restoration of monuments.” International Society for Micropiles & The International Association of Foundation Drilling.

[3] Nath U. et al. (2011) “Study of Lateral Resistance of Pile Cap using Finite element Analysis “.International Journal of emerging trends in engineering and development, Issue 1, Vol.1(August-2011) ISSN 2249-6149 RS Publication Page 15 .

[4] Ousta R.and shahrour I. (2001) “Three dimensional analysis of seismic behaviour of micropile used in the reinforcement of saturated soil” Journal for Numerical and Analytical Methods in Geomechanics ,Volume 25, Issue 2, pages 183–196, February 2001.

[5] Sadek and Shahrour (2004)” A three dimensional embedded beam element for reinforced geomaterials,” Int. J. Numer. Anal. Meth. Geomech., 28:931-946.

Page 53 Kishor kumar Prusty et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Some Quadrature Methods for Approximate Evaluation of Definite Integrals for Real Variables

Kishor kumar Prusty

Abstract

A quadrature rule of degree of precision seven has been formulated taking the linear convex combination of two constituent rules of degree of precision five. The rule is numerically verified with some suitable texts and error bound is determined.

Keywords: Quadrature rule, Degree of precision, Maclaurin's theorem, Error bound.

Introduction 1 And Simpson's rd rule fR 3 32 sf It is evident from literature review that there are so many authors [3],[4],[5],[6],[7],[8],[9] come forward for 1   fRdxxffI approximate evaluation of real definite integral of  s  b 1 (3) the form  dxxffI (1) 1    fff 1041 a 3 Keeping the fact in mind we desire to construct a quadrature rule of degree of precision seven for Each of the rules (2) and (3) is of precision three. Let approximate evaluation of eq.(1) from two f 32  fE  and s  fE  denotes the error in quadrature rules namely 3-point Fejer's second rule approximating eq. (1) by the rules (2) and (3) 1 with Simpson's rd rule 32 sf fR and Lobatto 4- respectively. Using Maclaurin's expansion of 3 functions in eq.(2) and (3) point rule L4 fR each of degree of precision five.

We transform  bxa to  t  11 with a suitable    f 32    f 32  fEfRfI  (4) transformation 2  abtabx in eq. (1). In section II we construct the quadrature    s    s  fEfRfI  (5) rule fR . In section III an error bound of the sLf 432 1 1 Where  ffE iv 0  f vi  ...0 said rule is established and the rule is numerically f 32 360 6048 verified in section IV.

1 iv 1 vi Formulation of quadrature rule  fR  of   ffE 0  f  ...0 sLf 432 s 90 1890 precision seven 1 1 Now multiplying eq.(5) by and adding resulting eq. We choose the 3-points Fejer's second rule 4 1   fRdxxffI with eq. (4)  f 32  1 (2) 1  4  fRfRfI  2   1   1  5 f 32 s     0 fff   We obtain 3  2   2  1    4  fEfE 5 f 32 s

1 Corresponding Author Email: [email protected] or    32 sf   32 sf fEfRfI (6)

© 2015 Kishor kumar Prusty et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 54 Kishor kumar Prusty et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

1 1 Where  4  fRfRfR (7) And  5 16 fEfEfE  (14) 32 sf 5 f 32 s sLf 432 21 L4 32 sf

  fff 10121   1   or fR    1   1  (8) 32 sf       Error analysis 15 8   ff      2   2  An asymptotic error estimate and error bound given by theorem‐1 and theorem‐2 respectively This is the desired quadrature rule of precision five for approximate evaluation of eq.(1).The truncation The truncation error generated in this error generated in this approximation is given by approximation is given by 1 1  4  fEfEfE sLf 432  5 L4 16 32 sf fEfEfE  32 sf 5 f 32 s 21 (9) (15) 1 128 viii  f vi  ...0  f  ..0 37800  !8323625 Theorem‐1 Construction of Lobatto 4- point rule Let xf  be sufficiently differentiable function Lobatto 4-point rule of degree of precision five  ff 11   in 1,1 , then the error sLf 432  fE  associated 1   with the sLf 432  fR  is given by L4 fR     1   1  (10) 6 5   ff        128    5   5  fE  f viii  ..0 sLf 432  !8323625 Let fE denotes the error for approximating the L4 Proof: It follows from eq. (15) integral given by eq. (1). Using Maclaurin's expansion of functions in eq.(10) Theorem‐2 We get    fEfRfI  (11) L4 L4 The bounds for the truncation error

The truncation error generated in this approximation      fRfIfE is given by is given by sLf 432 sLf 432 64M vii sLf 432 fE  where  max xfM  32 128 x 11 fE  f vi 0  f viii ...0  !62205 L4  !6525  !81125 Proof: We have Construction of quadrature rule of precision seven 32 fE  f vi  , where   1,1 Taking the linear combination of the above L4  !62205 1 1 formulated rules we derive a quadrature rule of 4 1 32 precision seven. Multiplying by eq.(6) and in fE  f vi  , where   1,1 15 12 32 sf  !62205 2 2 eq.(11) and adding them we get 1  5 L4 16 32 sf fRfRfI 21 32 vi vi (12) fE    ff   1 sLf 432  !62205 2 1  5  16 fEfE 21 L4 32 sf

1 Where  max vi xfK  and  min vi xfk  Where  5 16 fRfRfR (13) x 11 x 11 . sLf 432 21 L4 32 sf As vi xf  is continuous &  1,1 is compact. Hence there exists points b and a in the

Page 55 Kishor kumar Prusty et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752 interval 1,1 such that  vi bfK  and Table -1: Numerical verification of different integrals  vi afk  . Thus by Conte & Boor [1] Integ  fR   fR  fR  fE  32 sf L4 sLf 432 sLf 432 rals 32 fE  vi  vi afbf sLf 432  !62205 I1 0.680599 0.79626 0.70813890 0.038685532 32 1 3131 55810 07 1  vii dxxf  !!62205  1 I 0.160599 0.16061 0.16060280 0.000000014 2 32 7226 26842 87 4   fab vii   !62205 I 3 2.350375 2.35048 2.35040264 0.000000258 somefor   1,1 3769 99075 61 8

0.292893 0.29289 0.29289321 0.000000000 By mean value theorem ab  2 I 4 2333 31724 88 0

64 vi I 5 1.000003 0.99998 1.00000001 0.000000020 Then sLf 432 fE  f   !62205 4043 91898 99 0

64M I 6 0.642699 0.64269 0.64269908 0.000000004 Hence sLf 432 fE  9327 63791 67 9  !62205 where  max vii xfM x 11 Conclusion Numerical verification From the Table-1 it is observed that 1 x2 dxeI  .0 7468244328 Exact sLf 32432  EEE Lsf 4 .So our quadrature rule of 1   0 degree of precision seven converges nearer to the

1 exact value of the above integrals than the above 2 x two constituent rules. Our rule is superior to other 2  dxexI  .0 1606027942Exact  0 rules.

1 Acknowledgements x 3 dxeI  .2 350402387289Exact  This work is supported by the funding agency 1 (University Grant commission,), New-Delhi  4 Grant sl No.219550 (Minor Research project)  dxxI  .0sin 2928932188 Exact 4   0 References

 [1] S.conte and C.de.Boor,( 1980) “Elementary Numerical 2 Analysis,” Tata Mc-Graw Hill,.  dxxI  .1cos 0000000000 Exact 5   0 [2] Kendal E.Atkinson,( 2001) " An Introduction to Numerical Analysis", John Wiley, 2nd edition ,.  4 [3] R.N.Das and G.Pradhan,( 1996)" A mixed quadrature I  cos 2 dxx  .0 64269908170 Exact rule for approximate evaluation of real definite integrals", 6   0 Int.J.Math.edu.sci, 27,. 279-283,.

[4] S.R.Jena and R.B.Dash,( 2009) " Mixed quadrature of real definite integrals over triangles ", Paci-Asian.J.Math , 3, 119-124,.

Page 56 Kishor kumar Prusty et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

[5] R.B.Dash and S.R.Jena,( 2008) " A Mixed quadrature of Modified Birkhoff-Young using Richardson extrapolation and Gauss-Legendre-4 point transformed rule", Int.J.Appli.Math.Appli, 2, 111-117,.

[6] B.P.Acharya and R.N.Dash,( 1983) " Compound Birkhoff- Young rule for numerical integration of analytic functions", Int.J.Math.Edu.Sci.Technol, 14, 1-10.

[7] F.G.Lether(1976), " On Birkhoff-Young qadrature of analytic functions", J.Comut.Applied.Math, 2, 81.

[8]S.R. Jena and D. Nayak(2015)"Hybrid quadrature for numerical treatment of nonlinear Fredholm integral equation with separable kernel"Int. J. Appl.Math and Stat.,53,83-89 .

[9] S. R. Jena and P. Dash (2014)"Approximation of real definite integrals via hybrid quadrature domain",Int. J. of Sci. Engg. Tech. Research,3,3188-3191.

Author’s Affiliation

Department of Mathematics, Hindol College, Khajuriakata, Dhenkanal, PIN-759020 Odisha, India, E-mail: [email protected], Mob: +91-9937757389

Copy for Cite this Article- Kishor kumar Prusty, ‘Some Quadrature Methods for Approximate Evaluation of Definite Integrals for Real Variables’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 94- 97.

Submit your manuscript to International Journal of Science, Engineering and Technology and benefit from:

 Convenient Online Submissions

 Rigorous Peer Review

 Open Access: Articles Freely Available Online

 High Visibility Within The Field

 Inclusion in Academia, Google Scholar and Cite Factor.

Page 57 Muralidhar G.B et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Seismic Appraisal of Performance of RC Building with Immense Irregularity in Floor Masses

1Muralidhar G.B, 2Swathi Rani K.S, 3Pradeep Kote R

Abstract

Mass irregularity is the presence of heavy mass on a floor or when one floor is much heavier than the others, e.g., heavy machinery or a swimming pool installed on an intermediate floor of a building. This paper includes the slab thickness i.e., floor mass is varying. Slab thickness is increased at alternative floors in mass irregular buildings. 0.15 m slab thickness is taken for the without mass irregular buildings and for mass irregular buildings slab thickness is taken as 0.30m.In light of these facts, it is imperative to seismically evaluate building with the present day knowledge to avoid the

major destruction in the future earthquakes. This paper is concerned with the comparison of the seismic appraisal of RC buildings with and without mass irregularity, the method carried out in terms of equivalent static, response spectrum and pushover analysis according to IS 1893:2002(part1) code, G+2 to G+8 storey buildings are considered for the analysis. In this analysis for mass irregular buildings, the floor mass is varied at 2nd, 4th, 6th, 8th floor of all the buildings. The comparison of equivalent static response spectrum method and pushover analysis by using finite element software package ETAB’s 9.7 version is used to perform the modeling and analysis of G+2

to G+8 storey buildings by considering the seismic zone V as per IS 1893:2002(part 1) code. In this study building model analysis carried out namely gravity, equivalent static, response spectrum & pushover analysis in longitudinal direction & transverse direction and the results are compared with codal values. Results of this analysis are discussed in terms of the time period, storey displacement, storey drift and base shear. From this results it is concluded that time period, storey displacement, storey drift and base shear will be more in mass irregular buildings compare with the without mass irregular buildings.

Keywords: Equivalent Static, Pushover analysis, Storey drifts etc.

Introduction sandy silts are more likely to fail during an earthquake. Earthquakes are one of the most catastrophic of natural hazards and occurs due to sudden ephemeral Current earthquake codes define structural system as motion of the ground as a result of release of elastic either regular or irregular in terms of size and shape energy in a matter of few seconds. The impact of the of the building, arrangement of the structural and event is most disquieting because it affects large non-structural elements within the structure, area, occurs all on a sudden and unforeseeable. They distribution of mass in the building etc. When one or can cause large scale loss of life and property and more of these properties is non-Uniformly distort essential services such as water supply, distributed, either individually or in combination with sewerage systems, communication and power, other properties in any direction, the building is transport etc. Seismic vibrations may cause referred to as being irregular. settlement beneath buildings when soils consolidate or compact. 1Certain types of soils, such as alluvial or Some irregularities are architecturally planned and examples of these are:

• A residential building having a car park in the 1 Corresponding Author’s Email: [email protected] basement producing a flexible first storey.

© 2015 Muralidhar G.B et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 58 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

• A shopping complex with setbacks to building is considered to be located in the seismic accommodate boundary offset requirements. zone V and intended for commercial purpose.

• Buildings with flexible, rigid or no diaphragms at Model-I – Building without mass irregularity i.e., a floor level, or structural plan having different lateral building assemblage of regular slab, beam, and load resisting systems (resulting in torsion). column elements.

Floor Mass Irregularity Model-II –Building with floor mass irregularity i.e., increase the slab thickness at alternative floors Floor mass irregularity is the presence of heavy mass in building. on a floor or when one floor is much heavier than the others. In case of inevitable situations, the ratio of mass to stiffness of two adjacent storey should be made equal. Mass irregularities affect the dynamic response of the structure by increasing ductility demands at a few locations and lead to unpredicted higher mode effects.

Figure 1: Mass irregularity (IS 1893 part-I)

This exists when the weight of the structure at one level is substantially in excess of that at the levels immediately above or below it. This condition commonly occurs in industrial structures where heavy pieces of equipment are located at some levels. It also can occur in buildings that have levels with large mechanical rooms or storage areas.

Case Study of Structural System Figure 2: Three Dimensional view of 3 storey to 9 In the present study reinforced concrete moment storey building resisting frame building of third storey, fourth storey, fifth storey, sixth storey, seventh storey, eighth storey and ninth storey are considered. The plan layout, elevations and 3D as depicted in Figure 2 of all storey buildings with and without floor mass irregularity are as shown in the below Figures. The different configurations of buildings are modeled by considering only mass of the infill i.e., stiffness of the infill is neglected in order to account the nonlinear behavior of seismic demands. The bottom storey height is kept 1.5m and height of 3.5m is kept for all Figure 3: Plan of Model other storeys for all kind of building models. The

Page 59 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Floor finish: 1 kN/m2

DPC: 2 kN/m2

Live Load at Floor: 3 kN/m2

Wall Load: 16.1 kN/m

Wall load at top floor: 6.9 kN/m

Results and Discussions

In this chapter the results obtained for different building models considered for different types of analysis carried out namely gravity load analysis, Figure 4: Elevation of Mass regular G+8 building in X equivalent static analysis, response spectrum analysis – Direction and pushover analysis are presented. An effort in made to study the behavior of regular RC buildings Detailed Data of the Buildings in comparison with RC buildings having mass irregularity at different floor levels. General details of building Natural Time Periods No of Storey: G+2 to G+8 The natural time periods obtained from seismic code Bottom storey height: 1.5 m IS 1893 (Part 1) -2000 and analytical (ETABS v 9.1.1) are given in Table 1 Codal and analytical values do Storey height: 3.5 m not tally with each other. It can be observed that Building frame system: Special Moment Resisting models with equivalent diagonal struts significantly Frames (SMRF) affects fundamental natural period, which is a function of mass, stiffness and damping Building use: Commercial characteristics of the building.

Foundation Type: Isolated footing Table 1: Codal and Analytical Fundamental Natural Time Periods (sec) for Building Models Seismic zone: Zone V (factor 0.36)

Soil type: Medium soil

Material Properties:

Grade of Concrete for column: M35

Grade of Concrete for beam: M30

Grade of Steel: Fe 415

Modulus of Elasticity of concrete, E for M30: 27386.1278 N/mm2

Modulus of Elasticity of concrete, E for M35: 29580.398 N/mm2

Density of Concrete: 25 kN/m3 *Model-I: Mass regular buildings Poisson's ratio of Concrete: 0.175 *Model-II: Mass irregular building Load Intensities:

Page 60 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

(RSP) for 3 to 9 storey building models, along both X and Y directions is listed in the Table 3 below. In order to account the effect of torsion the displacements are captured in both directions when force is acting in particular direction.

Table 3: Lateral displacements (m) of 3 storey building models for seismic analysis

Chart-1: Natural time period (sec) profile for all Storey building for gravity and seismic combination.

Base Shear

The base shear obtained from equivalent static method and RS method with scaling factor for both gravity as well as seismic analysis is given in Table 2. In the response spectrum method the design base

shear (VB) is made equal to the base shear obtained from equivalent static method V B as per clause 7.8.2 of IS: 1893 (Part 1):2002 by applying the scaling factors calculated as shown in Table 2.

Table 2: Base shear in kN and scaling factors for all Storey

Chart-2: Lateral displacement (m) profile for 3 storey in longitudinal direction

Lateral Displacement

The lateral displacements obtained for equivalent static method (EQS) and response spectrum method

Page 61 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Chart-4: Lateral displacement (m) profile for5 storey in longitudinal direction

Chart-3: Lateral displacement (m) profile for 3 storey in Transverse direction Chart-5: Lateral displacement (m) profile for5 storey in Transverse direction Table 4: Lateral displacement (m) of 5 storey building models for seismic analysis Table 5: Lateral displacement (m) of 7 storey building models for seismic analysis

Page 62 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

1 0.013 0.0149 0.0111 0.0126

(b)Transverse direction for seismic combination

Equivalent static Response spectrum method method STORE Lateral Y displacement(m) Lateral displacement(m)

IIII II

9 0.1336 0.1524 0.089 0.1032

Chart-5: Lateral displacement (m) profile for 7 storey 8 0.1242 0.1426 0.0833 0.0973 in longitudinal direction 7 0.1077 0.1235 0.0736 0.0858

6 0.0924 0.1062 0.0645 0.0753

5 0.0743 0.0853 0.0536 0.0624

4 0.0555 0.0638 0.0417 0.0486

3 0.0416 0.0479 0.0325 0.0377

2 0.0275 0.0317 0.0224 0.0259

1 0.0136 0.0157 0.0115 0.0132

Chart-6: Lateral displacement (m) profile for 7 storey in Transverse direction

Table 6: Lateral displacement (m) of 9storey building models for seismic analysis

(a)Longitudinal direction for seismic combination

Equivalent static Response spectrum method method

STOREY Lateral Lateral displacement(m) displacement(m) Chart-7: Lateral displacement (m) profile for 9 storey I II I II in longitudinal direction by EQX and RSX

9 0.1253 0.1423 0.0836 0.0965

8 0.1167 0.1334 0.0784 0.0911

7 0.101 0.1153 0.0691 0.0802

6 0.0866 0.0991 0.0607 0.0705

5 0.0695 0.0795 0.0504 0.0584

4 0.0519 0.0594 0.0393 0.0455

3 0.0391 0.0448 0.0308 0.0355 Chart-8: Lateral displacement (m) profile for 9 storey 2 0.026 0.0298 0.0214 0.0246 in longitudinal direction by EQY and RSY

Page 63 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Storey Drifts Chart-10: Storey drifts profile in longitudinal direction Inter Storey drifts for different models obtained from the analysis are shown in Table 7 to 10 below. Inter Table 8: Inter storey drift (m) of 5 storey building Storey drifts profile can also be observed in Chart-8 models for seismic analysis to 15.

Table 7: Inter storey drift (m) of 3 storey building models for seismic analysis

Chart-11: Storey drifts profile in transverse direction

Chart-9: Storey drifts profile in longitudinal direction by EQX and RSX

Chart-12: Storey drifts profile in transverse direction

Page 64 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Table 9: Inter storey drift (m) of 7 storey building Table 10: Inter storey drift (m) of 9 storey building models for seismic analysis models for seismic analysis

Chart-13: Storey drifts profile in transverse direction Chart-15: Storey drifts profile in transverse direction by EQX and RSX

Chart-16: Storey drifts profile in transverse direction Chart-14: Storey drifts profile in transverse direction by EQY and RSY

Page 65 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Pushover Analysis

Table 11: Performance point and Hinge status in longitudinal direction for all building for gravity analysis

Performance levels Storey Displacement in Base Force Total Models m in kN A-B B-IO IO-LS LS-CP CP-C C-D D-E >E Hinges

Lateral load pattern: First mode

Model - I 0.2189 2194.025 380 30 24 56 0 0 0 0 496 G+2 Model - II 0.226 2066.619 390 20 14 64 0 0 4 4 496

Model - I 0.2680 1690.953 612 50 42 0 0 0 0 0 744 G+4 Model - II 0.2416 1661.517 626 34 38 44 0 2 0 0 744

Model - I 0.2625 1849.789 830 122 40 0 0 0 0 0 992 G+6 Model - II 0.3054 1919.496 844 58 72 18 0 0 0 0 992

Model - I 0.2410 2309.596 1034 206 0 0 0 0 0 0 1240 G+8 Model - II 0.2688 2501.806 1032 208 0 0 0 0 0 0 1240

Table 12: Performance point and Hinge status Transverse direction for all building for gravity analysis

Performance levels Storey Displacement Base Force Total Models in m in kN A-B B-IO IO-LS LS-CP CP-C C-D D-E >E Hinges

Lateral load pattern: First mode

Model - I 0.2178 2088.948 396 22 20 52 0 0 2 4 496 G+2 Model - II 0.2163 2090.472 402 16 16 56 0 0 0 6 496

Model - I 0.2363 1572.023 628 42 34 40 0 0 0 0 744 G+4 Model - II 0.2306 1547.299 640 30 32 42 0 0 0 0 744

Model - I 0.2520 1743.318 842 128 22 0 0 0 0 0 992 G+6 Model - II 0.2930 1802.739 854 56 60 22 0 0 0 0 992

Model - I 0.2388 2190.658 1054 186 0 0 0 0 0 0 1240 G+8 Model - II 0.2710 2364.107 1054 186 0 0 0 0 0 0 1240

Conclusion base shear, lateral displacements, storey drifts and eccentricity in linear and nonlinear analysis. The This paper is focused on the study of Seismic performance points and hinge status and are demands of different R.C buildings i.e., low rise, obtained using Non linear static analysis. Also an medium rise and high rise buildings using various attempt was made in pushover analysis to identify analytical techniques for the buildings located in the correct lateral load pattern for all the buildings seismic zone V of India medium soil. The with and without mass irregularity. Performance was studied in terms of time period,

Page 66 Muralidhar G.B et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

1) Period of the structures increase due to the [3]. Devesh P. Soni and Bharat B. Mistry†:” Qualitative abrupt changes of masses at floor levels in the Review of Seismic Response Of Vertically Irregular buildings. Building Frames”. ISET Journal of Earthquake Technology, Technical Note, Vol. 43, No. 4, December 2006, pp. 121- 2) Base shear increases with the increase of floor 132 mass is varying in buildings and it decreases for [4]. Vinod K. Sadashiva, Gregory A. MacRae & Bruce L. the buildings without the affect mass Deam:” Simple Methods to Evaluate Structural Irregularity irregularity Effects”. 2010 NZSEE conference.

3) Compared to the regular building the storey [5]. V.K. Sadashiva, G.A. MacRae, B.L. Deam ,C. Manunoury displacement will increases as the heavy mass “Vertical Mass Irregularity Effects on the Seismic floor level increases in buildings. Performance of Shear Buildings” 2008 NZSEE conference.

4) The storey drift will increases as the floor mass [6]. IS 456:2000, "Plain and Reinforced concrete - Code of increases in building, due to mass irregularity of practice", Bureau of Indian Standards, New Delhi. the buildings. [7]. Kadid.A, Boumrkik.A (2008), "Pushover analysis of reinforced concrete frame structures",Asian journal of civil 5) After studying mass irregularity at various floors, engineering (building and housing) vol. 9, no.1, pages 75-83. it is found that the worst situation was observed, nd th th when the floor mass was more at 2 , 4 , 6 and [8]. IS 1893-2002(Part-1), "Criteria for Earthquake resistant 8th floors of the buildings. design of structures", General Provisions and buildings, Bureau of Indian Standards, New Delhi. 6) The performance level of all the models is found between life safety and collapse prevention level Author’s details and the number of plastic hinges in the collapse 1Lecturer, Civil Engineering Department, University of prevention level at performance points for Gondar, Ethiopia, Email: [email protected] seismic designed buildings is same for all seismic load combination. 2Assistant Professor, Civil Engineering Department, East West Institute of Technology, Karnataka, India, Email: 7) The obtained result shows the amount of [email protected] information given by the linear analysis was 3 limited up to certain extent. Whereas the Assistant Professor, Civil Engineering Department, HKBK Institute of Technology, Karnataka, India nonlinear analysis provides the exact demand

and strength of the building. Copy for Cite this Article- Muralidhar G.B, Swathi Rani K.S 8) As the number of plastic hinges for both and Pradeep Kote R, ‘Seismic Appraisal of Performance of buildings i.e., with and without mass irregular RC RC Building with Immense Irregularity in Floor Masses’, International Journal of Science, Engineering and Technology, buildings are same, but the base shear appeared Volume 3 Issue 6: 2015, pp. 106- 115. to be is less in the building with mass.

The result shows that, the buildings with mass irregular are more vulnerable compared to buildings without mass irregularity during earthquake. Submit your manuscript to International Journal of Science, Engineering and References Technology and benefit from: [1]. A. D’Ambrisi, M. De Stefano, S. Viti "Seismic th  Convenient Online Submissions Performance of Irregular 3d RC Frames” - The 14 World Conference on Earthquake Engineering October 12-17,  Rigorous Peer Review 2008, Beijing, China.  Open Access: Articles Freely Available Online [2]. Andreas. J. Kappos, Georgios Panagopoulos (2004),  High Visibility Within The Field "Performance-based seismic design of 3D R/C buildings using inelastic static and dynamic analysis procedures",  Inclusion in Academia, Google Scholar and ISET journal of Earthquake technology, paper no. 444, vol. Cite Factor. 41, no. 1, pp. 141-158.

Page 67 Mahmoud Ahmady Ramadan et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal The Impact of Values-Based Branding (VBB) On the Strategic Sustainability Decision of the Supply Chain Management as A Superior Competitive Advantage

Mahmoud Ahmady Ramadan

Abstract

Nowadays, business strategy is commonly associated with sustainability. There is increasing evidence

that aligning the interests of all stakeholders often leads to better (financial) results. Examining sustainability from the supply chain point of view is a common enough exercise. However it must be noted that business strategy and marketing strategy are not always one and the same thing, (Horlings, 2010).

And, In fact, the real competition today is not between companies, but between supply chains. The winning approach to supply chains is an integrated perspective that takes account of networks of relationships, sustainability and product design, as well as the logistics of procurement, distribution, and fulfillment, (Christopher 2010)

This paper looks at how VBB contribute to the whole firm’s strategy and how brand planning needs

to be geared as a strategic role to supply chain management’s central objective of creating shareholder value. So how does a company start adding value to their SCM? Should they focus on building their corporate brand or just developing labeling for individual product or focus on operational efficiency in their supply chains and build collaborative partnerships?

Keywords: Branding, S SCM, Competitive Advantage, Sustainability, Sustainable branding.

Introduction and they want to feel good about their choices – environmental stewardship is an increasingly This paper will indicate that how many SCM are hold persuasive motivator. Based on existing market a view of brands that is too limited. Manufacturer research, over 40% of buyers have a strong and retailer reputation count now more than ever. In preference, and are willing to pay more, for products addition to looking for trusted brand names on and services from companies that use socially and supermarket shelves, consumers are now flipping environmentally responsible business practices. This over packages, saying, “Who makes this brand? Did is a significant market share! Communicate wisely they produce this product with high environmental about your environmentally responsible business to and social standards? (Ottma, 2011) ensure that all of it doesn’t go to your competitors,

1 According to Strandberg (2009), People want to feel Believing in sustaining competitive branding can a connection to the companies they do business with help companies overcome these challenges by affecting practical guidance how to develop a 1 Corresponding Author’s Email: [email protected], sustainable supply chain programme based on the values and principles of the global trend as [email protected] Cetinkaya( 2011 )says , It is clear that the market can

© 2015 Mahmoud Ahmady Ramadan et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 68 Mahmoud Ahmady Ramadan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

be opened up through raising awareness and Initially viewed as a series of costs, the business case offering an alternative to consumers, Horlings (2010) for sustainability is becoming increasingly apparent. says that why Brands help to build sustained By embracing the long-term strategic and relationships with the consumers. So Cetinkaya competitive advantages of sustainability, businesses (2011) adds that, Strong brands lend endurance and of all sizes find that they can have a significant permanence to an organization and protect it from impact, and at the same time meet - and exceed - the market turbulence and uncertainties. their business objectives, (Strandberg, 2009). And as consulting company, they mentioned some case Although, many organizations involved in business- studies to high light the impact of the sustainability to-business (B2B) dealings, they fail to understand as competitive advantage as follows: the significance of brands. They need to understand that stronger brands tend to make it more conducive  An 11-year study of corporations by Harvard for management to make capital purchase decisions, University, which emphasized stakeholder (Yap, 2006) management, found socially responsible and sustainable corporations had sales growth 4 Body times and employment growth 8 times that of “shareholder first” companies (KPMG, The In today’s environment, supply chain planning Business Case for Sustainability 2001). becomes obsolete as soon as it is complete because the dynamics of the market and the consumer are  Over a 5-year period Dow Jones Groups changing so quickly. Retailers also play an important Sustainability Index (DJGSI) performed an role in making sustainable products available to average of 36.1% better than did the traditional consumers. Sustainability is high on their agenda and Dow Jones Group Index (World Economic Forum, they are interested in creating shared value, (by 2005). “The DJSI 2008 report, affirmed a “positive Horlings 2010). strategically significant correlation between corporate sustainability and financial The VBB Perspective for the Sustainability performance”, citing that a number of its indexes Effective development and management of your have outperformed their comparative supply chain network will cut your costs and enhance benchmarks in relation to total returns since the your customer value. This is a sustainable source of launch of the respective indices. The report advantage in today’s turbulent global marketplace, found that sustainability strategies had a where demand is difficult to predict and supply significant impact on the cost of external chains need to be more flexible as a result, financing, return on invested capital, sales (Christopher 2010). growth, and the fade-rate of a firm’s competitive advantage.” (As reported in BITC: The Value of Sustainability is a collective term for everything to do Corporate Governance, October 2008, p. 4) with responsibility for the world in which we live. It is an economic, social and environmental issue. It is  An A.T. Kearny analysis revealed that during the about consuming differently and consuming current economic slowdown, companies that efficiently. It also means sharing between the rich show a “true” commitment to sustainability and poor, and protecting the global environment, appear to outperform their industry peers in the while not jeopardizing the needs of future financial markets. generations (Longhurst, 2002). And he adds that, Strandberg (2009), explains that Sustainability is an Sustainability is an issue for governments, for intangible asset that has the potential to enhance industry, for companies and ultimately for corporate reputation and differentiate a brand by consumers. enhancing Reputation, or brand equity, is founded Sustainability is clearly an important issue for on by making values such as trust, credibility, consumers but how can companies promote and reliability, quality and consistency and respect can encourage sustainable consumption? (Hensley, build customer loyalty based on distinct values 2002). differentiating the brand from the competition purchases and will make payments in a timely manner.

Page 69 Mahmoud Ahmady Ramadan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

As Too often, sustainability is confined to make team How should brands communicate their sustainability disconnected from business and brand strategy. The principles? Should all corporate and product brands new paradigm represents a company-wide, top- rush to advertise their social consciences? Well, they down, bottom-up imperative that determines certainly need to get their values in front of business strategy, operations and brand value, consumers in more dynamic media than the (Bemporad and Baranowski, 2008). corporate web-site. But brands that talk about nothing else risk being seen as “nice but dull.” So, A company can use sustainability as a market (Hensley, 2002). differentiator and enhance its definition of ‘quality,’ to include human health, environmental and social Building a Values-Based Brand (VBB) responsibility attributes, to meet growing questions and concerns by stakeholders (MBDC,2010). Values-based brands are always “doing the right thing.” It’s a simple principle, but one that foils many Thus, SCM as a branding tool includes all the brand owners because many don’t take the time to connections between production and consumption know what the right thing is. It’s inevitable that every centers, constitutes a vital process of conveying brand will face some form of change, controversy, branded goods to the market in optimal time, at and crisis. And it’s in these challenging times, that a optimal cost. When the creation of a brand is related brand’s actions broadcast its values. In a marketplace to management strategies, continuity and quality are hyper-focused on the next best thing, values-based possible by using supply chains management brands are disciplined focused, consistent, and effectively, (Dilber and Çalıpınar 2008) credible, (Dawson, 2012).

There is a mutual relationship between brand and As a company is not the sole owner of its brand. It supply chains. Supply chains of well-known goods shares this ownership with its customers, partners, are continuous and coordinated. Intensive demands vendors and other stakeholders – all engaged in for branded goods provide an effective operation for shaping the brand’s perception in the marketplace. the managers working according to the density of (Chicago Center, 2005) orders. To put it another way, for brand which have no demand problems, the system is initiate from the The brand operates as a signaling mechanism to last part of the chain according to the demand and increase customers’ confidence that the product will thus production takes place (Ula and Çalıpınar, provide excellent quality and reliability on important 2008). functions. The history of product experiences—both successes and failures—is spread in stories and Therefore, Sustainable Supply chain management aggregates to form part of the brand culture (SSCM) often represents a critical opportunity to Holt,(2003), Branding, then, is a management build an effective brand. Without effective perspective that focuses on shaping the perceived Sustainable Brand, SCM cannot deliver on the value of the product as found in society. promises made to customers which in turn lead to customer disloyalty. It is all about creating an Image of your company that gives your customers and prospective Increasingly, customers want a reliable supplier with customers’ confidence in your company and a good reputation for quality products and services. products that will meet or exceed their expectations Suppliers want to sell to a customer that will return every time. for repeat in order to share value and develop more sustainable value chain, you must create value, No longer can brands be differentiated on features, driven by quality, continuous innovation and specific benefits or price. There’s just too much stuff out business models creating value starts by creating there these days. Customers have so much choice delighted customers supply chains are sources of everything is white noise. Leading brands are always value, not of costs sharing value creates value, differentiated by their shared values. If the values either operationally or in terms of reputation your brand represents are not aligned to the values Creating shared value, (Horlings 2010). of your customer, no amount of marketing will change their mind. And never try amending brand values to line up with the customers. (Dawson, 2012)

Page 70 Mahmoud Ahmady Ramadan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

And according to Doyle (2002) it provides updated product. Each time a brand is recalled, consumer information as mentioned at figure one below that trust in the product is affected. potentially enables improvement or correction to the goal achievement. These data should indicate where In fact ,With considering the VBB critical factor for you are delivering value that is important to your sustainability at the center of every business customers and where you are failing to do so. decision, stakeholder relationship and company action, transaction becomes transformation, With branding for sustainability at the center of every marketing becomes movement and buying becomes business decision, stakeholder relationship and being that can grow the bottom line and change the company action, transaction becomes world. , (Bemporad ET, 2008). transformation, marketing becomes movement and buying becomes being that can grow the bottom Branding and the Customer Value Perspective line and change the world. The challenge to branding management is to create effective supply chain solutions to meet the needs of the different value segments. More than likely there will be the need for multiple supply chain solutions since ‘one size will not fit all

This new perspective sees the consumer not at the end of the supply chain but at its start. In effect this is the philosophical difference between supply chain management and what more properly might be called ‘demand chain management’.

As one author has suggested: Managing demand chains is … fundamentally different to managing

supply chains. It requires turning the supply chain on Figure 1: The branding paradigm shift from the its head, and taking the end user as the “what” of the commodity to the “how” of shared organization’s point of departure and not its final values destination.

(Source: In seeking to deliver significantly superior customer http://www.bbmg.com/pdfs/BBMG_sustainability_whi value the marketer must clearly define, communicate te_paper.pdf) and deliver a “value proposition” which is recognized by the target market as a better proposition than Thus Investor (2009) suggests that to build a value- that presented by competitors. based branding (VVB), the company should And according to Doyle (2003), Businesses often 1- Be systemic: Work systemically from the inside measure the wrong things about customers because out. Failure to maintain production standards can the business has created the wrong perspective on hurt consumer confidence in the product. It is critical its customer, such as believing a better product is to have well-developed auditing systems and to better for customers, when in some cases a better ensure high compliance. price with the existing product is what the customer really values. 2- Be transparent: Maintain a dialogue with suppliers, customers and consumers about your products, your Customers, to varying degrees, get added value from strategies, operational problems and success stories. products that lower the risks of future performance failures. So when there is risk inherent in a product, 3- Be trustworthy: Don’t underestimate the value of customers are usually willing to pay to reduce risk, brand trust. Brand trust is increasingly considered (Holt, 2003). essential for the successful marketing of products. Trust is fundamental to a consumer’s perception of a

Page 71 Mahmoud Ahmady Ramadan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Dawson (2012), also mentions that a list of things curve attributed to branding is called brand equity. brand owners of values-based brands always do to For many companies, branding has a tremendous build trusted relationships with customers: impact on profits. Thus, brands are some of the most important assets owned by the corporation (Holt, a) Value their purpose more than their profits 2003).-

b) Eliminate a sales first culture Successful brand building helps sustain relationships with consumers, creating long-term sustainable c) Focus on the things money can’t buy competitive advantage and protecting businesses d) Live their convictions rather than conform to from market turbulence and uncertainties. markets Manufacturing processes can often be duplicated in ways that strongly held attitudes established in e) Listen more and market less consumers’ minds cannot. Branding and Sustainable Competitive Advantage: (MDI ,2011). f) Elevate the quality of life for the tribe According to Doyle (2002), that Value-based Thus Doyle 2002 clarifies that it may require a marketing for bottom-line success is dynamic and recommitment to value or improvement in the way continuous, driven by the fact that customers’ needs you create value. It may require you to change the and value expectations are dynamic and continuous, feedback mechanisms. And update and enrich your not static. The value ratio changes with time. Beside customer value commitments by refining your your customers are in a competitive battle to remain customer value processes. (Doyle, 2002). in front of the competition in your industry. Next year they need innovation from you. And he adds this full and deep understanding of their customers’ needs and value expectations. And VBB as competitive advantage started to look at its information both from a segmentation and customer value perspective that Competition in today’s business environment is the information started to tell them new things. For becoming increasingly intense. While a company example, three broad customer value segments were may be a market leader today, the status quo might identified: change overnight. Having competitive advantage alone is not sufficient. The key determinant for (1) Customers who innovate into new markets, prolonged growth is sustainability – the ability to maintain a competitive advantage, (Yap, 2006). (2) Customers who were in fast-growing markets, and Thus it is harder to maintain a competitive edge through the product itself. Sustainable competitive (3) Customers looking to reduce costs and advantage is the foundation of a viable brand as improve productivity in large, highly competitive “Branding is identifying or creating, and then markets. exploiting, sustainable competitive advantage, The Benefits of VBB for SSCM (Gossen and Gresham 2011)

Successful branding Advancing sustainable practice and performance

Bemporad and Baranowski 2008 ,mention that Done According to Bemporad and Baranowski, (2008), right, sustainable branding will lead a revolution in Brand is adding sustainable value to define which companies are no longer distinguished by the sustainability initiatives, options, for differentiating “what” of new and improved commodities, but by product based on sustainable criteria, and the “how” of human relationships, shared values and developing systems to support sustainable brand common purpose as mentioned on figure one. claims. Investor, (2009) adds that Sustainability branding can open up new markets and distinguish Successful branding allows firms to charge more for current products, but there is not a one-size-fits-all their products or to sell more at the existing price, or approach. some combination thereof. The future stream of earnings produced by this shifting of the demand

Page 72 Mahmoud Ahmady Ramadan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Simply put, sustainable brands are not ends unto the involvement of all employees across all sectors themselves, but empowering platforms that allow us (Larderel, 2002). to meet the full spectrum of our needs, make a difference in the world around us and realize our Therefore according to Gartner(2012),the branding truest selves and best society. is the key is to find the right balance on both these dimension Companies that move fastest into global Improving the SSCM value from brand perspective markets with innovative products, coupled with supply chains that are customer-driven, adaptable to Wreden and Osborne, 2011 says that And despite change and resilient to disruption, will be the the poor performance of global brands such as Sony, winners. GM, Ford and other brands that use advertising to build their brands, it is sad, really, to hear agencies Finally, once coordinated communication is and consultants still talk about branding in terms of established between the brand and supply chains, logos, slogans, ad campaigns, static websites and the operation field of this system, namely pull even new business cards while ignoring the role of system, expands. Furthermore, fast, reliable and supply chain management (SCM). effective nature of supply chain (SC) strengthens the brand and makes it well known. However, when there According to Doyle ,(2002 ) the modern supply is a problem in SC, brand image is affected chain managers need to work very closely with the negatively. In the long run, (Ula and Çalıpınar, 2008.) marketers to improve the value so can follow five major actions , to improve by which follow effective Conclusion measuring : Branding provides to SSCM solutions focuses more 1. Spot gaps and “quick-hits.” These are items on best practices and continuous improvement more arising from an analysis of regular and systematic opportunities for education and training constructive measures that need to be in place to track results feedback on business processes opportunities for and performance on customer value. develop mutually –beneficial business processes and improve the profitability of your supply chain 2. Challenge customer understanding. Customer value needs and expectations are dynamic, In other word that, the emergence of a company to not static. develop the brand value culture by focusing on more and more of customer experience and amplify the 3. Redefine customer value commitments. benefits of the sustainability of their SCM to gain a Changing customer value an expectation requires are superior competitive advantage. definition of your customer value commitment. Strandberg (2009) adds, sustainability value-based 4. Improve customer value. As value needs are branding approach can maximize Customer Loyalty fulfilled, the value ratio changes. by providing an opportunity to develop customers’ willingness to pay increase to premium and deeper 5. Anticipate change. Your customer value understanding of customer expectations leads to commitments result in a better understanding of more closely targeted solutions, products, and future customer value needs and expectations. Your services. ability to anticipate these changes enhances the value of both your customer commitment and And when valued brands are high, SSCM can be customer relationships. stronger driver value and success for business strategy as much as for society. It will create more These drivers provide wonderful new business opportunities for continued improvement of what opportunities and the future’s successful companies your company offers and your ability to successfully will be those who are innovative and who develop communicate the benefits of your products and novel business models, new products, new services. technologies and practices that will help reconcile economic growth, environmental protection and Therefore it is essential for companies to take a social concerns. Bringing such changes will require proactive, systemic approach and communicate their stories, and their customers’ stories, frequently and

Page 73 Mahmoud Ahmady Ramadan et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

broadly. To take a proactive, systemic approach and Leveraging Brands to Create Shared Value) communicate their stories, and their customers’ [11]. Ron Gossen, APR, & Alicia Gresham . (2011, 30 stories, frequently and broadly. April)" Branding as the Foundation of Sustainable Brand building programmes must address both the Competitive Advantage” organization’s internal and external stakeholders. The [12]. Sandra Horlings ( 2010) “Marketing sustainability, combination of a strong entrepreneurial spirit and a Bridging the gap between branding, sustainability and commitment to proper brand building is a very consumer demands ” potent formula that can create powerful brands. Without having to look too far away, (Yap, 2006). [13]. Strandberg Consulting, (2009, December). “The Business Case For Sustainability ” Finally in such conditions, marketing and supply [14]. Thomas S. C. Yap.(2006),“Corporate Branding: Its chain managers must vigilantly watch over the ethics Role in Sustainable Competitive Advantage” Thomas S. C. of their branding policies, assuring the activities Yap Corporate Communications Department, UCSI create value rather than take advantage of customer weaknesses. [15]. Thomson Dawson, (2012, April 30). “The Power Of Brands Lies In Shared Values” , Strategic Communication References (brand development, communication/marketing strategy, PR, graphic design, online communication, etc.) [1]. Dilber Ula (Turkey), Hatice Çalıpınar (Turkey), (2008) “Evaluating the relationship between brand and Author’s details supply chain Management” Innovative Marketing, Volume 4, Issue 3, 2008008 Innovative Marketing, Volume 4, Issue Arab Academy for Science, Technology, and Maritime 3, 58 Transport, 23 Dr. ElSobki Street, Dokki, P.O. Box: 12311, Giza, Egypt [2]. Douglas B. Holt (2003), “Brands and Branding ". Office/Fax: +202 333 6 5492 [3]. Ethical Investor (2009, April), “Sustainable branding”: Copy for Cite this Article- Mahmoud Ahmady Ramadan , [4]. Jacquelyn A. Ottman ,(2011).“The New Rules of “The Impact of Values-Based Branding (VBB) On the Green Marketing Strategies, Tools, and Inspiration for Strategic Sustainability Decision of the Supply Chain Sustainable Branding ” Management as A Superior Competitive Advantage’, International Journal of Science, Engineering and Technology, [5]. Management Development Institute (MDI),( Volume 3 Issue 6: 2015, pp. 128- 134. 2011), “Branding and Sustainable Competitive Advantage”. Copyright 2012. 294 page. India.

[6]. Martin Brandt,(2000) ,“ Building World-Class Brands For Competitive Advantage” The Total Brand Submit your manuscript to International Management™ Approach proBRAND ,Menlo Park, Journal of Science, Engineering and California,Taipei, PROBRAND . Technology and benefit from: [7]. Martin Christopher (18 Nov 2010), Logistics and  Convenient Online Submissions Supply Chain Management (4th ed.) . Publisher: Financial Times/ Prentice Hall; ISBN-10: 0273731122 ISBN-13: 978-  Rigorous Peer Review 0273731122, 288 pages  Open Access: Articles Freely Available Online [8]. Nick Wreden & Marcus Osborn ,( 2011 )“The role  High Visibility Within The Field of Supply Chain Management in a brand”  Inclusion in Academia, Google Scholar and [9]. Peter Doyle ,(2002 )."Value-based marketing Cite Factor. ,marketing strategies for corporate growth and shareholder value” Copyright 2002 by The McGraw-Hill Companies

[10]. Raphael Bemporad and Mitch Baranowski . (2008), "Branding for Sustainability ,Five Principles for

Page 74 Bipin Kumar Yadav et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Simultaneous Face Detection and Recognition using Artificial Neural Networks for Identity Verification: A Survey

1Bipin Kumar Yadav, 2Kanak Kumar, 3Sanjay Sharma

Abstract

The rapid development of technology and the commercialization of technological achievements, face detection became more popular. One of the challenges in face recognition systems is to recognize faces around different poses and illuminations. Its popularity is due to wide range of commercial and

law enforcement applications and presence of latest techniques. It also has several applications in areas such as content-based image retrieval, video coding, video conferencing, crowd surveillance, and intelligent human–computer interfaces. But current systems are having laggings, which still needed to be worked upon like illumination and pose variations The face recognition phases include image preprocessing, feature extraction and clustering. Also the system used Artificial Neural Networks in recognizing faces detected from the input. The system also performs at its best if the person is directly facing the camera or at 0 degrees with respect to the camera.

Keywords – Face Detection, Face Recognition, Artificial Neural Networks, Image Processing

Introduction Pose

A facial recognition system is a computer application The images of a face vary due to the relative camera- for automatically identifying or verifying a person face pose (frontal, 45 degree, profile, upside down), from a digital image or a video frame from a video and some facial features such as an eye or the nose source. One of the ways to do this is by comparing may become partially or wholly occluded. selected facial features from the image and a facial database. Facial recognition systems are built on Presence or absence of structural components computer programs that analyze images of human Facial features such as beards, mustaches, and faces for the purpose of identifying them. The glasses may or may not be present and there is a programs take a facial image, measure characteristics great deal of variability among these components such as the distance between the eyes, the length of including shape, color, and size. the nose, and the angle of the jaw, and create a unique file called a "template." Using templates, the Facial expression software then compares that image with another image and produces a score that measures how The appearances of faces are directly affected by a similar the images are to each other. person’s facial expression.

Occlusion

Faces may be partially occluded by other objects. In

an image with a group of people, some faces may Figure 1: Configuration of a face recognition system partially occlude other faces.

The challenges associated with face detection can be Image orientation attributed to the following factors:

© 2015 Bipin Kumar Yadav et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 75 Bipin Kumar Yadav et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Face images directly vary for different rotations Multi-media environments with adaptive human about the camera’s optical axis. computer interfaces part of ubiquitous or context- aware systems, behavior monitoring at childcare or Imaging conditions old people’s centers, recognizing a customer and assessing his needs. When the image is formed, factors such as lighting (spectra, source distribution and intensity) and Video indexing camera characteristics (sensor response, lenses) affect the appearance of a face. Labeling faces in video.

There are numerous application areas in which face Face Recognition Technique recognition can be exploited for these following purposes, a few of which are outlined below: There are several face detection techniques available now-a-days. The novel face detection techniques are Security based upon scene recognition, color recognition, appearance based models etc. Access control to buildings, airports/ seaports, ATM machines and border checkpoints; computer/ PCA (Principal Component Analysis) network security; email authentication on multimedia workstations. It is a mathematical procedure that performs a dimensionality reduction by extracting the principal Surveillance components of the multi-dimensional data. The first principal component is the linear combination of the A large number of CCTVs can be monitored to look original dimensions that has the highest variability. for known criminals, drug offenders, etc. and The n-th principal component is the linear authorities can be notified when one is located; for combination with the maximum variability, being example, this procedure was used at the Super Bowl orthogonal to the n-1 first principal components. 2001 game at Tampa, Florida; in another instance, according to a CNN report.

General identity verification

Electoral registration, banking, electronic commerce, identifying new-borns, National IDs, passports, drivers’ licenses, employee IDs.

Criminal justice systems

Mug shot/ booking systems, post- event analysis, forensics.

Image database investigations Figure 2: PCA x and y is the original basis, ɸ is the Searching image databases of licensed drivers first principal component benefit recipients, missing children, immigrants and LDA (Linear Discriminant Analysis) police bookings. Linear Discriminant Analysis is a well-known scheme “Smart Card” applications for feature extraction and dimension reduction. LDA In lieu of maintaining a database of facial images, the is widely used to find linear combinations of features face-print can be stored in a smart card, bar code or while preserving class separatibility. Unlike PCA, LDA magnetic stripe, authentication of which is tries to model the differences between classes. performed by matching the live image and the Classic LDA is designed to take into account only two stored template. classes. Specifically, it requires data points for different classes to be far from each other, while points from the same class are close. Consequently,

Page 76 Bipin Kumar Yadav et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

LDA obtains differenced projection vectors for each Neural Networks class. Multi-class LDA algorithms which can manage more than two classes are more used.

Independent Component Analysis

Independent Component Analysis aims to transform the data as linear combinations of statistically independent data points. Therefore, its goal is to provide an independent rather that uncorrelated image representation. ICA is an alternative to PCA Figure 4: Neural Networks which provides a more powerful data representation. It’s a discriminant analysis criterion, which can be used to enhance PCA. Whereas PCA depends on the “pair wise relationships between pixels in the image database,” ICA strives to exploit “higher-order relationships among pixels.” That is, PCA can only represent second-order inter-pixel relationships, or relationships that capture the amplitude spectrum of an image but not its phase spectrum. On the other hand, ICA algorithms use higher order relationships between the pixels and are capable of capturing the phase spectrum. Indeed, it is the phase spectrum Figure 5: Structure of Neuron that contains information which humans use to identify faces.

Face Detection Strategies

Face detection can be represented by

Figure 6: Structure of Neuron (Input and output)

Proposed Methodology

Our purpose is to develop an effective and efficient Face detection technique by improving existing face detection algorithms. This face detection algorithm must be effective, accurate and efficient. This algorithm would be designed using combinations of skin colour model with fuzzy neural network. Figure 3: Various Face detection approaches The Major objectives of this research are as Detection can be represented by methods having following: statistical analysis, including Principal Component 1. To develop a hybrid algorithm for face detection & Analysis (PCA), Linear Discriminant Analysis (LDA), recognition using skin colour model with fuzzy and Factor Analysis (FA).In PCA, principal neural network. components of faces are found. Each face in the set can then be approximated by combination of the 2. To implement the skin colour based model for face largest eigenvectors, referred as Eigen faces. detection and neural network based face recognition model in MATLAB simulation environment.

Page 77 Bipin Kumar Yadav et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

3. To evaluate the performance of the hybrid Issue 5, March 2013 algorithm on the basis of relative error, accuracy, [8]. E. Acosta, L. Torres, A. Albiol, and E. J. Delp, An precision, recall and response time. automatic face detection and recognition system for video 4. To compare the results of hybrid algorithm with indexing applications, in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal the existing algorithm based on viola jones with Processing, Vol.4. Orlando, Florida, 2002, pp.3644-3647. neural network for face detection & recognition. Author’s details Conclusion 1Masters of Technology Scholar, Digital Communication, The proposed algorithm will be implemented in the MITS, Bhopal, India, Email: [email protected] MATLAB. The system begins with the image 2Assistant Professor, MITS, Bhopal, India, Email: acquisition process in which the image is loaded in [email protected] the MATLAB, The face detection method is used to detect and extract the face from the image to 3Assistant Professor, MITS, Bhopal, India perform the further computations. The face recognition technique will produce the results by matching the face features (low-level, colour based and shape based features) with the template Copy for Cite this Article- Bipin Kumar Yadav, Kanak database. Kumar and Sanjay Sharma, “Simultaneous Face Detection and Recognition using Artificial Neural Networks for Identity References Verification: A Survey’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. [1]. Garcia,D.C. , and de Queiroz, R.L. “Face-Spoofing 2D- 135- 138. Detection Based on Moire-Pattern Analysis.” In Information Forensics and Security,2015 International conference on,pp.778-786,IEEE,March 2015

[2]. Fernandez, Ma, D. Christina, Kristina Joyce E. Gob, Submit your manuscript to International Aubrey Rose M.Leonidas, Ron Jason J. Ravara, Argel A. Journal of Science, Engineering and Bandala, and ElmerP.Dadios."Simultaneous face detection and recognition using Viola-Jones Algorithm and Artificial Technology and benefit from: Neural Networks for identity verification." In Region 10  Convenient Online Submissions Symposium, 2014 IEEE, pp. 672-676. IEEE, 2014.  Rigorous Peer Review [3]. Zakaria Z., Sunandi S.A., “Face detection using combination of Neural Network and Adaboost”, TENCON,  Open Access: Articles Freely Available Online vol. 1, pp. 335-338, IEEE, 2011.  High Visibility Within The Field

[4]. Zhiwei Zhang, Dong Yi, Zhen Lei, Li, S.Z., “Regularized  Inclusion in Academia, Google Scholar and transfer boosting for face detection across spectrum”, Cite Factor. Signal Processing Letters, vol. 19, Issue 3, pp. 131-134, IEEE, 2012

[5]. Ming-Hsuan Yang, David J. Kriegman, Narendra Ahuja, Detecting Faces in Images: A Survey, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 1, January 2002

[6]. K. Kim, Intelligent Immigration Control System by Using Passport Recognition and Face Verification, International Symposium on Neural Networks. Chongqing,China, 2005, pp.147-156.

[7]. Neha Rathore, Deepti Chaubey, Nupur Rajput, A Survey On Face Detection and Recognition , International Journal of Computer Architecture and Mobility Volume 1-

Page 78 Prabhakar S. Manage et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Impedance Based Image Analysis of Field Distribution inside a Closed Phantom Using EIDORS

Prabhakar S. Manage

Abstract

Electrical Impedance Tomography (EIT) is a non invasive medical imaging technique which constructs the electrical impedance distribution image of the cross section of a body based on current excitation and voltage measurement from an array of electrodes.

This paper describes the implementation of electrical impedance tomography in the field of biomedical engineering which involves the development and performance evaluation of EIT system in detecting foreign object like non hardening clay and metal object in the water bath contained in plastic object. This system uses electrode in differential mode encircling a water container which is used for voltage injection and voltage measurement. This voltage data is used to reconstruct the conductivity profile of image by using Electrical Impedance and Diffuse Optical Reconstruction

Software (EIDORS) package available in MATLAB.

Keywords: Electrical Impedance Tomography, EIT, Biomedical, EIDORS, and MATLAB.

Introduction attaching to the subject’s body, a voltage or a current source, a measurement circuit, an analog to One of the non-invasive medical imaging techniques digital converter, and a storage medium. A minimum that have been widely in use today is the Electrical data set is acquired for several values of currents or Impedance Tomography (EIT). The EIT image voltages & image can be reconstructed using these provides significant information regarding the values [3]. physiological and pathological issues based on the electrical property of the tissue inside the human The data processing portion of EIT has been body [11]. The image quality heavily depends on the developed extensively in the medical field. The work performance of the applied current, such as of Polydorides [6] was of particular importance to the frequency, current accuracy and stability, therefore, project because this is extensively addressing the the design of a steady and highly accurate signal data processing issue of soft-field tomography, and source is of great significance. In this technique an eventually contributed to the development of the image of the conductivity or permittivity of part of MATLAB toolkit called EIDORS (Electrical Impedance the body is inferred from surface electrical Tomography and Diffuse Optical Tomography measurements. Reconstruction Software) [2]. EIDORS is a MATLAB program package developed collaboratively by EIT Typically, conducting electrodes are attached to the research groups in order to help advance the field of skin of the subject and small alternating currents or EIT as a whole. The data processing portion of this voltages are applied to some or all of the electrodes. experiment was accomplished with the EIDORS V3.0 The resulting electrical potentials are measured, and toolkit [5]. The toolkit was essential because of the the process may be repeated for numerous different challenges in solving an EIT inversion problem. The 1 configurations of applied current or voltage. A basic EIT inversion problem is a nonlinear, ill-posed EIT system consists of array of electrodes for problem that is very intensive computationally. The basis of the EIDORS package is that it utilizes a finite 1 Corresponding Author’s Email: [email protected] element model for forward calculations and a

© 2015 Prabhakar S. Manage et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 79 Prabhakar S. Manage et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

regularized nonlinear solver to obtain a unique and  Image analysis software to improve the stable inverse solution [4]. The package is equipped diagnostic value of the images. with a mesh generator, several standardized EIT methods, a graphical output, and supports two-  A user interface (display, hardcopy, keyboard, dimensional and three-dimensional EIT systems [4] storage facilities, etc.) to enable an easy user [8]. access to the image analysis. The first two parts are referred as the data acquisition hardware and Electrical impedance tomography is a radiation free the last four are referred as the image acquisition technique. It is safe, non invasive, portable and software that is performed on a computer. affordable medical imaging technique. Its applications include detection of breast cancer, Data Processing and Collection imaging gastric emptying and gastric secretion Image processing and reconstruction is performed pulmonary monitoring, thermal monitoring of using sophisticated reconstruction software, with the hypothermia, intraventricular hemorrhage. help of a computer .The reconstruction software The EIT System used in this work is EIDORS Package which is an acronym for Electrical Impedance and Diffuse Figure 1 depicts a block diagram of the proposed EIT Optical Reconstruction Software and MATLAB as system: programming tool [2][8]. EIDORS provides flexibility in analyzing the system using finite element models and MATLAB provides good graphical support for display of reconstructed images [7].

The circuit consists of power supply, signal generator, relay system, microcontroller, electrodes and a phantom. The circuit setup is as shown in the Fig 2. First a plastic box is taken assuming it to be a closed phantom. Water is poured in it and electrodes are attached as shown in figure 2. Care is taken to ensure all electrodes are immersed properly in the water. The power supply is switched on to 12 volts and necessary voltages are given to microcontroller and relay system. The ac frequency is kept at 100 Hz. Figure 1: Block diagram of the EIT System The supply from microcontroller drives a relay which in turn is connected to an electrode pair. The The EIT system consists of electrodes are numbered as 1a, 1b, 2a, 2b till 8a, 8b constituting a total of 16 electrodes. Depending  An array of electrodes, attached to the surface of upon the simulation pattern, one electrode pair is the patient or the conducting medium, to connected to relay at a time and the supply is maintain an electrical contact with the imaging provided. This electrode is considered to be the media. source and current through it measured using digital multimeter. Current across remaining pairs is  A measurement circuit, which applies an measured accordingly. This process is repeated by alternating current to the medium to be imaged switching the source till all the currents are and measures resultant voltage distribution on measured. This data is used to reconstruct the image. the surface of the object. The same setup can be used for testing other  An image reconstruction algorithm, which scenarios. reconstructs images of spatial resistivity

distribution from the voltage measurements.

 An image processing algorithm consisting of several filtering and enhancement algorithms to improve the image quality.

Page 80 Prabhakar S. Manage et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

acted as a source, while the readings were obtained from other electrode pairs.

Figure 2: Experimental Setup

Results and Discussions Figure 4: Electrodes arranged on a circular box

Most EIT systems apply current or voltages between Clay, which is a non conducting material, was placed a pair of electrodes at a time (an opposite drive near the source (electrode pair 1 a-b). Clay acts like configuration) [1]. The electrodes are placed by an obstruction and does not allow any current to taking non-conducting circular ring as reference. The pass through it. No current is taken up by the clay radial method is used for taking readings. Before and this causes a rise in the current measured from taking readings on human tissue, the EIT procedure the electrode pairs (8a-b, 2a-b) which were closest to was performed on a phantom (papaya and the point where the clay was placed. However the watermelon) [9]. The tissue impedance of the current measured from electrode pairs (3, 4, 5, 6, and phantom is as shown in figure 3. 7) which were farther away from the clay did not show much of a deviation when compared to the 35 reference because the path taken by the current was 30 free from any obstruction.

25 When clay was kept away from the source, near

20 electrode pair 5a-b, the current measured from the electrode pairs close to the source did not show 15 Impedance much of a deviation when compared to the 10 reference. This happens because there is no

5 obstruction to the path of current reaching these electrodes. However the current measured from 0 2 3 4 5 10 10 10 10 electrode pair 5a-b, where the clay was placed, was Frequency seen to be raised. This happens because the clay does not absorb any of the current and thus the Figure 3: Impedance versus frequency current reaching electrode pair 5a-b is more. Figure 5 As the tissue impedance of the phantom is similar to shows the two scenarios. the impedance of the human tissue, EIT procedure on phantom can be used.

EIT is applied on closed object hence experiment was performed on circular plastic box. Here pair wise method was used for taking the readings [1]. The box used had a diameter of 13cm. The electrodes were placed around the circumference of box, equidistant from each other at an angle of 22.5˚. Different cases were tried on this box by applying input ac voltage to the electrode pair 1 a-b; this Figure 5: Clay placed near and away from source

Page 81 Prabhakar S. Manage et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Iron, which is a conducting material, was then placed 20 18 near the source. The current obtained from electrode Reference 16 Iron rod near to the source

pairs 8a-b and 2a-b which were placed closest to the 14 Iron rod away from the source

iron rod showed a drop in the current recorded. This 12

happens because iron conducts electricity and there 10 is a voltage drop across the iron rod and hence the 8 current reaching electrode pairs 8a-b and 2a-b are of 6 a reduced value. However the current obtained at the microamps in 4C urrent 2 other electrode pairs did not show much of a change 0 because there was no obstruction to the path of 2 3 4 5 6 7 8 Electrode pair current reaching the other electrodes. Figure 7: Comparison of Current distribution in When the iron rod was placed away from the source, electrode pairs when clay and iron rod were placed near the electrode pair 5a-b, a drop in current was near and away from the source observed because the iron rod takes up some of the current as it is a conducting material. The current Figure 8 shows the actual image of the water obtained from electrode pairs placed away from the container. Figure 9 and 10 show the reconstructed iron rod remains somewhat the same when images using EIDORS with 2410 and 576 elements compared to the reference. This happens because respectively. the path taken by the current does not face any obstruction. Figure 6 shows the two scenarios.

Figure 6: Iron rod placed near and away from source

Figure 7 shows the comparison of current Figure 8: Actual image of the water container distribution in electrode pairs when iron rod and clay were placed near and away from the source. Left graph shows the comparison of current distribution when clay was placed and the right one show the variations in current inside the phantom when iron rod was placed.

22 20 Reference 18 Clay near to the source

16 Clay away from the source 14 12

10 Figure 9: Reconstructed image using EIDORS and

8 with 2410 elements

reti ira ps microam in 6C urrent

4

2 2 3 4 5 6 7 8 Electrode pair

Page 82 Prabhakar S. Manage et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Attempts were made to image smaller objects like pin, screw drivers, and small plastic objects; however it turned out to be unsuccessful. This is due to the resolution of EIDORS software and shortcomings of hardware [1].

Conclusion

An EIT system for 16 electrodes was developed and various tests were conducted using two different

techniques. Radial method on phantoms Figure 10: Reconstructed image using EIDORS and (watermelon and papaya) yielded better results and with 576 elements it is observed that whenever there is any abnormality present in tissue there is a change in the impedance. Figure 11 shows the presence of foreign object like EIT procedure was repeated for the pair wise method clay. Figure 12 shows the reconstructed image which on the plastic box and position of the abnormality is clearly identifies the presence of foreign object (by detected. Various results were obtained when foreign means of change of color). objects (both conducting as well non-conducting) were placed near and away from the source. The simulations and tests carried out prove that the circular container can be used for 2D imaging. Using EIDORS as a reconstruction software and MATLAB as a programming language, images were reconstructed and various stimulation patterns were shown both for adjacent as well as opposite techniques. The results also reveal that plastic bottle is capable of detecting objects of poor conductivity as well as the one with higher conductivity.

References Figure 11: Actual image of water container with a [1]. Mohd Tahir Erwati, Nagi Farrukh, “Application of foreign object like clay electrical impedance tomography in biomedical and material technology “,SCOReD 2009, pp168-171, November 2009.

[2]. M. Vauhkonen, W.R.B. Lionheart, L.M.Heikkinen, P.J.Vauhkonen, and J.P.KAIPIO, “A MATLAB package for EIDORS project to reconstruct two-dimensional EIT images”, PhysiolMeas, vol. 22. Pp. 107-111, 2001.

[3]. Robert W. Stacey, “Electrical impedance tomography”, June 2006.

[4]. Adler A and Lionheart WRB (2006), “Uses and abuses of EIDORS: An extensible software base for EIT. Figure 12: Reconstructed image clearly showing the PhysiolMeas, 27:S25-S42. presence of foreign object [5]. Adler A and Lionheart WRB (2005) “EIDORS:Towards a However, certain factors limit the resolution of EIT community based extensible software base for EIT images; the principal ones being noise, number of conf Biomedical Applications of EIT London , UK, June measurements and mesh size. There were various 22-24. difficulties encountered. The entire set of reading had to be taken in one session only as the phantom [6]. Polrdorides N and Lionheart WRB (2002) “A MATLAB toolkit forthree-dimensional EIT: a that was used becomes soggy and starts decaying. contribution to electrical impedance and diffuse Hence phantom cannot be used for long time.

Page 83 Prabhakar S. Manage et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

optical reconstruction software project MeasSciTechnol 13:1871-1883.

[7]. Adler A,Lionheart, PolrdoridesN , “Simple FEMS aren’t good as we thought : experiences developing EIDORS v3.3.

[8]. N Polrdorides, “Image reconstruction algorithms for soft field tomography”, P.H.D thesis.

[9]. Sarwan, Sneh Anand, Amit Sengupta, “Impedence- Based Image Reconstruction of the Field Distribution inside the Closed Phantom Using Finite Element Method”, IJCNS Vol 2, No. 7 July 2010.

[10]. B H Brown, R H Smallwood, D C Barber, P V Lawford and D R Hose, Medical Physics and Biomedical Engineering, IOP Publishing Ltd, 1999.

[11]. D. K. Kamat, Sunil M. Shinde, Dr. P. M. Patil, “Electrical Impedance Tomography for Biomedical Application”,IIJEC, Vol 3, Issue 5, May 2015.

[12]. Liliana Borcea, “Electrical impedance tomography”, Institute of Physics Publishing, Oct 2002, R99–R136.

Author’s details

Assistant Professor, K.L.E Society’s Dr. M. S. Sheshgiri College of Engineering & Technology, Belgaum, Karnataka, India, Email: [email protected]

Copy for Cite this Article- Prabhakar S. Manage, “Impedance Based Image Analysis of Field Distribution inside a Closed Phantom Using EIDORS’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 139- 144.

Submit your manuscript to International Journal of Science, Engineering and Technology and benefit from:

 Convenient Online Submissions

 Rigorous Peer Review

 Open Access: Articles Freely Available Online

 High Visibility Within The Field

 Inclusion in Academia, Google Scholar and Cite Factor.

Page 84 Snehal Kadgaonkar et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Water Distribution Network’s Modelling and Calibration

1Snehal Kadgaonkar, 2P. T. Nimbalkar, 3D. R. Kulkarni

Abstract

Water is an inestimable natural resource and is essential for all life on the planet. But the natural

resources have been exploited, mistreated and contaminated and hence management of water is a really challenging task in developing countries to make sure every customer is getting sufficient and good quality of drinking water. Increases in population and climate change are main reasons for an ever increasing demand on water supply system. Since water resources are definite, it requires proper management and supply.

This paper focuses on modelling and calibration of water distribution network which can be used for further analysis like pressure optimization, growth studies etc. A trial and error process is used for the calibration of network. The paper describes the path followed through the hydraulic model build up to

final calibrated model, including importing of the assets, the definition of network zones and measures taken for the calibration using EAPNET tool.

Keywords: Calibration, Critical point, District metering area, High performance polyethylene pipe, Hydraulic model build, Pressure reducing valve, Water distribution network.

Introduction the facilities as links and nodes. The behaviors of the links and nodes are described in the form of Water distribution system is a hydraulic infrastructure mathematical equations. The model equations are consisting of elements such as pipes, tanks, then solved, and the solutions are typically displayed reservoirs, pumps and valves etc. Effective design is on maps of the system or as tabular output. very important for a new water distribution network and expansions of existing network, so as to provide For those involved in design, construction and drinking or potable water to the end customers. maintenance of public water distribution system, Water distribution modelling plays an important role computation of flow and pressure in a complex in the design and operating water distribution network is a great challenge. Earlier, many methods system. It is capable of serving water to the have been used to compute flows in pipe network community trustworthily, safely and economically. which involves graphical method, mathematical Because of the availability of user friendly and model and physical analogies. Development and sophisticated models these goals comes into reality implementation of these methods using a computer than ever before. Before starting any modelling have been used over the last fifty years. The Hardy project, it is necessary that the water utility agrees Cross method is adopted from the moment of upon the need for the model and purposes for which distribution method, developed by Hardy Cross. This the model will be used in both short term and long method is used to determine the moments in term. In utilities, a model consists of pipes, pumps, indeterminate structures. In later stages these demands, etc. 1These components in the system are methods were obsolete after the development of represented in maps and drawings of those facilities. computer solving algorithms employing Newton- The maps are converted to a model that represents Raphson method and other solution methods. These algorithm methods removed the need to solve 1Corresponding Author’s Email: [email protected] nonlinear systems of equations by hand. In certain cases it has been found that the Hardy Cross method

© 2015 Snehal Kadgaonkar et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 85 Snehal Kadgaonkar et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

converges very slowly or not at all. This leads to Walski, Bhave, Ormsbee and Wood, Boulos and suggest special measures to improve convergence Wood states that several techniques of model and a constrained model for the minimum cost calibration involves trial and error procedure. From design of water distribution networks. point of view of model’s hydraulic calibration it is important to make sure that both flow values (which Hardy Cross proposed the use of mathematical contains systems inflows and outflows as well as methods for calculating flows in complex networks. network’s flow) and pressure values (or level in the This manual, iterative procedure was an epoch- reservoirs) are simulated correctly. Inputs and making advance in the water distribution system outputs of the network are the important sectors in calculation and used throughout the water industry the measurement of total system demand. for almost 40 years, even extended to the early stage of computer age. The machine implementations of Depending on the optimisation technique and their Hardy Cross methodology were developed and were dynamics (static/transient) calibration methods are in widespread use by the 1980s. The usability of classified as (1) Iterative methods which is based on these models was greatly improved in the 1990s with trial and error procedures; (2) Explicit methods, which the introduction of the public domain EPANET model solve the extended set of steady-state mass balance and other Windows-based commercial water and energy equations; and (3) Implicit methods, distribution system models. which are formulated and solved using an optimisation technique coupled with a hydraulic Most of researchers studied water networks solver. To solve the uncertainties associated with calibration methodology thoroughly but it is almost estimated parameters and model predictions some evaded by practitioners. Due to less number of efforts have been attempted. To estimate the measurements and high uncertainty in real networks uncertainty First-Order Second-Moment (FOSM) makes the calibration problem more challenging. approximation and Bayesian recursive optimization Walski et al. (2003) states that “simulation is a approach have been applied instead of random process where mathematical representation of the sampling approach. real WDN used to compute the systems performance, in order to reproduce the responses of Walski in 1983, proposed a trial and error real systems for the same input conditions”. This methodology by using a fire flow test in a pipe procedure is called as model calibration. Shamir and network to adjust both demands and roughness. Howard (1977) defines that calibration “consists of Another iterative methodology is proposed by Bhave determining the physical and operational in 1988, where the network was divided in zones to characteristics of an existing system and determining adjust the total demand and the resistances in the the data [that] when input to the computer model pipe network is adjusted too. Solving the basic will yield realistic results”. Cesario (1995) states that network equations explicitly, Ormsbee and Wood in calibration as "the process which involves fine-tuning 1986 formulated the calibration algorithm in terms of a model until it is able to simulate the field data for a head loss coefficients. However, implicit methods particular time horizon (e.g. the scenario peak time were user-friendly and used most of the time. The consumption), with a degree of accuracy pre- problem that deals with the calculation of the established”. Walski et al. (2003) states calibration as pressure and flow distribution in the network is "the process of comparing the model results with the described by Datta and Sridharan in 1994. This solves field data. If necessary, adjust the model data until the problem of determining resistance coefficient the predicted model behaviour matches with the (Hazan Williams coefficient) by means of weighted field behaviour for a wide range of operating least squares (WLS) method. In 1996 Reddy et al. conditions”. In Straightforward manner Calibration is estimated the roughness using Weighted least defined as the comparison between simulated data squares method based on the Gauss-Newton vs. measured data. The calibration methods typically minimization technique. More references of alters system demands, roughening or smoothing of calibration techniques to identify most reliable the pipe and modifies pump operation method of calibration are reviewed by Savic et al in characteristics until satisfactory match is obtained 2009. When input data is inaccurate it is important to between measured and modelled data”. calculate estimated parameter values as well as reliable of estimation. Bargiela and Hainsworth in

Page 86 Snehal Kadgaonkar et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

1989 compared Monte Carlo simulation. Monte Carlo junctions, pipes, valves, pumps, reservoirs, hydrants. simulation is used for confidence limit analysis. It is The pipe network contains lot of information about an optimisation and sensitivity-based approach. pipes, junctions, pumps, valves, etc. as well as the Enable the hydraulic operation of a study area, properties of the components. Pipeline network aiming A WDN’s model construction using EPANET properties, the formation of these parts and other contribute a more feasible method. databases can effectively simulate and managed by EPANET. Case Study The distribution network was present in the GIS and Water distribution network Characterization imported to the EPANET. The simplified DMA network in GIS format are transformed to the pattern For the effective water distribution network analysis, in EPANET and water supply terminal of DMA is Gulbarga city in the state of Karnataka, India is expressed as reservoir, as shown in Fig. 1. The basic considered. The population of the town as per the information in the model should include: node flow, data available from the statistics department is taken node elevation and pipe roughness, pipe diameter as 430,000. For the study purpose, one zone with the and so on for hydraulic analysis. For the pipes, population of 4000 is considered. The study area Hazen-Williams formula for the calculation of unit contains only domestic population with the no major head loss with the roughness coefficient of K=140 large industrial or commercial consumers. (The lengths were assigned automatically from the Households are now consuming an average of 91 GIS) is considered. The node flow is obtained by litres per person per day, which is sufficient to enable demand of the consumers at the node multiplied by the maintenance of hygiene standards as well as to diurnal pattern. The model must be verified after the meet most convenience needs. import, to check the connectivity of the network at The WDN is 10km long pipeline mainly in HPPE with intersections and reservoir nodes. a diameter of 63mm. The pipe age is about 5-6 year. The relevant flow and pressure data at the inlet The DMA is feeding via inlet meter with the PRV and meter, pressure monitoring point and the critical contains two pressure monitoring point and critical point of DMA is obtained by the SCADA data at the point. interval of 15 min.

Taking in to account the inlet meter flow profile, diurnal pattern (dimensionless) of this area can be obtained from the actual measuring value.

Figure 1: Water distribution network under analysis Figure 2: Demand Pattern Water distribution network model build The extended period simulation is used for hydraulic The first step to the WDN’s model construction modelling based on Hazen Williams’s equation, and contains analysis of the historic network data. WDN litre per second as the flow unit and meter as the model requires network data, water data and pressure unit. operation data. Model calibration The model for water supply system establishes the After the hydraulic model construction proceeded its computer simulation, including the following parts: calibration. For the calibration the SCADA data of

Page 87 Snehal Kadgaonkar et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

flows and pressure at the inlet meter, pressure future. Calibrated models of WDS are used for future monitoring point and critical point are used. To growth studies. Before a network model is used for analyse the accuracy of the model, it is necessary to further studies, it needs to ensure that the model give input of actual measuring data into the file for would predict, with reasonable accuracy with the comparison. The comparative graph between field data. The behaviour of the network should computed flow and observed flow at the inlet of reflect the field conditions. Such a process is called as DMA is shown in Figure 3 and the relation between "calibration" of the model. The accuracy of a computed pressure and observed pressure at the hydraulic model depends on calibration methods pressure monitoring point 1 is shown in Figure 4 and how well it has been calibrated. Hence Before a model is used for any future studies or decision- making purposes calibration analysis should always be carried out. Calibration is the process which compares the model results against field observations. Calibration actions focuses on the adjusting the model hydraulic conditions until model-predicted performance reasonably matches

with measured system performance over a wide Figure 3: The computed and observed value of inlet range of operating conditions. meter flow Following steps are involved in the calibration of the As obtained from Fig. 3, the average computed inlet model: flow during a day is 20.95 L/S, and the mean 1. Head at source node observed value is 21.13 L/S, with an absolute error of 0.85%. From the above results, flow calibration of the The head at source nodes can be determined based zone with absolute error of 0.85% is acceptable. on the head loss difference between the reservoir head and pressure monitoring point immediate downstream of the inlet meter. The water elevation in the reservoirs and the head supplied by the pumps can be measured with SCADA system.

2. Manual calibration approach

The manual process or trial-and-error method of calibration generally involves the modeller’s Figure 4: The computed and observed value of estimates to change pipe roughness values and pressure data at inlet meter nodal demands, conducting the simulation, and comparing simulated results against observed As known from Figure 4, pressure at the inlet meter results. Until a satisfactory match is obtained during 24 hours, the average computed value of between simulated and observed values the process pressure is 58.78m and the observed mean value is is carried out iteratively. When model is not able to 59.28 m, with an absolute error of 0.84%. Therefore it show satisfactory match, it is considered as the is concluded that source of modelling error mainly model is not a true representation of the part of the includes pipe age, pipe roughness, influence of water real system where discrepancies remain. In such consumption pattern. cases, to identify discrepancies between the model The pressure data in the study area is measured at and the real system further site investigations are inlet meter, pressure monitoring points and at the usually carried out. Incorrectly modelled valve critical point. settings and unrecorded connections can be reason of the discrepancies. The process of calibration may Calibration methodology include changing system demands, smoothening or roughening of pipes, throttling of the valve, Calibration of WDS is necessary to predict the water changing pump operating condition, and adjusting distribution network models behaviour under other model attributes that affect simulation results. different condition and to plan their expansion in

Page 88 Snehal Kadgaonkar et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Calibration Actions From the above observed and simulated values, pressure variation at the pressure monitoring point 2 is 25 m before calibration.

After the setup of PRV, the pressure at the monitoring point 2 is matching at the minimum night flow time but head loss of 2m/km is occurring at the peak time between 7 am to 8 am. Hence to calibrate the head loss, The K value of HPPE pips is decreased from 140 to 120. In the below image pipes with changed roughness are heighted in the pink colour. (a)

(b) Figure 7: Pipe roughed to calibrate head loss Figure 5: Simulated and observed value of pressure monitoring point 1: (a) Before Calibration; (b) After Calibration

From the above observed and simulated values (Fig.5a) pressure variation at pressure monitoring point 1 is about 40 m. Hence model needs to be calibrated. Therefore to calibrate the pressure, Pressure reducing valve present at the d/s side of inlet meter, set to the pressure of 22m. From Fig.5b pressure at pressure monitoring point 1 during 24 hours, the average simulated value of pressure is (a) 22m and the observed mean value is 22.2 m, with an absolute error of 0.9%.

(b)

Figure 6: Simulated and observed value of pressure Figure 8: Simulated and observed value of pressure at pressure monitoring point 2 before calibration at monitoring point 2: (a) before changing the pipe roughness; (b) After changing the pipe roughness

Page 89 Snehal Kadgaonkar et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

From Fig. 8b, pressure at pressure monitoring point 2 between 07:00 to 08:00 head losses of 2m/km during 24 hours, the average simulated value of occurring in the system. These head losses are pressure is 14.94m and the observed mean value is calibrated by changing the K value of HPPE pipe 15.07 m, with an absolute error of 0.86% from 140 to 120.

Acknowledgement

Thanks are due to the Municipal Corporation of Gulbarga city for data availability.

References

[1]. Baiyi Jiang, Fabei Zhang, Jian Gao and Hongbin Zhao (2013). Building Water Distribution Network Hydraulic Model by Using Water GEMS. American society

of civil Engineers, 453-461. (a) [2]. Dr. G. Venkata Ramana , Ch. V. S. S. Sudheer , B.Rajasekhar (2015). Network analysis of water distribution system in rural areas using EPANET. Procedia Engineering, 119,496 – 505.

[3]. F. Costanzo, A. Fiorini Morosini, P. Veltri, D. Savić (2014). Model Calibration as a Tool for Leakage Identification in WDS: A Real Case Study. Procedia Engineering, 89, 672-678.

[4]. Fulvio Boano, Marco Scibetta, Luca Ridolfi and Orazio Giustolisi (2015). Water distribution system modeling and optimization: a case study. Procedia (b) Engineering, 119, 719-724.

Figure 9: Simulated and observed value of pressure [5]. Giulia Farina, Enrico Creaco & Marco Franchini at CP: (a) Before Calibration; (b) After Calibration (2014). Using EPANET for modelling water distribution systems with users along the pipes. Civil Engineering and From Fig. 9b, the average computed pressure at Environmental Systems, 31:1, 36-50. Critical point is 11.64 m and the mean observed [6]. Jakobus E. Van Zyl , Dragan A. Savic & Godfrey A. value of pressure is 11.73m, with an absolute error of Walters (2005). Extended-period modelling of water pipe 0.76%. Hence from the fig. 5, 8, 9 it is concluded that networks-a new approach. Journal of Hydraulic Research, model is calibrated and it is used for the further 43:6, 678-688. analysis. [7]. Josep Roma, Ramon Perez, Gerard Sanz, Sergi Conclusion Grau(2015). Model calibration and leakage assessment applied to a real Water Distribution Network. Procedia The hydraulic model of DMA is established by Engineering, 119,603 – 612. EPANET, and can be used for further analysis like pressure optimization, growth studies, leakage [8]. K. E. Lansey, W. El-Shorbagy, I. Ahmed, J. Araujo, modelling etc. and C. T. Haan (2001). Calibration Assessment and Data Collection for Water Distribution Networks. 127, 270-279. For the calibration of the model, the existing PRV [9]. Mario Castro Gama, Emilio Attilio Lanfranchi, pressure is set to 22m. From inlet flow meter data, Quan Pan and Andreja Jonoski (2015). Water distribution the variation trends of water supply and water network model building, case study: Milano, Italy. Procedia consumption of DMA are as per the diurnal pattern Engineering, 119, 573 – 582. is considered. The leakage in the system is higher than the water consumption from 0:00 to 04:00 and [10]. Massimo Greco and Giuseppe Del Giudice (1999). the water consumption is greater from 07:00 to New Approach to Water Distribution Network Calibration. 08:00. Because of higher water consumption Journal of Hydraulic Engineering, 125, 849-854.

Page 90 Snehal Kadgaonkar et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

[11]. Pramod R. Bhave (1988). Calibrating water Copy for Cite this Article- Snehal Kadgaonkar, P. T. distribution network model. Journal of Environmental Nimbalkar and D. R. Kulkarni, “Water Distribution Network’s Engineer, 114, 120-136. Modelling and Calibration’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. [12]. Shan Wu, Long Yang, Chen Zhou, and Jian Zhang 145- 151. (2013). Leakage Modelling and Leakage Control Analysis by Pressure Management in Water Supply System of DMA. ICPTT, 141-150.

[13]. Stephen Nyende-Byakika, Gaddi Ngirane- Katashaya & Julius M. Ndambuki (2012). Comparative Submit your manuscript to International analysis of approaches to modelling water distribution Journal of Science, Engineering and networks. Civil Engineering and Environmental Systems, 29:1, 79-89. Technology and benefit from:

[14]. W. P. Cheng, T. C. Yu, G. Xu (2014). Real-Time  Convenient Online Submissions Model of a Large-Scale Water Distribution System.  Rigorous Peer Review Procedia Engineering, 89,457 – 466.  Open Access: Articles Freely Available Online [15]. Z. Alves, J. Muranho, T. Albuquerque, A. Ferreira (2014). Water distribution network’s modelling and  High Visibility Within The Field calibration. A case study based on scarce inventory data.  Inclusion in Academia, Google Scholar and Procedia Engineering, 70, 31-40. Cite Factor.

Author’s details

1M.Tech Research Scholar, Civil Engineering Department, Bharati Vidyapeeth Deemed University College of Engineering, Pune, India, Email: [email protected]

2Professor, Civil Engineering Department, Bharati Vidyapeeth Deemed University College of Engineering, Pune, India. Email: [email protected]

3Assistant Professor, Civil Engineering Department, Bharati Vidyapeeth Deemed University College of Engineering, Pune, India. Email: [email protected]

Page 91 Karunesh Kumar Shukla et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Integrated Action Plan for Improvement of Drainage Congested Areas and Mitigation of Flood and Waterlogged areas using Geoinformatics: a Case Study of Gonda District, Uttar Pradesh

1Karunesh Kumar Shukla, 2Purnima Sharma, 3A. K. Agarwal

Abstract

Floods are the most commonly occurring disaster in Uttar Pradesh, affecting almost every year some part of the state or the other. In 2013, 65 districts of Uttar Pradesh were affected by floods and water logging covering an area of 549524 ha and a total of 15132 villages. Gonda district has been affected

by severe flood and water logging every year. A total of 237 villages in 10 blocks were affected by river flood and water logging in 2013 covering an area of 77965 ha (Technical Report, RSAC-UP: SWRD: 2014:01, 2013-14). This flood situation interrupted over all development of the district. The present study is an attempt to identify the causing factors and some suitable remedial measures for overall improvement in the flood and water logging problems of Gonda district with the help of Geoinformatics.

Keywords: Flood, Water logging, Monsoon, Run-off, Geoinformatics.

Introduction and their tributaries are flood prone in Uttar Pradesh. Ganga River basin of Uttar Pradesh experiences India is highly vulnerable to floods and out of the normal rainfall in the region from 60 cm to 190 cm, total geographical area of 329 m.ha, more than 40 of which more than 80% occurs during the southwest mha is flood prone. Floods are recurrent monsoon. The rainfall increases from west to east phenomenon, which cause huge loss of lives and and from south to north similarly. The problem of damage to livelihood systems, property, flood increases from west to east and from south to infrastructure and public utilities. It is a cause of north. Out of the 240.93 lakh hectares geographical concern that flood related damages are showing an area of the State about 73.06 lakh hectares is flood increasing trend. The average annual flood damage prone (http:\\rahat.up.nic.in) (Figure-1). during the last 10 years (1996-2005) was Rs. 4745 crore, as compared to Rs. 1805 crore, the Uttar Pradesh has experienced massive flooding in corresponding average for the last 53years. This can 1998, 2000, 2001, and2008. At least 2000 people be attributed to many reasons including rapid were killed in Utter Pradesh in 1998, what authorities increase in population and urbanization coupled with call the worstflooding in memory. It is estimated that growing developmental and economic activities in 30 districts of the state are seriously prone to the flood plains and global warming (NDMA, 2008). flooding. The incidence of flood is frequent mainly in the eastern Ganga Plain regions. This is broadly the Flooding in the Ganga river basin is more or less an result of spilling of rivers like Sharada, Rapti, Chhoti annual feature which is aggravated by drainage Gandak, , Great Gandak, BurhiGandak and congestion, comprising states of Uttar Pradesh Kosi. Flooding is a hazard which operates during 1 (Talwar and Juneja, 2009). Ganga, Yamuna, high discharge periods. Thetributaries of the Ganga Ramganga, Sharda, Ghaghra, Rapti and Gandak rivers River has witnessed 20 to 115 times facing problem of flood during 1975 to 2000 as measured at various gauging sites (Singh, 2009). 1Corresponding Author’s Email: [email protected]

© 2015 Karunesh Kumar Shukla et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 92 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

The main causes of flood and waterlogging in the Therefore the present study suggests the integrated Gonda district are heavy rainfall/flash floods, siltation action plan for improvement and management of of waterbodies /drains, unplanned urbanization, flood prone areas in Gonda district of Uttar Pradesh deforestation and poor drainage management for with the use of Geoinformatics (Figure-2). dewatering. Drainage systems are the major source of conducting waste water and also rain water. But, Study Area due to sedimentation, siltation and poor Gonda district lies between latitudes 26046' and management, these systems fail. Therefore, in the 27027' north and longitude 81031' and 82037' east monsoon period, drainage system overflows and the and falls in Survey of India Toposheet No. 63E & 63I. surrounding areas become flooded (Sharma and The total geographical area of the district is Shukla, 2015). Although, there are many 3,404sq.km. There are four numbers of tehsils and improvements and mitigation measures such as seventeen blocks in Gonda district. The district embankments, bundings and spur etc. has been built population is 3,431,386 (Census, 2011). for protection of flood in the district, yet the problem exists and creates havoc for the living beings in The general slope of the district is from west to east, Gonda district. except north to south in the western part. The average slope of Gonda district is 30-50 derived from Advancements in the remote sensing technology and CARTODEM (Figure-3). the Geographic Information Systems (GIS) help in real time monitoring, early warning and quick Geomorphology damage assessment of flood disasters. In the context of flood hazard management, GIS can be used to Physiographically, Gonda district is divided into two create interactive map overlays, which clearly and units, the upland plains underlain by older alluvium quickly illustrate which areas of a community are in and the low level plains underlain by newer alluvium. danger of flooding. Such maps can then be used to Flood plain (alluvium) areas are extensive and low coordinate mitigation efforts before an event and lying flat areas laying adjacent to Ghaghra river. The recovery after (Noah Raford, 1999 as cited in Awal, deposit is thickest near the river margins and 2003). thinning outward the valley slopes and composed of unconsolidated alluvial materials of varying lithology. Sanyal and Xi Xi (2005) have designed a Flood Ravines, younger alluvial plain and older alluvial plain Hazard Mapping which has vital component for are also occurs in the district (Ground Water appropriate land use planning in flood-prone areas. Brochure of Gonda District, U.P., 2008-2009). It creates easily-read, rapidly accessible charts and maps which facilitates the administrators and Rainfall and Climate planners to identify areas of risk and prioritize their mitigation/ response efforts. An efficient The average annual rainfall is 1152 mm. The climate methodology is used to accurately delineate the is sub-humid and it is characterised by good rainfall flood-hazard areas in the . mainly during southwest monsoon season and a dry hot summer (Ground Water Brochure of Gonda Bapalu Venkata and Sinha (2005) has tried to identify District, U.P., 2008-2009). areas of risk and prioritize their mitigation/ response efforts in the flood-hazard areas in the Kosi River Drainage and Waterbodies Basin, North , India in a GIS environment. The area chiefly drained by the river Ghaghra which Kumar (2005) has applied GIS techniques in Flood forms the southern and south western boundary of Hazard Management in North Indian Plain. This the district. Kuwano river forms the north eastern system constitutes of the Ganga, and its largest boundary of the district. The area also drained by the tributary the Yamuna, other Himalayan rivers- Tirhi Nadi and Monwar Nadi (Ground Water Ramganga, Gomati, Ghaghara, Gandak, Rapti, Brochure of Gonda District, U.P., 2008-2009) (Figure - Gandak and Kosi, and some peninsular rivers, like 4). Chambal, Son and Punpun. It is also examines the Data Used and Methodology potential of GIS to meet the purpose.

Page 93 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Wetland data, drainage, and flood layers (Radarsat mapped from this flood layer. The flood affected data) of 2008-2013 were used for suggesting areas categorised into four categories extreme integrated and comprehensive flood and drainage vulnerable areas, high vulnerable areas, moderate improvement plan for Gonda District. Cartosat- vulnerable areas and low vulnerable areas on the 1+LISS IV merged product of 2008, data were used basis of repetition of flood. The lowlying areas were for identification of drainage, settlement, waterbodie, identified on basis of relative height extracted from road or railway etc. networks, LISS III data of 2006 CARTODEM. Changes in waterbodies and drainage and 2013 were used for rivers and wetland, were demarcated in different time period. The Toposheet were used for demarcation of old causative factors of flood and waterlogging are well drainage and nomenclature. Flood layer from 2008 determined for analysing all data. Using all spatial to 2013 were used for demarcation of inundation and non-spatial data finally prepared detailed maps and waterlogged areas. and statistics. These statistics were used to prepared an action plan for mitigation of flood and Flood layers of different dates and years from 2008 waterlogging. The flow chart of the steps taken is to 2013 were combined to generate a union flood given below:- layer. Flood affected areas were identified and

Results and Discussions the time of flood, the building, settlements etc. built around it gets severely affected. The silted drains The observed in Belsar, Nawabganj, Paraspur and also increase the severity of the problem. The main Tarabganj block of Gonda district (Figure-5). These cause of flood is poor water storing and drainage of areas occupy various wetlands which are a natural flood water and encroachment and mitigation in resource of water and act as a reservoir for storage drainage. The existing drains are choked, therefore of excess water. Due to encroachment in these the water get accumulated in these area. wetlands, the storage area is further reduced and at

Page 94 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

A number of villages and blocks of Gonda district identified for renovation/desiltation etc. in this area have been affected by flood and waterlogging in (Table-2). 2008-2013. Out of 17 blocks, 3 blocks have been affected six times by flood and waterlogging. 6 Total number of 14 embankments proposed along blocks have been affected five times, again 6 blocks Ghaghra, Tehri, Mantawar, Sarju and Bishuhi River. have been affected four times and 8 blocks have been affected three times by flood and waterlogging Three embankments proposed on left side of since 2008 (Technical Report No- RSAC-UP: Ghaghra river as follows- SWRD:2014:01, 2013-14).  The length of Jabbar nagar-Paliya Chroutha Out of 1817 villages, 31 villages have been affected embankment is 9.0 km falling in Belsar and six times by flood and waterlogging in 2008-2013. 15 Tarabganj blocks. villages five times, 21 villages four times and 23  The length of Choukhariya-Sakipur villages three times have been affected by flood and waterlogging since 2008. embankment is 6.6 km falling in Nawabganj blocks. Integrated Development Plan for Improvement of  The length of Bangown-Dantnagar Congested Drainage, Wetland and Flood embankment is 3.8 km falling in Tarabganj and Mitigation Nawabganj blocks. Flood mitigation measures helps planners and decision makers for the protection of peoples, Four embankments proposed along Terhi river as agriculture land, industrial areas etc. The following follows- measures are adopted in Gonda district for integrated development plan:-  Jujharipur-Gohani embankment proposed on right side of river. The length of embankment is 1. Desiltation of ponds 15 km falling in Tarabganj block. 2. construction of embankments  Bhopatpur-Semra Sekhpur embankment 3. Afforestation proposed on right side of river. The length of 4. Renovation of existing / extinct ponds / waterbodies embankment is 12.2 km falling in Wazirganj, and 5. Construction of new drains Tarabganj blocks. 6. Desiltation of existing drains  Rampur Kharhata-Kanakpur embankment 7. Proposed route of conduit channel for flood proposed on left side of river. The length of mitigation embankment is 40 km falling in Wazirganj, 1. There are thirty three ponds proposed for Nawabganj and Tarabganj blocks. desiltation and increasing storage capacity of water  Katra Bhogchand-Wazirabad embankment (Table-1). proposed on left side of river. The length of embankment is 1.5 km falling in Nawabganj The comparison of waterbodies and drainage since block. 2006 to 2013 shows that there were about thirty six waterbodies present in 2006 but at present they are Four embankments proposed along Bishuhi river as either extinct or reduced in size. There are thirty follows- three drains present in 2006 but in 2013 they are chocked and reduced in carrying capacity of water  Kochwa-Kurasi embankment proposed on right (Figure-6). side of river. The length of embankment is 11.6 The observation reveals that Nawabganj, Babhanjot, km falling in Rupaidiha block. Chhapia, Tarabganj blocks in district get flooded due  Paharwa-Bankati Suryabal Sin embankment to low-lying topography. There were several ponds in proposed on right side of river. The length of 2006 but at present these ponds are in critical embankment is 10.3 km falling in Mujhana block. condition or almost dried up. There are five ponds

Page 95 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

 Pandri Savita-Kurasi embankment proposed on 5. The 7740 ha. area contains high moisture left side of river. The length of embankment is 11 content with marshy condition covering is suitable km falling in Rupaidiha block. for afforestation (Table-7).  Bagulhi-Jiiani Kalan embankment proposed on CONCLUSIONS left side of river. The length of embankment is 10.1km falling in Itiathok and Mujhana blocks. The present study illustrates that the flooding and waterlogging in Gonda district is due to drainage Two embankments proposed on left side of congestion, siltation of river and waterbodies. There Mantavar river as follows- were about thirty six waterbodies present in 2006 but at present they are either extinct or reduced in size.  The length of Mishrauliya Gosai-Ghunahi There are thirty three drains choked and silted which embankment is 9.6 km falling in Mankapur block. interrupted the flow of rain water. Therefore, it is  The length of Bairpur Ramnath-Mankapur mandatory to take action towards desiltaion and embankment is 9.8 km falling in Mankapur block. renovation of ponds, waterbodies and drains for overwhelming the problem of waterlogging and One embankment Rangi-Gokula proposed on left flood in the Gonda district. There are fourteen side of Mutaha Nala. The length of embankment is embankments proposed in these areas facing flood due to overflow of Ghaghra, Terhi, Bishuhi etc river. 5.4 km falling in Tarabganj and Nawabganj blocks. Thirty three ponds were suggested for desiltation. The above stated embankments are passing through Suitable areas were suggested for afforestation. Five 97 villages (Table-3). These embankments will be ponds were identified for renovation. Three new protecting 297 villages by flood. drains were proposed. A conduit channel has been proposed to save six villages from erosion. 2. The main cause of flood and waterlogging in the district is encroachment and siltation of drains. Thus the present study is an attempt to provide Drainage is the major source of conduct of the rain suitable measures for tackle the problem of flood and waterlogging in the Gonda district. By adopting water and waste water but due to siltation in the the compressive technique for flood mitigation and drainage they are choked and the surroundings area waterlogging an integrated action plan for the and settlements affected by flood during monsoon. district will be a milestone for saving lives and There are three drains proposed joining on Terhi livestocks. River, Barsot nala and Belai nala (Table-4). References 3. A number of thirty three places in Ghaghra, Terhi, Kunao, Sarju, Bishuhi, Mantnavar rivers and [1]. Agarwal AK, Shukla KK (2013). Flood inundation and Kumudwa, Mutha, Ghoghra and Bhagla Nala are river migration studies in Uttar Pradesh with special reference to flood mitigation measures along major rivers found choked and silted (Table- 5). These places in Devipatan and Gorakhpur mandal, Uttar Pradesh: require desiltation urgently. Technical report No- RSAC-UP: SWRD:2014:01, RSAC-UP 4. Six village of Belsar Block have been facing 2013-14: 7. erosion and flood problem because of steep [2]. Awal R(2003). Application of Steady and Unsteady meander of Terhi River. Conduit channel connecting Flow Model and GIS for Floodplain Analysis and Risk two loops are suitable for preventing erosion of river Mapping: A Case Study of Lakhandei River, . (M.Sc. to save villages (Table-6). Proposed flood and Thesis), Water Resources Engineering, IOE, Tribhuvan University, Kathmandu.Okamoto, waterlogged mitigation action plan of Gonda district. An integrated and comprehensive action plan for [3]. BapaluVenkata G, Sinha, R (2005) GIS in Flood Hazard flood mitigation and decongestion of drain and Mapping: a case study of Kosi River Basin, India, Conference Proceedings of Map Middle East, UAE waterbodies has been prepared (Figure-7). [4]. Census of India, http://www.census2011.co.in/census/district/gonda.html

Page 96 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

[5]. Ground Water Brochure of Gonda District, U.P., 2008- [14]. www.earthscienceindia.info pp:6 2009 [15]. Talwar, A. K. and Juneja, S., 2009. Flood Disaster [6]. http:\\india-wris.nrsc.gov.in Management. ISBN 978-81-311-0151-3, commonwealth publication: 219-221. [7]. http:\\rahat.up.nic.in/disaster_management.htm Author’s details [8]. Kumar A (2005) Application of GIS in Flood Hazard Management: An AlternativePlan for the Floods of North 1Researcher in MGCGV, Chitrakoot University Indian plain, Map India, New Delhi,2005 Email ID: [email protected], Contact No: +91- [9]. NDMA (2008) National Disaster Management 9795013310 Guidelines: Management of Floods 2Researcher, Department Of Geology, University Of [10]. Sanyal J, Xi XiLu (2005) Remote Sensing and GIS-Based Lucknow, Lucknow, India, Email ID: Flood Vulnerability Assessment of Human Settlements: A [email protected], Contact No: +91- Case study of Gangetic West Bengal, India, 8004288155

[11]. Hydrological, 2005 3Scientist-SE, PM-DMC & LIDAR, Remote Sensing Applications Centre-U.P., Lucknow, India, Email ID: [12]. Sharma P, Shukla KK( 2015) Integrated Drainage [email protected], Contact No: +91 Management Plan for Urban Flooding: A Case Study of 9335281198 Lucknow City, Uttar Pradesh, India, International Journal of Renewable Energy and Environmental Engineering ISSN Copy for Cite this Article- Karunesh Kumar Shukla, 2348-0157, Vol. 03, No.02. Purnima Sharma and A. K. Agarwal, “Integrated Action Plan

for Improvement of Drainage Congested Areas and [13]. Singh DS (2009) Rivers of Ganga Plain: Boon / Bane e- Mitigation of Flood and Waterlogged areas using Journal Earth Science India: Geoinformatics: a Case Study of Gonda District, Uttar Pradesh’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 152- 174. List of Figures

Figure 1: Flood affected areas in Uttar Pradesh as on 2013

Page 97 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Figure 2: Flood affected areas in Gonda district as on 2013

Figure 3: Relative height interval map of Gonda district extracted from CARTODEM data

Page 98 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Figure 4: Waterbodies and drainage in Gonda district as on 2013

Figure 5: Flood and waterlogged affected areas (2008-2013) along with drainage, waterbodies and wetlands in Gonda district

Page 99 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Figure 6: Change in waterbody and drainage map from 2006, 2008 and 2013 in Gonda district

Figure 7: Integrated action plan for improvements of drainage and waterbodies and mitigation of flood and waterlogged areas, Gonda district

Page 100 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

List of Tables

Table 1: List of Ponds identified for desiltation

S.No. Name Of Ponds Location Name Of Village Name Of Block

1 Tari Tal 82°0'21.375"E 27°15'29.027"N Tari Parsuian Pandri Kirpal

2 Suhela Tal 82°5'43.409"E 27°12'52.745"N Purey Subsukha Mujhana

3 Biras Tal 82°11'9.594"E 27°10'56.25"N Dudhav Mujhana

4 Unknown 81°51'50.871"E 27°18'28.304"N Kochwa Rupaidiha

5 Nan Tal 82°26'33.894"E 27°6'0.216"N Lahgaura BABHANJOT

6 Ghazi Belwa Tal 82°26'55.235"E 27°5'33.303"N Gazipur BABHANJOT

7 Parsa Tal 82°28'8.949"E 27°4'31.429"N Babhanjot BABHANJOT

8 Kohrauna Tal 82°28'13.478"E 27°4'30.652"N Bhaupur BABHANJOT

9 Unknown 82°25'55.378"E 27°5'8.543"N Bangawan BABHANJOT

10 Gura Tal 82°25'55.653"E 27°5'30.604"N Kolhuee Garib BABHANJOT

11 Unknown 82°31'22.122"E 27°3'17.636"N Maraila Khas BABHANJOT

12 Unknown 82°29'2.241"E 27°3'14.22"N Rasulpur Khan BABHANJOT

13 Kauria Tal 81°54'13.274"E 27°16'25.74"N Kouria RUPAIDIHA

14 Unknown 81°58'0.958"E 27°12'40.425"N Chaturbhuj Jot PANDRI KIRPAL

15 Unknown 81°58'37.007"E 27°13'8.371"N Mishrolia Kanoongo PANDRI KIRPAL

16 Unknown 81°59'44.675"E 27°12'41.472"N Subhagpur PANDRI KIRPAL

17 Khajua Tal 82°01'4.056"E 27°14'43.665"N Bahlopur ITIATHOK

18 Zira Bhari Tal 82°21'55.797"E 26°57'43.284"N Jira Bhari CHHAPIA

19 Unknown 82°23'6.377"E 26°56'44.085"N Navar CHHAPIA

20 Gandharwa Tal 82°26'11.549"E 26°56'48.223"N Gur Gaon CHHAPIA

21 Khakhari Tal 82°25'54.069"E 26°57'45.428"N Baria Deeh CHHAPIA

22 Unknown 82°27'33.014"E 26°58'14.731"N Charu CHHAPIA

23 Bahrela Tal 81°44'28.021"E 27°5'52.418"N Chakarout COLONELGANJ

24 Kukahi Tal 81°44'10.983"E 27°7'18.967"N Gonawan HALDHARMAU

25 Kathaila Tal 81°45'39.335"E 27°6'57.235"N Parasa Maheshi HALDHARMAU

26 Unknown 81°50'47.709"E 26°58'47.909"N Deharas PARASPUR

Page 101 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

27 Gadauti Tal 81°49'44.458"E 26°59'33.696"N Deharas PARASPUR

28 Jhingaira Tal 82°12'25.569"E 26°56'33.249"N Mohanpur NAWABGANJ

29 unknown 81°53'31.165"E 26°53'8.875"N Semari Khurd BELSAR

30 unknown 81°41'27.46"E 27°1'19.43"N Shahpur COLONELGANJ

31 unknown 81°41'27.46"E 27°1'19.43"N Rudauli COLONELGANJ

32 unknown 81°40'42.109"E 27°1'21.341"N Shahpur COLONELGANJ

33 unknown 81°40'14.993"E 27°2'0.263"N Tenganaha COLONELGANJ

Table 2: List of ponds demarcated for Renovation

S.No Village Name Block Name Location Name Of Pond . (If Any)

1 Pilkhawan PANDRI KIRPAL 81°59'51.376"E Barka Tal 27°11'44.79"N Chursiha

Pilkahi

Pandri Kripal

2 Choubeypur NAWABGANJ 82°11'10.43"E Unknown 26°53'14.445"N

3 Kolhampur Bishen NAWABGANJ 82°11'31.534"E Unknown 26°53'54.825"N Fidaipur

Harbanshpur

Table-3: List of proposed Embankments along Ghahgra, Bishuhi, Terhi rivers and their tributaries

S.N Name Of Name Of Name Of Block Location (Starting Point To Length o. Drains Village Downstream) (Km)

1 Bishuhi River Pandri Savita RUPAIDIHA 81°53'5.761"E 27°19'30.968"N 11.00 (Left) Kochwa

Beerpur Bhoj

Sisai Mafi

Anantpur

Page 102 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Purainia

Bhud Kudi

Gonria

Bhola Jot

Kurasi 81°58'24.172"E 27°18'40.749"N

2 Bishuhi River Kochwa RUPAIDIHA 81°53'1.014"E 27°19'13.863"N 11.60 (Right) Sisai Mafi

Mangal Nagar

Manohar Jot

Novagawan

Purainia

Rupai Deeh

Kurasi 81°58'36.325"E 27°18'22.843"N

3 Bishuhi River Paharwa MUJHANA 82°9'55.792"E 27°14'5.193"N 10.34 (Right) Purey Neval

Jaitapur

Dewari Klan

Duttnagar

Bankati Arjun Singh

Bankati 82°12'56.884"E 27°10'54.088"N Suryabal Sin

4 Bishuhi River Bagulhi ITIATHOK 82°10'30.392"E 27°14'2.21"N 10.09 (Left) Seer Bankat

Indra Parea MUJHANA

Jjjani Kalan 82°13'32.025"E 27°10'51.059"N

5 Mantnvar Mishrauliya MANKAPUR 82°13'31.177"E 27°5'0.613"N 9.59 River (Left) Gosai

Page 103 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Maheva Nankar

Bardahi

Kurva Jangli

Ghunahi 82°17'20.228"E 27°3'1.182"N

6 Mantnvar Baripur MANKAPUR 82°12'52.052"E 27°4'37.133"N 9.82 River (Left) Ramnath

Madhupur

Pachputi Jagtapur

Mirzapur Ramnath

Jaidava

Mankapur Rural

Bharahun

Dinkarpur

Mankapur (NP) 82°16'55.673"E 27°2'49.27"N

7 Terhi River Jujharipur TARABGANJ 82°2'21.976"E 26°56'59.689"N 14.94 (Right) Akbarpur

Rampur Tengraha

Singha Chanda

Gohani 82°2'8.128"E 26°54'46.145"N

8 Terhi River Rampur WAZIRGANJ 82°1'52.09"E 26°58'2.628"N 39.96 (Left) Kharhata

Dallapur

Naubasta

Ramcherapur

Majhara

Garsar

Durjanpur Ghat

Pipari

Page 104 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Ballipur

Son Barsa TARABGANJ

Singha Chanda

Rampur Tengraha

Akbarpur

Khargupur NAWABGANJ

Nagwa

Nawabganj

(MB)

Bishnoharpur

Raghunathpur

Mahgupur

Turkouli

Dullapur

Balpur

Kanakpur 82°12'16.468"E 26°50'26.176"N

9 Terhi River Bhopatpur WAZIRGANJ 82°1'52.241"E 26°55'5.937"N 12.23 (Right) Gohani TARABGANJ

Ranipur Pahari

Taktona

Puraini

Ghachabikapur

Semra NAWABGANJ 82°3'22.111"E 26°50'52.195"N Shekhpur

10 Ghaghra Jabbar Nager BELSAR 81°53'43.251"E 26°50'5.6"N 8.96 River (Left) Paraspatti TARABGANJ Majhwar

Bahadur Khas

Pras Patti Purwar

Page 105 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Karora

Paliya 81°58'29.705"E 26°50'19.149"N Charoutha

11 Ghaghra Choukhariya NAWABGANJ 82°0'40.721"E 26°49'23.994"N 6.61 River (Left) Tulsipur Majha

Sakipur 82°4'16.021"E 26°50'38.252"N

12 Mutaha Nala Rangi TARABGANJ 82°0'35.856"E 26°51'33.473"N 5.35 (Left) Maherampur

Nakhara NAWABGANJ

Indarpur

Pure Ambar

Gokula 82°3'18.961"E 26°50'10.226"N

13 Ghaghra Bangown TARABGANJ 81°58'59.351"E 26°50'33.292"N 3.81 River (Left) Dant Nagar NAWABGANJ 82°0'40.71"E 26°49'24.31"N

14 Terhi River Katra NAWABGANJ 82°12'16.223"E 26°50'26.82"N 1.52 (Left) Bhogchand

Wazirabad

Table 4: List of proposed drain (A, B and C) for Ghaghra, Terhi and Bishuhi Rivers respectively

S.N Name Of Name Of Name Of Block Location Length o. Drains Village (Km)

1 A Lakhanapur HALDHARMAU 81°42'54.726"E 27°8'20.222"N 10.27

Gaddaupur

Kadipur

Karuwa

Koncha Kasimpur

Gonawan

Parasa

Page 106 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Maheshi

Gursara

Bataura Lohangi

Katela Talab

Bansgaon

Parsa Godri 81°48'19.398"E 27°6'58.234"N

2 B Sindhouti BELSAR 81°53'23.498"E 26°52'21.173"N 0.82

81°53'35.947"E 26°51'58.029"N

3 C Konder WAZIRGANJ 82°06'2.082"E 26°56'29.496"N 0.67

Kadipur 82°06'7.706"E 26°56'10.221"N

Table 5: List of location and length of drains for disiltation

S.N Name Of Name Of Name Of Block Location (Starting Point To Length o. Drains Village Downstream) (Km)

1 Tributory of KURASI RUPAIDIHA 81°58'6.498"E 27°18'34.363"N 1.49 Bishuhi River CHAHUVA 81°57'45.998"E 27°17'52.047"N

2 Mantnvar River Benipur MANKAPUR 82°17'39.106"E 27°1'19.238"N 32.06

Asharfabad

Manipur Grint CHHAPIA

Basdevpur Grint

Gailan Grant NAWABGANJ

Lidehna Grant

Devinagar

Lidehna

Durjanpur

Ramgarh

Kaloni

Page 107 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Ganeshpur Wazirganj 82°10'48.423"E 27°0'37.209"N Grint

Veliya

3 Bishuhi River Amghati MANKAPUR 82°18'31.223"E 27°6'13.462"N 5.87

Radha Nagar 82°19'19.708"E 27°4'34.878"N

4 Bishuhi River Radha nagar MANKAPUR 82°19'26.082"E 27°4'33.079"N 1.73

Tamapar 82°19'42.25"E 27°3'51.732"N

5 Bishuhi River Lalpur MANKAPUR 82°20'36.089"E 27°4'3.715"N 2.19

Durgapur

Sumerpur 82°21'13.38"E 27°3'33.814"N

6 Bishuhi River Sumerpur MANKAPUR 82°21'29.863"E 27°3'26.356"N 0.52

7 Bishuhi River Sumerpur MANKAPUR 82°21'39.187"E 27°3'26.047"N 45.19

Kakarghata

Sabbon Jot BABHANJOT 82°35'4.145"E 26°59'29.961"N

Mokalpur

Keshau Nagar Grint

Dhari Ghat

Kuk Nagar

Grint

Singer Ghat

Hathini Khas CHHAPIA

Tejpur

Kathauva

Barsainian

Ghanshyampu r Grint

Gay Ghat

Lalganj Grint

Bagdar Grint

Page 108 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Laxmi Nagr Grint

Maharajganj

8 Kuano River Kuk Nagar BABHANJOT 82°36'0.658"E 27°0'28.171"N 1.40 Grint

9 Kuano River Kuk Nagar BABHANJOT 82°34'47.585"E 27°0'54.948"N 2.21 Grint

10 Kuano River Khorare BABHANJOT 82°34'18.786"E 27°1'47.895"N 6.65

Kuk Nagar 82°34'41.506"E 27°0'57.508"N Grint

11 Kuano River Bukaee Buzurg BABHANJOT 82°29'52.477"E 27°8'28.06"N 29.24

Chandradeep

Konar

Farenda Buzurg

Majha Khurd

Alauddinpur

Bajpur

Fandha

Baksaria Grint

Khorare 82°34'19.099"E 27°1'47.714"N

12 Kuano River Jagnnathpur BABHANJOT 82°29'3.332"E 27°9'41.793"N 7.18 Grint

Bayatal

Basti Khas

Bukaee Buzurg 82°29'52.781"E 27°8'28.113"N

13 Tributory of Duttnagar MUJHANA 82°10'59.697"E 27°13'13.479"N 5.56 Bishuhi River Dulhapur Bankat

Poore Gonaee 82°9'21.697"E 27°11'39.729"N

14 Bishuhi River Bhorha MUJHANA 82°13'47.891"E 27°9'56.345"N 22.42

Page 109 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Bankasiha Shiv Ratan MANKAPUR Agaya

Datauli

Uppadhaypur Grint

Amghati 82°18'1.08"E 27°5'56.05"N

15 Tributory of Kharouwa NAWABGANJ 82°14'16.779"E 26°52'19.058"N 5.89 Terhi River Atmadpur

Lolpur 82°14'54.468"E 26°49'58.292"N

16 Tributory of Turkouli NAWABGANJ 82°10'13.097"E 26°51'21.281"N 2.56 Terhi River Dullapur

Balpur

Durga Ganj 82°11'0.764"E 26°50'33.616"N

17 Kumudwa Nala Mukundpur BELSAR 81°50'16.521"E 26°55'10.568"N 8.92

Umari Bdgamganj

Semari Kalan

Bhikaripur Khurd

Sindhouti 81°51'49.759"E 26°51'48.094"N

18 Sarju Nadi Sindhouti BELSAR 81°51'50.835"E 26°51'48.748"N 9.0

Garhi

Jabbar Nager

Paraspatti TARABGANJ 81°53'40.956"E 26°49'33.508"N Majhwar

19 Tributory of Nawabganj NAWABGANJ 82°8'39.726"E 26°52'4.898"N 5.42 Terhi River (MB)

Nagwa

Dullapur

Page 110 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Etmadpur 82°10'2.699"E 26°50'23.337"N

20 Mutaha Nala+ Susela TARABGANJ 81°59'33.48"E 26°54'38.252"N 17.13 Ghoghra Nala Khanpur

Kindhura

Asartha

Khojanpur

Rangi

Gokula

Maherampur

Nakhara NAWABGANJ

Tulsipur Majha 82°3'14.006"E 26°49'29.363"N

21 Ghoghra Nala Pathar TARABGANJ 81°56'45.948"E 26°54'32.19"N 15.17

Khajuri

Retadl Singh

Sojhiya

Khanpur

Dhourhara Ghat

Kindhura

Ranipur Kaksi

Ghachabikapu

r

Asartha 82°0'12.885"E 26°52'30.877"N

22 Bhagla Nala Paraspatti TARABGANJ 81°54'5.278"E 26°50'33.747"N 19.71 Majhwar

Amouthi

Chiverha

Dhanoula

Gabhora

Bangown

Page 111 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Chandsuha

Rangi 82°1'3.287"E 26°50'43.305"N

23 Bhagla Nala Sindhouti BELSAR 81°53'19.376"E 26°51'56.77"N 4.05

Amdahi

Amouti TARABGANJ 81°54'50.382"E 26°50'58.789"N

Paraspatti Majhwar

24 Bhagla Nala Bangown TARABGANJ 81°57'57.862"E 26°49'49.551"N 7.62

Paliya Charoutha

Karora

Bahadur Khas

Veuda 81°59'43.23"E 26°48'45.396"N Uparhar

25 Ghaghra River Dant Nagar NAWABGANJ 81°59'45.553"E 26°47'40.362"N 0.63

26 Tributary of Choukhariya NAWABGANJ 82°4'50.439"E 26°50'58.34"N 4.62 Terhi River

Tulsipur Majha 82°3'24.67"E 26°49'28.784"N

27 Tributary of Choukhariya NAWABGANJ 82°4'32.161"E 26°50'46.791"N 5.17 Terhi River Tulsipur Majha

Semra Shekhpur

Indarpur

Nakhara 82°2'42.567"E 26°50'47.477"N

28 Unknown Konder WAZIRGANJ 82°6'34.732"E 26°56'56.615"N 2.89

Wazir Ganj 82°7'40.371"E 26°56'23.849"N

29 Terhi River Bhopatpur WAZIRGANJ 82°4'49.853"E 26°52'35.659"N 15.67

Persiya

Page 112 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Ashokpur

Bhatpurwa

Chandapur

Kadipur

Rupipur

Garsar

Akbarpur TARABGANJ 82°3'49.407"E 26°55'56.582"N

30 Terhi River Nawabganj NAWABGANJ 82°8'39.862"E 26°52'5.039"N 6.61 (MB)

Nawabganj Gird

Sirsa

Chakpan WAZIRGANJ 82°9'55.309"E 26°54'46.241"N

Hariharpur

Chandapur

31 Tributory of Dalel Nagar BELSAR 81°51'10.097"E 26°52'34.866"N 1.33 Sarju Nadi Bhikaripur 81°51'29.428"E 26°52'4.307"N

32 Ghaghra River Bahuvan PARASPUR 81°42'5.695"E 26°57'46.281"N 6.53 Madar Majha

33 Tributary of Katra COLONELGANJ 81°39'7.505"E 27°7'27.862"N 1.72 Sarju Nadi Shahbjpur

Narayanpur 81°39'27.248"E 27°8'15.926"N Majha

Table 6: List of villages for construction of conduit channel

S.N Name Of Name Of Name Of Length Of Location o. Village Block Drain Channel

1 Baghia Nihchal BELSAR Terhi River 3.98 Km 81°56'35.56"E 27°1'18.989"N

2 Nihalpur

3 Bhat Purwa

4 Bhat Purwa

Page 113 Karunesh Kumar Shukla et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

5 Durjanpur

6 Ranipur 81°57'16.049"E 26°59'21.856"N

Table 7: List of villages having suitable area for Afforestation (TOTAL AREA 7739.68 ha.)

S.No. Village Name Block Name

1 Naraianpur Grint MANKAPUR

2 Baksara Agyanram

3 Asharfabad

4 Amava

5 Ballipur

6 Manipur Grint CHHAPIA

7 Kathar

8 Gailan Grant NAWABGANJ

9 Sikandarpur

10 Janki Nagar

11 Lidehna Grant

12 Ramgarh Kaloni

13 Parsapur Thanwa

14 Hardwa

15 Ganeshpur Grint WAZIRGANJ

16 Chandha

17 Ramaipur

18 Veliya

Page 114 Abhishek Sachdeva et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Strength Evaluation of Cement Concrete Using Bottom Ash as a Partial Replacement of Fine Aggregates

1Abhishek Sachdeva, 2Gobind Khurana

Abstract

The natural sources of river sand are getting depleted gradually. Mining of sand also leads to various environmental hazards. The demand for the protection of the natural environment and the ban on mining in some areas is further aggravating the problem of availability of river sand. Bottom ash is a by-product of combustion of pulverized coal composed of mainly silica, alumina and iron with small amounts of calcium, magnesium sulphate, etc. The appearance and particle size distribution of coal bottom ash is similar to that of river sand. These properties of bottom ash make it attractive to be

used as fine aggregate in the production of concrete. This paper presents the experimental investigation carried out to study the effect of use of coal bottom ash as a partial replacement of fine aggregates in concrete. An experimental program is planned in which controlled concrete of grade M40 is prepared. Fine aggregate is partially replaced with coal bottom ash by 10%, 20%, 30% and 40% and the properties of concrete such as workability, compressive strength and flexural strength are evaluated. The test results of this research work indicate that coal bottom ash is a suitable material to be used as fine aggregates. Workability decreases with the increase in levels of sand

replacement by coal bottom ash in concrete. Both, the compressive strength and flexural strength were not strongly affected upto 20% replacement level. Therefore, 20% of fine aggregates may be replaced with coal bottom ash and a concrete with good strength may be produced with coal bottom ash in concrete.

Keywords: Coal bottom ash, compressive strength, flexural strength, concrete etc.

Introduction production of concrete. Natural resources are continuously being depleted worldwide, while Concrete is a material often used in the construction simultaneously the wastes thus generated from the of various civil engineering structures. Concrete has industry are substantially increasing. Sustainable two major components– cement paste and development for construction involves the use of aggregates. The cement paste consists of mixture of non-conventional and innovative materials as well as cement and possible pozzolonas along with water. the recycling of waste materials to compensate for The strength of concrete depends upon the strength the lack of natural resources and the discovery of of these components, their deformation properties, alternative methods of environment conservation. and the adhesion between the paste and aggregate The challenge for the civil engineering community in surface. Concrete is the most important engineering the near future is to realize projects in harmony with material and the addition of some other materials the concept of sustainable development and this may change the properties of concrete. Studies have involves the use of high performance materials and been carried out to investigate the possibility of products manufactured at reasonable cost with the utilizing a broad range of materials as partial lowest possible environmental impact. 1replacements for cement and aggregates in the The natural sources of river sand are getting depleted gradually. The demand for the protection of 1 Corresponding Author Email: [email protected] the natural environment and the ban on mining in

© 2015 Abhishek Sachdeva et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 115 Abhishek Sachdeva et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

some areas is further aggravating the problem of Sufficient quantity of the coarse aggregates, fine availability of river sand. At present, the construction aggregate and cement was collected from local industry is plagued with the scarcity of this essential market. The cement used in this study is Ordinary constituent material of concrete. Therefore, in the Portland cement (OPC 43 grade) of brand Shree present circumstances of scant sources of river sand ultra, specific gravity of which is 3.13. Coarse and boom in infrastructure development, it becomes aggregate of maximum size 20 mm is used and fine essential and more significant to find out its aggregate is confined to ZONE II. The specific gravity substitute material in concrete. and fineness modulus of coarse aggregates is 2.66 and 6.68 respectively and that of fine aggregate is Hence worldwide research work was focused to find 2.63 and 2.53 respectively. Coal bottom ash is alternative use of this waste material and its use in collected from Guru Gobind Singh Super Thermal concrete industry is one of the effective methods of Power Plant, Ropar, Punjab. The specific gravity of utilization. Increase in demand and decrease in coal bottom ash used in the study is 1.71. Super natural resource of fine aggregate for the production plasticizer used in this study is Glenium – 51 which is of concrete has resulted in the need of identifying a based on modified polycarboxylic ether. Glenium was new source of fine aggregate. The possibility of purchased from BASF INDIA LIMITED, Chandigarh. utilization of thermal power plant by-product bottom ash as replacement to fine aggregate in concrete is Methodology taken into consideration. An experimental program was planned in which Bottom ash is a by-product of combustion of controlled concrete of grade M40 is designed, casted pulverized coal. This coal bottom ash is physically and tested for compressive strength after 28-days of coarse, porous, glassy, granular, greyish and curing. SEM-EDS analysis was conducted on the incombustible materials that are collected from the bottom ash to study the morphology and chemical bottom of furnaces that burn coal. Lots of research composition. Five different mixes were prepared has been carried out for effective utilization of fly ash containing 0%, 10%, 20%, 30% and 40% bottom ash in construction industries due to its fine particles and as partial replacement of fine aggregates. These Pozzolonic properties. But little literature is available mixes were tested for compressive strength and on bottom ash utilization. Bottom ash being coarser flexural strength after 28-days of curing. Slump tests and less Pozzolonic than fly ash can be used as fine were conducted for the workability of concrete to aggregates in concrete by partial replacement of achieve 100 mm slump value by varying the dosage sand. Particles of bottom ash range from fine sand to of super plasticizer. Cubes of sizes 150 x 150 mm for fine gravel. Bottom ash is composed of mainly silica, compressive strength and beams of 500 mm x 100 alumina and iron with small amounts of calcium, mm x 100 mm for flexural strength were cast. All the magnesium sulphate, etc. The appearance and specimens were water cured and tested after 28 days particle size distribution of coal bottom ash is similar of curing. to that of river sand. These properties of bottom ash make it attractive to be used as fine aggregate in the Mixture Proportions production of concrete. The previous studies have The mixture proportions of various concrete mixes also reported promising results on the use of coal are given in Table - 1. Concrete Mix Design for M 40 bottom ash in partial or full replacement of river Grade of Concrete was done as per IS 10262:2009 sand in concrete. and IS 456:2000. Fine aggregates were partially Experimental Program replaced with coal bottom ash by mass in concrete. Fixed quantities of cement and coarse aggregate i.e., An experimental program was planned to investigate 415 kg/m3 and 1092.61 kg/m3 respectively were used the properties of concrete at fresh and hardened in the manufacturing of all the concrete samples. stage containing Coal bottom ash as a partial Water cement ratio was kept constant, i.e. 0.38 for all replacement of fine aggregate. the concrete samples.

Materials

Page 116 Abhishek Sachdeva et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Table -1: Detail of mix

Fine Bottom Mix Bottom Aggregates Ash Designation Ash (%) (kg/m3) (kg/m3)

MB0 0 782.27 0

MB1 10 704.043 78.227

MB2 20 625.816 156.454

MB3 30 547.589 234.681

MB4 40 469.362 312.908

Figure 1: Morphology of bottom ash Results and Discussions Energy-Dispersive X-Ray Spectroscopy (EDS) In the present work, coal bottom ash is used as a partial replacement of fine aggregates. SEM-EDS Energy-dispersive X-ray spectroscopy (EDS, EDX, analysis was carried out on the bottom ash to study or XEDS), sometimes called energy dispersive X-ray the morphology and chemical composition of the analysis (EDXA) or energy dispersive X-ray bottom ash used. Slump test was performed on microanalysis (EDXMA), is an analytical technique different mixes for the workability of concrete. used for the elemental analysis or chemical Strength evaluation has been done based on the characterization of a sample. EDS analysis was done compressive strength test and flexural strength test on the bottom ash and the chemical composition of for different concrete mix. The experimental set up bottom ash used in the study is described in Table – for various tests and their results are described 2 below. below: Table -2: Chemical Composition of Bottom Ash Scanning Electron Microscope (SEM) COMPOUND PERCENTAGE A scanning electron microscope (SEM) is a type SiO 35.13 of electron microscope that produces images of a 2 sample by scanning it with a focused beam Al2O3 25.63 of electrons. The electrons interact with atoms in the sample, producing various signals that can be MgO 0.54 detected and that contain information about the CaO 0.46 sample's surface topography and composition. The most common SEM mode is detection of secondary FeO 1.50 electrons emitted by atoms excited by the electron beam. By scanning the sample and collecting the K2O 0.58 secondary electrons with a special detector, an image displaying the topography of the surface is created. SEM analysis was conducted on the bottom ash. Workability Analysis reported the morphological characteristics of bottom ash by scanning electron micrograph in The workability of concrete mixtures was measured terms of the shape and surface characteristics of the by performing slump test. The fixed quantity of water particles. Figure 1 clearly shows that bottom ash was added in all the concrete mixes and the dosage particles were angular and irregular in shape and had of super plasticizer was varied in every mix to achieve rough surface. The porous structure of the particles 100 mm slump value. The test results show that of bottom ash may also be observed. slump values of bottom ash concrete mixtures decreased with the increase in levels of fine

Page 117 Abhishek Sachdeva et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

aggregate replacement by coal bottom ash. The Chart 2: Variation of slump for different concrete dosage of super plasticizer required for different mixes at 1.2 % dosage of super plasticizer concrete mixes to achieve 100 mm slump value and the variation of slump for different concrete mixes at 120 1.2 % dosage of super plasticizer is shown in Table -3 and Table -4 respectively. 100

Table 3: Required dosage of super plasticizer to 80 achieve 100 mm slump 60

Mix Designation Required dosage (%) 40 Slump Value (mm) MB0 1.2 20

MB1 1.3 0 MB0 MB1 MB2 MB3 MB4 MB2 1.5 Mix MB3 2.2

MB4 2.5 Compressive Strength

Compressive strength test was performed on standard cube of size 150 x 150 x 150 mm after 28 Chart 1: Required dosage of super plasticizer to days curing as per IS 516-1959. Specimens were achieve 100 mm slump taken out from curing tank at 28- days of water curing. Surface water was then allowed to drip down. Specimens were then tested on 200 tones capacity Compression Testing Machine. The compressive strength is calculated by dividing the maximum compressive load by the cross sectional area of the cube specimens. The results are shown in Table -5.

The compressive strength is calculated by the following formula:

fcu = Pc/A

Where,

fcu = compressive strength of specimen, N/mm2 Table 4: Variation of slump for different concrete Pc = Failure Load in compression, KN mixes at 1.2 % dosage of super plasticizer A = Loaded area of cube, mm2 Mix Designation Slump value (mm) Table 5: 28-days Compressive Strength Results MB0 105 Mix Designation Compressive strength 2 MB1 95 (N/mm )

MB2 80 MB0 47.92

MB3 40 MB1 47.45

MB4 25 MB2 46.52

Page 118 Abhishek Sachdeva et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

MB3 45.92 MB3 4.33

MB4 39.59 MB4 4.12

Chart 3: 28-days Compressive Strength results Chart 4: 28-days Flexural Strength results

60 5 4.5 50 4 40 3.5 3 30 2.5 (N/mm2)20 2 1.5 10 1 28 Days compressive strength 0 0.5 0 MB0MB1MB2MB3MB4 28 Days Flexural strength (N/mm2) MB0 MB1 MB2 MB3 MB4 Mix

Mix

Flexural Strength Conclusion Flexural strength test was performed on beam specimens according to IS 516:1959. Specimens The present experimental research work was carried were taken out from curing tank at 28- days of water out to evaluate the suitability of coal bottom ash as a curing. Surface water was then allowed to drip partial replacement of fine aggregates in concrete. down. Standard beams of size 500mm x 100mm x Experiments were conducted by replacing fine 100mm were subjected to two pints loading till aggregates with coal bottom ash in varying failure of specimen. It was performed after 28 days percentages in concrete. Test results indicate that of curing on a flexural testing machine. The results coal bottom ash is a suitable material to be used as of Flexural strength test are given in Table ‐6. fine aggregates. Based on the analysis of test results and discussion following conclusions can be drawn: The Flexural Strength is given by,  Morphology of the coal bottom ash shows R = irregular and a complicated texture of particles having rough surface resulting in the increase of inter R= Modulus of Rupture or flexural strength (N/mm2) particle friction, thus decreasing workability.  Workability decreases with the increase in levels P=Maximum applied load (N) of sand replacement by coal bottom ash because bottom ash is more porous; therefore absorb more L= effective span between the supports (mm) water than sand.  b=width of the beam specimen (mm) A marginal decrease was observed, both in the compressive strength and flexural strength upto 20% Table 6: 28-days Flexural Strength Results replacement level. Therefore, 20% of fine aggregates may be replaced with coal bottom ash and a 2 Mix Designation Flexural strength (N/mm ) concrete with good strength may be produced with coal bottom ash in concrete. MB0 4.63  A decrease in strength of concrete with the MB1 4.62 increase in levels of fine aggregate replacement by coal bottom ash is due to the replacement of the MB2 4.58 stronger material with the weaker material.

Page 119 Abhishek Sachdeva et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Acknowledgements with different W/C Ratio. International Journal of Advanced Technology in Civil Engineering, 2 (1), 45-50. I express my deep gratitude to Dr. Sanjeev Naval, Associate Professor and Head, Civil Engineering Department, DAV [5]. Singh, M. Siddique, R. (2014). Strength properties and Institute of Engineering and Technology, Jalandhar, for micro-structural properties of concrete containing coal providing me stimulating guidance, continuous bottom ash as partial replacement of fine aggregate. encouragement and support throughout the research Construction and Building Materials, ELSEVIER, 50, 246- work. On a personal note, I would like to thank my wife 256. Rajdeep, my family and friends who have always supported and encouraged me a lot. [6]. Soman, K. Sasi, D. Abubaker, K.A. (2014). Strength properties of concrete with partial replacement of sand by References bottom ash. International Journal of Innovative Research in Advanced Engineering, 1 (7), 223-227. [1]. Aggarwal, P. Aggarwal, Y. Gupta, S.M. (2007). Effect of Bottom Ash as Replacement of Fine Aggregates in [7]. Kadam, M.P. Patil, Y.D. (2014). The Effect of sieved Coal Concrete. Asian Journal of Civil Engineering (Building and Bottom Ash as a Sand Substitute on the Properties of Housing), 8 (1), 49-62. Concrete with Percentage Variation in Cement. American Journal of Civil Engineering and Architecture, 2 (5), 160- [2]. Sani, M. Muftah, F. Muda, Z. (2010). The Properties of 166. Special Concrete Using Washed Bottom Ash (WBA) as Partial Sand Replacement. International Journal of Author’s details Sustainable Construction Engineering & Technology, 1 (2), 1 65-76. Student, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India, Email: [3]. Arumugam, K. Ilangovan, R. James, D. (2011). A study [email protected] on characterization and use of Pond Ash as fine aggregate 2 in Concrete. International Journal of Civil and Structural Assistant Professor, DAV Institute of Engineering and Engineering, 2(2), 466-474. Technology, Jalandhar, Punjab, India, Email: [email protected] [4]. Kadam, M.P. Patil, Y.D. (2013). Effect of Coal Bottom Ash as Sand Replacement on the Properties of Concrete

Copy for Cite this Article- Abhishek Sachdeva and Gobind Khurana, “Strength Evaluation of Cement Concrete Using Bottom Ash as a Partial Replacement of Fine Aggregates’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 189- 194.

Submit your manuscript to International Journal of Science, Engineering and Technology and benefit from:

 Convenient Online Submissions

 Rigorous Peer Review

 Open Access: Articles Freely Available Online

 High Visibility Within The Field

 Inclusion in Academia, Google Scholar and Cite Factor.

Page 120 Ankita Sharma et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal Data Transmission and Reception Using Text Steganography with Error Detection

1Ankita Sharma, 2Anjana Sangwan

Abstract

In the research area of text steganography and cryptography, most dominant part was the key used for the hiding, encrypting and placing a data into another data is very crucial, also it is important that an algorithm should not have any limitations regarding the bits size of the secret data, case sensitivity or it

should not be language bounded. Approach implemented in this paper suggests the use of text information and cover text to be combined and formed in such a way that it can be used or transformed into any other format including images, audio or into any other multimedia file. Along with the format transformation hiding the encryption key is another important feature of this approach, as the key used for encrypting and hiding data into another data is combined with the transmitted data that it should not be visible from the outside and should not represent any separate data as such.

Keywords: Steganography, cryptography and encryption.

Introduction categorized into audio, image, text and video steganography. Text steganography can contain Cryptography is a technique of keeping and trans- whatever from varying the formatting of present text, mitting data in a specific format so that only the to altering words within a sentence, to producing intended user can read and practice it. The term is arbitrary character arrangements or using context- most often associated with scrambling plaintext into free grammars to produce readable message [7]. cipher text (encryption), then back again (known as Text steganography is assumed to be the decryption).The limitations of then cryptography complicated due to shortage of redundant info overcome by the Steganography, is the hiding of a which is present in text, image, audio or a video file. secret message within an ordinary message and the The construction of text data is alike with which is to extraction of it at its destination. be observed, whereas in additional categories of documents such as in image, the construction of Steganography raised significance as the US and the document is dissimilar from with which is to be British government, after the advent of 9/11, the use observed. Negligible changes can be done to a of cryptography was banned and publication sector picture or an audio, video file, but in text files, even needed to cover copyright marks [6]. In an extra letter or punctuation can be noticeable by a steganography, the data to be covered is called reader [9]. Storage of text file requires less memory embedded text. A harmless medium, such as audio, space and its faster as well as easier communication text, image or video file; which is to be used for marks it desirable to other types of steganographic hiding embedded message is called cover data. The approaches [10]. Text steganography can be key which is optional, used in inserting procedure is generally categorized into three types: Format based called as stego-key. A stego-key is used for Random and Statistical generation and Linguistic controlling the concealing procedure so as to limit methods. discovery and/or retrieval of inserted data to the users who know the process [1]. The stego object is Previous Work an entity i.e. known after concealing the embedded message in a cover media. 1Steganography can be In this sub-section, we present some of the popular approaches of text steganography.

1Corresponding Author Email: [email protected] Line Shift

© 2015 Ankita Sharma et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 121 Ankita Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

In this method, secret data is concealed by shifting afterward a word denotes bit 0 and two spaces the text lines vertically to some degree [10, 11]. A line afterward a word denotes bit 1. But, uneven use of noticeable has two unnoticeable control lines one on white space is not transparent [9]. either sideways of it for spotting the direction of movement of the noticeable line [12]. To conceal a Spam Text bit 0, upwards the line is shifted and to conceal bit 1, To cover bits HTML and XML files can be used also. If downwards the line is shifted [13]. Determination of there are several opening and closing tags, bit 0 is where the line has been moved up or down is considered and if for starting and closing only tag is completed by determining the distance of the used, then bit 1 is considered [13]. In alternative centroid of noticeable line and its control lines [12]. method, bit 0 is denoted by a lack of space in a tag The hidden data would get damaged if the word is and bit 1 is denoted by placing a space inside a tag typed another time or if a (OCR) Character [13]. Recognition Program is used [10]. SMS-Texting Word Shift SMS-Texting language is a grouping of shortened In this method, secret text is secreted by horizontally terms used in SMS [8]. Using full form of name or its shifting the words, i.e. right or left to symbolize bit 1 abridged form binary data can be concealed. To or 0 respectively [13]. Words shift are identified using store words and their respective shortened forms a correlation process that considers a profile as Codebook is made. Full form of the word is used to waveform and agrees whether it initiated from a hide bit 0, and abbreviated form of word is used to waveform whose center slab has been moved left or hide bit 1 [8]. right [12]. This technique can be recognized less, because variation of distance between words to fill a Feature Coding statement is very common [10, 11]. But if somebody identifies the procedure of distances, the person can In feature coding technique, the secret text is hidden compare or match the stego text with the algorithm by altering one or more characters of the text. All the and find the secreted content by the difference. Also, features which can be used to conceal the retyping or using OCR sequencers abolishes the information are surveyed and picked up by a parser concealed data [10, 11]. in a text file [13]. Just like, points in letters ‘i’ and ‘j’ can be placed otherwise, length of strike can be Syntactic Method altered in letters f and t, or by lengthening or shortening the height of letters ‘b’, ‘d’, ‘h’, etc. [6, 14]. This method uses marks of punctuation such as There is an error in this process which is, if an OCR comma (,), full stop (.), etc. to hide bits 1 and 0. But package is used or if re-writing has been done, the problematic area with this technique is that it needs concealed message would get damaged. identification of right places to insert marks of punctuation [10, 11]. Hence, care must be done in SSCE (Secret Steganographic Code For applying this technique as person who reads can Embedding) notify incorrect placement of punctuations [9]. This method first ciphers a data using Secret White Steg Steganographic Code for Embedding table and then encapsulates the encrypted text in a face file by This method uses white spaces for concealing a putting articles a or an with the non-precise nouns in secret data. There are three means of hiding English language using a definite mapping system information by using white spaces. In Inter Sentence [15]. The embedding positions are ciphered using Spacing, insertion a single space to cover bit 0 and the similar SSCE table and set aside in other file two spaces to conceal bit 1 at the end of individually which is transmitted to the recipient with the stego terminating character [9]. In End of Line (EOL) at the file surely. last of every line spaces, insertion of fixed number of spaces is done. Just like, two spaces to convert one Word Mapping bit per line, four spaces to convert two bits and go on. In Inter Word Spacing method, one space

Page 122 Ankita Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

In this method a secret message is ciphered using language, frequency of letters (alphabets) in English inherited operative crossover and then inserts the dictionary is used as the base of allocating numbers resultant cipher text, using two bits at a time, in a to the alphabets in the English language. mask file by putting blank spaces in between words of even or odd length by means of some mapping Frequency of letters varies in between the specified method [16]. The embedding positions are stored in length. No perception is made for allocating coding some another file and sent to the recipient along number to consonants and vowels. with the stego entity. Each letter in the English alphabet is given a number MS Word Document in between the range of 0 to 15 [20].

In this method, text sections in a article are Proposed Work deteriorated, imitating to be the work of an writer This research paper emphasize on hiding data and with substandard writing skills, with confidential text key in a single and non-separable matrix. Data is first being concealed in the choice of deteriorations scrambled with the randomly generated data and which are then reviewed with modifications being then further processed. traced [17]. Data inserting is concealed such that the stego article seems to be the product of combined Data embedding and transmission steps writing [17]. Step 1: Data input. Cricket Match Scorecard Step 2: Display the entered data. In this technique, data is concealed in a cricket match record by earlier appending a useless zero previous Step 3: Data converted into Machine code. to a number to symbolize bit 1 and parting the number as it is to signify bit 0 [18]. Step 4: Size and Length calculated.

CSS (Cascading Style Sheet) Step 5: Store the size of the entered data into variables. This method scrambles a data using RSA public key cryptosystem and secret message text is then fixed in Step 6: Range determination of the entered data for a Cascading Style Sheet (CSS) by using End of Line the creating the envelope data. on each CSS style properties, closely after a (;) Step 7: Store the range of the secret data. semicolon. A space afterward a semicolon inserts bit 0 and a double space afterward a semicolon inserts Step 8: Envelope generation algorithm started. bit 1 [19]. Step 9: Envelope created with range similar to secret Related Work data.

Some of the exceptional characteristics, inflexion, Step 10: Data embedding algorithm started, data is static word order and usage of periphrases, of dived into sections and then it is placed along with language i.e. English language are used for the text the envelope data and in between of the envelope steganography technique. The meaning of the word data to create a new matrix which includes secret inflexion is that it can point out the connection of the data in a scrambled form along with random data. words into a sentence by minimum changing of shape. In static order, each word’s place in a Step 11: Determine and store the range and the size sentence decides its connection with the others. of the newly formed encapsulated data from Step 10. Periphrases are small phrases and can be stated as the different means to express something. Step 12: A new random matrix is generated by using the size and the range values obtained in Step 11. A specific code called Vedic Numerical Code used in decoding and deciphering Sanskrit text is described. Step 13: Random number selection algorithm started The coding depends on the tongue position. To based on the number of elements present in the data apply the Vedic code to the alphabet of English and the envelope encapsulated matrix.

Page 123 Ankita Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Step 14: Operations performed with the scalar quantity obtained from Step 13 on the encapsulated matrix obtained from Step 10.

Figure 2: Data Receiving and Extraction

Step 23: Secret data is now been fetched by the extractor by applying the reverse algorithm of the procedure followed at the transmitter end in Step 10.

Step 24: Data extracted and ready for the display. Figure 1: Data Embedding and transmission Results Step 15: Now the matrices are converted into multimedia format, the two matrices random matrix Step 1: Firstly, taking the secret text as an input and the encapsulated matrix will coincide with each which is to be steganographied further by applying other to form a different matrix so that it can be encoding algorithm. converted into any form of multimedia file.

Step 16: Now, there will further complex functions to be implemented on the multimedia file generated from step 15.

Step 17: Data transmission started.

Data receiving and extracting steps: Figure 3(a): Taking Secret Text as an Input.

Step 18: Data received. Step 2: The steganographied secret data is further transmitted from transmission end to receiving end. Step 19: Data extraction started.

Step 20: Level 1 extraction performs the reverse of the operations performed in the Step 16.

Step 21: Level 2 extraction performs the separation of the two matrices which formed the multimedia image in Step 15.

Step 22: Step 13 is again followed at the receiver Figure 3(b): Data Transmission. end.

Page 124 Ankita Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Step 3: The transmitted data is now received at The system used for the simulation has the following receiver side and extraction of secret data is configurations: Processor Intel(R) Core(TM)2 Duo performed by applying decoding algorithm and CPU T6570 @ 2.10GHz, 2101 MHz, 2 Core(s), 2 output is received. Logical Processor(s), OS Name: Microsoft Windows 7 Ultimate, Version: 6.1.7601 Service Pack 1 Build 7601, Installed Physical Memory (RAM): 3.00 GB.

This code has been tested over the latest available MATLAB software with us i.e. MATLAB 2012b. The

omission of the public and private key makes this Figure 3(c): Extracted output at receiver end. system more secure, also the use of random functions makes it more reliable and complex as far This is how the work is done by encapsulating the as security is concerned. secret data by applying the suitable algorithms and complex operations at the transmission end. Similarly Conclusion the extraction performed at the receiver end by using the decoding algorithms. The data is extracted in the From the above obtained results and the compiled same format as it was entered as an input. code it can be concluded that the text steganography is an essential factor in transmitting Table 1: The comparative table of the parameters of important text information to another end. From the papers studied with the proposed methodology code complied in this thesis and the result studied in the previous work, it can be concluded that to send Parameters Ours Paper 1[21] Paper 2[20] the data over a channel by scrambling and transforming it into different outlook there will also Length Unlimited Unlimited but Limited needs to be be a key required to decode it back to its original reduced form, in this thesis this drawback has been removed up to a certain extent by combining the data and the key in a single matrix. Language No Yes Yes, Indian Bounded Root The key generated in this model is random process and cannot be controlled by any individual or by any Database Not Required Required system or any algorithm. The above formed matrix Requirement Required can be transmitted in the form of a sound signal to Words No Yes Yes confuse or to create a huss at the unauthorized end Dependency which is not intended to decode the received data.

Format Possible Not Specified Not Also the transmitted data can be converted into any Transformati Specified other format without affecting its original format and on without adding any new key to it.

Time 10ms 27ms Not Future Scope: The above designed algorithm can Specified further be developed or improved by finding the method to depict the exact location of the disturbed Accuracy 99.98% Not Specified Not Specified elements of the transmitted data by calculating its determinant, which needs to be zero if there is no Error Yes Not Not error present in the received matrix. Resistive applicable applicable References

[1] F. A. P. Petitcolas, R.J. Anderson, and M. G. Kuhn, The results shown in this paper are based on the “Information hiding- a survey,” In Proceedings of IEEE, simulation done over the MATLAB. MATLAB runs the vol.87, pp. 1062-1078, 1999. code for approximately 10 milliseconds and [2] L. Y. Por, and B. Delina, “Information hiding- a new generated the above presented results. approach in text steganography,” 7th WSEAS Int. Conf. on

Page 125 Ankita Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Applied Computer and Applied Computational Science, [14] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O. 2008, pp. 689-695. Gorman, “Electronic marking and identification techniques to discourage document copying,” IEEE Journal on Selected [3] L. Y. Por, T. F. Ang, and B. Delina, “WhiteSteg- a new Areas in Communication, vol.1, pp. 1495-1504, 1995. scheme in information hiding using text steganography,” WSEAS Transactions on Computers, vol.7, no.6, pp. 735- [15] I. Banerjee, S. Bhattacharyya, and G. Sanyal, “Novel text 745, 2008. steganography through special code generation,” Int. Conf. on Systemics, Cybernetics and Informatics, pp. 298-303, [4] S. Changder, D. Ghosh, and N. C. Debnath, “Linguistic 2011. approach for text steganography through Indian text”, 2010 2nd Int. Conf. on Computer Technology and [16] S. Bhattacharyya, I. Banerjee, and G. Sanyal, “A novel Development, pp. 318-322, 2010. approach of secure text based steganography model using word mapping method,” Int. Journal of Computer and [5] R.J. Anderson, and F. A. P. Petitcolas, “On the limits of Information Engineering, vol.4, pp. 96-103, 2010. steganography”, IEEE Journal of Selected Areas in Communication, vol.16, pp. 474-481, 1998. [17] T. Y. Liu, and W. H. Tsai, “A new steganographic method for data hiding in Microsoft word documents by a [6] K. Rabah, “Steganography-the art of hiding data”, change tracking technique,” IEEE Transactions on Information Technology Journal, vol.3, pp. 245-269, 2004. Information Forensics and Security, vol.2, no.1, pp. 24-30, 2007. [7] K. Benett, “Linguistic steganography- survey, analysis and robustness concerns for hiding information in text”, [18] M. Khairullah, “A novel text steganography system in Purdue University, CERIAS Tech. Report 2004-13, 2004. cricket match scorecard”, Int. Journal of Computer Applications, vol.21, pp. 43-47, 2011. [8] M. S. Shahreza, and M. H. S. Shahreza, “Text steganography in SMS”, 2007 Int. Conf. on Convergence [19] H. Kabetta, B. Y. Dwiandiyanta, and Suyoto, Information Technology, 2007, pp. 2260-2265. “Information hiding in CSS: a secure scheme text steganography using public key cryptosystem,” Int. Journal [9] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, on Cryptography and Information Security, vol.1, pp. 13-22, “Techniques for data hiding”, IBM Systems Journal, vol.35, 2011. pp. 313- 336, 1996. [20] Souvik Roya, P.Venkateswaran, “A Text based [10] M. H. S. Shahreza, and M. S. Shahreza, ”A new Steganography Technique with Indian Root”, International approach to Persian/Arabic text steganography”, In Conference on Computational Intelligence: Modeling Proceedings of 5th IEEE/ACIS Int. Conf. on Computer and Techniques and Applications (CIMTA), vol. Procedia Information Science and 1st IEEE/ACIS Int. Workshop on Technology 10, pp. 167 – 171, 2013. Component-Based Software Engineering, Software Architecture and Reuse, 2006, pp. 310-315. [21] Shivani, Virendra Kumar Yadav, Saumya Batham, “A Novel Approach of Bulk Data Hiding using Text [11] M. H. S. Shahreza, and M. S. Shahreza, ”A new Steganography”, 3rd International Conference on Recent synonym text steganography,” Int. Conf. on Intelligent Trends in Computing (ICRTC), vol. Procedia Computer Information Hiding and Multimedia Signal Processing, pp. Science 57, pp. 1401 – 1410, 2015. 1524-1526, 2006. Author’s details [12] S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O. Gorman, “Document marking and identification using both 1M.Tech Scholar, Computer Science Engineering, Swami line and word shifting,” INFOCOM’95 Proceedings of the Keshvanand Institute of Technology, Rajasthan, India, Fourteenth Annual Joint Conf. of the IEEE Computer and [email protected] Communication Societies, pp. 853-860, 1995. 2Senior Lecturer, Computer Science Engineering, Swami [13] J. Cummins, P. Diskin, S. Lau, and R. Parlett, Keshvanand Institute of Technology, Rajasthan, India, “Steganography and digital watermarking,” School of [email protected] Computer Science, pp.1-24, 2004.

Copy for Cite this Article- Ankit Sharma and Anjana Sangwan, “Data Transmission and Reception Using Text Steganography with Error Detection’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 195- 200.

Page 126 Ashish Sharma et al. 2015, Volume 3 Issue 6 International Journal of Science, ISSN (Online): 2348-4098 Engineering and Technology ISSN (Print): 2395-4752 An Open Access Journal A Geographical Study of Keoladeo National Park, Bharatpur (Rajasthan) with Using Remote Sensing and GIS

Ashish Sharma

Abstract

Keoladeo National Park (KNP) (27º7’6”N – 27º 12’2”N and 77º 29’5” E – 77º 33’9”E)is a 29 km sq. area situated on the extreme western edge of the Gangetic basin thatwas once confluence of Rivers

Gambhir and Banganga in Bharatpur district in theState of Rajasthan.It is a wet land .Wetlands play a vital role in the ecosystem by creating unique biodiversity which is of ecological and environmental significance. Wetlands play vital functions for humans such as water storage, flood mitigation,storm

protection, ground water recharge & discharge, erosion control and also provides many services and commodities to humanity. Knowledge of changes in wetlands is a very important issue for natural resource management. Wetlands of India,( estimated to be 58.2 million hectares) are

important repositories of biodiversity. Therefore, Monitoring and Conservation of Wetlands is very important. The present study aims at changing environment of Keoladeo National Park with use of Remote Sensing and GIS. It has been also observed that most of the villagers in the nearby area are much more aware about the conservation of biodiversity, importance of the Keoladeo National Park in terms of biodiversity conservation, its charisma for migratory birds, and specially the importance of the world heritage site tag. The study demonstrates the integration of satellite remote sensing and GIS was an effective approach for analyzing the direction, rate, and spatial pattern of land use changes. Integration of these two technologies was found to be more beneficial in describing and analyzing land use change process.

Key Words: Ecosystem, Keoladeo National Park, Biodiversity Conservation, Land Use Changes.

Introduction species. The fauna includes more than 350 species of birds which include 42 species of raptors and 9 Keoladeo National Park (KNP) (27º7’6”N – 27º 12’2”N species of owls, 27 species of mammals, 13 species and 77º 29’5” E – 77º 33’9”E)is a 29 km sq. area of reptiles, 7 species of amphibians, 58 species of situated on the extreme western edge of the fishes and 71 species of butterflies, more than 30 Gangetic basin that was once confluence of Rivers species of dragonflies and more than 30 species of Gambhir and Banganga in Bharatpur district in the spiders inhabit the park. Owing to the abundance of State of Rajasthan. KNP has a unique mosaic of the birds, KNP is often referred as ‘Birders Paradise’. habitats that include wetlands, woodlands, scrub forests, grasslands that supports an amazing diversity of both plant and animal species. 1Keoladeo National Park’s flora consists of over 375 species of angiosperms of which 90 species are wetland

1Corresponding Author Email: [email protected]

© 2015 Ashish Sharma et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. Page 127 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

structure of this system are still valid today. A number of more recent landuse / landcover mapping units follow these basic concepts although their units may be more detailed or more specialized, and they may be based on more recent Remote Sensing Systems data Source. They still follow the basic structure originally set by the USGS.

Land use/land cover information should be presented on separate maps and not intermixed as in the USUIS classification system. From a practical standpoint, however, it is offer most efficient to mix the two systems when remote sensing data from the Figure 1: Location of Keoladeo National Park, principal data source for such mapping activities. Rajasthan Which land cover information can be directly interpreted from appropriate remote sensing Acknowledge of land use/land cover is important for images? Information about human activity on the many planning and management activities and is land (Land use) cannot always be inferred directly considered as essential element for modeling and from land cover? As an Example, extensive understanding the earth as a system. Land cover recreational activates covering large tract of land are maps are presently being development from local to not particularly amenable to interpretation from National to global scale. The use of panchromatic, aerial photographs or satellite images. For instance, medium scale aerial Photography to map land use is a common and pervasive recreations use occurring has been as accepted practice since the 1940s. More on land that would classified as some type of forest, recently, small scale photographs and satellite range, and wetland or agriculture land during either images have been utilized for land use and land a ground survey or Image interpretation. These cover mapping. addition information sources are needed to supplement the land cover data. Supplemental The term landcover relates to the types of feature information is also necessary for determining the use presents on the surface of the earth. Fields, lake, of such land as parks, commercial building, or water trees and concrete highway are all example of conservation districts that may have land use landcover types. The term landuse relates of human coincident with administrative boundaries not usually activity or economic function associate with a specific identifiable on Remote Sensor Images. Recognizing piece of Land. For an Example, a piece of land on that some information cannot be derived from the fringe of an urban area may be used for single- Remote Sensing Data, the USGS system is based on family housing, depending on the level of mapping Categories that can be seasonably interpreted from details. Its land use could be described as urban use, aerial or Space Imagery. or single-family residential use. The same tract of land would have a land cover consisting of roots, Agro climatic zonal planning has been initiated by pavement, grass and trees. the Planning Commission of Government of India to maximize agricultural and allied production in the It would be important to know that use of this land is country with optimum management of soil, land, for single-family development. For a hydrologic water and plant resources. One of the primary study of rainfall – runoff characteristic, it would be requirements for this is land use information in important to know the amount and the distribution standard terms of categories and classes, their aerial of Roofs, pavement, grass and trees in the tract. This extent and spatial distribution. Owing to knowledge of both landuse and landcover can be requirements of urgency and reliability, district-wise important for land planning and management land use mapping has been taken up with remote activities. sensing technique for all the 15 agro-climatic zones The USGS devised a landuse /landcover classification of the country under the Department of Space, system for use with remote sensing data in the mid Government of India. 1970s (Anderson et al, 1976). The basic concept and

Page 128 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

The land use map of part of KEOLADEO NATIONAL object without physically contacting it in any way PARK, BHATATPUR (RAJASTHAN) has been regardless of whether the observer is immediately generated at Department of Geography, University of adjacent to the object or millions of miles away it is Rajasthan. Digital techniques of remote sensing further required that such sensing may be achieved were followed in interpretation of Rabi season data in the absence of any matter in the intervening space and it’s aggregation to develop a map showing between the object and the observer. Consequently, complete picture of land use in the study area. Major the categories include built-up land, agriculture land, forest, waste land and water bodies were interpreted. At present, CARTOSAT 1&2 data is currently used for better image interpretation because it provides high Objective resolution both in mono and stereo mode. The resolution of CARTOSAT-2 is 80 cm. It is The objective of the present study is to map the approximately similar to IKONOS(1meter), landuse/ landcover pattern of KEOLADEO NATIONAL Quickbird(60cm) and Geoeye(41cm) satellite sensor PARK, BHATATPUR (RAJASTHAN) with the help of resolution. Erdas 9.1 for image georeferencing and ArcGIS 9.2 for onscreen digitization in Shape file along with Geographical Information System (GIS) statistical analysis of LU/LC categories. GIS is a decision support computer based system for Remote Sensing collecting, storing, presenting and analysis of geographic data. This system uses spatially Remote sensing is the science and art of obtaining referenced database and giving users the capability information about as object, area or phenomenon to control quires over space, and usually through through as analysis of the data acquired by a device time. GIS is much more advanced than Computer which is not in contact with object, area or Aided Design (CAD) or any other spatial data system. phenomenon under investigation. In the present The basic output of GIS or spatial data analysis context, information about the object area or any system is a map. The need to analysis maps to phenomenon must be available in a form that can be compare and contrast pattern of earth related impressed on a carrier vacuum. The information phenomena, is confirmed by the long standing carrier, or communication link, is electromagnetic tradition of doing so with traditional maps. energy. Remote Sensing Data basically consists of wavelength intensity information acquired by Many geographical phenomena are best described collecting the electromagnetic radiation leaving the scientifically as field survey. Good example is object at specific wavelength and measuring its topographic elevation, air temperature, and soil intensity. moisture content. A two dimensional field may be defined as any single valued function of location in a Remote Sensing of earth’s environment comprise two dimensional space and discrete field, with measuring and recording of electromagnetic energy nominal dependent variables. It appears that any reflects from or emitted by the planets surface and geographical phenomena can be represented either atmosphere from a vantage point above the surface, as a field or as a collection of digital object. and relating of such measurements to the nature and distribution of surface materials and atmospheric Creation of Shape File condition. Sensor mounted on aircraft or satellite platforms measure the amounts of energy reflected It is a tool for data storage in the form of shape file from or emitted by the earth’s surface. These (.shp) measurement are made at a large number of points It has many tools for storage the data such as. distributed either along a one dimensional profile on the ground below the platform or over a two- 1 point dimensional area on either side of the ground track platform. 2 polyline

The definition of Remote Sensing is restricted to 3 polygon mean the process of acquiring information about any 4 multipatch

Page 129 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

5 multipoint

HOW TO CREATE SHAPE FILE IN ARC MAP 9.2 SOFTWARE (STEPS):-

1. First open Arc map and double click on Arc catalog on main menu bar.

2. Select a desired folder, right click on there, select a new shape file and feature types.

3. Feature type may be point, polyline, polygon, multipatch, multipoint.

Arc Map

1. Click the start button on the Window taskbar.

2. Point to Programs.

3. Point to Arc GIS.

4. Click Arc Map.

Arc Map Basic General Used Tools and Menu

[a] Menu Study Area

Location & Introduction of study area KEOLADEO national park is situated between (27°7’06” N – 27°12’02” N latitude and 77°29’05’ E – 77°33’09” E longitude) with an elevation of 572 m amsl. It is 2 km South-east of Bhatatpur city, 38 km South-west of Mathura and 50 km West of Agra and 180 km from Delhi in Bharatpur district of Rajasthan .

Masonry around the border separates the park the surrounding agriculture fields. There are about 15 villages around the park. [b] General Use Tools in Arc Map

Page 130 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

The KNP is part of that Indo Gangetic plain with elevations ranging from 173-176 meters above sea level. The area is semi arid with an average rainfall of 500-700 mm, though rainfall can vary greatly from year to year.

The KNP has exceptionally high biodiversity. The Park contains 100 species of plants, about 50 species of fish, seven species of turtles, five lizard species, and thirteen snake species. The KNP is also rightly known as a “bird paradise” with over 354 species. Birds from Siberia and Europe come here in the winter. The Siberian crane (Grus leucogeranus) commonly known as “snow wreath” or “lily of birds”, visits this Park. In fact, this is the only reported wintering ground of the Siberian crane in the Subcontinent. However, their About Study Area numbers in the KNP recently declined from 2300 to Historical Highlights Of Keoladeo almost none during the last two decades. In February 1996, four Siberian cranes re-appeared after two 1726 – 1763 Ajan Bund constructed years of absence, much to the relief of the conservation community. During the winter of 1999 1850 – 1899 Natural depression presently two Siberian cranes visited the park. occupied by Park converted into a hunting preserve Evolution of the Ecosystem 1901 Reserve flooded for the first The history of the KNP is as fascinating as its time biodiversity. The area was a natural depression, and the wetlands have existed on some form or other for 1902 Reserve inaugurated with an several centuries. The Keoladeo was re-designed by organised duck shoot the local kings to attract more migratory birds. The present wetland sites are reported to have been 1919 Boundaries of the designed around 1750 after the construction of a duck shoot reserve notified small dam, Ajan Bund, up stream by the famous local king Suraj Mal. The Ajan bund is to facilitate complex 1925 1925 Bharatpur Forest water management in retaining soil moisture, Act. Passed. Shikar Department supplying water to crops, maintaining the ground brought under Forest water levels, etc. The historical highlights of the Park Department. Rules for are shown in below. The dykes in the Park date back protection of wildlife and to 1700 and were built to retain water. The Park was forests of Rajasthan framed for owned by the local king who used it as a bird, 1930-1935 particularly duck, hunting ground. Even today the 1926 Rulers hand over reserve to hunting records of the then rich and famous are Rajasthan Government but displayed inside the Park on stone carvings. The retain hunting rights. Is successful hunters included kings, British viceroys declared a Bird Sanctuary and princes. These dykes were also used by the local elites to shoot the birds during winter. Most of the Park consists of dykes, trees, water gates, etc, - and are part of a conscious design. So this present shape 1927 Last leopard shot and form of wetlands are result of meticulous design and management.

1928 Declared as a Protected Forest under the Rajasthan Forest Act.

Page 131 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

1953 September, at times to even October. The annual average rainfall ranged varied from different year.

Climatic Condition 1929 Ruler’s hunting rights withdrawn The climate is hot in the summer, hot humid in mansoon, cold and foggy in the winter. Hot dry 1977-1981 Wall around the Sanctuary site weather dust stroms, low humidity and scanty was built drizzles of only a few millimeters characterize the pre-monsoon season in Bharatpur. 1981 Declared as a Ramsar site Data Database and Methodology 1982 Notified as a National Park – Grazing banned Data Used

1983 Declared a World Heritage site. Satellite data

For delineation and mapping of land use land cover, multitemporal orthorectified IRS LISS-IV (5.8m) path Location and row 202-59 and date 19 Jan. 2007 and Cartosat PAN (2.5 )path and row 528-272 and date 27 jan. KEOLADEO national park is situated between 2007 have been used. (27°7’06” N – 27°12’02” N latitude and 77°29’05’ E – 77°33’09” E longitude) with an elevation of 572 m Secondary Data amsl. In the form secondary data, Survey of India (SOI) Topography topographic sheets were used. These topographic sheets on 1: 50,000 scales are used for identification The area of KNP is about 29 sq. m. it is a low-lying of the base feature. The toposheets falling in the depression with a gentle slope towards the centre study area, forming a depression. The total wetland area is about 6 sq. km. this is a main submersible area of the park. They are of KNP is covered in toposheet No. 54E/8 The average elevation of the area is about 174 meter. and 54E/12. The submersible area has divided into various unequal compartments by means of dykes. Software Used Occasionally some ditches fo varying sizes occur in the rest of the area. A metalled road , which is now Basically, five software were used for this project viz; closed to traffic, passes directly through the park. (a) ArcView 3.2a – this was used for displaying and Soil subsequent processing and enhancement of the image. It was also used for the carving out of Ilorin Soil at KNP is thick alluvium, overlying kanker path region from the whole Kwara State imagery using and some clay formation. The periodic inundation both the admin and local government maps. dominant the area. Patches of saline soil are common in the terrestrial area. (b) ArcGIS – This was also used to compliment the display and processing of the Data Temperature (c) Erdas Imagine 9.1for subset and Georeference Bharatpru experience extremes of climatic conditions as the annual temperature varies from 1° C to 50 °C. (d) Microsoft word – was used basically for the presentation of the research. Rainfall (e) Microsoft Excel was used in producing the bar Bharatpur receives most of its precipitation from graph. southwest monsoon, which usually sets in towards the end of June or early July and extends up to

Page 132 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Database A GIS database includes data about the position and the attribute of geographical feature that have been Database is a collection of interrelated information, coded as point, line, areas and pixels. usually stored on some form of mass storage system.

Methodology

Steps detecting and identifying, classifying, measuring and evaluating the significance of spatial relationship. Georeference of data Image interpretation Key  Generation of FCC (False Color Composite) The image interpretation key provides a critical  Onscreen generation. Digitization of image. reference base for advanced interpretation. It helps the interpreter in evaluating the information in an  Computation and analysis of various vegetation organized and consistent manner. The image indices. interpretation key consists interpretation elements  Statistical analysis and report. viz., Tone, Texture, Size, Shape, Association, Pattern, etc.The interpretation key has been used as per the  Remote Sensing Data Interpretation guide line given in the manual.

Data Interpretation Land Use Land Cover Interpretation

Image interpretation 1. Using the interpretation key prepared, land use land cover class has been delineated by using Image interpretation is defined as the ‘art of onscreen interpretation procedure. examining image for the purpose of identifying object or surface feature and judging their 2. Relevant satellite image(s) has been displayed on significance’. Interpreter studies the remotely sensed the computer screen at 1:5000 scale. data and attempts through logical process in

Page 133 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

3. The grid has been used for each of the scene 5’x5’ Result, Discussion and Conclusion tiles as control grid. The landuse/ landcover map generated while Land Use Land Cover Classification interpreting the satellite image has 15 classes. The area falling in each category is given below- During the interpretation of Land use Land cover of KEOLADEO NATIONAL PARK, BHATATPUR LU/LC CATEGORY THEIR AREA IN sq.km AND %. (RAJASTHAN) following categories was observed in the study area. CATEGORIES AREA sq.km. Area in %

1. Dense forest: comprised of mitragyna parvifolia Settlements 0.02 0.08 along with Acacia nilotica or zizipus mauritiana, the Water body 0.04 0.14 under groth showe the presence of kirganelia reticulate and capparis sepiaria. The low grass cover Open land 0.09 0.33 had cynodon dactylon. Dense trees 0.11 0.39 2. Open forest: open or scattered forest includes thorny scrub with Mitragyna parvifolia as under Open forest 0.17 0.60 growth with low cynodon dactylon grass cover. Open forest with grass 0.62 2.15 3. Grassland: scattered vetiveria zizanioides cover the area with Desmostachya bipinnata from in the Waterlogged scrub 0.91 3.13 low stratum. Wetland with grass 0.97 3.34 4. Grassland with scattered trees: Low grassland with scattered tree also presence stray and scattered Wetland with trees 1.64 5.63 trees and shrubs. The ground substratum support low grass. Grassland 2.05 7.04

5. Open water: This comprise of mostly free Grassland with trees 2.75 9.47 floating and suspended aquatics. Scattered grass with 6. Settlements: In this category mostly constructed trees 2.81 9.65 areas like guest house, temple, canteen etc. are Dense forest with water include. moisture 4.32 14.85 7. Wetland: There are mainly water logged areas Wetland 5.75 19.75 with aquatic vegetation.etc. Dense forest 6.81 23.40

Total 29.12 100

Page 134 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

Graphical Representation (Pie Chart) Of Landuse/ Landcover of Keoladeo National Park, Bhatatpur (Rajasthan)

Pie Chart of KNP

Bar Chart of LU / LC

Conclusion

Keoladeo National Park (KNP) popularly known as Bharatpur Ghana Bird Santuary is not only a bird paradise but is one of the best waterfowl reserves in the world for both resident as well as migratory birds. The Indian wetland is unique for being included under both the Ramsar and World Heritage Convention. KNP is one of the three place in the world, known to harbour wintering Siberian cranes (Grus leucogeranus) RS and GIS technique have emerged as a powerful tool for mapping and monitoring the natural resources. Its capabilities for

mapping and monitoring seasonal changes and for Land Use/Land Cover Map of KNP, Bharatpur habitat evaluation of wildlife have been already established.

The present study was carried out to study the distribution pattern of selected Land Use / Land Cover. And mapping and monitoring KNP’s main features and an evaluation of selected features.

References

1. Anderson, J.R. Land uses Land cover changes. A framework for monitoring. Journal of Research, U.S. Geological Survey. Volume 5, No-3, PP-143-153 Govt. of India.

2. Gujja Biksham (1996) Participatory Management Planning For The K.N.P. Bharatpur. WWF- International.

3. Kiran Choudhary, Krishnendra Singh Nama. (2014) Road Map of KNP, Bharatpur Assesment of Water Quality Parameters of Selected Blocks

Page 135 Ashish Sharma et al. International Journal of Science, Engineering and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-4098 , ISSN (Print): 2395-4752

In K.N.P. Bharatpur, Rajasthan With Reference To 7. NRSC (2006): Manual of National Land use Feasiliblity. Biolife Journal, Vol.2 Issue 3. Landcover,Mapping using Multi-temporal Satellite data. A Project Report by (Dr. S. Palria ) project on wetland 4. Lillesand, T.M. & R.W. Keifer (1979), Remote sensing biodiversity conservation. Raddy, .Anji, Remote and Image Interpretation. Sensing and Geographic Information system

5. Lo, C.P. & Albert K.W. Yeung (2002), Concept & 8. I.V. Murlikrishna, Geographical Information Systems Techniques of Geographic Information Systems. and Remote Sensing Applications.

6. Mathur, V.B., K. Sivakumar, Bhumesh Singh and Author’s details Anoop, K.R. 2009. A bibliographical review for identifying research gap areas: Keoladeo Ghana National Park – A Research Scholar, Babu Shobharam Government Arts World Heritage site, Wildlife Institute of India, Dehradun. College, Alwar (Rajasthan), University Of Rajasthan, 54p. Email ID- [email protected]

Copy for Cite this Article- Ashish Sharma, “A Geographical Study of Keoladeo National Park, Bharatpur (Rajasthan) With Using Remote Sensing & GIS’, International Journal of Science, Engineering and Technology, Volume 3 Issue 6: 2015, pp. 201- 210.

Submit your manuscript to International Journal of Science, Engineering and Technology and benefit from:

 Convenient Online Submissions

 Rigorous Peer Review

 Open Access: Articles Freely Available Online

 High Visibility Within The Field

 Inclusion in Academia, Google Scholar and Cite Factor.

Page 136