75
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0 Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in 2377 | Page DESIGN, ANALYSIS AND FAILURE OF ACTUAL CHARGING BELT CONVEYOR SYSTEM USED IN THE INDUSTRY TO SET THE OPTIMUM RESULTS Pranav Manikrao Deshmukh 1 , Dr.S.P.Trikal 2 1 Department of Advanced Manufacturing and Mechanical System Design, SSGMCE, Shegaon, (M.S) (India) 2 Associate Professor, SSGMCE, Shegaon,(M.S)(India ) ABSTRACT The aim of the paper is knowledge of damage process which is required for the correct regulation of operation conditions for conveyor belt. The aim is to determine conditions caused this type of damage (height of impact and weight of material impact). The current trend is to provide weight/cost effective products which meet the stringent requirements. The aim of this paper is to study existing conveyor system and optimize the Belt speed,Width,Wrapping angle,troughing angle, Pulley diameter and addition of Snub pulley .The parametric model of belt conveyor where modeled in Solid-work 2014 where different parameter are studied. Keyword: Belt Conveyor, Idler, Pulley, Failure, Simulation Software (Solid Works),Ansys Software I. INTRODUCTION This master of engineering project was carried out at a YASH ENTERPRISES, which produces all types soap manufacturing and packaging .Yash enterprises is located in Khamgaon Dist: Buldhana. The purpose of this project was to provide a comprehensive knowledge of the basic production process theory of designing belt conveyor. The project focuses on choosing the right conveyor belt and suitable components to ensure manufacturing of high-quality belt conveyor. The existing problems of the idlers and belt conveyor are pointed out and proper solutions are given to make them a longer life. This project helps to improve the production by eliminating the various failures and other problem. The final aim was to create a modified design to achieve large scale production, of idlers which enhances both the efficiency and productivity. In order to help the company to get larger sales market, a plan of designing a belt conveyor was carried out, but further research still is needed to make it come true.

DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

Embed Size (px)

Citation preview

Page 1: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2377 | P a g e

DESIGN, ANALYSIS AND FAILURE OF ACTUAL

CHARGING BELT CONVEYOR SYSTEM USED IN

THE INDUSTRY TO SET THE OPTIMUM RESULTS

Pranav Manikrao Deshmukh 1, Dr.S.P.Trikal2 1Department of Advanced Manufacturing and Mechanical System Design,

SSGMCE, Shegaon, (M.S) (India)

2Associate Professor, SSGMCE, Shegaon,(M.S)(India )

ABSTRACT

The aim of the paper is knowledge of damage process which is required for the correct regulation of operation

conditions for conveyor belt. The aim is to determine conditions caused this type of damage (height of impact

and weight of material impact). The current trend is to provide weight/cost effective products which meet the

stringent requirements. The aim of this paper is to study existing conveyor system and optimize the Belt

speed,Width,Wrapping angle,troughing angle, Pulley diameter and addition of Snub pulley .The parametric

model of belt conveyor where modeled in Solid-work 2014 where different parameter are studied.

Keyword: Belt Conveyor, Idler, Pulley, Failure, Simulation Software (Solid Works),Ansys Software

I. INTRODUCTION This master of engineering project was carried out at a YASH ENTERPRISES, which produces all types soap

manufacturing and packaging .Yash enterprises is located in Khamgaon Dist: Buldhana.

The purpose of this project was to provide a comprehensive knowledge of the basic production process theory of

designing belt conveyor. The project focuses on choosing the right conveyor belt and suitable components to

ensure manufacturing of high-quality belt conveyor. The existing problems of the idlers and belt conveyor are

pointed out and proper solutions are given to make them a longer life. This project helps to improve the

production by eliminating the various failures and other problem.

The final aim was to create a modified design to achieve large scale production, of idlers which enhances both

the efficiency and productivity. In order to help the company to get larger sales market, a plan of designing a

belt conveyor was carried out, but further research still is needed to make it come true.

Page 2: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2378 | P a g e

.

Fig 1:Actual charging belt conveyor system Design calculation of belt conveyor

Table 1 Specification of Belt-Conveyor System

Parameter Dimension

Height of conveyor, H 3042mm

Total belt length Lb 18040mm

Centre to centre distance L 9000mm

Belt width W 550mm

Belt speed V 0.2m/sec

Capacity C 3ton/hr

Motor RPM N 1500rpm

Temperature required T 10-200c

Motor - 3-phase induction motor

Table 2 Density of Belt Materials

Material Density(Kg/m3)

Leather 1000

Convass 1220

Rubber 1140

Balata 1110

Single woven belt 1170

Double woven belt 1250

II. DESIGN PROCEDURE FOR BELT CONVEYOR SYSTEM

2.1 Belt Capacity [C] C=3.6×Load cross-section area perpendicular to belt× Belt speed ×Material

density=3000 kg/hr ………..(1)

2.2 Belt Power For horizontal and elevating conveyor,

Fc=0.020 ,Tf=45m From table 3, Q=33 ,S=0.2m/sec

Page 3: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2379 | P a g e

POWER= KW= =33.76KW ………(2)

2.3 Belt Tension Effective tension (Te)=Total empty friction+ Load Friction+ load slope friction ……….(3)

a)Return side friction=Fe×Q×L×0.4×(9.81×10-3) = 0.020×33×9×0.4×(9.81×10-3) =0.0233KN

Total empty friction=Fe×(L+tf)×Q×(9.81×10-3) = 0.020×(9+45)×33×(9.81×10-3) =0.3496KN

Carrying side empty friction=total empty friction-return side friction =0.3496-0.0233=0.3263KN

b)Load friction=Fl(L+tf) (9.81×10-3) =0.025(9+45) (9.81×10-3) =55.181KN

c)Load slope tension= (9.81×10-3) KN= (9.81×10-3) =124.24KN

d)Belt slope tension=B×H (9.81×10-3) KN =0.55×9×9.81×10-3 =0.486KN

Effective Tension,Te=0.3496+55.181+124.34=179.8706 KN

Power is also calculated from Effective Tension, Power=Te×S KW=179.8706×0.2=35.97 KW

2.4 Belt Width

Belt Width= = =599.569mm ……….(4)

The belt strength of canvas belt is 300N/mm and the belt having properties like high tensile strength,corrosion

resistance,wear and tear resistance.

2.5 Design of Shaft

Drive pulley shaft design:- Te=179.8706KN

T1=Carrying side belt tension=Te[ =179.8706[ =328.95KN

T2=Return side belt tension T2=T1-Te=328.95-179.8706=149.079KN

W=Weight of drive pulley =200 =1.962KN

Fig2: Load and Moment Diagram

Resolving horizontal and vertical components,

FH=T1 = 328.95 =449.2KN

Page 4: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2380 | P a g e

FV=T1 = 328.95 =161.5KN

Horizontal loading,RCH =RDH = = =224.6KN

Vertical loadingRcv= Rdv = = =80.75KN

For horizontal loading, RCH×0.05+ RDH×0.6= RBH×0.65

224.6×0.05+ 224.6×0.6= RBH×0.65 RBH=224.6KN Similarly, RAH=224.6KN

For vertical loading, RCV×0.05+ RDV×0.6= RBV×0.65

80.75×0.05+ 80.75×0.6= RBV×0.65 RBV=80.75KN Similarly, RAV=80.75KN

For horizontal bending moment diagram,

MCH= RAH×0.05= 224.6×0.05=11.23KN-m MDH= RBH×0.05= 224.6×0.05=11.23KN-m

For vertical bending moment diagram,

MCV= RAV×0.05= 80.75×0.05=4.04KN-m MDV= RBV×0.05= 80.75×0.05=4.04KN-m

Resultant moment at C and D= = =11.93KN-m ………………..(5)

Equivalent Torque, Te= , T=Te×r=179.8706×0.075=13.49KN

Based on Equivalent Torque,

Teq= = =24.59KN-m ………(6)

Allowable shear stress τs= , d= = =0.1406m=140.6mm ……….(7)

Meq= = =21.24KN-m

Allowable bending stress ɓb= Meq d= = =0.1493m=149.3mm ….. . (8)

The required diameter of the shaft pulley is 149.3mm

III. ANALYSIS OF CHARING BELT CONVEYOR STSTEM

3.1 Load Analysis (Stress Analysis)

Stressɓ = …………(9)

Maximum tension in the belt, Tmax=T1+Tc

T1=Tension in tight side taken from design section=328.95 KN

Tc=Centrifugal tension of the belt can be calculated as,=mv

m=Area×length×density =b×t×l×ρ =0.55×0.05×18.040×1220=605.242Kg=5937.42 N

V= = =2.09 m/sec

Tc=12.409KN

Tmax=T1+Tc=328.95+12.409=341.359 KN

Stress= =12413054.55N/m2 =12.41× N/m2=12.41 Mpa

Page 5: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2381 | P a g e

Fig3:Geometry of Actual Design Fig4: Boundry Condion of Actual Design

Fig5: Stress of Actual Design

From Actual Design of Charging Belt Conveyor System, The following problem or failure should be occur-

1) Belt slips when conveyor is started.

2) Belt slips while running.

3) The belt is stalling or jerking.

4) Excessive top cover wear over entire top surface or in load carrying area.

5) The covers are hardening and/or cracking.

6) Transverse breaks in belt at the edge.

7) Belt runs fine when it’s empty but wont track right when it’s loaded.

IV. RESULT AND DISSCUSION

Table 3 Comparison of result of analysis

Calculated

Stress(mPa)

Analytical

Stress(mPa)

%Error

Actual Design 12.41 13.68 1.27

From the actual design, the calculated stress is less than the analytical stress .For that reason, we have to occur

certain type of failure.

V. CONCLUSION & FUTURE SCOPE

Page 6: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2382 | P a g e

This project provides a comprehensive knowledge of the basic production process theory of designing belt

conveyor. The project focuses on choosing the right conveyor belt and suitable components to ensure

manufacturing of high-quality belt conveyor. The existing problems of the idlers and belt conveyor are pointed

out and proper solutions are given to make them a longer life. This project helps to improve the production by

eliminating the various failures and other problem.

The final aim was to create a modified design to achieve large scale production, of idlers which enhances both

the efficiency and productivity. In order to help the company to get larger sales market, a plan of designing a

belt conveyor was carried out, but further research still is needed to make it come true.

The calculated shaft diameter is 149.3 mm and analysis and simulation of actual design of charging belt

conveyor system. The problem occur during working of conveyor system should be determined.

REFERENCES [1] R.S.Khurmi S.Chand Textbook of “Machine Design” & Co. Pvt.Ltd. Edition 2012 . ISBN : 81- 219- 2537-1

[2] Zhao, Lihua. "Typical failure analysis and processing of belt conveyor." Procedia Engineering 26 (2011):

942-946.

[3] Fedorko, Gabriel, et al. "Failure analysis of irreversible changes in the construction of rubber–textile

conveyor belt damaged by sharp-edge material impact." Engineering Failure Analysis 39 (2014): 135-148.

[4] Ariff, Tasnim F., et al. "Design Improvements and Fabrication of Conveyor Belt Cleaner and Washing

System at Westports Malaysia."

[5] Shinde, Suhas M., and B. Patil. "Design And Analysis Of A Roller Conveyor System For Weight

Optimization And Material Saving." International Journal on Emerging (2012).

[6] Molnár, Vieroslav, et al. "Analysis of asymmetrical effect of tension forces in conveyor belt on the idler roll

contact forces in the idler housing." Measurement52 (2014): 22-32.

[7] Shim, Hee-Jin, and Jung-Kyu Kim. "Cause of failure and optimization of a V-belt pulley considering fatigue

life uncertainty in automotive applications."Engineering Failure Analysis 16.6 (2009): 1955-1963.

[8] Fedorko, Gabriel, et al. "Failure analysis of belt conveyor damage caused by the falling material. Part I:

Experimental measurements and regression models." Engineering Failure Analysis 36 (2014): 30-38.

Page 7: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2383 | P a g e

DESIGN MODIFICATION AND ANALYSIS OF

CHARGING BELT CONVEYOR SYSTEM TO SET

OPTIMUM RESULTS

Pranav Manikrao Deshmukh 1, Dr.S.P.Trikal2

1Department of Advanced Manufacturing and Mechanical System Design,

SSGMCE, Shegaon, (M.S) (India)

2Associate Professor, SSGMCE, Shegaon,(M.S)(India )

ABSTRACT The aim of the paper is knowledge of damage process which is required for the correct regulation of operation

conditions for conveyor belt. The aim is to determine conditions caused this type of damage (height of impact

and weight of material impact). The current trend is to provide weight/cost effective products which meet the

stringent requirements. The aim of this paper is to study existing conveyor system and optimize the Belt speed,

Width, Wrapping angle, troughing angle, Pulley diameter and addition of Snub pulley .

Keyword : Belt conveyor, Idler, Pulley, Failure, Simulation Software (Solid Works), Ansys software

I. INTRODUCTION This master of engineering project was carried out at a YASH ENTERPRISES, which produces all types soap

manufacturing and packaging .Yash enterprises is located in Khamgaon Dist: Buldhana.

The purpose of this project was to provide a comprehensive knowledge of the basic production process theory of

designing belt conveyor. The project focuses on choosing the right conveyor belt and suitable components to

ensure manufacturing of high-quality belt conveyor. The existing problems of the idlers and belt conveyor are

pointed out and proper solutions are given to make them a longer life. This project helps to improve the

production by eliminating the various failures and other problem.

The final aim was to create a modified design to achieve large scale production, of idlers which enhances both

the efficiency and productivity. In order to help the company to get larger sales market, a plan of designing a

belt conveyor was carried out, but further research still is needed to make it come true.

II. PROBLEM DEFINITION The aim of this project is to redesign existing charging belt conveyor system by designing the critical parts (Belt

capacity, Belt tension, Belt power, Belt width, Shaft, pulley ), to minimize the overall failure or problem of the

conveyor system and to save considerable amount of material.

III. OBJECTIVE OF THE STUDY The following are the objectives of the study

1. Study existing charging belt conveyor system and its design.

Page 8: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2384 | P a g e

2. Geometric modeling of existing roller conveyor.

3. To generate parametric model using ANSYS

4. To carry out linear static, modal, transient and optimization analysis of existing roller conveyor.

5. Modification of critical conveyor parameters for system optimization.

6. To carry out Analysis of Modified design for same loading condition.

7. Recommendation of new solution for system optimization.

IV. SCOPE OF PRESENT STUDY 1. Check design of existing conveyor system.

2. Simulation method applied to optimize parameters troughing angle, belt speed, addition of snub roller, belt

width and shaft diameter.

3. ANSYS applied for linear static, modal, transient and optimization analysis.

4. Modal Analysis of belt conveyor system

5. Optimization of conveyor assembly for failure reduction.

6. Comparison between existing and optimized design.

V. STUDY OF THE EXISTING ASSEMBLY OFCONVEYOR SYSTEM

Fig1:-Existing Design of Charging Belt Conveyor System

5.1 Driving Device Driving device is the power transmitting mechanism of a belt conveyor. It is made up of an electromotor,

coupling, reducer and driving pulley and so on. According to different using conditions and working

requirements, the drive mode of a belt conveyor can be grouped to single-motor driving, multi-motor driving,

single-pulley driving, and double-pulley driving and multi-pulley driving.

Single motor and single pulley driving is adopted by a belt conveyor. The driving device is installed at the

discharge point which is located at the conveyor head. When the power is big, a single motor and double-pulley

driving is used, precisely, one motor has two driving pulleys, and the two pulleys are connected by a pair of

exposed gear which has the same number of teeth.

The pulleys can be classified into two types: driving pulleys and return pulleys. The belt is driven by friction

which is produced by pulley’s surface and belt’s surface because of the function of driving pulley, and the

movement direction of the belt is changed at the same time.

Page 9: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2385 | P a g e

Driving pulley is the main component of transmitting power. In order to transmitting enough power, enough

friction must be provided from the belt and pulley. According to the theory of friction transmission, the methods

of increasing friction between the conveyor belt and the pulley and augmenting the wrap angle can be adopted

to ensure enough driving power when a driving device needs to be chosen. Usually, when a single pulley is

used, wrap angle can be 1800-2400; when double-pulley is used, the wrap angle can reach 3600-4800. Double-

pulley’s driving can enhance the conveyor’s traction greatly, so it is often used especially when the transport

distance is long.

Driving pulley’s surface has glossy-faced and rubber-faced types. Rubber-faced pulley can be utilized to

increase the friction coefficient between the driving pulley and the belt, as well as to reduce the wear of the

pulley. When the pulley is small, the environment humidity is low, a glossy-faced pulley can be chosen. A

rubber-faced pulley can be used when the environment humidity is high, power is big, and slip is easy.

Choosing a right pulley is important. When the belt of a fabric belt core is used, the pulley is chosen on the basis

of the belt’s thickness. The conveyor belt needs to move around the pulley repeatedly during the working

process, and bending occurs. When the belt is bent, the external surface is stretched and while the internal

surface is compressed, the stress and strain of each layer vary. The rubber layers have mechanical fatigue and

are damaged due to the scaling when the repetitive bending reaches a certain level. The smaller diameter of

pulley, the bigger the deflection of conveyor belt and the faster the scaling occurs.

5.2 Return Pulley A return pulley has three categories: 1800. The return pulley’s diameter is related to driving pulley’s diameter

and the wrap angle that the belt has on the return pulley. Return pulley is a welded-steel plate construction with

an antifriction bearing.

5.3 Troughing Plate Troughing plate are used to support the belt during conveying the material into the feeder.Troughing platee

having 550 mm distance from the sdjacent plate for the proper belt alignment.The plate having the trough angle

is 450.

The belt conveyor is an endless belt moving over two end pulleys at fixed positions and used for transporting

material horizontally or at an incline up or down. The main components of a belt conveyor are:

1. The belt that forms the moving and supporting surface on which the conveyed material rides. It is the

tractive element. The belt should be selected considering the material to be transported.

2. The idlers, which form the supports for the carrying and return stands of the belt.

3. The pulleys that support and move the belt and controls its tension.

4. The drive that imparts power to one or more pulleys to move the belt and its loads.

5. The structure that supports and maintains the alignments of the idlers and pulleys and support the driving

machinery.

6. The trough plate that support the belt for carrying proper amount of material to the feeder.

7. Belt cleaner that keeps the belt free from materials sticking to the belt.

8. Surge hopper and feeder,which is essential for supplying material to the conveyor at uniform rate when the

supply of material is intermittent.

Page 10: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2386 | P a g e

5.4 From Actual Design of Charging Belt Conveyor System,The Following Problem or Failure

Should Be Occur 1) Belt slips when conveyor is started.

2) Belt slips while running.

3) The belt is stalling or jerking.

4) Excessive top cover wear over entire top surface or in load carrying area.

5) The covers are hardening and/or cracking.

6) Transverse breaks in belt at the edge.

7) Belt runs fine when it’s empty but wont track right when it’s loaded

VI. MODIFIED DESIGN OF THE CHARGING BELT CONVEYOR SYSTEM A) By Adding Snub Roller And Idlers

Fig2: Modified Design of Charging Belt Conveyor System

VII. IDLER FUNCTIONS

7.1 Idlers Idler is the supporting device for belt. Idlers move as the belt moves so as to reduce the running resistance of the

conveyor. Idlers’ qualities depend on the usage of the belt conveyor, particularly the life span of the belt.

However, the maintenance costs of idlers have become the major part of the conveyor’s operating costs. Hence,

idlers need to have reasonable structure, durability in use, small ratio of steering resistance, reliability, and dust

or coal dust cannot get in bearing, due to which the conveyor has a small running resistance, saves energy and

prolongs the service life.

Page 11: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2387 | P a g e

Fig. 3 Idlers Used on A Belt Conveyor To Support The Belt On The Carrying And Return

Strands

VIII. THE FOLLOWING TYPE OF IDLERS ARE USED IN BELT CONVEYOR SYSTEM

8.1 Impact Idler Rubber-cushioned impact idlers are one solution for absorbing impact in the belt’s loading zone. The rubber

covers absorb some of the energy to provide the benefit of shock absorption.

One disadvantage of using impact rollers in the load zone is that each idler supports the belt only at the top of

the roller. No matter how closely spaced, the rounded shape of the roller and the ability of the rubber to deflect

under the load will allow the conveyor belt to oscillate or sag away from the ideal flat profile. This sag allows

and encourages the escape or entrapment of fugitive material. The space interval between impact rollers offers

little protection from tramp materials dropping from above and penetrating the belt.

Fig. 4 Impact Idler

8.2 Carrying Idlers Carrying idlers provide support for the belt while it carries the material. They are available in flat or troughed

designs. The flat design usually consists of a single horizontal roll for use on flat belts, such as belt feeders.

The troughed idler usually consists of three rolls-one horizontal roll in the center with inclined rolls on either

size. The angle of the inclined rollers from horizontal is called the trough angle. Typically, all three rolls are

same length, although there are sets that incorporate a longer center roll and shorter inclined rollers called

“picking idlers”. This design supplies a larger flat area to carry material while allowing inspection.

8.3 Training Idler There are a number of designs for training idlers that work to keep the belt running in the center of the conveyor

structure. Typically, these idlers are self-aligning: they react to any mistracking of the belt to move into a

position that will attempt to steer the belt back into the center. They are available for both carrying side and

return side application.

Belt-training idlers should never be installed under the carrying side of the belt in the load zone, as they sit

higher than the adjacent regular carrying idlers and raise the belt as they swivel.

TRANSITION: These idlers ease the belt from a troughed configuration to the flat pulley surface. Reducing

stress in the outer belt edges.

Page 12: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2388 | P a g e

8.4 Return Idler Return idlers provide support for the belt on its way back to the loading zone after unloading cargo. These idlers

normally consist of a single horizontal roll hung from the undesirable of the conveyor stringers-return idlers,

incorporating two smaller rolls, are sometimes installed to improve belt tracking.

8.5 Idler Spacing The spacing between the rolling components has a dramatic effect on the idler support and shaping missions.

Idlers placed too far apart will not properly support the belt nor enable it to maintain the desired profile. Placing

idlers too close together will improve belt support and profile, but will increase conveyor construction costs and

may lead to an increase in the conveyor’s power consumption.

The spacing of return idlers is determined by belt weight, because no other load is supported by these idlers and

sag related spillage is not a problem on this side of the conveyor. Typical return idler spacing is3 meters.

IX. ANALYSIS OF CHARING BELT CONVEYOR STSTEM- FOR ACTUAL DESIGN

9.1 Load Analysis (Stress Analysis)

Stressɓ = …………

Maximum tension in the belt, Tmax=T1+Tc

T1=Tension in tight side taken from design section=328.95 KN

Tc=Centrifugal tension of the belt can be calculated as,=mv

m=Area×length×density =b×t×l×ρ =0.55×0.05×18.040×1220=605.242Kg=5937.42 N

V= = =2.09 m/sec

Tc=12.409KN

Tmax=T1+Tc=328.95+12.409=341.359 KN

Stress= =12413054.55N/m2 =12.41× N/m2=12.41 Mpa

Fig5: Geometry of Actual Design Fig6: Boundry Condion of Actual Design

Page 13: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2389 | P a g e

Fig7: Stress of Actual Design

X. MODIFIED DESIGN OF THE CHARGING BELT CONVEYOR SYSTEM:- 10.1 By adding snub roller and idlers for increasing the wrap angle between belt and pulley.

Calculate stress developed in the belt with modified design by adding snub roller ,

Stressɓ =

Maximum tension in the belt,

T1=291.48 KN Tc=12.409KN

Tmax=T1+Tc=303.889 KN

Stressɓ=11.05× N/m2

Stressɓ=11.05 Mpa

Fig8: Boundry Condition of Modified Design Fig9: Meshing Model )f Modified Design

Page 14: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2390 | P a g e

Fig10: Geometry of Modified Design Fig11: Stress of Modified Design

XI. SOLUTIONS SUGGESTED After completion of the project various suggestion were made to the company regarding the design and

operation of the conveyor belt system

1. It was advised to use the impact,transition,trainingand carrier roller idlers intheconveyor system.

2. The transition distance of the belt was not adequate and it was increased .

3. The installation of snub roller for proper belt tensioning.

4. The proper angle of wrapping between belt and pulley.

5. The proper troughing angle should be provided.

6. Inorder to avoid dust emission it was advised to install bag filter for collecting dust from the Skirt Board area.

XII. CONCLUSION & FUTURE SCOPE The material spillage from the conveyor belt is a significant problem not only from the point of view of

environment and government regulations , but also because of number of labour hours lost in the cleaning, cost

incurred due to frequent repairs or rollers and other conveyor parts etc.

Conveyor systems are present in all most in every manufacturing unit be it a soap plant, mineral and ore

processing facility, food and agro industry you name it. Thus knowing the basics of conveyor systems is

essential for a mechanical engineer both for maintenance and design applications.

REFERENCES

[1] R.S.Khurmi S.Chand Textbook of “Machine Design” & Co. Pvt.Ltd. Edition 2012 . ISBN : 81- 219- 2537-1

[2] Zhao, Lihua. "Typical failure analysis and processing of belt conveyor." Procedia Engineering 26 (2011):

942-946.

[3] Fedorko, Gabriel, et al. "Failure analysis of irreversible changes in the construction of rubber–textile

conveyor belt damaged by sharp-edge material impact." Engineering Failure Analysis 39 (2014): 135-148.

[4] Ariff, Tasnim F., et al. "Design Improvements and Fabrication of Conveyor Belt Cleaner and Washing

System at Westports Malaysia."

[5] Shinde, Suhas M., and B. Patil. "Design And Analysis Of A Roller Conveyor System For Weight

Optimization And Material Saving." International Journal on Emerging (2012).

[6] Molnár, Vieroslav, et al. "Analysis of asymmetrical effect of tension forces in conveyor belt on the idler roll

contact forces in the idler housing." Measurement52 (2014): 22-32.

[7] Shim, Hee-Jin, and Jung-Kyu Kim. "Cause of failure and optimization of a V-belt pulley considering fatigue

life uncertainty in automotive applications."Engineering Failure Analysis 16.6 (2009): 1955-1963.

[8] Fedorko, Gabriel, et al. "Failure analysis of belt conveyor damage caused by the falling material. Part I:

Experimental measurements and regression models." Engineering Failure Analysis 36 (2014): 30-38.

Page 15: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2391 | P a g e

VOICE NAVIGATION STICK FOR BLIND 1Pankaj Patil, 2Kunal Bonage, 3Bhimsen Gire, 4Pranjali R Phirke

1,2,3,4 Department of Electronics, Savitribai Phule Pune University, Pune, (India)

ABSTRACT

God gifted sense to human being which is an important aspect in our life is vision. We are able to see the beauty

of nature, things which happen in day-to-day life with the help of our eyes. But there are some people who lack

this ability of visualizing these things. They face many difficulties to move on with their daily life. The problem

gets worse when they move to an unfamiliar location. Visually impaired people face many challenges when

moving in unfamiliar public places. Only few of the navigation systems for visually impaired people can provide

dynamic interactions. None of these systems work perfectly for outdoors. Propose navigation device for the

visually impaired focus on travelling from one location to another. This focuses on designing a device for

visually impaired people that help them in travelling independently comfortable to use. The device is linked

with a GPS to identify the location of the blind person. Moreover, it provides voice alert to avoid obstacles

based on ultrasonic sensors. An emergency button is also added to the system. The whole device is designed to

be small and is used in conjunction with the stick.

Keywords — Blind People, GPS, Ultrasonic Sensor, Stick, Voice Navigation .

I. INTRODUCTION

Blindness or visual impairment is a condition that affects many people around the world. This condition leads to

the loss of the valuable sense of vision. Worldwide more than 160 million people are visually impaired with 37

million to be blind. The need for assistive devices was and will be continuous. There is a wide range of

navigation systems and tools existing for visually impaired individuals the blind person truly requirements and

identifying objects.

1.1Background There are 285 million people worldwide that have some level of visual impairment. The blind navigation system

catering needs of the blind people who are not able to move from one place to other place without the help of

others. Recent survey source says India is now become the country having world’s large number of blind

people. There are 37 million blind people across the globe, over them 15 million people are in India. The blind

travel in India depends on other guide like cane, people information, trained dogs. A guide dog is trained to

guide its users to avoid the accidents from objects and barriers. When a visually impaired person is using a

walking stick, they waving their walking stick and finds the obstacle by striking obstacles ahead of them. Hence

here a system is proposed to help this group of population.

1.2 Motivation God gifted sense to human being which is an important aspect in our life is vision. We are able to see the beauty

of nature, things which happen in day-to-day life with the help of our eyes. But there are some people who lack

this ability of visualizing these things. They face many difficulties to move on with their daily life. The problem

gets worse when they move to an unfamiliar location. Visually impaired people face many challenges when

Page 16: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2392 | P a g e

moving in unfamiliar public places. As many of these people have difficulty knowing where they are or where

they are going, frequently feeling totally disorientated or even isolated, supplemental navigational guidance is

very important for them. Navigation involves updating one’s position and orientation while he or she is

travelling an intended route, and in the event the person becomes lost, reorienting and re-establishing a route to

the destination. Hence a system has to be found to minimize the difficulties of virtually impaired people to reach

their destination

1.3 Objective The paper main objective is to provide a talkative assistance to blind people. We are going to develop a

intelligent system that works efficiently good in outdoor. Current navigation device for the visually impaired

focuses on travelling from one location to another, this system focuses on designing a device for visually

impaired people that help them to travel independently which is comfortable to use. This device is used to help

blind people to move with the same ease and confidence as a sighted people. The device is linked with a GPS to

identify the location of the blind person. Moreover, it provides the voice alert to avoid obstacles based on

ultrasonic sensors. An emergency button is also added to the system. The whole device is designed to be small

and is used in conjunction with the stick.

Fig 1: Statistical Analysis

II. LITERATURE SURVEY There are several methods and devices used to guide visually impaired persons. Several research works are

being performed by many institutions throughout the world to offer the best navigational robot in terms of cost

effectiveness. This section gives a brief review on various navigational aids for blind individuals.

Blind and visually impaired people are at a disadvantage when they travel because they do not receive enough

information about their location and orientation with respect to traffic and obstacles on the way and things that

can easily be seen by people without visual disabilities. The conventional ways of guide dog and long stick only

help to avoid obstacles, not to know what they are. Navigation systems usually consist of three parts to help

people travel with a greater degree of psychological comfort and independence. Sensing the immediate

environment for obstacles and hazards, providing information about location and orientation during travel today

in the market different technologies like GPS, GPRS, etc are used to navigate visually impaired people. The

studies of various published international papers have been done. Before more technologically advanced

solutions to mobility aids are discussed it is useful to outline basic properties of the traditionally used primary

aids and explain their main properties and limitations.

Page 17: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2393 | P a g e

2.1 Stick

The most popular mobility hand held aid. It is usually foldable and adjustable to the height of the user. A blind

person using swing-like movements, “scan” the path in front in approx. 1 m distance (near -space

protection).The stick requires about 100 hours of training for skilful use, e.g. detecting drop-offs, walking up

and down the stairs.

Advantages: cheap, light-weight constructions available, effectively informs of shorelines, landmarks and

obstacles at ground-level, notifies others about visual disability of its user. Disadvantages: does not protect from

obstacles at torso and face level.

2.2 Guidance of Dog A specially trained dog assisting the blind in obstacle avoidance, but usually not aiding in way finding (unless

travelling a familiar path), e.g. the dog is trained to stop before obstacles, reacts to commands on walking

directions. In spite of their great usefulness, guide dogs are a rarely used aid - only about 1% of the visually

impaired use it. Most guide dog owners do not simultaneously use the dog and the stick.

Advantages: good in following familiar paths, good overall obstacle avoidance, trained for selective

disobedience when sensing danger to his owner.

Disadvantages: very costly guide dog service period is on average 6 years, regular dog up-keeping costs and

lifestyle changes.

2.3 Human Guide

A blind person walks hand in hand with a sighted guide.

Advantages/disadvantages: The most obvious, but in practice not a permanent solution for aiding the blind in

mobility and navigation. A blind person lacks privacy and can have a feeling of being a burden to his or her

guide.

III. WORKING

Fig 2: Proposed System

3.1 System Description The Fig 2 shows the block diagram of the walking stick unit that is present in the walking stick of the blind

people. In this paper, the main objective is GPS and GSM section, obstacle unit (IR SENSOR AND

Page 18: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2394 | P a g e

ULTRASONIC SENSOR). The blind person will reach his destination place using voice. He will speak his

starting and destination place. All this detail will be displayed on LCD. When he wishes to go to any new

location he will enter the position using keyboard. His location will be trace using GPS. The co-ordinates given

by GPS are stored in EEPROM. And it is given to micro-controller. It will match the co-ordinates and then it

will display on LCD and announcement will be done on speaker. Accelerometer is fitted on the stick, thus blind

person turn to any direction such as left, right, forward and backward. So he will come to know the location of

that place he is facing too. Ultrasonic sensor and IR sensor is used to detect the obstacle such as vehicles, any

person etc. As soon as obstacle is detected the blind person is warned with the help of speaker thus avoiding any

kind of mishap.

3.1.1 Arm 7 This generation introduced the Thumb 16-bit instruction set providing improved code density compared to

previous designs. The most widely used ARM7 designs implement the ARMv4T architecture, but some

implement ARMv3 or ARMv5TEJ. All these designs use Von Neumann architecture, thus the few versions

comprising a cache do not separate data and instruction caches. Some ARM7 cores are obsolete. One

historically significant model, the ARM7DI is notable for having introduced JTAG based on-chip debugging;

the preceding ARM6 cores did not support it. The "D" represented a JTAG TAP for debugging; the "I" denoted

an Icebreaker debug module supporting hardware breakpoints and watch points, and letting the system be stalled

for debugging. Subsequent cores included and enhanced this support. It is a versatile processor designed for

mobile devices and other low power electronics. This processor architecture is capable of up to 130 MIPS on a

typical 0.13 µm process. The ARM7TDMI processor core implements ARM architecture v4T. The processor

supports both 32-bit and 16-bit instructions via the ARM and Thumb instruction sets.

The ARM7TDMI (ARM7+Thumb tag Debug fast Multiplier enhanced ICE) processor is a 32-

bit RISC CPU designed by ARM, and licensed for manufacture by an array of semiconductor companies. In

2009 it remains one of the most widely used ARM cores, and is found in numerous deeply embedded system

designs. The ARM7TDMI-S variant is the synthesizable core.

3.1.2 LCD LCD is used in a project to visualize the output of the application. We have used 16x2 LCD which indicates 16

columns and 2 rows. So, we can write 16 characters in each line. So, total 32 characters we can display on 16x2

LCD. LCD can also used in a project to check the output of different modules interfaced with the

microcontroller. Thus LCD plays a vital role in a project to see the output and to debug the system module wise

in case of system failure in order to rectify the problem.

3.1.3 Keypad

Keypad is basically used to provide the input to the microcontroller. The keypad consists of micro switches

which are connected to the microcontroller pins in a matrix format. Each key is assigned with the special

character or symbol or digit. When user press the key the respective assigned ASCII value of that key is

provided to the microcontroller via software. The keypad is also standard 4x4 which has 8 pin connector. The

4x4 keypad has the layout like the table shown below. BK is backspace while entering the password. EN is enter

and is used do enable/disable menu item or enable the system

Page 19: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2395 | P a g e

Keyboards are the most widely used input device of the 8051, and the basic understanding of them is essential.

At the lowest level, keyboards are arranged in matrix form of rows and columns. The CPU accesses both rows

and columns through ports: therefore, with two 8-bit ports, an 8 X 8 matrix of keys can be connected to

microcontroller. When a key is pressed, a row and a column make a contact: otherwise, there is no connection

between them.

3.1.4 Scanning and Identifying the Keys The rows are connected to an output port and the columns are connected to an input port. If no key has been

pressed, reading the input port will yield 1s for all columns since they are all connected to high (VCC). If all the

rows are grounded and a key is pressed one of the columns will have 0 since the key pressed provides a path to

ground. It is the function of the microcontroller to scan the keyboard continuously detects and identifies the key

pressed.

3.1.5 GPS Modem The GPS smart receiver features the 16 channels .Ultra low power GPS architecture. This complete enabled

GPS receiver provides high position, velocity and time accuracy performances as well as high sensitivity and

tracking capabilities.

The ultra low power CMOS technology, the GPS receiver is ideal for many portable applications such as PDA,

Tablet PC, smart phone etc.

Benefits- 1. Ultra low power consumption

2. Easy and fast to install

3. Superior urban canyon performance

4. Low cost with high performance

Fig 3: GPS Component

Page 20: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2396 | P a g e

3.1.6 Announcement System Announcement system is nothing but a speaker or headphone which is connected at the output of the system for

announcement purpose. As per the system application, according to the visual based guide, the respective saved

audio file is played using a speaker or headphone.

3.1.7 SD Card SD card is basically is used as an storage device which will required to store the required data. The system

database can be used to store in SD card in the form of .wav file and can be accessed from that whenever it is

required. SD card is interfaced with the system using a protocol called SPI protocol.

3.1.8 Accelerometer An accelerometer is an electromechanical device that will measure acceleration forces. These forces may be

static, like the constant force of gravity pulling at your feet, or they could be dynamic - caused by moving or

vibrating the accelerometer. By measuring the amount of static acceleration due to gravity, you can find out the

angle the device is tilted at with respect to the earth. By sensing the amount of dynamic acceleration, you can

analyze the way the device is moving. Accelerometers use the piezoelectric effect - they contain microscopic

crystal structures that get stressed by accelerative forces, which cause a voltage to be generated. Another way to

do it is by sensing changes in capacitance. If you have two microstructures next to each other, they have a

certain capacitance between them.

3.1.9 GSM Modem GSM (Global System for Mobile communication) is a digital mobile telephony system. With the help of GSM

module interfaced, we can send short text messages to the required authorities as per the application. GSM

module is provided by SIM uses the mobile service provider and send SMS to the respective authorities as per

programmed. This technology enables the system a wireless system with no specified range limits. GSM uses a

variation of time division multiple access (TDMA) and is the most widely used of the three

digital wireless telephony technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then

sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the

900 MHz or 1800 MHz frequency band.

3.1.10 IR Obstacle Sensor Here we are connecting an IR based obstacle sensor. The 50 ohm resister is used for current limiting. The

current through the LED is 5v / 50 ohm = 100 mump, which is high for an LED. But to increase the range of the

obstacle sensor we are using a lower range resistor (50 ohm).On the receiver side we have connected the IR

receiver in reverse bias. So as soon as the light falls in the IR receiver, the anode voltage increases and when the

anode voltage is more than the cathode voltage then the LED in forward bias mode and start conducting.

3.1.11 Ultrasonic Sensor Ultrasonic sensors are basically used to measure the distances between the obstacle / object and the sensor. The

ultrasonic sensor works on Doppler Effect. It consists of a ultrasonic transmitter and a receiver. The transmitter

transmits the signal in one direction. This transmitted signal is then reflected back by the obstacle and received

Page 21: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2397 | P a g e

by the receiver. So the total time taken by the signal to get transmitted and to received back will be used to

calculate the distance between the ultrasonic sensor and the obstacle.

Fig 4: Working of Ultrasonic Sensor

3.1.12 Voice System Hm2007 The speech recognition is a complete easy to build programmable speech recognition circuit. Programmable in

the sense that you train the words (or vocal utterances) you want the circuit to recognize. This system allows

you to experiment with many facets of speech recognition technology.

IV. CONCLUSION

An attempt has been made to make a compact and portable device which is exclusively designed for visually

impaired people. It will allow the visually impaired person to travel through an unfamiliar environment with

ease. It can be said that the project provides Silicon Eye for visually impaired people.

REFERENCES

[1] Alshbatat, Abdel Ilah Nour "Automated Mobility and Orientation System for Blind or Partially."

INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS 568-582,

2013

[2] Harshad Girish Lele, Viten Vilas Lonkar, Varun Vasant Marathe, Mrunmayi Mohan Modak. "Electronic

path guidance for visually impaired people " The International Journal Of Engineering And Science

(IJES), 09-14, 2013

[3] Mahdi Safaa A., Muhsin Asaad H. and Al-Mosawi Ali I. "Using Ultrasonic Sensor for Blind and Deaf

persons Combines Voice." International Science Congress Association 50-52, 2012

[4] Lamya El alamy, Sara Lhaddad, Soukaina Maalal, Yasmine Taybi,Yassine Salih-Alj "Bus Identification

System for Visually Impaired Person."International Conference on Next Generation Mobile Applications,

Services and Technologies, pp.13-17, 2012.

[5] A. R. Garcia, R. Fonseca. A. Duran. "Electronic long cane for locomotion improving on visual impaired

people" IEEE, pp.58-61, 2011

[6] S. Sai Santhosh, T. Sasiprabha, R. Jeberson,. "BLI – NAV Embedded Navigation System for Blind People."

IEEE 277-282, 2010

Page 22: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2398 | P a g e

[7] Mohd Helmy Abd Wahab, Amirul A. Talib, Herdawatie A.Kadir, Ayob Johari, A.Noraziah, Roslina M.

Sidek, Ariffin A. “Smart cane: assistive cane for visually Impaired people”, IJCSI, Vol.8 Issue 4, July

2011.

[8] http://www.who.int/topics/blindness/en/index.html

[9] “Electronic Interfaces Aiding the Visually Impaired in Environmental Access, Mobility and Navigation”

978-1-4244-7562-9/107©2010 IEEE.POLAND, pp. 13-15, 2010

[10] Shripad Bhatlawande, Manjunatha Mahadevappa, Jayanta Mukherjee, Mukul Biswas “Design,

Development and Clinical Evaluation of the Electronic Mobility Cane for Vision Rehabilitation”

10.1109/TNSRE.2014.2324974, IEEE Transactions on Neural Systems and Rehabilitation Engineering

[11] G.Gayathri, M.Vishnupriya, R.Nandhini, Ms.M.Banupriya “SMART WALKING STICK FOR

VISUALLY IMPAIRED”International Journal Of Engineering And Computer Science ISSN:2319-7242

Volume 3 Issue 3 March, 2014 Page No. 4057-4061

[12] Nandhini.N , Vinoth chakkaravarthy.G , G.Deepa Priya “Talking Assistance about Location Finding

both Indoor and Outdoor for Blind People” International Journal of Innovative Research in Science,

Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 2, February 2014.

[13] Arijit Datta “Advanced GPS & GSM Based Navigation System for Blinds” International Journal for

Research in Technological Studies Vol. 1, Issue 6 May 2014 | ISSN (online): 2348-1439.

[14] Srimathi Manickam, Proceeding of 5th national conference on VLSI, embedded, and communication and

networks ISSN:2320-0790. April 17 2014.

Page 23: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2399 | P a g e

A REVIEW OF CLOUD COMPUTING THREATS &

SECURITY ISSUES

1 Rahul Singh, 2 Punyaban Patel, 3Preeti Singh

1, 2, 3 Department of Computer Science & Engineering, CSIT, Durg (India)

ABSTRACT

As Cloud Computing is maturing with time, from being a buzzword & an exciting opportunity for the IT circle to

becoming a real, concrete technological model for organizations & businesses which they can migrate to and

take advantages of the features, freedoms & chances it offers. Anyone who aims to be successful in the near

future is working on getting the most out of this promising paradigm. With most opportunities & new

unexplored paths there are some risks involved. The cloud computing model is also a new avenue for the non-IT

world & everyone has their doubts & concerns. Security is the biggest concern among all the people &

organizations whether they are cloud users or cloud service providers. Whenever someone uploads data to a

remote location either for storage or processing, there is some worry about its safety. This Paper gives study of

cloud computing risks and serves as a source for threat recognition that will help cloud clients and vendors to

settle on educated choices about risk relief inside a cloud environment. Keywords – Attacks, Cloud Computing, Data Breach, DoS attack, Risk, Security, Threats, Virtualization

I. INTRODUCTION

In the recent past, cloud computing has developed from being just a promising business idea to one of the fastest

growing segments of the IT industry. It is providing seemingly boundless infrastructure to store consumer data

and execute programs. Today Cloud Computing is a booming deployment option for IT firms as Small and

Medium Business companies are realizing the potential of the idea that simply by moving onto the cloud they

can gain fast access to best business applications or remarkably improve their infrastructure resources, all at

very slim costs. The cloud offers several benefits like fast deployment, pay-for use, lower costs, scalability,

rapid provisioning, rapid elasticity, ubiquitous network access, greater resiliency, hypervisor protection against

network attacks, low-cost disaster recovery and data storage solutions, on-demand security controls, real time

detection of system tampering and rapid re-constitution of services [25].

Whenever a company is moving to the cloud or anyone is looking to use any of the cloud services the biggest

concern is of security. The cloud service providers hold the responsibility of any problems if things go wrong,

thus the providers must make sure that they get the security aspects right. According to IHS the global market

for cloud computing in April 2014 was estimated at about $70 billion, and is estimated to grow to about $250

billion by 2017 [42]. 42% of IT decision makers are planning to increase spending on cloud computing in 2015,

with the greatest growth in enterprises with over 1,000 employees [41]. Everybody and anybody who is going to

be successful in the next decade or so has a plan to attack the cloud. The traditional enterprise IT players,

Page 24: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2400 | P a g e

whether they're on the hardware side or on the software side, whether it's an Oracle and a Microsoft or a Cisco

or an Avaya, or an HP or a Dell, has a plan to essentially address the cloud [42]. Fig.1 shows the top five

estimated tech spending increases in 2015. Cloud computing comes second, behind security technologies. This

graphic depicts the overall spending of the IT industry. As one would expect security is the most focused issue

in the IT world at the moment. And the sub-section of Cloud Computing is also expected to follow the trend.

Security is the most vital issue in the Cloud environment.

The next section acquaints the readers to the Cloud Computing Paradigm. The definitions, characteristics,

service & deployment models are presented. The section after that focuses on the threats & security issues

pertaining to the cloud environment. Various concerned issues & kinds of attacks are discussed.

Fig. 1: Top Five Forecasted Tech Spending Trends in 2015

II. THE CLOUD COMPUTING PARADIGM

Cloud Computing is a fairly new paradigm that has made quite an impact on the world of computing. It is said

to have evolved from Grid Computing, which is a model that gives the capacity to perform higher throughput

processing by exploiting numerous arranged machines to model a virtual machine architecture that has the

capacity appropriate procedure execution over a parallel infrastructure. Cloud computing refers to both the

applications conveyed as services over the Internet and the hardware infrastructure and programming platform

in the data centres that provide those services. It gives the facility to access shared resources and common

Page 25: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2401 | P a g e

infrastructure, offering services as needed over the networked system to perform operations that meet changing

business needs, and all the while, end users are unaware of the location of physical resources and devices being

accessed. Fig.2 illustrates the cloud computing model.

2.1 Definitions of Cloud Computing

The term “Cloud Computing” itself doesn’t hint anything about what it means to anyone who doesn’t already

know what it is [30]. Many experts have given many definitions of the paradigm. Armbrust et al. (2009)

postulate: “Cloud Computing refers to both the applications delivered as services over the Internet and the

hardware and systems software in the data centers that provide those services. The services themselves have

long been referred to as Software as a Service (SaaS). The data center hardware and software is what we call a

Cloud” [1]. According to National Institute of Standard and Technology cloud is defined as “Cloud computing

is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable

computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned

and released with minimal management effort or service provider interaction”. This cloud model is composed of

five essential characteristics, three service models, and four deployment models [20]. Vaquero et al. (2009)

summarize proposed definitions and introduce a new one: “Clouds are a large pool of easily usable and

accessible virtualized resources (such as hardware, development platforms and/or services). These resources can

be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource

utilization. The pool of resources is typically exploited by a pay-per-use model in which guarantees are offered

by the Infrastructure Provider by means of customized SLAs” [37].

Fig. 2: The Cloud Computing Model

Page 26: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2402 | P a g e

2.2 Essential Characteristics of Cloud Computing

· On-demand self-service: The consumer has the control over which service of the provided options he

or she is going to use & how much, as and when needed without any human interaction [30].

· Broad network access: Usually the Internet is the medium for providing services. These services can be

accessed through any device that has the capacity to access the internet, may it be a desktop computer,

a laptop or a mobile phone.

· Resource pooling: All the computing resources of the provider are pooled together in order to serve

multiple clients simultaneously. The resources, physical or virtual are assigned & revoked depending

on the user demand in real time. The users have no idea about the resources being provided are located.

They can be in a different country or even on a different continent [30].

· Rapid elasticity: There is a high degree of flexibility when it comes to the capabilities. They can be

increased or decreased, depending on the demand. It seems to the user that there are unlimited

resources at their disposal & they can use them, of-course on a pay-per-use basis.

· Measured service: Cloud systems manage & optimize the utilization of resources at some level of

abstraction depending on the type of service by applying measured use of the service. This provides

transparency between the provider & user of the service can be observed, kept in check & reported.

2.3 Cloud Computing Service Models

There are basically three service models in the Cloud Model, i.e. the services can be provided to the clients in

three forms. These service models are discussed next. Fig.3 illustrates the service models as layers that run one –

over – another & lists some examples of the available services.

· Software as a service (SaaS): In this model, the cloud client exploits programming running on the cloud

supplier's foundation as opposed to on the client's own particular equipment. The applications needed

are available from different customer gadgets through either a thin client interface, for example, a web

program (online email), or a program interface. In SaaS administrations, the client has no power over

the fundamental cloud framework, getting to applications through a web program or separate project

interface. An alternate definition of XaaS (Everything as a Service) that may comprehensively be

incorporated in SaaS is CaaS (Communication as a Service), which incorporates cloud administrations

for messaging and Voice Over Internet Protocol (VOIP).

· Platform as a service (PaaS): In this model, the cloud clients use their own applications and information

on stage devices, including programming apparatuses, having a place with and oversaw by the cloud

supplier. Application designers chipping away at portable applications generally utilize cloud-based

stages to create and dispatch their administrations. The cloud client does not oversee or control the

hidden cloud foundation, for example, system, servers, working frameworks, or capacity, yet has

control over the conveyed applications and maybe over arrangement settings for the application

facilitating environment.

· Infrastructure as a service (IaaS): In this model, the cloud supplier's transforming, stockpiling, systems

and other principal processing assets permit the cloud client to send and run programming, which can

Page 27: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2403 | P a g e

incorporate working frameworks and applications. The cloud client does not oversee or control the

fundamental framework however has control over working frameworks, stockpiling and conveyed

applications, and may have constrained control of select systems administration parts (for instance, host

firewalls). Making utilization of the flexibility of IaaS for information stockpiling and transforming

limit permits an association or venture to get to processing foundation in an adaptable and auspicious

way.

Fig. 3: Service Models in Cloud Computing

2.4 Cloud Computing Deployment Models

· Private Cloud – The cloud infrastructure is owned or leased by a single organization and is operated

solely for that organization.

· Community Cloud – Several organizations that have similar polices, objectives, aims and concerns

share the cloud infrastructure.

· Public Cloud – A large organization owns the cloud infrastructure and sells cloud services to industries

or public.

· Hybrid Cloud – It is combination of two or more clouds. It enables data and application probability.

2.5 Benefits of Cloud Computing

Some benefits of cloud computing can be listed as:

· Reduced Cost: Organizations don't have to build the infrastructure needed for their IT needs. This

reduces the cost for organizations that move to the cloud environments as they can get resources as and

when needed & make payments incrementally.

Page 28: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2404 | P a g e

· Increased Storage: Cloud storage services provide huge storage space at trifling rates. People and

organizations can get as much storage they need and store much more data than on private computer

systems.

· Highly Automated: The cloud users don't need to worry about software updates & don't have to sweat

to keep up with the ne advances in the technology.

· Flexibility: The cloud computing model offers much more flexibility in comparison to the traditional

computing methods as services can be utilized on-demand & scaled with the changing needs.

· More Mobility: People can access information & services whenever they want, wherever they are,

rather than having to stay tied to their desks.

· Allows IT to Shift Focus: Experts can focus on R&D, no longer having to worry about constant server

updates and other computing issues. Governments & organizations are free to concentrate on

innovation.

III. THREATS AND SECURITY ISSUES

Cloud computing environment is for the most part expected as a potential expense saver and in addition supplier

of higher administration quality. Security, Availability, and Reliability are the significant quality concerns of

cloud administration clients, recommends that security in one of the noticeable test among all other quality

challenges. Each of these models has an alternate effect on application security. There is various security issues

connected with cloud computing however these issues fall into two general classes: Security issues confronted

by cloud providers and security issues confronted by their clients. A discussion of the various cloud threats &

security issues follows.

3.1 Abuse of Cloud Services

This threat is more of an issue for cloud service providers than cloud consumers, but it does raise a number of

serious implications for those providers [23]. Cloud providers lend computing resources & services to all the

clients whether they are individuals or small or enormous corporations. The clients don't have to buy and keep

up a large number of servers, as cloud service providers rent them all the servers they need for moderate prices.

However not all clients utilize this power as a windfall. For an attacker to gauge the encryption keys will take

years with a solitary server. Yet with the assistance of a great many servers it will get to be anything but difficult

to gauge the keys inside minutes.

3.2 Account Hijacking

Account or Service Hijacking incorporates assaults like phishing, extortion, and abuse of software

programming. This security risk emerges because of loss of credentials. In the event that the attackers get access

to your ids and passwords, they can without much of a stretch get access to your classified information and

bookkeeping data. Additionally they can control or erase your information, return misrepresented data, and

sidetrack your customer to some illegitimate site. To maintain a strategic distance from this, the associations or

people ought to shield their passwords and certifications from being imparted in the middle of clients and

administrations. Additionally legitimate verification system ought to be utilized.

Page 29: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2405 | P a g e

3.3 Authentication and Authorization

Most companies, if not all, are storing their employee information in some type of Lightweight Directory

Access Protocol (LDAP) servers [25]. In the case of SMB companies, a segment that has the highest SaaS

adoption rate, Active Directory (AD) seems to be the most popular tool for managing users (Microsoft White

Paper, 2010). With SaaS, the software product and services are facilitated outside of the corporate firewall.

Numerous times client credentials are put away in the SaaS suppliers' databases and inside the corporate IT

infrastructure. This implies SaaS clients must not forget to remove or disable the accounts as workers leave the

organization and create/re-enable accounts as people come onboard. Fundamentally, having numerous SaaS

products will expand IT administration overhead. Case in point, SaaS suppliers can give appoint the validation

procedure to the client's inside LDAP/AD server, with the goal that organizations can hold control over the

administration of clients.

3.4 Availability

The SaaS application needs to guarantee that clients are provided services all day and all night. This includes

rolling out architectural improvements at the application and infrastructural levels to include versatility and high

accessibility. A multi-level architectural design needs to be embraced, backed by load balancing techniques of

utilization cases, running on a variable number of servers. Versatility to equipment/programming failures, and in

addition to Denial of Service (DoS) attacks, needs to be developed starting from the earliest stage the

application. At the same time, an appropriate action plan for business continuity (BC) and disaster recovery

(DR) needs to be considered for any unplanned emergencies. This is essential to ensure the safety of the

enterprise data and minimal downtime for enterprises [25].

3.5 Backup

The Cloud service providers need to make sure that all confidential & important information is regularly backed

up to facilitate quick recovery in case of power failures or natural disasters. The backup of the data should be

kept at different locations which are geographically far away from each other, thus, minimizing the chances of

the same disaster or problem affecting both the original data location and the back-up location. The backup data

should be updated at regular intervals. The use of effective & powerful encryption techniques is recommended

to protect the backup data from accidental leakage.

3.6 Data Access

Information access issue is primarily identified with security strategies gave to the clients while getting to the

information. In an ordinary situation, a little business association can utilize a cloud gave by some other supplier

to completing its business forms. This association will have its own security approaches in light of which every

representative can have entry to a specific set of information. The security strategies may entitle a few

contemplations wherein a percentage of the workers are not offered access to certain measure of information.

The cloud service model must be sufficiently adaptable to consolidate the particular approaches set forward by

the association. The model must additionally have the capacity to give hierarchical limit inside the cloud in light

of the fact that different association will be sending their business forms inside a solitary cloud environment.

Page 30: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2406 | P a g e

3.7 Data Breaches

The CIOs of every organization has the hallucination of losing their sensitive internal data to their competitors.

In November 2012, researchers from the University of North Carolina, the University of Wisconsin and RSA

Corporation released a paper describing the fact that if multiple virtual machines are running on a single

physical server, than it may be possible to extract the private cryptographic keys used on one virtual machine by

sitting on other virtual machine using side channel timing information. In a multitenant environment, if a flaw

exists in a single tenant’s application cloud allow an intruder to access the application of all the clients present in

the environment. The impact of data breaches can be reduced by encrypting the data, but if you lose your

encryption key, your data will be lost automatically. Multiple copies of data are prepared to reduce the impact of

data loss but it will increase your exposure to data breaches [11].

3.8 Data Confidentiality Issue

The definitional outskirts of cloud computing are tremendously bantered about today. Cloud computing includes

the offering or stockpiling by clients they could call their own data on remote servers claimed or worked by

others and gets to through the Internet or different associations. Cloud computing services exist in numerous

varieties, including information stockpiling locales, feature destinations, charge readiness locales, individual

health record sites and numerous more. The whole substance of a client's capacity gadget may be put away with

a solitary cloud supplier or with numerous cloud suppliers. At whatever point an individual, a business, a

legislature office, or some other element offers data in the cloud, protection or confidentiality inquiries emerge.

All this important data is very valuable & the confidentiality must be maintained.

3.9 Data Integrity

Data integrity is one of the most critical elements in any system. Data integrity is easily achieved in a standalone

system with a single database. Data integrity in such a system is maintained via database constraints and

transactions [25]. Usually ACID (atomicity, consistency, isolation and durability) properties are followed during

transactions to ensure the integrity of data. Enter the universe of SOA and Cloud computing, and the issue of the

data integrity gets amplified considerably more, as there is a blend of on-reason and SaaS applications

uncovered as administration. SaaS applications are multi-tenant applications facilitated by a third gathering.

SaaS applications typically uncover their usefulness through XML based APIs (Application Program

Interfaces). Additionally, in SOA based situations, numerous on-reason applications uncover their usefulness

through SOAP and REST web benefits too. One of the greatest difficulties with web administrations is exchange

administration. At the convention level, HTTP (Hyper Text Transfer Protocol) does not help exchanges or

ensured conveyance, so the main alternative is to execute these at the API level. Albeit there are gauges

accessible for overseeing information honesty with web administrations, for example, WS-Transaction and WS-

Reliability, these guidelines are not yet develop and relatively few sellers have executed these. Most SaaS

sellers uncover their web administrations APIs with no backing for exchanges. Additionally, every SaaS

application may have diverse levels of accessibility and SLA (administration level understanding), which further

muddles administration of exchanges and information respectability crosswise over numerous SaaS

applications.

Page 31: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2407 | P a g e

3.10 Data Locality

In the cloud scenario, the customer has no idea where the data is getting stored. In many a cases, this can be a

problem. Due to compliance and data privacy laws in various countries, locality of data is of utmost importance

in many enterprise architectures. For example, in many European and South American countries, certain types

of data cannot leave the country because of potentially sensitive information. In addition to the issue of local

laws, there’s also the question jurisdiction, if an investigation is underway.

3.11 Data Loss

For cloud clients, data loss is a standout amongst the most concerning issue. A man lost all his personal records

because of absence of data security by the cloud administration. Obviously, information put away in the cloud

can be lost because of different reasons also. A coincidental or physical disaster like fire and earthquake can

cause the loss of valuable data. Moreover, if a client transfer its information to the cloud in the wake of

scrambling it and loses the encryption key because of any reason, the information will be lost too.

3.12 Data Security

In a conventional computing software deployment model, the delicate data of every undertaking keeps on

staying inside the venture limit and is liable to its physical, coherent and staff security and access control

strategies. Nonetheless, in the cloud demonstrate, the undertaking information is put away outside the venture

limit, at the cloud merchant end. Therefore, the cloud vendor must embrace extra security checks to guarantee

information security and anticipate ruptures because of security vulnerabilities in the application or through

noxious workers. This includes the utilization of solid encryption systems for information security and fine-

grained approval to control access to information. Malicious users can exploit weaknesses in the data security

model to gain unauthorized access to data. The following assessments test and validate the security of the

enterprise data stored at the SaaS vendor [25]:

· Cross-site scripting [XSS]

· Access control weaknesses

· OS and SQL injection flaws

· Cross-site request forgery [CSRF]

· Cookie manipulation

· Hidden field manipulation

· Insecure storage

· Insecure configuration.

3.13 Data segregation

Multi-occupancy is one of the significant attributes of distributed computing. As a consequence of multi-

occupancy various clients can store their information utilizing the applications gave by SaaS. In such a

circumstance, information of different clients will live at the same area. Interruption of information of one client

by an alternate gets to be conceivable in this environment. This interruption could be possible either by hacking

Page 32: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2408 | P a g e

through the escape clauses in the application or by infusing customer code into the SaaS framework. A customer

can compose a veiled code and infuse into the application. In the event that the application executes this code

without confirmation, then there is a high capability of interruption into other's information. A SaaS model

ought to in this manner guarantee a reasonable limit for each client's information. The limit must be guaranteed

at the physical level as well as at the application level. The administration ought to be sufficiently insightful to

isolate the information from diverse clients. A malicious user can use application vulnerabilities to handcraft

parameters that bypass security checks and access sensitive data of other tenants. The following assessments test

and validate the data segregation of the SaaS vendor in a multi-tenant deployment [25]:

· SQL injection flaws

· Data validation

· Insecure storage

3.14 Denial of Service

Denial-of-service attack is like being caught in rush-hour traffic gridlock: there is no way to get to your

destination, and nothing you can do about it except sit and wait [23]. As a client, administration blackouts baffle

you, as well as power you to re-evaluate whether moving your discriminating information to the cloud to lessen

framework expenses was truly beneficial when its all said and done. Since cloud suppliers regularly bill

customers in view of the process cycles and circle space they expend, there is the likelihood that an assailant

will be unable to totally thump your administration off of the net, however may at present reason it to devour so

much transforming time that it gets to be excessively lavish for you to run and you will be compelled to bring it

down yourself.

3.15 Identity Management and Sign-On Process

Identity management (IdM) or ID management is a broad administrative area that deals with identifying

individuals in a system (such as a country, a network or an organization) and controlling the access to the

resources in that system by placing restrictions on the established identities. Identity management can involve

three perspectives [25]:

1. The pure identity paradigm: Creation, management and deletion of identities without regard to access

or entitlements.

2. The user access (log-on) paradigm: For example: a smart card and its associated data used by a

customer to log on to a service or services (a traditional view).

3. The service paradigm: A system that delivers personalized role based, online, on-demand, multimedia

(content), presence based services to users and their devices.

3.16 Insecure Interfaces & APIs

The interfaces or APIs used to interact with the service providers are prone to risks by attackers [11]. Most

providers strive to ensure security is well integrated into their service models, it is critical for consumers of

those services to understand the security implications associated with the usage, management, orchestration and

Page 33: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2409 | P a g e

monitoring of cloud services. Reliance on a weak set of interfaces and APIs exposes organizations to a variety

of security issues related to confidentiality, integrity, availability and accountability [23].

3.17 Insufficient Due Diligence

Cloud computing is a standout amongst the most built up IT developments. Numerous organizations being

pushed to the cloud without a complete understanding of Cloud Service Provider (CSP) environment. Because

of this associations are assuming obscure level of danger. By embracing cloud advancements without fitting

comprehension will leave the association with number of issues. The gauge for any association to embrace this

new innovation is that they must have proficient assets and perform broad interior and CSP due diligence to

understand the concepts.

3.18 Malicious Insiders

A malicious insider, for example, a system programmer, in a improperly outlined cloud scenario can have access

to possibly sensitive data. From IaaS to PaaS and SaaS, the malicious insider has expanding levels of access to

more discriminating frameworks, and inevitably to information. Frameworks that depend exclusively on the

cloud service provider (CSP) for security are at extraordinary hazard here. Regardless of the possibility that

encryption is actualized, if the keys are not kept with the client and is just accessible at information use time, the

framework is still defenceless against malicious insider assault.

3.19 Network Security

In a cloud deployment model, sensitive data is obtained from the enterprises, processed by the SaaS application

and stored at the cloud vendor end. All data flow over the network needs to be secured in order to prevent

leakage of sensitive information. This involves the use of strong network traffic encryption techniques such as

Secure Socket Layer (SSL) and the Transport Layer Security (TLS) for security [25].

3.20 Shared Technology Issues

A trade off of an essential bit of imparted innovation, for example, the hypervisor, an imparted stage segment, or

an application in a SaaS environment uncovered more than simply the traded off client; rather, it uncovered the

whole environment to a capability of trade off and rupture. This defencelessness is risky on the grounds that it

possibly can influence a whole cloud without a moment's delay.

3.21 Vulnerability in Virtualization

Virtualization is one of the principle sections of a cloud environment. In any case this stances significant

security danger. Guaranteeing that diverse occasions running on the same physical machine are secluded from

one another is a noteworthy undertaking of virtualization which is not met totally in today's situation. The other

issue is the control of overseer on host and visitor working frameworks. Current VMMs (Virtual Machine

Monitor) don't offer impeccable confinement. Numerous bugs have been found in all mainstream VMMs that

permit getting away from VM. Virtual machine monitor ought to be 'root secure', implying that no benefit inside

the virtualized visitor environment grants obstruction with the host framework. Some vulnerability has been

Page 34: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2410 | P a g e

found in all virtualization software which can be exploited by malicious, local users to bypass certain security

restrictions or gain privileges [25]. For example, the vulnerability of Microsoft Virtual PC and Microsoft Virtual

Server could allow a guest operating system user to run code on the host or another guest operating system.

IV. CONCLUSION

There is no doubt what so ever that cloud computing is providing benefits to IT enterprises with its various

facilities and on demand services in a cost effective manner. Every business whether big or small can benefit

from moving to the clouds. But there are various challenges and security problems which everyone must

consider before transferring the data to a cloud. Data Security is the biggest challenge faced by the cloud

community. So the way to better nature of administration and fruitful cloud computing activities is to have a

harmony in the middle of profits and the related risks. Cloud suppliers ought to include more assets and security

approaches to shield themselves from noxious assaults. This paper has presented an overview of most of the

issues concerning the security aspect of the cloud paradigm. As the clouds are in continual developmental phase,

the researchers have a lot of challenges in handling the security threats, energy conservation, resource

management, scheduling strategies, interoperability and reliability in cloud computing and make it a successful

and profitable technology.

REFERENCES

[1]. Armbrust M., et al. "A View of Cloud Computing", Communications of the ACM, April 2010, vol. 53,

no. 4, pg: 50-58, DOI:10.1145/1721654.1721672

[2]. Ashktorab V., Taghizadeh S.R., "Security Threats and Countermeasures in Cloud Computing", IJAIEM,

ISSN 2319 - 4847, Volume 1, Issue 2, October 2012, pg: 234-245

[3]. Buyya R., Yeo C. S., Venugopal S., Broberg J., and Brandic I., "Market-Oriented Cloud Computing:

Vision, Hype, and Reality for Delivering IT Services as Computing Utilities", in proceedings of the 10th

IEEE International Conference on High Performance Computing and Communications, HPCC'08,

Dalian, China, Sept. 2008.

[4]. Buyya R., Yeo C. S., Venugopal S., Broberg J., and Brandic I., "Market-Oriented Cloud Computing:

Vision, Hype, and Reality of Delivering Computing as the 5th Utility", Proceedings of the 2009 9th

IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGRID '09, ISBN: 978-0-

7695-3622-4 DOI: 10.1109/CCGRID.2009.97

[5]. Buyya, R., Broberg, J., Goscinski, A., "Cloud Computing: Principles and Paradigms", Wiley, 2011,

ISBN: 978-81-265-4125-6

[6]. Choubey R., Dubey R.,, Bhattacharjee J., "A Survey on Cloud Computing Security, Challenges and

Threats", IJCSE, ISSN: 0975-3397Vol. 3 No. 3, Mar 2011, pg: 1227-1231

[7]. Dargan S., "Security Threats in Cloud Computing Environment", Journal Of Information, Knowledge

And Research In Computer Engineering, ISSN: 0975 – 6760, VOLUME – 03, ISSUE – 02, pg: 619-621

Page 35: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2411 | P a g e

[8]. Devangan K.K., Wanjari A., Dewangan S.K., "A Valued Analysis of Information Security, Threats and

Solutions for Cloud Computing", IJARCSEE, ISSN: 2277 – 9043, Volume 2, Issue 9, September 2013,

pg: 648-658

[9]. Dhingra M., "Cloud Data Encryption Ensuring Security", International Journal of Engineering Research

& Technology (IJERT), ISSN: 2278-0181, Vol. 4 Issue 01, January-2015, pg: 62-64

[10]. Gharehchopogh F.S., Rezaei R., Maleki I., "Mobile Cloud Computing: Security Challenges for Threats

Reduction", International Journal of Scientific & Engineering Research, ISSN: 2229-5518, Volume 4,

Issue 3, March-2013

[11]. Gupta S., Khandelwal S., "Cloud Computing Security Threats", International Journal of Engineering

Research & Technology (IJERT), ISSN: 2278-0181, Vol. 4 Issue 01, January-2015, pg:20-22

[12]. Hayes B., “Cloud computing”, Communications of the ACM, July 2008, Vol. 51, No. 7, pg. 9-11, DOI:

10.1145/1364782.1364786.

[13]. Inbarani W.S., et al., "A Survey on Security Threats and Vulnerabilities In Cloud Computing",

International Journal of Scientific & Engineering Research, ISSN 2229-5518, Volume 4, Issue 3, March -

2013, pg: 1-4

[14]. Joshi A.G., Shele R.R., "Overview on Security Threats and Solutions in Cloud Computing", International

Journal of Computer, Information Technology & Bioinformatics (IJCITB), ISSN: 2278-7593, Volume-2,

Issue-2, pg: 1-5

[15]. K. Valli Madhavi et al, "Cloud Computing: Security Threats and Counter Measures", International

Journal of Research in Computer and Communication technology, IJRCCT, ISSN: 2278-5841, Vol 1,

Issue 4, September 2012

[16]. K.L.Neela, V.Kavitha, R.K.Ramesh, "Cloud Computing: Threats and Security Issues", IJESRT, ISSN:

2277-9655, Vol. 2 Issue 8 Aug 2013, pg: 2070-2072

[17]. Kumar P. et al. "Security Threats to Cloud Computing", International Journal of IT, Engineering and

Applied Sciences Research (IJIEASR) ISSN: 2319-4413, Volume 2, No. 1, December 2013, pg: 25-29

[18]. Lee K., "Security Threats in Cloud Computing Environments", International Journal of Security and Its

Applications, Vol. 6, No. 4, October 201 2, pg: 25-32

[19]. Makkar G.D., Panwar V., "Cloud Computing Security: Risks and Threats", IJETTCS, ISSN 2278-6856,

Volume 3, Issue 2, March – April 2014, pg: 111-116

[20]. Mell P., Grance T., "The NIST Definition of Cloud Computing", NIST Special Publication 800-145,

September 2011, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

[21]. Muthukumar V.P., Saranya R., "A Survey on Security Threats and Attacks in Cloud Computing",

Computer Science International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693,

Volume-2, Issue-11, pg: 120-125

[22]. Nicho M., Hendy M., "Dimensions Of Security Threats In Cloud Computing: A Case Study", Review of

Business Information Systems – Fourth Quarter 2013, Volume 17, Number 4, pg: 159-170

[23]. Raju M., Lanitha B., "Survey about Cloud Computing Threats", (IJCSIT) International Journal of

Computer Science and Information Technologies, Vol. 5 (1) , 2014, pg: 384-389

[24]. Rot A., Sobinska M., "IT Security Threats in Cloud Computing Sourcing Model", Proceedings of the

2013 Federated Conference on Computer Science and Information Systems, pp. 1141–1144

Page 36: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2412 | P a g e

[25]. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing",

Elsevier Journal of Network and Computer Applications 34 (2011), pg: 1–11

[26]. Sabahi F., "Cloud Computing Security Threats and Responses", 978-1-61284-486-2/11/pg: 245-249,

©2011 IEEE

[27]. Shah B., Vania J., "A Literature Survey on Virtualization Security Threats in Cloud Computing",

International Journal of Science and Research (IJSR), ISSN (Online): 2319-7064, Volume 3 Issue 12,

December 2014, pg: 1137-1140

[28]. Shaikh F.B., Haider S., "Security Threats in Cloud Computing", 6th International Conference on Internet

Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates, 978-1-

908320-00-1/11/pg: 214-219 ©2011 IEEE

[29]. Singh R., Patel P., "Cloud Computing vs. Grid Computing: A Comparison”, in the Proceedings of

ICETPITM – 2015, International Conference on Exploring Trends and Practices in Information

Technology and Management, 5’Th – 6’Th January, 2015, St. Aloysius’ College, Jabalpur, M.P.

[30]. Singh R., Patel P., Sahoo B., “A Compendium of Cloud Computing”, International Journal of Advance

Computing Technique and Applications (IJACTA), ISSN: 2321-4546, Vol. 2, No. 1 (January, 2014), pg:

073-079

[31]. Solanke V.S., Kulkarni G.A., Katgaonkar P., Gupta S., "Mobile Cloud Computing: Security Threats",

Proceedings of International Conference on Electronics and Communication Systems (ICECS'14), pg:

550-553

[32]. Soofi A.A., Khan M.I., Fazal-e-Amin, "Encryption Techniques for Cloud Data Confidentiality",

International Journal of Grid Distribution Computing, ISSN: 2005-4262, Vol.7, No.4 (201 4), pp.1 1 -20,

http://dx.doi.org/10.14257/ijgdc.2014.7.4.02

[33]. Srivastava P., Chandan R.R., Singh R.K., "A perspective view of security threats in cloud Computing",

National Conference on Challenges & Opportunities to Computer science & Information technology in

Next Generation, (COTII-13),16thfeb-2013,AIMT,Lucknow

[34]. Te-Shun Chou, "Security Threats on Cloud Computing Vulnerabilities", International Journal of

Computer Science & Information Technology (IJCSIT) Vol 5, No 3, June 2013, pg: 79-88, DOI :

10.5121/ijcsit.2013.5306

[35]. Tiwari D., Dhariwal M.K., Kesharwani A., Tehariya S.K., "Security Threats in Cloud Computing",

IJMEMR, ISSN: 2320-9984 (Online), Volume 1, Issue 4, December 2013, pg: 5-12

[36]. Tiwari D., Tiwari D., "A survey ofcloud computing security threats", Proceedings of the International

Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV, pg: 47-51

[37]. Vaquero L. M., Rodero-Merino L., Caceres J., Lindner M., "A Break in the Clouds: Towards a Cloud

Definition", ACM SIGCOMM Computer Communication Review, Volume 39, Number 1, January 2009,

pg: 50-55

[38]. Yadav A.R., "Identified Vulnerabilitis And Threats In Cloud Computing", IOSR Journal of Computer

Engineering (IOSR-JCE), e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan –

Feb. 2015), pg: 01-04

[39]. Zhang Q., Cheng L., Boutaba R., "Cloud computing: state-of-the-art and research challenges", J Internet

Serv Appl (2010) 1: 7–18, Springer, DOI 10.1007/s13174-010-0007-6

Page 37: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2413 | P a g e

[40]. Collett S., 'Forecast 2015: IT spending on an upswing",

http://www.computerworld.com/article/2840907/forecast-2015-it-spending-on-an-upswing.html,

accessed March 2015

[41]. Columbus L., "Roundup Of Cloud Computing Forecasts And Market Estimates, 2015",

http://www.forbes.com/sites/louiscolumbus/2015/01/24/roundup-of-cloud-computing-forecasts-and-

market-estimates-2015/, accessed March2015

[42]. Rebello J., IHS Technology, https://www.ihs.com/articles/videos/enterprise-cloud-computing.html,

accessed March 2015

Page 38: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2414 | P a g e

SELECTIVE HARMONIC ELIMINATION WITH

REDUCED SWITCH TOPOLOGY IN MULTILEVEL

INVERTER Mrs. Sarika D Patil1, Sumant G Kadwane2

1Department of Electrical Engineering, Rajiv Gandhi College of Engineering & Research,

RTMNU Nagpur, (India) 2Department of Electrical Engineering, Yeshwantrao Chavan College of Engineering,

RTMNU Nagpur, (India)

ABSTRACT

A generalized formulation of Selective Harmonic Elimination (SHE) PWM for Multilevel Inverter is recently

formulated in literature which can eliminate a large number of lower order harmonics. Various methods for

calculating the firing angles for SHE PWM are known and still research in this area is ongoing. This paper

presents a MATLAB based approach for modeling and simulation method suitable for studying SHE methods

using Newton Raphson Method with reduced switch topology to apply them in various applications. In this

paper a cascaded 3-Phase, 7- Level, H-bridge Multilevel Inverter with reduced switch topology using

MATLAB/Simulinkc blocks is presented as a systematic approach. The primary contribution of this paper is that

the Simulink model developed can also be extended for higher level inverter applications also. The proposed

Model can generate stepped voltage waveform and can be programmed for a wide range of modulation indices.

Keywords: CHB-Cascaded H-Bridge, MLI- Multilevel Inverter, PWM – Pulse Width Modulation,

Reduced switch circuit. SHE- Selective Harmonic Elimination

I. INTRODUCTION Recently Multilevel Inverters are widely used in many industrial applications, where the requirement is medium

voltage and high power. Multilevel Inverter has been widely used for chemical, oil, and liquefied natural gas

plants, water plants, marine propulsion, power generation, energy transmission, and power-quality devices,

FACTS Devices [1-3]. Cascaded H-bridge converter topology is prominently used and particularly useful for

renewable energy and DSTATCOM applications [4-6]. While in comparison with traditional two-level voltage

source inverters, multilevel inverters have several advantages. The generalized problem for SHE is presented in

various papers having nonlinear equations with advanced computing methods like genetic algorithm, particle

swarm optimization, bee algorithm and bacterial foraging [8],[9],[10]. These papers primarily focus on the

method of solving the nonlinear equations but not the exact formulation of SHE problem with

MATLAB/Simulink. While this paper attempts to formulate the in depth MATLAB/Simulink based simulation

of SHE problem with Newton Raphson iterative Method with reduced number of switches.

Page 39: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2415 | P a g e

II.SWITCH REDUCTION TOPOLOGY

The number of power electronic switches (IGBTs and gate drives) in the single phase of suggested topology is

given by

Where k is the number of switches,

In the conventional cascaded multilevel inverter the number of power switches is given by

Fig. 4 compares the number of switches with the conventional cascaded multilevel inverter. As shown in this

figure, the suggested topology needs fewer switches for realizing m level voltages for output. This point reduces

the installation area and the number of the gate driver. For example, to generate seven levels of output voltage

(m=7), proposed topology needs 10 switches and conventional cascaded H-bridge multilevel inverter requires

12 switches. The main H-bridge cell of one inverter used for implementation of the multilevel inverter. The

full bridge inverter module includes four power switches to form an H-bridge. The Reference sine wave

is generated sine block with 120° displacement for each phase and amplitude as per the modulation index

requirement. Fig. 1 shows final configuration of seven level multilevel inverter with reduced switch connected

to the cascaded basic unit which reverse alternate waveform to get positive, zero and negative levels. For 0 < t <

(T/2), Sa, Sb are fired together and positive half of Vout is generated, for (T/2) < t < T, Sc, Sd are on and negative

half of output waveform is produced. It is obvious that period time of Vo is half of period time of Vout.. In

suggested topology, the maximum number of output phase voltage is given by

n, m are the number of DC voltage sources and the maximum number of levels of phase voltage, respectively. In

the conventional cascaded multilevel inverter, the relation between the number of DC voltage source and the

maximum number of levels of output phase voltage is similar to suggested topology. As a result, for the same

number of output phase voltage, the number of DC voltage source is the same. A multilevel cascade inverter

consists a number of H-bridge cells that are connected in series per phase, and each module requires a

separate DC source to generate voltage levels at the output of inverter. MATLAB/Simulink Model is designed

for Three Phase 7-Level Multilevel Inverter with three different firing angles as θ1, θ2 and θ3. These constant

values of firing angles are then compared with the sine wave through comparator and given to gate pulses of

respective switches(IGBT) in H- Bridge Model. For three phase generation the angles are displaced by 120° in

each phase.

Fig.1 Seven-Level Multilevel Inverter

Page 40: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2416 | P a g e

v0

Time

T/2T

3vin

2vin

vin

-vin-2vin

-3vin

4 5 7 9 11 13

812162024

Cascaded H-bridge Inverter

Suggested Topology

No of switches

No. of voltage levels Fig.2 Output voltage waveform of 7-level Fig.3 Comparison of switches to output

multilevel inverter voltage levels

Total 3 H-Bridges per phase are configured in subsystem as shown in Fig.1. The input to the gate pulse of this

H-Bridge is given through input S1-S4. According to this, stepped waveform is obtained at the output side as

shown in Fig. 2.. Although the simulation is carried out for 7-Level inverter the number of H-Bridge block can

be added to increase the level as per formula given in (3) and number of switches required for suggested

topology is as shown in Fig.3. The results of this scheme are presented in section IV.

III. SELECTIVE HARMONIC ELIMINATION The dead band is not considered in this simulation model and complementary pulse is fed to the upper and lower

switches of each leg of H bridge inverter. Here sine wave is compared with firing angle θ. We need to calculate

the proper values of θ for evaluating the SHE algorithm. The values of three firing angles are set as θ1

=0.2129(rad), θ2 = 0.2996(rad) and θ3 =0.4107(rad).The H-Bridge blocks are connected in series to build a

phase for seven level multilevel inverter and three phases are build to form the entire three phase inverter. The

corresponding firing angles are generated through constants as per the values of θ. The Fourier series expansion

of the general multilevel stepped output voltage is given in (4), where n is the harmonic number of the output

voltage of inverter.

The switching angles can be chosen to obtain minimum voltage harmonics. Normally, these angles are chosen

so as to cancel the predominant lower frequency harmonics. The major difficulty for selective harmonic

elimination methods, including the fundamental switching frequency method and the Virtual Stage PWM

method, is to solve the transcendental equations for switching angles. To satisfy fundamental voltage and to

eliminate 5th and 7th harmonics, three nonlinear equations are as follows. These equations are solved by

iterative method such as the Newton-Raphson method suggested in [10]

(5)

(6)

Page 41: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2417 | P a g e

(7)

IV. RESULTS AND DISCUSSIONS

Configuration shown in Fig. 1 has been simulated using MATLAB/SIMULINK to verify the capabilities of

mentioned inverter.

Fig.4 shows the PWM generated for 1-Phase of the multilevel Inverter fed to each switch of respective H-

Bridges connected in series. It is quite evident that these PWMs combined together results into a 7-Level

PWM pattern. The pattern of firing pulses is shown in Fig.4(A). The phase voltage of seven level inverter as

per the simulation explained in section 3. is shown in Fig.4(B). The DC sources of 12V each are used in the H-

Bridge blocks. The results show the step changes of 12V each and resulting amplitude of V36± amplitude of

the phase voltage. In consistent with these results the magnitude of V72± appears in Line Voltages as shown

in Fig. 4(C). The corresponding harmonics order in Bar Graph and List is obtained in Fig.4(D). These results are

obtained through FFT Analysis from Power GUI Block. The results are shown for modulation index M = 0.8.

Table 1:Switching Angles for M=0.8 Table 2: % of Harmonics & THD

M θ1 θ2 θ3

0.8 0.2129 0.2996 0.4107

5th Harmonic 7th Harmonic THD

0.35% 0.07% 12.51%

The results obtained from simulation of MATLAB/Simulink shows that the harmonic THD contents are

12.5% for phase voltage and 9.45% in line voltage using SPWM modulator. The third, fifth and seventh

harmonics are within 1% tolerance. 9th harmonic shall be automatically cancelled and other higher order

harmonics can be eliminated by conventional filter. While it is to be noted that the fundamental harmonic is

preserved and selected order of harmonics are very small which strongly confirms the validity of proposed

system.

0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20

0.5

1

Time, s

PWM

1

0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20

0.5

1

Time, s

PWM

2

0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20

0.5

1

Time, s

PWM

3

(A)

Page 42: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2418 | P a g e

(B)

(C)

(D)

Fig. 4 (A)Firing Pulses, (B) Phase voltage (C) Line voltage (D) Bar graph of FFT Analysis of line

voltage

V. CONCLUSION

In this study, the preferred inverter has fewer switches as compared to a traditional cascaded multilevel inverter.

But, the relation between the number of DC voltage source and the maximum number of levels of output phase

voltage is similar to that of conventional cascaded multilevel inverter. This topology increases capability and

reliability of the multilevel inverter circuitry. Due to switch reduction, losses across the switch get reduced.

Compared with traditional two level inverter total harmonic distortion of output voltage is decreased in the

suggested multilevel inverter topology. The harmonic distortions present in the load current and voltage

waveforms were observed and calculated through FFT analysis tool.The performance of recommended topology

and its controller are to be simulated using MATLAB/SIMULINK software and results are presented with novel

PWM technique which shows the ability of the reduced switch multilevel inverter.

REFERENCE

Page 43: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2419 | P a g e

[1] S.Kouro, M. Malinowski, K Gopakumar, J. Pou, L.G. Franquelo,Wu Bin; J Rodriguez, M.A Pérez,

J.I.Leon, Recent Advances and Industrial Applications of Multilevel Converters, IEEE Trans on Industrial

Electronics, Vol 57 , Issue: 8, Page(s): 2553 – 2580, 2010

[2] T.A. Meynard, H. Foch, P. Thomas, J. Courault, R. Jakob, and M. Nahrstaedt, Multicell Converters: Basic

concepts and Industry Applications’, IEEE Trans on Industial Application, Vol.49, No. 5, pp 955-964,

Oct.2002.

[3] Mariusz Malinowski, K. Gopakumar, Jose Rodriguez, Marcelo A. Pérez, “A Survey on Cascaded

Multilevel Inverters”, IEEE Trans on Industrial Electronics., Vol. 57, No. 7, July 2010.

[4] N. Farokhnia, S. H. Fathi, and H. R. Toodeji, ‘Direct nonlinear control for individual DC voltage

balancing in cascaded multilevel DSTATCOM’, in Proc. IEEE Int. Conf. EPECS, 2009, pp. 1–8.

[5] L.M.Tolbert, F.Z.Peng, ‘Multilevel Converters as a utility interface for renewable energy system’, IEEE

conference, Vol.2,pp. 1271-1274, 2000

[6] L.G. Franquelo, J. Rodriguez, J. I. Leon, S. Kouro, R. Portillio, andM.A. M. Prats, ‘The age of multilevel

Converters arrive’, IEEE Trans on Industrial Electronics., Mag, Vol.2, No. 2, pp 28-39, June 2008.

[7] J. Rodriguez, J.S. lai, and F.Z. Peng, ‘ Multilevel Inverters: A Survey of topologies, controls , and

applications’, IEEE Trans on Industrial Electronics, Vol. 49, No. 4, pp 724-738, Aug 2002.

[8] Ayoub Kavousi, Behrooz Vahidi, Reza Salehi, Mohammad Kazem Bakhshizadeh, Naeem Farokhnia, S.

Hamid Fathi.: ‘Application of the Bee Algorithm for Selective Harmonic Elimination Strategy in

Multilevel Inverters’, IEEE Trans on Power Electronics, Vol. 27, No. 4, APRIL 2012.

[9] Mehrdad Tarafdar Hagh,, Hassan Taghizadeh, Kaveh Razi.: ‘Harmonic Minimization in Multilevel

Inverters Using Modified Species-Based Particle Swarm Optimization’, IEEE Transactions On Power

Electronics, Vol. 24, No. 10, October 2009.

[10] Jagdish Kumar, Biswarup Das, Pramod Agarwal,, Selective Harmonic Elimination Technique for

Multilevel Inverter, NPSC, IIT, Bombay , 2008.

Page 44: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2420 | P a g e

EMOTIONAL INTELLIGENCE & SOCIAL

ADAPTABILITY

Ms. Ranju Lal1, Ms. Manisha Dayal2 1Faculty of Management, KIET, Ghaziabad,(India)

2Faculty of Management MAIMS, Delhi,(India)

ABSTRACT

Emotional Intelligence is an umbrella term because its concept comprises various skills dispositions of the

individual which are generally called “soft skills or interpersonal and intrapersonal skills”. Emotional Intelligence has been found to be a predictor of life satisfaction, healthy psychological adaptation,

positive interactions with peers and family and higher parental warmth. Lower Emotional Intelligence has also been

found to be associated with violent behavior, illegal use of drugs and alcohol and participation in delinquent

behavior. Engelberg and Sjoberg (2004), Adeyemo (2005), and Safavi et al. (2008) who preached that emotional intelligence

was related quite strongly to social adjustment. Positive emotionality is associated with sociability (e.g. Argyle &

Lu, 1990), whereas persistent negative affect keeps other at bay (e.g. Furr & Funder, 1998). Accordingly, people

need to process emotional information and manage emotional dynamics intelligently to navigate the social world.

The purpose of this study is to investigate the role (or positive impact) and relation of Emotional Intelligence and

Social Adaptability. The present work is a compilation of few selected papers written by researchers aiming to

disseminate the knowledge generated by the previous researchers. In this article, we are presenting thoughts, ideas,

experiences and findings of the practitioners and academia’s across the globe.

Keywords: Emotional Intelligence, Adjustment, Social Adaptability, Emotions, Social Relationships.

I INTRODUCTION

Emotions play a very important role in our lives as emotions are basic primeval forces of great powers and

influences designed by nature. They enable individual to circumstances which demand the utmost efforts for

survival or success or to add colour and spice to our living.

Emotions are prime movers to thought and conduct, which gives best to life and important qualities to personality.

Emotions and feelings are interwoven with the network of reason and there is interconnectivity between emotions

and cognition.

The work by McKee, Goleman and Noyatzis has shown that the missing link in providing a much more accurate

explanation of how an individual was likely to be successful in work or life is the role played by how an individual

handles feelings or emotions. Consequently feelings:

· Direct us to what we want and / or need.

Page 45: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2421 | P a g e

· Determine our behaviour or actions toward what we want and / or need.

Allow us to access and act upon empathy for others.

· Facilitate relationship forming and inspire others.

· Create bond and a sense of higher purpose in groups, families, organizations and more.

The ability to express and control our own emotions is important, but so is our ability to understand, interpret, and

respond to the emotions of others. Imagine a world where you couldn’t understand when a friend was feeling sad or

when a co-worker was angry. Psychologist refers to this ability as Emotional Intelligence.

1.1 Emotional Intelligence

In 1990, Salovey and Mayer coined the term “Emotional Intelligence” and based their work on the non-cognitive

aspects of intelligence. These authors defined emotional intelligence as “a form of social intelligence that involves

the ability to monitor one’s own and others thinking and action.” In 1995, Goleman wrote his book, Emotional

Intelligence, based upon Salovey and Mayer’s work. Since then, emotional intelligence has become the hottest

buzzword everywhere.

EI or EQ embraces two aspects of intelligence:

- Understanding yourself, your goals, intentions, responses, behaviour and all.

- Understanding others and their feelings.

1.2 Four Branches of EI

Mayer & Salovey proposed a model that identified four different factors of Emotional Intelligence: the perception of

emotion, the ability reason using emotions, the ability to understand emotion and the ability to manage emotions.

1. Perceiving Emotions: the first step in understanding emotion is to accurately perceive them. In many cases, this

might involve understanding non-verbal signals such as body language and facial expressions. 2. Reasoning with emotions: the next step involves using emotions to promote thinking and cognitive activity.

Emotions help prioritize what we pay attention and react to; we respond emotionally to things that garner our

attention.

3. Understanding emotions: the emotions what we perceive can carry a wide variety if meaning. If someone is

expressing angry emotions, the observer must interpret the cause of their anger and what it might mean.

4. Managing emotions: the ability to manage emotions effectively is a key part of emotional intelligence.

Regulating emotions, responding appropriately and responding to the emotions of others are all important aspect of

emotional management.

Emotional Intelligence has been found to be a predictor of life satisfaction, healthy psychological adaptation,

positive interactions with peers and family and higher parental warmth. Lower Emotional Intelligence has also been

found to be associated with violent behaviour, illegal use of drugs and alcohol, and participation in delinquent

behaviour.

Page 46: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2422 | P a g e

1.3 Components of Emotional Intelligence

The main identifying characteristics of Emotional Maturity are made possible by the Emotional Intelligence

component:

1. Self-awareness: Recognize and understand your own moods and motivations and their effect on others. To

achieve this state, you must be able to monitor your own emotional state and identify your own emotions.Emotional

Maturity in this trait shows:

§ Confidence

§ Sense of humor (can laugh at self)

§ Aware of your impression on others (can read the reactions of others to know how you are perceived)

2. Self-Regulation: Controlling your impulses—instead of being quick to react rashly, you can reign in your

emotions and think before responding. You express yourself appropriately. Emotional Maturity in this trait shows:

§ Conscientiousand take personal responsibility for your own work/deeds.

§ Adaptable (and favorable) to change

§ When someone is complaining or is rude to you, you do not respond in kind. You respond in a manner

which would not escalate the situation. (At this point, you will also realize that when someone expresses anger at

you, they’re not always angry at you; they’re often just angry and want to take it out on someone.)

3. Internal Motivation: Internal motivation is marked by an interest in learning. It is also self-improvement vs. a

pursuit of wealth and status (as a pursuit of wealth and status is an external motivator). Emotional Maturity in this

trait shows:

§ Initiative and the commitment to complete a task

§ Perseverance in the face of adversity

4. Empathy: The ability to understand another person’s emotional reaction. This is only possible when one has

achieved self-awareness—as one cannot understand others until they understand themselves. Emotional Maturity in

this trait shows:

§ Perceptive of other’s emotions and taking an active interest in their concerns.

§ Proactive—able to anticipate someone’s needs and the appropriate reaction.

§ Social Situations such as office politics do not faze one who has a firm grasp of empathy.

5. Social Skills: Identifying social cues to establish common ground manage relationships and build

networks. Emotional Maturity in this trait shows:

§ Communication: Listening and responding appropriately

§ Influence and Leadership: The ability to guide and inspire others

Page 47: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2423 | P a g e

§ Conflict Management: The ability to diffuse difficult situations using persuasion and negotiation.

1.4 Why Emotional Intelligence?

EI helps to predict success because it reflects how a person applies knowledge to the immediate situation. Emotional

Quotient measures “common sense” and the ability to get along in the world. EQ training is used in corporates,

employee development, leadership programs, and in education settings. From a leadership development perspective,

participants enhance their leadership capacities, improve communication, decrease workplace conflict, and improve

problem-solving skills. As a personal benefit, individuals are motivated and inspired to achieve their life goals, have

greater career success, build stronger personal relationships, increase their optimism, and are healthier.

1.5 Gender and Emotional Intelligence

Since females tend to be more emotional and intimate in relationships as compared to males, so their emotional

intelligence ought to be higher than that of males. This is perhaps because of the society, which socializes the

genders differently as has been found in studies by Duckelt and Raffali (1989) and Sandhu and Mehrotra (1999).

Moreover higher emotional intelligence among girls can also be explained in terms of their personality

characteristics. Similar findings were reported in studies by Tapia (1999) and Dunn (2002). They observe that girls

score higher with regard to empathy, social responsibilities and interpersonal relationships than boys. They were

more sensitive towards their relationships with parents, friends and siblings. All these traits help them to acquire

more emotional intelligence as compared to boys.

1.6 Urban/Rural Areas and Emotional Intelligence

The urban adolescents had comparatively better emotional intelligence and adjustment as against their rural

counterparts. This might be due to being prevalent nuclear family units in urban area where parents feel more

concerned of their wards activities and provide suitable guidance and emotional support to their children.

1.7 Adaptability / Adjustment To adapt comes from the Latin word – apere (to bind, to attach). Its past form, aptus (apte), when added to the

locution ad (to, towards) created the verb adaptare (to adjust to, in prevision of) (Rey, 2006). The present use of to

adapt emerged in 16th century, along with a few other derived meanings (aptitude to appropriate or to adhere).

Adjustment refers to the ability of an individual to fit into his environment. Adjustment is an important factor to

complete a person’s goal successfully. It is the process by which a living organism maintains a balance between its

needs and the circumstances that influence the satisfaction of these needs. The concept of adaptation has been at the heart of psychological modeling since its origin in psychological

adaptation. It is defined as the process of unceasing interaction between man and the ever-changing world within

which he evolves. But when the constraints continue, the adaptation system becomes exhausted and “adaptation”

illnesses appear (asthma, ulcers, hypertension or psychosomatic diseases).

Page 48: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2424 | P a g e

1.8 Social Adaptability

Social Adaptability is the ability to form and maintain friendship according to the norms of one’s peer group reflects

the level of social competence of any person.

It’s an adjustment and adaptation to humans to other individuals and community groups working together for a

common purpose. Social adaptation occurs in the process of socialization and also with the aid of mechanisms of

social control, which include social pressure and state regulation.

Social adaptation becomes increasingly significantly when social change affects important aspects of life over

comparatively short periods of time. Such changes include migration, changes in age, rapid industrial development,

and major shifts of the population from the country to the city.

In socialist society, the process of social adaptation requires study and concentrated action. The failure of certain

individuals to adapt, combined with specific unfavourable situations, may adversely affect the individual’s conduct.

It is useful to study crime from the point of view of unsatisfactory social adaptation in order to understand the causes

of crime and to fight crime effectively.

A person who is socially inadaptive could be shy, withdrawn, or aggressive. The manifestations are:

· Difficulty in joining a group conversation

· Unable to see how his/her behaviour could affect the group

· Unable to see if his/her behaviour has caused any problem

· talks about a happy event with a stern expression

· gets into a fight for even a minor incidents

·

1.9 Relationships between Emotional Intelligence and Social Adjustment

Researchers realized that a child’s emotional life has an impact in his social adaptation (Gardner, 1993; Pekrun,

1992). Positive emotionality is associated with sociability (e.g., Argyle & Lu, 1990), whereas persistent negative

affect keeps other at bay (e.g., Furr & Funder, 1998). Accordingly people need to process emotional information and

manage emotional dynamics intelligently to navigate the social world. Kierstead (1999, page 4 of 8) quotes Mayer

and Salovey describing the role of EI, it states “EI plays a role in our friendships, parenting and intimate

relationships.”

Engelberg and Sjoberg(2004), Adeyemo(2005), and Safavi et al. (2008), who preached that Emotional Intelligence

was related quite strongly to social adjustment.Safavi et al. (2008) investigated the relationship between emotional

intelligence and socio-emotional adjustment in pre-university girl students in Tehran. The result showed that there

was a significant correlation between emotional intelligence and Socio-emotional adjustment.

Evidence for associations between EI ability and Social success have been summarized in a number of recent book

chapters and review articles (see Brackett, Lopes, Iveevic, Mayer & Salovey, 2004; Brackeet &Salovey, 2006;

Mayer, Salovey, Caruso, 2004). In general, studies have shown that EI ability has related to greater empathy

(Ciarrochi, Chan, & Caputi, 2000), less negative interactions with peers (Brackett, Mayer, & Warner, 2004), higher

Page 49: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2425 | P a g e

quality relationships, less conflict and antagonism with friends (Lopes, Brackett, Nezlek, Schutz, Sellin, & Salovey,

2004; Lopes, Salovey, Starus, 2003), and lower levels of violence and drug problems (Brackett et al., 2004; Gil-

Olarte, Guil, & Mestre, 2004; Rubin, 1999; Trinidad & Johnson, 2002).

II CONCLUSION

Success of social adaptation of the person is reached by means of his personal and professional qualities, including a

high level of development of emotional intelligence. Schools have to develop teamwork and co-operation that are so

evident in activities so that children take part in and outside of school such as sports and productions. As Vygotsky

(1978) posited that social interaction plays a fundamental role in the development of cognition and that everything is

learned on two levels – first through interaction and then integrated into the individual’s mental structure.

Elias et al (1992) argued that the teaching emotional & social skills by the teacher are very important at school. It

can effect academic achievement positively not during the years that follows as well. Teaching these skills has a

long term effect on the achievement. Though the development of EI is a natural process, yet it can be enhanced as it

has been concluded that EI can be learned and it should be a component of leadership training.

2.1 Strategies To Incorporate Appropriate Social Skills:

· Learn how to begin and maintain conversation

· How to share

· How not to offend others

· Find solutions to problems

· Take part in team / group games

· Role play appropriate and inappropriate behaviour

· Discuss morale in human value stories

· Cues for body language

· Ways to find the level of emotion stated in a text

· Maintain a diary to develop inner dialogue

2.2 How To Improve Emotional Intelligence

· Observe how you react to people? Do not rush to the judgment before you know all the facts. Try to put

yourself in their place and be more open and accepting of their perspective and needs.

· Look at your current environment. Do you seek attention for your accomplishment? Humility can be a

wonderful quality and it doesn’t mean that you are shy or lack self-confidence.

· Do a self-evaluation. What are your weaknesses? Have courage to look at yourself honestly – it can change

your life.

Page 50: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2426 | P a g e

· Examine how you react to stressful situations? Do you blame others or become angry on them? The ability

to stay calm and in control in difficult situations is highly valued. Keep your emotions under control when

things go wrong.

· Take responsibility for your actions. Apologize – if you hurt someone’s feeling. People are usually more

willing to forgive and forget if you make an honest attempt to make things right.

· Examine how your actions will affect others – before you take those actions. If your decision will impact

others, put yourself in their place.

REFERENCES

[1] Boyatzis, R. E. (1994). Stimulating self-directed learning through the managerial assessment and Development

course, Journal of Management Education, 18(3), 304-323.

[2] Boyatzis, R. E., Golman, D., & Rhee, K. S. (in press). Clustering competence in emotional intelligence:

insights from the Emotional Competence Inventory (ECI). In R. Bar-on & J. D. Parker (Eds.), Handbook of

Emotional Intelligence. San Francisco, CA: Jossey-Bass.

[3] Davies, M. Stankov, L., * Roberts, R. D. (1998). Emotional Intelligence: in search of an elusive construct,

Journal of Personality and Social Psychology, 75, 989-1015.

[4] Gardner, H. (1983). Frames of mind. New York: Basic Books.

[5] Goleman, D. (1995). Emotional Intelligence. New York: Bantam.

[6] Goleman, D. (1998). Working with Emotional Intelligence, New York: Bantam.

[7] Gowing, m. (in press). Measurement of Individual Emotional Competence. In C. Cherniss & D. Goleman

(Eds.), Emotional competence in organizations.

[8] Mayer, J. D., Salovey, P., & Caruso, D. (1998b). competing models of emotional intelligence in R. J. Sternberg

(Ed.), handbook of human intelligence (2nd ed.,). New York: Cambridge University Press.

[9] Salovey, P., & Mayer, J. (1990). Emotional Intelligence, Imagination, Cognition, and Personality, 9(3), 185-

211.

[10] Salovey, P., Woolery, A., & Mayer, J. D. (in press). Emotional Intelligence: conceptualization and

measurement. In G. Fletcher & M. S. Clark (Eds.), The Blackwell Handbook of Social Psychology (Vol. 2:

Interpersonal Processes,). Oxford, England: Blackwell Publishers.

Page 51: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2427 | P a g e

BATTERY (Ni-Cd) CHARGING ANALYSIS OF

STAND- ALONE 300W SOLAR PHOTOVOLTAIC

SYSTEM AT CONSTANT SOLAR INSOLATION

Prashant Singh1, Sujil A2 , Prabhat Kumar 3

1PG Scholar Dept. of Electrical Engineering ACEIT, Jaipur (India)

2 Research Scholar Dept. of Electrical Engineering MNIT, Jaipur (India)

3 Assoc. Prof. Dept. of Electrical Engineering ACEIT, Jaipur (India) ABSTRACT Efficient energy storage is proving to be one of the most imperial alternative from the solar photovoltaic system

for power generation so far. Ni-Cd batteries is one of the widely acknowledged energy storage device that can

line up with other charge storing devices. The solitary features of battery (nickel-cadmium) are such that it also

praises other energy storage technologies. These batteries (Ni-Cd) have better performance characteristics than

other conventional battery in the field of rapid charging and discharging capability, high power density and

improved system efficiency. The very paper gives an insight the charging and discharging characteristics, voltage

and current through load of constant solar insolation. The dynamic model of 300W stand-alone solar photovoltaic

system with the very battery is simulated in matlab/Simulink environment. Key words: Blocking/Bypass diode, insolation, solar cell model, SOC, stand-alone system I. NTRODUCTION Energy is a decisive input for the industrial, social, and financial development and also plays a vital role in our

life. Energy crises occur mainly due to two reasons first one rapidly increasing world population and later is higher

living standard of human nowadays. If present trend continues, the world in the year 2000 A.D. will be more

crowded than that of today. Thus, it is important to explore more and more alternative energy sources like

sunlight, wind, and biomass and ocean energy. Photovoltaic energy are renewable, clean and eco-friendly energy

source and it can be used as in various applications [1]. Solar energy is one of the most promising alternatives

for conventional energy sources. Now a day’s photovoltaic solar energy has been widely used to generate

electricity [2-4]. Photovoltaic energy is emerging as an important distributed energy resource since few last

decades [5]. However, these renewable energy sources reduce from some imperfection when they are used as a

stand-alone energy sources. The naturally periodic properties of sun light causes power fluctuation on solar panel

Page 52: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2428 | P a g e

system. In addition it is difficult to store the power generated by solar panel for night and future use when sunlight

is off [6-7]. Due to these reasons energy storage is required to maintain the power flow and also to manage systems

momentary power balance. So for energy storage from solar panel mainly batteries or super capacitor are Used.

This paper is further organizes as follows. Section II describes the photovoltaic cell. Section III explain the

modeling and simulation of solar PV system. In this section solar cell modeling and battery modeling is describes.

Section IV describes the case study and the result and analysis after successful simulation of proposed 300 W

stand-alone solar photovoltaic system. While conclusion are presented in section V.

II. DESCRIPTION OF PHOTOVOLTAIC CELL Solar cell is a device that converts the energy of sunlight directly into electricity by the photovoltaic effect [8].

The photovoltaic effect can be described the light, which is in the form of energy, strikes a PV cell and transfers

enough energy to cause the freeing of electrons. A built-in potential barrier in the cell acts on these electrons to

produce a voltage which can be used to drive a current through an electric circuit .The basic material for the

photovoltaic cells is high purified silicon (Si), which is obtained from sand or quartz. Photovoltaic cell are of

mainly three type’s monocrystalline silicon cell, polycrystalline silicon cell, amorphous silicon cell. Photovoltaic

cells are semiconductors that have weakly bonded electrons at a level of energy called valence band [9-10].

When energy strikes at the valance bond it release, that electrons and that electrons moves to another energy level

known as conduction band. At the conduction band, the electrons are able to conduct electricity through an

electrical load. Fig.1 shows the simple concept of photovoltaic system. PV cells use the energy of photons from

sunlight to break their band gap energy thereby producing DC current. Typically, PV cells produce low power

(approximately 2-

3Watts) [11] hence to develop more power, voltage multiple solar cell need to be connected in series or parallel

and overall meeting is known is module. Within a module the different cells are connected electrically in series or

in parallel although most modules have a series connection. Individual cells are usually connected into a series

string of cells (typically 36 or 72) to achieve the desired output voltage. In a series connection the same current

flows through all the cells and the voltage at the module terminals is the sum of the individual voltages of each cell.

When modules are connected in parallel the current will be the sum of the individual cell currents and the output

voltage will equal that of a single cell. The nominal voltage of a solar module is 12V and a PV module for

charging 12V batteries usually has 33 to 36 cells. Several module are connected in series, parallel, series-parallel

configuration to form an array. Photovoltaic (PV) systems are of a modular nature [12].because Solar cells can be

connected in series or parallel in virtually any number and combination. Therefore, PV systems may be realized in

an extraordinary broad range of power; from mille watt systems in watches or calculators to megawatt systems for

central power production.

III. MODELING & SIMULATION OF SOLAR (PV) SYSTEM The single line diagram of proposed 300W stand-alone solar photovoltaic (PV) system is given in fig.2 it consist

of a battery storage unit, an inverter, blocking and bypass diode and a charge controller.

Page 53: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2429 | P a g e

Fig.1. Concept of Photovoltaic Fig.3. Single exponential model of PV Cell

3.1 PV Cell Model Many equivalent circuits have been proposed in the literature [13-16] in order to assess the behavior of the PV

cell. The mathematical model of PV cell is represented by a current source with a diode connected in parallel as

shown in fig.3. This model has current constant source (ISC), connected with a diode a series resistance (Rs). The

modeling of the standalone solar PV system is based on the equivalent circuit diagram of the PV cell.

Functional block parameters which are used in PV cell model can be shown in table 1. Applying Kirchhoff’s

law to the node where ISC, diode, RP and RS meet, we get the following equation for the photovoltaic current.

On applying the

KCL

(1)

Diode Current

(2)

On applying the KVL

(3)

Table.1 Parameters of Battery

Page 54: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2430 | P a g e

3.2 Battery Model

Batteries are the central part of the any stand-alone PV system. The battery block implements a generic

dynamic model parameterized to represent most popular types of rechargeable batteries.

Discharge model (i*>0) (4)

Charge model (i*<0)

(5)

Table 2 shows block parameter used to modify the battery specifications for the modelling.

Table.2 Parameters of Battery

Parameters Rating

Nominal voltage (V) 24

Rated capacity (AH) 165

Initial state-of-charge (%) 20

Maximum capacity (AH) 171.85

Fully charged voltage (V) 26.1316

Parameters Rating

Short-circuit current 7.97

Short-circuit voltage 22.1

Current at Pmax 7.46

Voltage at Pmax 18.19

Page 55: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2431 | P a g e

PV Module

Power Conditioning

Blocking /Bypass diode

Charge Controller

Battery

Inverter

AC Load

DC Load

Fig.2. Single Line Diagram of 300W Stand-alone Solar PV System designed in Simulink/Simpower system

IV. SIMULATION RESULT AND ANALYSIS In this section the simulation result of proposed model is discussed. Such as result has also allowed the

validation of proposed model. In this paper, the simulation result obtained during constant solar insolation.

The proposed model consists of resistive + Inductive (2+j0.01) Ω type load. During simulation the

parameters values that are used to represent a battery, can be used as default values. The Simulink model

shown in fig.2 are simulated and observed output waveform are shown in fig.4.and fig.5. It produces an

output power of 271.49 W for a constant radiation of

1000 W/m2 and output voltage 36.23 V.Fig.6 shows the battery output voltage, output current and %SOC and

output voltage and output current of 300W solar PV system through load (Resistive Inductive) for

bat tery is shown in fig.7. The Charging and discharging cycle are confronted to the one provided by the

model. The cycle are displayed in fig.4 are simulated for 100*2000 sec.at constant moments of the day. The

number of cycles increases with the insolation as the photovoltaic electricity production gets higher. We

can see that the shape of the voltage during charging and discharging is well reproduced by the

simulation. At constant solar insolation 1000 W/m2 battery take 12.31 hours becoming full charge.

Page 56: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2432 | P a g e

Fig.4. Solar PV Output Power

Fig.5. Solar PV Output Voltage

Fig.6. Output current, voltage and state of charge of battery for initial charging-discharging time

Fig.7. Output voltage and current through load for initial SOC of battery

V. CONCLUSION

Page 57: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2433 | P a g e

The most prevailing agony in today’s world power market is the shortage of fossils fuel. The planet is

progressively marching toward a satirical state of energy crises, owing to an escalating energy utilization which

is far greater than its supply. And the shortage of fossil fuel is providing the necessary nourishment for this

mushrooming problem. Hence the necessity to explore more and more alternative energy sources has become a

matter of utter significance but more important is to store that energy in appropriate device. Based upon the

result discussed above, we can say that these nickel Cadmium battery is better in comparison with other

conventional battery as general solution for power storage. What makes these batteries to stand a cut above

other battery is its durability and flexibility that can be adopted to serve in many roles for which conventional

batteries are not as well suited. It also consists high power density. The charging and discharging time of Ni-Cd

battery is also less in comparison with other conventional battery. By the end of this century, nearly all of the

economically available energy resources will be gone. From now until then, what remains will be rationed by

price. Thus these storage device may emerge as a boon for many application of power system in terms of

efficiency.

REFERENCES [1] Zang, Hai Yang, and Xiu Yang. "Simulation and analysis of two-level photovoltaic grid-connected

system." Advanced Materials Research. Vol. 433. 2012.

[2] K. Ding, X. Bian and H. Liu, ‘Matlab-Simulink Based Modeling to Study the Influence of no uniform

Insolation Photovoltaic Array’, Power and Energy Engineering Conference (AAEEC), 2011 Asia-Pacific, pp.

1–4, 25-28 March 2011.

[3] S.R. Chowdhury and H. Saha, ‘Maximum Power Point Tracking of Partially Shaded Solar Photovoltaic

Arrays’, Solar Energy Materials and Solar Cells, Vol. 94, N°9, pp. 1441 - 1447, 2010.

[4] Y. Jiang, A. Abu Qahouq and M. Orabi, ‘Matlab/Pspice Hybrid Simulation Modeling of Solar PV

Cell/Module’, Applied Power Electronics Conference and Exposition (APEC), Twenty-Sixth IEEE, pp.

1244 –1250, 2011.

[5] B. Kroposki, Member, & R. DeBlasio, “Technologies for the New Millennium: Photovoltaics as a

Distributed Resource,” 0-7803-6420-1/00 IEEE, pp 1798-1801, 2000.

[6] Onar O C, Uzunoglu M, Alam M S. Modeling, control and simulation of an autonomous wind-

turbine/photo-voltaic/fuel cell/Ultra-capacitor hybrid power system. J. Power Sources 2008; 185:1273-

1283.

[7] Datta M, Sengyu T, Yona A, Funabashi T, Kim C–H. Photovoltaic output power fluctuations

smoothing methods for single and multiple PV generators. J. Current Applied Physics 2010; 10:265-270.

[8] Sharma, S. Hasan Saeed DK. Non-Conventional Energy Resources. SK Kataria and Sons, 2009.

[9] G Liu, et al. “A general modeling method for I-V characteristics of geometrically and electrically confide

Photovoltaic arrays”. Energy Conversion and Management. vol. 52, pp. 3439 -3445, 2011.

Page 58: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2434 | P a g e

[10] AM Yahya, et al. “Behavior and performance of a photovoltaic generator in real time”. International

Journal of Physical Sciences. vol. 6, pp. 4361-4367, 2011.

[11] K Ishaque, et al. “Simple, fast and accurate two-diode model for photovoltaic modules”. Solar Energy

Materials and Solar Cells. vol. 95, pp. 586-594, 2011.

[12] S. J. Chiang, K. T. Chang & C. Y. Yen, “Residential Photovoltaic Energy Storage System,” IEEE

transactions on Industrial Electronics, vol. 45, no. 3, pp 385-394, June 1998.

[13] Minwon Purk, Bong-Tue Kim, In-Kmn Yu, 2001, "A novel Simulation Method for PV Power Generation

Systems using Real Weather Conditions", Industrial Electronics, 2001 Proceedings ISIE 2001, IEEE

International Symposium Vol.1 P. 526-530.

[14] Chen, Wei, Hui Shen, Bifen Shu, Hong Qin, and Tao Deng. "Evaluation of performance of MPPT devices

In PV systems with storage batteries." Renewable Energy 32, no. 9 (2007): 1611-1622. [15] Tsai, Huan-Liang, Ci-Siang Tu, and Yi-Jie Su. "Development of generalized photovoltaic model using

MATLAB/SIMULINK." In Proceedings of the world congress on Engineering and computer science, vol.

2008, pp. 1-6. Cite seer, 2008.

[16] Salmi, T., Bouzguenda, M., Ghastlie, A., & Masmoudi, A. (2012). Matlab/Simulink based modeling of

photovoltaic cell. International Journal of Renewable Energy Research (IJRER), 2(2), 213-218.

Page 59: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2435 | P a g e

ROLE OF BPO IN FINANCE & ACCOUNT Reepu

Department of Management, Punjab Institute of Technology, Nandgarh, Punjab (India)

ABSTRACT Business houses are posed with various challenges. Liberalization, Globalization and Privatisation have

uprooted the trade barriers instituting a ground for intense competition. CFOs therefore are under accuse

pressure of revenue maximization, diminution of operating costs, so as to add more value to the customer’s

deliverables. Outsourcing finance and account’s business processes have become a feasible option for CFOs.

Such BPOS offer a wide gamut of services order to cash, procure to pay and record to report. These automated

offerings support business core competencies enabling them to attain their strategic outcomes. India has been a

favourable hub of such services. The present study is an attempt to study the role of BPO in Finance and

Account.

Keywords: Finance & Account BPO, Globalization, Order to Cash, Procure to Pay, Record to

Report etc

I. INTRODUCTION Outsourcing is an accord in which a company outsources one or more services that could have been

manufactured in-house too. Outsourcing exists in one or more forms:

§ Professional Employer Organization: PEOs execute the HR functionality of organization. The contracted

organization will design a cost efficient methodology to manage the human resources, their payroll,

compensation etc. sharing with organization their expertise on administering, responsibility, risk

management, conformity to employment laws etc.

§ Business Process Outsourcing: It is delegation of certain IT enabled processes which do require a congenial

support from the human beings for its continuous functionality for e.g. data warehousing etc.

§ Application Service Provider: It is a variant of outsourcing which uses internet as a vehicle, for providing

software. Organizations may outsource any software and will be charged a monthly fee for it in contrast to a

traditional model where the software is once delivered and disbursements are hence concluded. For e.g.

many organizations use Peachtree etc accounting software which they can access via a login id and password

from anywhere. It reduces all the hassles related to software update, uphold, backups, recovery, theft,

malicious attacks etc. Organization is automatically oriented with the latest software; its web enabled utility

allows retrieval of information from anywhere.

§ E-Services: It unifies the operations of both BPO and ASP i.e. it is a deliverance of a software product which

may require human intervention.

Business Process Outsourcing connotes outsourcing in different fields. The provider of service normally

manages a certain business with the subsisting or by introducing a new technology for another party. In India

technical assistance, telemarketing, finance and accounting, conversion of data, insurance etc services have been

extensively popular as several UK, USA etc companies outsource ITES process from India only. It has also been

Page 60: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2436 | P a g e

revealed that India has a market share of nearly 56% of business process outsourcing. Several contributing

factors include:

§ Economies of Scale: Outsourcing from India reduces the cost, increases the output and overall

performance of the company’s products is increased.

§ Professionalism: India constitutes various talented, benevolent, skilled professionals having upper hand in

technological orientations.

§ Risk Sharing: Outsourcing facilitates sharing of risks or may even lead to their mitigation.

§ Economical Labour force: Indian labour force has always been regarded as inexpensive in comparison to

others.

§ Geographical advantage: India possess geographical add on not embraced by everybody.

Finance and Accounting functions play a vital role in achieving the organizational strategic targets. Ever-

greening of a financial turmoil may cause business to cease its operations, as F&A has been considered the

lifeline of an organization. So, it should be assured that every activity in it must contribute to the overall value

addition for the organization. Then only businesses can sustain and generate massive revenue. Firms normally

outsource the following in context of F&A:

§ Order to cash

§ Procure to pay

§ Record to report

II. REVIEW OF RELATED LITERATURE There has been paucity of relevant literature. Kumar A. (2012) conducted a study to determine the incumbent

opportunities and threats in Indian BPO. He outlined that several external as well as internal challenges surround

the Indian BPO. Several ways to mitigate threats included abolition of unethical customs, management of

attrition rate, constructive brand equity etc. Meenakshi A. (2013) paper is an endeavour to contribute to the

literature of BPO in three ways. It evaluates primarily the workplace situation of BPOs. Second, it appraises the

different benefits an employee receives due to work-life balance. Third, several recommendations like review of

existing policy framework, improvement of compensation package, amiable workplace environment etc are also

portrayed which will enable a BPO worker to have authentic work-life balance. Hagargi (2013) researched that

their entails huge problems of working with Indian BPOs like health problems, sleeping disorders, depression,

eyesight etc. The paper put forward several solutions like free exercise class, day outs etc. out of which time

management has been considered an optimal one. Gupta (2013) performed an exploratory research to determine

the attrition rate in IT and BPO and found that an appraisal system from organization, adequate trainings and

alteration of timings will amplify employee morale. Tamizharasi K. et al (2014) advocated that BPO employees

suffer huge stress which may be due to workload, timing, recurrent nature of tasks, performance etc due to

which they bear several physical and mental problems.

III. FINANCE AND ACCOUNTS BPO

3.1 Need Globalisation has thronged the business with complexities, presenting numerous challenges. Due to innumerable

treaties there has been vigorous relaxation in the trade barriers leading to more interconnectedness. Although

Page 61: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2437 | P a g e

company becomes viably open for different platforms, but it is besieged with an environment which is

incessantly changing. An intense competition prevails. Pressures to decrease cost, attaining adequate control,

supple and achieve organic and inorganic growth have become the crucial drivers to become successful. Further

to achieve this growth organization need to devise a combined approach accompanied with contemporary

technology which stays for long, is inexpensive and active through which its performance can be enhanced.

Due to Financial Sector Reforms there has been emergence of new regulatory bodies, standards etc demanding

compliance with the rules and regulations. Moreover an organization has to develop a persistent approach

towards knowledge management, patent, IPR etc so as to secure a competitive position. Acquisition and retain

of talent has posed certain major challenges in BPO so this issue has also gained importance. It has been

advocated that such issues and challenges can be easily triumphed over with the usage of a common

denominator i.e. F&A BPO.

3.2 Finance and Account Is Outsourced To Outperform One or All Functions as Described 3.2.1 Order to Cash

Order to cash is the focal facet of every business as it comprises of the entire set of events from where the

customer initiates the process of order placement, his requests are processed so as to obtain cash. Several BPOs

offer end to end products deeming the business type and its requirement. OTC commences from pre-sale

activity, order placement, accounts receivable and general ledger process. The order to cash procedure can be

described as:

Step1: Instigating with the presale activity it involves maintaining customer related data who seem to be active

buyers or some who have been fascinated with their portfolios. Information about such customers is retained in

an ERP. Many organizations even prefer to outsource a specialised package of CRM solutions. Product related

queries are elucidated well which will enable to convert the prospective into active leads.

Step2: During this stage received orders are processed i.e. a linkage is established between the customer, order,

inventory, purchase, vendor and payment modules. If the product is available in their warehouse then a pick-up

request is made but if the product is unavailable with them, they will forward the request to the vendor. Even a

customer is offered with wide payment alternatives from Credit to COD.

Step3: At this instant pick and drop facility is triggered i.e. after acquainting the order from the source or

warehouse, it is packed and is ready forwarded to its destination. Relevant entries are always done in ERP.

Step4: Then organization endeavours to deliver the consignment directly to the customer or may even opt for a

third party carrier. The fall in inventory is recorded to general ledger. The COGS of the goods dispatched is

computed in conjunction. The relevant information required for bill preparation is also documented.

Step5: Billing is prompted for which the modules of inventory, order and customer information are linked.

Meanwhile the accounts receivable data and selling information is also recorded in the general ledger.

Step 6: As soon as the cash is received transactions are classified, maintained and recorded in the general ledger

account. It will enable the management to make effective decisions.

Role of BPO in OTC can be explicated as BPOs have widespread offerings to realize the entire process. They offer a complete package for management of

order, sales, credit, accounts receivable, contracts, collection and billing targeting reduction in the cost,

mismanagement, cycle time, order returns, processing time and any other fall backs. Some BPOs also offer a

Page 62: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2438 | P a g e

range of supporting activities like whenever an invoice is hoisted concurrently the statement is posted to the e-

mail account of the customer. In case the customer has huge outstanding and there prevails his unwillingness to

pay then even the legal proceedings are headed by them. Accounts receivable reports are also generated to

showcase the due obligations etc.

3.2.2 Procure to Pay Procure to Pay is a sequential series of activity involving purchase requisitions, expenditure corroboration or

processing of accounts payables in consonance with corporate governance.

Step 1: A formal purchase requisition is raised after reviewing the stock in hand and the anticipated demand.

Such requisitions can be a regular one- fulfilling the requisites of conventional manufacturing or it can be a

special\occasional one- placing orders for some special material. Such requisitions are made to ensure

replenishment of stock so that there is never a stock out problem. Whenever any (regular or special) requisitions

are raised following issues are always addressed: (a) Material Type, Quantity, Quality (b) Purchase Timing (c)

EOQ. The requisition copy is normally maintained in triplicate. One copy is send to authorising officer for

approval, second copy is remitted to storekeeper and third is retained by the Department initiating the request.

Step 2: When the purchase requisitions have been raised then a vendor for procuring the order is to be selected.

Organization may issue an open tender, limited tender or a single tender for the purpose of inviting quotations.

A supplier may be selected by taking into consideration parameters like price quotation, quantity per unit of

price, available capacity, supplier’s financial soundness and his management, delivery and payment terms,

product specifications etc. Organization must prepare a comparative statement of quotations for choosing an

optimal one.

Step 3: Once the supplier is selected then the purchase order is directed towards him. It may be regarded as an

agreement binding both the parties in several terms and conditions. Order copy is preserved with the material

receiving department, department which had initiated the request, accounts department and purchase

department.

Step 4: With the material shipment the receiving and inspection team embarks with unloading, unpacking of the

order, monitor the quantity, quality and type of material. Any delay in material receiving must be conveyed

before and any extension in terms of delivery dates should be charged with penalties.

Step 5: Finally entire set of bills for payment are evaluated against the quantity delivered and the prescribed

price. Moreover, a close eye is kept on if the bill is offered with any trade, cash and quantity discount or with

any type of levied taxes. Hence the disbursements are made according to the payment conditions.

Role of BPO in PTP can be expounded as: BPOs offer one to one service in connotation of PTP. Its package include modules for account payables

processing, database maintenance, intercompany credit management, arithmetical and other accuracy checks,

management of interface etc with an effort to abbreviate procurement cycle, cost and hence assuring suppliers

compliance with the regulations.

3.2.3 Record to Report International Accounting Standard has mandated the usage of accounting standards and principles for

consolidating the financial accounts. An organization has to post various transactions to General Ledger

Page 63: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2439 | P a g e

Account. It must aggregate the different sub-ledgers and make necessary adjustments. They have to consolidate

and validate the presented information. Financial reporting is a requisite to meet the statutory requirements.

Management accounting and recording facilitates management to formulate policies and make effective

decisions.

Role of BPO in RTR can be described as: BPO may assist the management with the help of preparation of an automated reconciliation of cost and

financial accounts, balance sheet, VAT, etc. Other services include preparation of weekly, fortnightly, monthly

reports about MIS, accruals, prepayments, depreciation charges etc.

3.3 Impact The Finance and Accounting BPO performs both front end and back end operations at a reasonable price

yielding more efficacy than organization performing on its own. It vouches for economies of scale using the

latest technology, delivering a single platform for a multi business firm thereby, enabling them to handle remote

operations too. Multi-lingual support has mitigated the difference of country origin. F&A BPO makes

continuous investment to introduce certain modifications over the back end with the dynamics of time

bifurcating them with the traditional line of F&A BPO. So, who will not contract the operations with a third

party which make deliverables to them more quick, accurate, latest technology and ample support?

3.4 Advantages of F&A BPO § It enables an organization to realise not only their functional tactics but also their strategic outcomes,

thereby yielding an extensive sweep to the challenging areas.

§ It endures growth due to the formation of partnership.

§ Outsourcing helps organization to be competitively robust because they can focus more on their core

activities.

§ It helps them to diminish their operating costs.

§ Work replication is certainly avoided.

IV. CONCLUSION BPO plays an extensive role in Finance and Account. It facilitates an organization with several modules like

order to cash, procure to pay and record to report enhancing its revenue collections, effectual working capital

management and thus, contented stakeholders. Many organizations like Accenture, Sutherland Global Service,

Wipro, NCS etc. offer a wide array of F&A services. Buying such services from outside braces transparency,

tech support, assures accurate deliverables and reduction in operating costs. Package support for accounts

receivable, accounts payables, order management, reconciliation etc has made the entire processing more rapid

and precise enabling management to make powerful and proficient decisions.

REFERENCES [1] Kumar Anirudh, Business Opportunities: Special Reference to Business Process Outsourcing Sector in India,

Asia Pacific Journal of Marketing and Management Review, Vol.1 (4), December 2012.

Page 64: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2440 | P a g e

[2] Meenakshi A. et al, Work Organization and Work Life Balance in the BPO Sector, International Journal of

Scientific and Research Publications, Vol.3, Issue 6, June 2013.

[3] Hagargi, Work Life Balance in Indian ITES/BPO’s, Global Research Analysis, Vol.2, Issue 6, June 2013.

[4] Gupta V., An Analysis of Attrition: Retention Strategy for IT/BPO Industry, International Journal of

Advanced Research in Computer Science and Management Studies, Vol.1, Issue 7, December 2013.

[5]Tamizharasi K. et al, Work Stress and Job Performance Evaluation of BPO employees, International Journal

of Advanced Research in Computer and Communication Engineering, Vol.3, Issue 1, January 2014.

Page 65: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2441 | P a g e

EVOLUTIONARY PRACTICES IN HRM Reepu

Department of Management, Punjab Institute of Technology, Nandgarh, Punjab (India)

ABSTRACT Human Resource Management has undergone spectrum of evolutions infusing more competence and efficiency

in organizational frame work. From industrial revolution to bossy structure to scientific management to welfare

secretaries to contemporary world there has been several key deliverables. HRM engulfs huge array of

activities ranging from organizational development to maintaining employee relations. This paper is an attempt

to highlight some evolutionary practices like strategic HRM, E-learning, Computerised HRIS, and Performance

Feedback Mechanisms which have revolutionized the posture of Human Resource Management, enabling

personnel to outperform in work, achieve strategic objectives, value building, compliance regulation and

contrive the future of the organization.

Keywords – HRM, Strategic HRM, E-Learning, Computerised HRIS, Performance Feedback

Mechanisms etc

I. INTRODUCTION Human Resource Management embarks from organization, resourcing, HR development, reward management

and employee relation. HRM manoeuvres the growth of an entity from its prematurity to the trail of progression.

It can be described as an avant-garde forward looking approach stalking several evolutions that has made its

voyage completely successful. This branch of learning undertook from England where carpenters, masons etc

form an association for furnishing their tasks. Then industrial revolution in the 18th century demanded the use of

more machinery, steam etc instead of human resource. A sort of bossy revolution was also asserted infusing

more gaps between boss and employees. 19th century was the era of world wars but industrial psychology tend

to gain importance over that instance of time and an emphatic approach over combining psychological

principles to the industrial arena was uprooted stating more effectiveness in the working of labourers. Later,

father of scientific management F.W. Taylor portrayed several scientific management principles. With the

passage of time, around 1920s due to the rise of conflicts among employee and employer some organizations

initiated the concept of Welfare secretaries, whose task was to bridge the gap by communicating the employee

that the actions have been lodged for strengthening him only. Human Relations Movement was a consequence

of sequential studies performed at Hawthorne Facility of Western Electric at Chicago. The study concluded that

their performance increases in relation to the group in which they conduct their work. However, till 1960

managing the human resources was considered only a blue-collar job and the scope was limited to mere record

keeping. Eventually after this time frame the importance of human resource management grew and then began

the inclusion of several sub-systems, which ultimately saw several evolutions. Since 1984, Human Resource

Management has been regarded as vital for an organization (as per the Michigan School). Following underpins

the crucial activities of HRM:

Page 66: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2442 | P a g e

Fig1. Scope of HRM

II. REVIEW OF RELATED LITERATURE

Watanabe K. (2005) researched that students from far areas, working ones and oriented to specialised domains

are beneficial with E-learning practices for correspondence courses and on campus courses utilizing E-learning

practices. According to this study, E-learning will soon become more popular vehicle of learning in Japanese

classrooms. Wright P.M etal (2007) identified variables like HR practice and organizational performance etc

which have been ignored over the time period and supported their findings with several literatures. Khera etal

(2012) conducted an empirical study with 127 respondents from top IT companies and found that the utmost

advantage of HRIS is that it enables to store information about employees, while secondary advantages include

that it enables to amass strategic actions performed by HR. Bal Y, etal (2013) prospects that SHRM plays a huge

role in developing innovativeness into an organizational performance. Hussain M (2013) found that research in

context of HRM is quite small and there exists several areas which need more attention.

III. EVOLUTIONARY PRACTICES

3.1 Performance Appraisal Performance appraisal have evolved from 90 degree where only superior tend to be the sole source for feedback,

180 degree where the outlook of self, superior and subordinate is of the point of interest and 270 degree in

which perspective of superior, subordinate is of worth credible and is used to compute ratings through Bias

Factor. 360 degree Feedback Method also deemed as multi-perspective, multi-rater, full-circle feedback, is a

popular feedback mechanism which undertakes the prospects of employer, customers, supervisors, subordinates

and peers. Few factors which drive such a feedback mechanism include the support of top level management,

consciousness of the decisive factor amongst the employees, authenticity of the parties involved, training

imparted so far and confidentiality of the data.

Page 67: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2443 | P a g e

Fig.2 Performance Appraisal This feedback is initiated with the help of determination of various objectives. Such objectives may be oriented

to assess the training needs, performance etc. of the employees. Next, after establishment of objectives comes

the phase of decision as to which employee is to be selected as well as its rater. Further, the decisive factor (e.g.

competency model) is plumped for performance. Such criterion must harmonize with software packages

because this vehicle will ease the processing. Later, a methodology for data collection is to be devised which

can be either outsourced or developed internally. The collected data must be analysed using the available

software packages and made ready for presentation. Organization must employ a pilot study before commencing

the entire project. It will enable to understand better the overall efficacies and hence prior modifications can also

be entailed. Hence after tweaking it to desired level, the feedback system should be kicked off, under the close

supervision of HR department. The data obtained from the feedback must be cautiously preserved as well as

shared amongst all. Another 540degree feedback system has also been developed in which client, superior,

peer, subordinate and self opinions are a valuable credence.

The evolutionary practice which has surpassed this traditional feedback system is 720 degree feedback system

taking into consideration both pre and post assessment intervention. This system rather than contemplating

merely the individual role it takes into account a bigger picture i.e. employee’s role at an organizational level. It

regards a profundity approach by measuring the employee’s performance though interviews. More emphasis is

laid on what actually matters or what is crucial for the organization for instance the perspective of clients; hence

with a superior response both the organization and its stakeholders will be gratified.

3.2 E-Learning Trainees have to learn consistently. This enables them to comprehend the various goals to be realized for

intrinsic accomplishment. Learning will serve as a constructive endeavour for the attainment of corporate goals

and objectives. To ease the process of learning learners must be given a gracious environment to learn. Relevant

feedbacks and rewards at appropriate times must be given. Trainees also focus on learning to suffice their basic

needs of living, social needs for surviving and for the achievement of their personal goals. Perpetual feedback

and encouragement will make the learning process more effective. But the process of retainment has become the

difficult task for the human brain as delineated:

Page 68: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2444 | P a g e

Fig.3 Forgetting Curve With the advent of E-Learning, learning process has been stimulated and development of subject matter to

create expertise on the various specific skills has become the utmost important concern. E-Learning can be

described as the use of technological vehicle for acquisition, complete dissemination of knowledge. E-learning

entails the use of Instrumentional Design Model for generating modules comprising various learning principles

with variant styles. Appropriate outcomes will be acquainted with the establishment of adequate objectives,

supporting theories and an assessment sheet.Graphic Visualisers will enrich the content more. A healthier

learning will require the use of style sheets as recommended by the designer. Further for E-Learning both

Graphic designers and Tool experts play a significant role. Graphic designer have the mastery of multimedia and

may create an image etc. in a jiffy. Tool experts on the other hand, can easily embedd any video, audio etc with

the content. The module once created have to be reviewed by language experts- to assert the language

congruence, design review experts- to evaluate the designing arena, HI design reviewer- ensuring a learnable,

legible outcome.

Therefore, such E-Learning programmes would alleviate the training and development programmes without

mandating the requirement of space and time of learning. They will serve as a JIT tool for the trainees. Such E-

learning T&D programmes will definitely augment the productivity, skill set and efficiency of the employee

leading to lesser wastage of any resources. Once overwhelmed with the learning then an employee can easily

adapt the workable methodology used in the organization. Such a process will definitely intensify the employee

morale engulfed with reduced absenteeism as well as turnover. It will assure an enriched employee experience.

Hence an organization’s profitability, productivity will rise, fostering with better relationships between superior,

subordinate and labourers and hence an enhanced corporate image and trust.\

3.3 SHRM Strategy and HRM have been considered as two important disciplines of management. But the globalisation

have unwraped multitudinal dimensions leading to the origination of SHRM (Strategic Human Resource

Management) which is difficult to define but SHRM is generally perceived as a distinctive approach to

managing people which seeks to achieve competitive advantage through the strategic development of highly

committed and capable workforce [Appleby & Mavin (2000)]. Thus, SHRM integrates the functionalities of

recruitment, selection, training, development etc in congruence with the organisation’s strategic objectives, to

attain a perfect fit of the two.

Page 69: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2445 | P a g e

So, while traditional HRM orients to employee-employer relation, ruled with directives and is a sort of reactive

transaction. SHRM incorporates the analysis of all stakeholders so as to make necessary transformations,

directed with the rules in accordance to the dynamic conditions and is more proactive in nature.

An organizational diagnosis will enable to locate the organization’s strength and weakness and gauging the

strategies which can be translated to human practices i.e. human resources should be made accounatble through

its functions what the organization is indeed trying to achieve. It will enable personnels to understand the

pecuniary impact of their actions. Moreover it can be identified that if their activity is value driven or adds value

to an organization. Hence, aligning such outcomes with personnels will enable them to make full utilization of

their potential. The organization can become triumphant by pursuing the following:

1. Forecasting

2. SHR Formulation

3. Implementation and Control

Forecasting the events will usher them with the opportunities as well as the threats. There will always persist

some events which the organization can easily handle or which are under their control, on the other hand there

exists some over which the organization has little control. There may be some probablistic events, but there even

can exist various unforeseen circumstances which may taint their performance. Various forecasting models can

even be utilised. On reaching the conclusion of such events then a SHRM strategy must be developed. To

reduce any eccentric conduct an organization must develop first organizational objectives, vision, mission etc.

Then the HR strategy ensuring that relevant policies, procedures, philosophies etc must accustom with the

organizational fit. Once SHRM has been processed then hasty implementation with thoughtful consideration of

different aspects must be inherited. Resistance will be encountered during this phase, but deliberate attempts

should be made to the strategy’s introspective elements. Since it has been found that top notch have sustained

the cut throat competition with the help of their valuable resources, innovations etc.

3.4 Computerised Human Resource Information System Human Resource Information System is a system used to acquire, store, manipulate, analyse, retrieve and

distribute pertinent information about an organization’s human resources (Tannenbaum, 1990). Now-a-days

HRIS have driven several implications from HR Planning to Labour Relations. A computerised human resource

information system has evolved to account the information about employee from his date of recruitment to his

performance till date. Such a system is a constituent of various modules like e-recruit, performance

management, payroll, compensation, status and skill tracking, training, succession planning, etc. It maintains a

database for it. So hardware, management of database, software, development programme etc are an obstinate

requisite for CHRIS. Numerous HRIS software in this context have reportedly been developed like Abra Suite,

HRSOFT, Peoplesoft, CORT, Atlas Business Solutions, Human Resource MicroSystems, Oracle-HRMS, SAP

HR, Spectrum HR, Vantage HRA etc.

Making information to available online encompass several challenges like associating e-HR with the

organizational strategy, accustoming the unknowns with the technological assistance, checking the viability of

the information, performance augmentations etc. So, an organization may pursue the following trail:

Page 70: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2446 | P a g e

§ Locate the various impositions of the current, future HR needs to the computerised HR information

systems.

§ Set out early, the desired outcomes from the CHRIS.

§ Make a declaration of the obligation.

§ Seek the available alternatives to meet the requirements.

§ Draw commendation taking into account the available financial structure, product line and other

supporting arrangements.

IV. CONCLUSION Human Resource Management has undergone numerous phases of evolutions steering more efficacy in the

discipline. The present paper trailed the evolution of Performance Feedback Mechanism from 90 degree to 720

degree seeking to improve the way in which employee performs the tasks. E-Learning on the other hand,

portrayed that human retention capacity diminishes with the passage of time, so there is a need of web enabled

system to access the theoretical framework whenever required. SHRM tries to unify two distinct branch of

learning’s to attain the organizational output. CHRIS has further addressed several emerging issues of

mismanagement etc.

REFERENCES [1] Michael Armstrong, A Handbook of Human Resource Management Practice, Kogan Page Publishers.

[2] Watanabe K., A Study on Needs for E-Learning - Through the Analysis of National Survey and Case

Studies, Progress in Informatics, No.2, pp.77-86, 2005.

[3] Wright P.M & Nishii, L.H., Strategic HRM and Organizational Behaviour: Integrating Multiple Level of

Analysis, CAHRS Working Paper Series, 2007.

[4] Khera etal, Human Resource Information System and its Impact on Human Resource Planning: A Perceptual

Analysis of Information Technology Companies, IOSR Journal of Business and Management, Vol.3, Issue

6, pp. 06-13, 2012.

[5] Bal Y. Etal., A Study on Determining the Relationship between Strategic HRM Practices and Innovation in

Organizations, Management, Knowledge and Learning, International Conference 2013.

[6] Hussain M and Ahmad M., Mostly Discussed Research Areas in Human Resource Management (HRM) – A

Literature Review, International Journal of Economics and Management Sciences, Vol.2, No.3, pp. 10-17,

2012.

[7] Morgan, Introduction to Psychology, Tata Mcgraw Hill.

[8] Rajib Lochan Dhar, Strategic Human Resource Management, Excel Books.

[9] Torress-Coronas, Teresa, Encyclopedia of Human Resources Information Systems: Challenges in E-HRM.

Page 71: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2447 | P a g e

STUDY AND PERFORMANCE ANALYSIS OF

SONET/SDH NETWORK ChinchuJoseph1, NijaP.S.2, Flintu Kunjukunjan3

1,2,3 Department of Electronics and Communication, SNSCT, Coimbatore (India)

ABSTRACT SONET/SDH is an international standard networking principle and a multiplexing method. The name of

hierarchy has been taken from the multiplexing method which is synchronous by nature. The evolution of this

system will assist in improving the economy of operability and reliability of a digital network. SONET/SDH

network has been designed only for voice traffic and it is leased line services. A huge amount of SONET/SDH

services from small granularities are expected to migrate towards Ethernet based services and traditional voice

platforms will be replaced voice over internet. This paper also covers the performance comparison of different

SDH data standards using optisystem software.

Keywords: ADM, PDH, POH, Regenerator, SOH, STM.

I. INTRODUCTION

Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET) refer to a group of fibre-

optic transmission rates that can transport digital signals with different capacities. SDH is based on repeated

hierarchy of fixed length frames that are designed to carry synchronous traffic channels. It eliminates group of

multiplexers by allowing single stage multiplexing and de-multiplexing thereby reducing hardware

complexities. The term Plesiochronous Digital Hierarchy (PDH) is used to describe allsuch digital standards before the advent

of SONET/SDH. This indicates asystem in which all parts operate on clock signals which have exactly thesame

rate (within a bounded error), but may have different phases. Such acharacteristic is arguably not a design

decision as much as it is an adjustmentto the realistically inevitable. The move to optical transmission systems

wasaccompanied by a move to a synchronous architecture, which means thatSONET/SDH performs

multiplexing in a strictly time division multiplexed manner.

II. SONET/SDH STANDARDS

The SDH standards exploit one common characteristic of all PDH networks namely 125 micro seconds

duration, i.e. sampling rate of audio signals (time for 1 byte in 64 k bit per second). This is the time for one

frame of SDH. The frame structure of the SDH is represented using matrix of rows in byte units as shown in

Figure.1.

Page 72: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2448 | P a g e

Fig.1. SDH frame structure

As the speed increases, the number of bits increases and the single line is insufficient to show the information on

Frame structure. The Frame structure contains 9 rows and number of columns depending upon synchronous

transfer mode level (STM). In STM-1, there are 9 rows and 270 columns. The first 9 rows and 9 columns

contain Section Overhead and 9 rows and 261 columns contain main information called Payload. Section

overhead containing information about the frame structure required by the terminal equipment. Each container

pointer will added to form virtual container. The interface speed of the STM-1 can be calculated as follows:

(270 columns x 9 rows x 8 bits x 1/125 s) = 155.52 Mbps.

In SDH, a single level definition called Synchronous Transport Module (STM) is used. It is more appropriate to

speakof STS frames at layers above the Photonic, and of OC signals at the Photonic layer. In this sense, the role

of the Photonic layer is to map STS frames onto OC signals. Table 1 shows the commonly used rates, together

withthe corresponding bit transfer rates, both raw and without overhead. One ofthe distinctions of SONET/SDH

from the old PDH approaches is that thefractional overhead remains constant at all levels of the digital hierarchy

inolder systems they usually increase at higher levels of the hierarchy.

Table 1. SONET/SDH Data Rate

III. SDH NETWORK ELEMENTS

3.1 Line Terminal Mux It can accept a number of tributary signals and multiplex them to the appropriate optical SDH. The input

tributaries can either be existing PDH signals such as 2, 34 and 140mbps or lower rate SDH signals The line

terminal multiplexer takes the range of input either 2, 34, 140, mbps and multiplex to the higher rate optical

carrier. Depending on the required regenerator spacing, optical interfaces of both 1310 nm and 1550nm are

generally available as the option, a line terminal interface for internal protection switching. Additional option on

line Terminal Multiplexer equipment provides for access to the order wire channel and the data communication

channels.

SDH Level

Data Rate

STM-1 155.52Mbps

STM-4 622.08Mbps

STM-16 2.4883Gbps

STM-64 9.95328Gbps

STM-256 39.8131Gbps

Page 73: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2449 | P a g e

3.2 Regenerator Regenerators are required with spacing dependent on the transmission technology these are not just simple

signals regenerators but have alarm reporting and performance monitoring capability a fault can be quickly

isolated to the individual transmission section.The most basic element in the regenerator is when the

transmission is needed more than 50 km they terminate and regenerate the optical signal. wavelengths of

1310nm and 1550nm are preferred because glass fibre is peculiar transparent to light at these wavelength fibre is

even more transparent at 1550n than 1310 and so lower regenerators are needed the further the signal has to go

the greater the transmitter power.

3.3 Add/Drop Mux ADM’S are generally available at the STM-1 and STM-4 interface rates and signals with in ADM. it is possible

to add channels to, or drop channels from the through signal. The ADM function is the one of the major

advantages resulting from the SDH where the PDH network requires banks of hardwired back-back terminals

Add/Drop Mux is a network element which allows configurable of a subnet of a payload from a higher rate data

stream. It is the basic SDH building block for local access to synchronous networks. it generally offers STM-1

interfaces and operates in the thru-mode fashion .A wide variety of tributary signals, such as 2mbps can be

added. This capability is one of the key benefits provided by synchronous systems since ADM elements

supports a function the previously took banks to back-back equipment.

3.4 Synchronous DXC

Synchronous Digital Cross Connect function as a semi-permanent switches for transmission channels and can

switch at any level from 64kbps up to STM-1.DXC can be rapidly reconfigured under software control to

provide digital leased lines and other services of varying bandwidth. It is capability without need for de-

multiplexing makes the digital cross connect such a powerful tool, allowing rapid configuration of the transport

network to provide digital leased lines and other services. The synchronous DXC functions as a semi-permanent

switch for varying bandwidth transmission channels i.e. 2 Mbps under software control, the cross connect

devices can pick out and reroute one or more lower order channels from transmission signals without the need

of de-multiplexing.

IV. BLOCK DIAGRAM AND RESULTS

The main block diagram for SDH network is shown in the figure 2. The results are obtained based on this

architecture.

Fig.2. SONET/SDH architecture

The simulation is carried out for different bit rates such as 155.52Mbps (stm-1), 622.08Mbps (STM-2),

2.4883Gbps (STM-3), 9.48Gbps (STM-4) and analysed Q factor for each data rates. The eye diagram for each

data rates are shown below.

Page 74: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2450 | P a g e

1. EYE Diagram for data rate 155.52Mbps(STM-1)

The Quality (Q) factor for STM-1 is 643.486

2. EYE Diagram for data rate 622.08Mbps(STM-2)

The Quality (Q) factor for STM-2 is 402.798

3. EYE Diagram for data rate 2.4883Gbps(STM-3)

The Quality (Q) factor for STM-3 is 142.7

4. EYE Diagram for data rate 9.95328Gbps (STM-4)

The Quality (Q) factor for STM-4 is 6.62663

Page 75: DESIGN, ANALYSIS AND FAILURE OF ACTUAL ...data.conferenceworld.in/ICRTESM/P2377-2451.pdfMaximum tension in the belt, T max=T 1+T c T 1=Tension in tight side taken from design section=328.95

International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0

Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in

2451 | P a g e

V. CONCLUSION

The simulative analysis shows a gradual decrease in Q factor corresponding increase in data rate. The Q factor

decreases from 643. 486 to 6.62663 for a bit rate 155.52Mbps to 9.95328Gbps. This shows that whenever the

packet size or data rate increases the quality will be reduce. So in order to increase the quality of service

operators can multiplex different data according to customer needs. The future works involves multiplexing the

different data rates to utilize the bandwidth efficiently without sacrificing the quality of services.

REFERENCES

[1] N.Jyothirmai, R. ManasaValli, A.Rama Krishna,“ SDH and its future trends”International Journal of

Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-1, Issue-6,

November 2012.

[2] Antˆonio Marcos Alberti&RoulienFernandes, “Ethernet-over-SDH: Technologies Review and Performance

Evaluation,” RevistaTelecomunicações, Vol. 13, Nº. 01, Maio De 2011.

[3] Gustavo Campos Sebastião, “Performance Comparison of Traditional SDH and NG-SDH Networks for IP

Traffic Transportation”, Departamento de EngenhariaElectrotécnica e de ComputadoresInstituto Superior

Técnico/ Instituto de Telecomunicações Lisbon, Portugal.

[4] R. Udayakumar1, V.Khanaa and K. P. Kaliyamurthie,“Optical Ring Architecture Performance

Evaluationusing Ordinary Receiver” Indian Journal of Science and Technology.

[5] Bhupender Sharma, RanjuKanwar, Sumitkumar, “Compression of Data and Routing in SONET with

Comparison of Various LANs”,International Journal of Emerging Technology and Advanced

EngineeringISSN 2250-2459, Volume 4, Issue 8, August 2014.

[6] Ghebretensaé Z., Harmatos J., and Gustafsson K, “Mobile broadband backhaul network migration from

TDM to carrier Ethernet,” IEEE Commun. Mag.,vol.48, no.10, pp.102-109, October 2010.