design, analysis and failure of actual ...data.conferenceworld.in/icrtesm/p2377-2451.pdfmaximum...
TRANSCRIPT
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2377 | P a g e
DESIGN, ANALYSIS AND FAILURE OF ACTUAL
CHARGING BELT CONVEYOR SYSTEM USED IN
THE INDUSTRY TO SET THE OPTIMUM RESULTS
Pranav Manikrao Deshmukh 1, Dr.S.P.Trikal2 1Department of Advanced Manufacturing and Mechanical System Design,
SSGMCE, Shegaon, (M.S) (India)
2Associate Professor, SSGMCE, Shegaon,(M.S)(India )
ABSTRACT
The aim of the paper is knowledge of damage process which is required for the correct regulation of operation
conditions for conveyor belt. The aim is to determine conditions caused this type of damage (height of impact
and weight of material impact). The current trend is to provide weight/cost effective products which meet the
stringent requirements. The aim of this paper is to study existing conveyor system and optimize the Belt
speed,Width,Wrapping angle,troughing angle, Pulley diameter and addition of Snub pulley .The parametric
model of belt conveyor where modeled in Solid-work 2014 where different parameter are studied.
Keyword: Belt Conveyor, Idler, Pulley, Failure, Simulation Software (Solid Works),Ansys Software
I. INTRODUCTION This master of engineering project was carried out at a YASH ENTERPRISES, which produces all types soap
manufacturing and packaging .Yash enterprises is located in Khamgaon Dist: Buldhana.
The purpose of this project was to provide a comprehensive knowledge of the basic production process theory of
designing belt conveyor. The project focuses on choosing the right conveyor belt and suitable components to
ensure manufacturing of high-quality belt conveyor. The existing problems of the idlers and belt conveyor are
pointed out and proper solutions are given to make them a longer life. This project helps to improve the
production by eliminating the various failures and other problem.
The final aim was to create a modified design to achieve large scale production, of idlers which enhances both
the efficiency and productivity. In order to help the company to get larger sales market, a plan of designing a
belt conveyor was carried out, but further research still is needed to make it come true.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2378 | P a g e
.
Fig 1:Actual charging belt conveyor system Design calculation of belt conveyor
Table 1 Specification of Belt-Conveyor System
Parameter Dimension
Height of conveyor, H 3042mm
Total belt length Lb 18040mm
Centre to centre distance L 9000mm
Belt width W 550mm
Belt speed V 0.2m/sec
Capacity C 3ton/hr
Motor RPM N 1500rpm
Temperature required T 10-200c
Motor - 3-phase induction motor
Table 2 Density of Belt Materials
Material Density(Kg/m3)
Leather 1000
Convass 1220
Rubber 1140
Balata 1110
Single woven belt 1170
Double woven belt 1250
II. DESIGN PROCEDURE FOR BELT CONVEYOR SYSTEM
2.1 Belt Capacity [C] C=3.6×Load cross-section area perpendicular to belt× Belt speed ×Material
density=3000 kg/hr ………..(1)
2.2 Belt Power For horizontal and elevating conveyor,
Fc=0.020 ,Tf=45m From table 3, Q=33 ,S=0.2m/sec
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2379 | P a g e
POWER= KW= =33.76KW ………(2)
2.3 Belt Tension Effective tension (Te)=Total empty friction+ Load Friction+ load slope friction ……….(3)
a)Return side friction=Fe×Q×L×0.4×(9.81×10-3) = 0.020×33×9×0.4×(9.81×10-3) =0.0233KN
Total empty friction=Fe×(L+tf)×Q×(9.81×10-3) = 0.020×(9+45)×33×(9.81×10-3) =0.3496KN
Carrying side empty friction=total empty friction-return side friction =0.3496-0.0233=0.3263KN
b)Load friction=Fl(L+tf) (9.81×10-3) =0.025(9+45) (9.81×10-3) =55.181KN
c)Load slope tension= (9.81×10-3) KN= (9.81×10-3) =124.24KN
d)Belt slope tension=B×H (9.81×10-3) KN =0.55×9×9.81×10-3 =0.486KN
Effective Tension,Te=0.3496+55.181+124.34=179.8706 KN
Power is also calculated from Effective Tension, Power=Te×S KW=179.8706×0.2=35.97 KW
2.4 Belt Width
Belt Width= = =599.569mm ……….(4)
The belt strength of canvas belt is 300N/mm and the belt having properties like high tensile strength,corrosion
resistance,wear and tear resistance.
2.5 Design of Shaft
Drive pulley shaft design:- Te=179.8706KN
T1=Carrying side belt tension=Te[ =179.8706[ =328.95KN
T2=Return side belt tension T2=T1-Te=328.95-179.8706=149.079KN
W=Weight of drive pulley =200 =1.962KN
Fig2: Load and Moment Diagram
Resolving horizontal and vertical components,
FH=T1 = 328.95 =449.2KN
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2380 | P a g e
FV=T1 = 328.95 =161.5KN
Horizontal loading,RCH =RDH = = =224.6KN
Vertical loadingRcv= Rdv = = =80.75KN
For horizontal loading, RCH×0.05+ RDH×0.6= RBH×0.65
224.6×0.05+ 224.6×0.6= RBH×0.65 RBH=224.6KN Similarly, RAH=224.6KN
For vertical loading, RCV×0.05+ RDV×0.6= RBV×0.65
80.75×0.05+ 80.75×0.6= RBV×0.65 RBV=80.75KN Similarly, RAV=80.75KN
For horizontal bending moment diagram,
MCH= RAH×0.05= 224.6×0.05=11.23KN-m MDH= RBH×0.05= 224.6×0.05=11.23KN-m
For vertical bending moment diagram,
MCV= RAV×0.05= 80.75×0.05=4.04KN-m MDV= RBV×0.05= 80.75×0.05=4.04KN-m
Resultant moment at C and D= = =11.93KN-m ………………..(5)
Equivalent Torque, Te= , T=Te×r=179.8706×0.075=13.49KN
Based on Equivalent Torque,
Teq= = =24.59KN-m ………(6)
Allowable shear stress τs= , d= = =0.1406m=140.6mm ……….(7)
Meq= = =21.24KN-m
Allowable bending stress ɓb= Meq d= = =0.1493m=149.3mm ….. . (8)
The required diameter of the shaft pulley is 149.3mm
III. ANALYSIS OF CHARING BELT CONVEYOR STSTEM
3.1 Load Analysis (Stress Analysis)
Stressɓ = …………(9)
Maximum tension in the belt, Tmax=T1+Tc
T1=Tension in tight side taken from design section=328.95 KN
Tc=Centrifugal tension of the belt can be calculated as,=mv
m=Area×length×density =b×t×l×ρ =0.55×0.05×18.040×1220=605.242Kg=5937.42 N
V= = =2.09 m/sec
Tc=12.409KN
Tmax=T1+Tc=328.95+12.409=341.359 KN
Stress= =12413054.55N/m2 =12.41× N/m2=12.41 Mpa
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2381 | P a g e
Fig3:Geometry of Actual Design Fig4: Boundry Condion of Actual Design
Fig5: Stress of Actual Design
From Actual Design of Charging Belt Conveyor System, The following problem or failure should be occur-
1) Belt slips when conveyor is started.
2) Belt slips while running.
3) The belt is stalling or jerking.
4) Excessive top cover wear over entire top surface or in load carrying area.
5) The covers are hardening and/or cracking.
6) Transverse breaks in belt at the edge.
7) Belt runs fine when it’s empty but wont track right when it’s loaded.
IV. RESULT AND DISSCUSION
Table 3 Comparison of result of analysis
Calculated
Stress(mPa)
Analytical
Stress(mPa)
%Error
Actual Design 12.41 13.68 1.27
From the actual design, the calculated stress is less than the analytical stress .For that reason, we have to occur
certain type of failure.
V. CONCLUSION & FUTURE SCOPE
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2382 | P a g e
This project provides a comprehensive knowledge of the basic production process theory of designing belt
conveyor. The project focuses on choosing the right conveyor belt and suitable components to ensure
manufacturing of high-quality belt conveyor. The existing problems of the idlers and belt conveyor are pointed
out and proper solutions are given to make them a longer life. This project helps to improve the production by
eliminating the various failures and other problem.
The final aim was to create a modified design to achieve large scale production, of idlers which enhances both
the efficiency and productivity. In order to help the company to get larger sales market, a plan of designing a
belt conveyor was carried out, but further research still is needed to make it come true.
The calculated shaft diameter is 149.3 mm and analysis and simulation of actual design of charging belt
conveyor system. The problem occur during working of conveyor system should be determined.
REFERENCES [1] R.S.Khurmi S.Chand Textbook of “Machine Design” & Co. Pvt.Ltd. Edition 2012 . ISBN : 81- 219- 2537-1
[2] Zhao, Lihua. "Typical failure analysis and processing of belt conveyor." Procedia Engineering 26 (2011):
942-946.
[3] Fedorko, Gabriel, et al. "Failure analysis of irreversible changes in the construction of rubber–textile
conveyor belt damaged by sharp-edge material impact." Engineering Failure Analysis 39 (2014): 135-148.
[4] Ariff, Tasnim F., et al. "Design Improvements and Fabrication of Conveyor Belt Cleaner and Washing
System at Westports Malaysia."
[5] Shinde, Suhas M., and B. Patil. "Design And Analysis Of A Roller Conveyor System For Weight
Optimization And Material Saving." International Journal on Emerging (2012).
[6] Molnár, Vieroslav, et al. "Analysis of asymmetrical effect of tension forces in conveyor belt on the idler roll
contact forces in the idler housing." Measurement52 (2014): 22-32.
[7] Shim, Hee-Jin, and Jung-Kyu Kim. "Cause of failure and optimization of a V-belt pulley considering fatigue
life uncertainty in automotive applications."Engineering Failure Analysis 16.6 (2009): 1955-1963.
[8] Fedorko, Gabriel, et al. "Failure analysis of belt conveyor damage caused by the falling material. Part I:
Experimental measurements and regression models." Engineering Failure Analysis 36 (2014): 30-38.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2383 | P a g e
DESIGN MODIFICATION AND ANALYSIS OF
CHARGING BELT CONVEYOR SYSTEM TO SET
OPTIMUM RESULTS
Pranav Manikrao Deshmukh 1, Dr.S.P.Trikal2
1Department of Advanced Manufacturing and Mechanical System Design,
SSGMCE, Shegaon, (M.S) (India)
2Associate Professor, SSGMCE, Shegaon,(M.S)(India )
ABSTRACT The aim of the paper is knowledge of damage process which is required for the correct regulation of operation
conditions for conveyor belt. The aim is to determine conditions caused this type of damage (height of impact
and weight of material impact). The current trend is to provide weight/cost effective products which meet the
stringent requirements. The aim of this paper is to study existing conveyor system and optimize the Belt speed,
Width, Wrapping angle, troughing angle, Pulley diameter and addition of Snub pulley .
Keyword : Belt conveyor, Idler, Pulley, Failure, Simulation Software (Solid Works), Ansys software
I. INTRODUCTION This master of engineering project was carried out at a YASH ENTERPRISES, which produces all types soap
manufacturing and packaging .Yash enterprises is located in Khamgaon Dist: Buldhana.
The purpose of this project was to provide a comprehensive knowledge of the basic production process theory of
designing belt conveyor. The project focuses on choosing the right conveyor belt and suitable components to
ensure manufacturing of high-quality belt conveyor. The existing problems of the idlers and belt conveyor are
pointed out and proper solutions are given to make them a longer life. This project helps to improve the
production by eliminating the various failures and other problem.
The final aim was to create a modified design to achieve large scale production, of idlers which enhances both
the efficiency and productivity. In order to help the company to get larger sales market, a plan of designing a
belt conveyor was carried out, but further research still is needed to make it come true.
II. PROBLEM DEFINITION The aim of this project is to redesign existing charging belt conveyor system by designing the critical parts (Belt
capacity, Belt tension, Belt power, Belt width, Shaft, pulley ), to minimize the overall failure or problem of the
conveyor system and to save considerable amount of material.
III. OBJECTIVE OF THE STUDY The following are the objectives of the study
1. Study existing charging belt conveyor system and its design.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2384 | P a g e
2. Geometric modeling of existing roller conveyor.
3. To generate parametric model using ANSYS
4. To carry out linear static, modal, transient and optimization analysis of existing roller conveyor.
5. Modification of critical conveyor parameters for system optimization.
6. To carry out Analysis of Modified design for same loading condition.
7. Recommendation of new solution for system optimization.
IV. SCOPE OF PRESENT STUDY 1. Check design of existing conveyor system.
2. Simulation method applied to optimize parameters troughing angle, belt speed, addition of snub roller, belt
width and shaft diameter.
3. ANSYS applied for linear static, modal, transient and optimization analysis.
4. Modal Analysis of belt conveyor system
5. Optimization of conveyor assembly for failure reduction.
6. Comparison between existing and optimized design.
V. STUDY OF THE EXISTING ASSEMBLY OFCONVEYOR SYSTEM
Fig1:-Existing Design of Charging Belt Conveyor System
5.1 Driving Device Driving device is the power transmitting mechanism of a belt conveyor. It is made up of an electromotor,
coupling, reducer and driving pulley and so on. According to different using conditions and working
requirements, the drive mode of a belt conveyor can be grouped to single-motor driving, multi-motor driving,
single-pulley driving, and double-pulley driving and multi-pulley driving.
Single motor and single pulley driving is adopted by a belt conveyor. The driving device is installed at the
discharge point which is located at the conveyor head. When the power is big, a single motor and double-pulley
driving is used, precisely, one motor has two driving pulleys, and the two pulleys are connected by a pair of
exposed gear which has the same number of teeth.
The pulleys can be classified into two types: driving pulleys and return pulleys. The belt is driven by friction
which is produced by pulley’s surface and belt’s surface because of the function of driving pulley, and the
movement direction of the belt is changed at the same time.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2385 | P a g e
Driving pulley is the main component of transmitting power. In order to transmitting enough power, enough
friction must be provided from the belt and pulley. According to the theory of friction transmission, the methods
of increasing friction between the conveyor belt and the pulley and augmenting the wrap angle can be adopted
to ensure enough driving power when a driving device needs to be chosen. Usually, when a single pulley is
used, wrap angle can be 1800-2400; when double-pulley is used, the wrap angle can reach 3600-4800. Double-
pulley’s driving can enhance the conveyor’s traction greatly, so it is often used especially when the transport
distance is long.
Driving pulley’s surface has glossy-faced and rubber-faced types. Rubber-faced pulley can be utilized to
increase the friction coefficient between the driving pulley and the belt, as well as to reduce the wear of the
pulley. When the pulley is small, the environment humidity is low, a glossy-faced pulley can be chosen. A
rubber-faced pulley can be used when the environment humidity is high, power is big, and slip is easy.
Choosing a right pulley is important. When the belt of a fabric belt core is used, the pulley is chosen on the basis
of the belt’s thickness. The conveyor belt needs to move around the pulley repeatedly during the working
process, and bending occurs. When the belt is bent, the external surface is stretched and while the internal
surface is compressed, the stress and strain of each layer vary. The rubber layers have mechanical fatigue and
are damaged due to the scaling when the repetitive bending reaches a certain level. The smaller diameter of
pulley, the bigger the deflection of conveyor belt and the faster the scaling occurs.
5.2 Return Pulley A return pulley has three categories: 1800. The return pulley’s diameter is related to driving pulley’s diameter
and the wrap angle that the belt has on the return pulley. Return pulley is a welded-steel plate construction with
an antifriction bearing.
5.3 Troughing Plate Troughing plate are used to support the belt during conveying the material into the feeder.Troughing platee
having 550 mm distance from the sdjacent plate for the proper belt alignment.The plate having the trough angle
is 450.
The belt conveyor is an endless belt moving over two end pulleys at fixed positions and used for transporting
material horizontally or at an incline up or down. The main components of a belt conveyor are:
1. The belt that forms the moving and supporting surface on which the conveyed material rides. It is the
tractive element. The belt should be selected considering the material to be transported.
2. The idlers, which form the supports for the carrying and return stands of the belt.
3. The pulleys that support and move the belt and controls its tension.
4. The drive that imparts power to one or more pulleys to move the belt and its loads.
5. The structure that supports and maintains the alignments of the idlers and pulleys and support the driving
machinery.
6. The trough plate that support the belt for carrying proper amount of material to the feeder.
7. Belt cleaner that keeps the belt free from materials sticking to the belt.
8. Surge hopper and feeder,which is essential for supplying material to the conveyor at uniform rate when the
supply of material is intermittent.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2386 | P a g e
5.4 From Actual Design of Charging Belt Conveyor System,The Following Problem or Failure
Should Be Occur 1) Belt slips when conveyor is started.
2) Belt slips while running.
3) The belt is stalling or jerking.
4) Excessive top cover wear over entire top surface or in load carrying area.
5) The covers are hardening and/or cracking.
6) Transverse breaks in belt at the edge.
7) Belt runs fine when it’s empty but wont track right when it’s loaded
VI. MODIFIED DESIGN OF THE CHARGING BELT CONVEYOR SYSTEM A) By Adding Snub Roller And Idlers
Fig2: Modified Design of Charging Belt Conveyor System
VII. IDLER FUNCTIONS
7.1 Idlers Idler is the supporting device for belt. Idlers move as the belt moves so as to reduce the running resistance of the
conveyor. Idlers’ qualities depend on the usage of the belt conveyor, particularly the life span of the belt.
However, the maintenance costs of idlers have become the major part of the conveyor’s operating costs. Hence,
idlers need to have reasonable structure, durability in use, small ratio of steering resistance, reliability, and dust
or coal dust cannot get in bearing, due to which the conveyor has a small running resistance, saves energy and
prolongs the service life.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2387 | P a g e
Fig. 3 Idlers Used on A Belt Conveyor To Support The Belt On The Carrying And Return
Strands
VIII. THE FOLLOWING TYPE OF IDLERS ARE USED IN BELT CONVEYOR SYSTEM
8.1 Impact Idler Rubber-cushioned impact idlers are one solution for absorbing impact in the belt’s loading zone. The rubber
covers absorb some of the energy to provide the benefit of shock absorption.
One disadvantage of using impact rollers in the load zone is that each idler supports the belt only at the top of
the roller. No matter how closely spaced, the rounded shape of the roller and the ability of the rubber to deflect
under the load will allow the conveyor belt to oscillate or sag away from the ideal flat profile. This sag allows
and encourages the escape or entrapment of fugitive material. The space interval between impact rollers offers
little protection from tramp materials dropping from above and penetrating the belt.
Fig. 4 Impact Idler
8.2 Carrying Idlers Carrying idlers provide support for the belt while it carries the material. They are available in flat or troughed
designs. The flat design usually consists of a single horizontal roll for use on flat belts, such as belt feeders.
The troughed idler usually consists of three rolls-one horizontal roll in the center with inclined rolls on either
size. The angle of the inclined rollers from horizontal is called the trough angle. Typically, all three rolls are
same length, although there are sets that incorporate a longer center roll and shorter inclined rollers called
“picking idlers”. This design supplies a larger flat area to carry material while allowing inspection.
8.3 Training Idler There are a number of designs for training idlers that work to keep the belt running in the center of the conveyor
structure. Typically, these idlers are self-aligning: they react to any mistracking of the belt to move into a
position that will attempt to steer the belt back into the center. They are available for both carrying side and
return side application.
Belt-training idlers should never be installed under the carrying side of the belt in the load zone, as they sit
higher than the adjacent regular carrying idlers and raise the belt as they swivel.
TRANSITION: These idlers ease the belt from a troughed configuration to the flat pulley surface. Reducing
stress in the outer belt edges.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2388 | P a g e
8.4 Return Idler Return idlers provide support for the belt on its way back to the loading zone after unloading cargo. These idlers
normally consist of a single horizontal roll hung from the undesirable of the conveyor stringers-return idlers,
incorporating two smaller rolls, are sometimes installed to improve belt tracking.
8.5 Idler Spacing The spacing between the rolling components has a dramatic effect on the idler support and shaping missions.
Idlers placed too far apart will not properly support the belt nor enable it to maintain the desired profile. Placing
idlers too close together will improve belt support and profile, but will increase conveyor construction costs and
may lead to an increase in the conveyor’s power consumption.
The spacing of return idlers is determined by belt weight, because no other load is supported by these idlers and
sag related spillage is not a problem on this side of the conveyor. Typical return idler spacing is3 meters.
IX. ANALYSIS OF CHARING BELT CONVEYOR STSTEM- FOR ACTUAL DESIGN
9.1 Load Analysis (Stress Analysis)
Stressɓ = …………
Maximum tension in the belt, Tmax=T1+Tc
T1=Tension in tight side taken from design section=328.95 KN
Tc=Centrifugal tension of the belt can be calculated as,=mv
m=Area×length×density =b×t×l×ρ =0.55×0.05×18.040×1220=605.242Kg=5937.42 N
V= = =2.09 m/sec
Tc=12.409KN
Tmax=T1+Tc=328.95+12.409=341.359 KN
Stress= =12413054.55N/m2 =12.41× N/m2=12.41 Mpa
Fig5: Geometry of Actual Design Fig6: Boundry Condion of Actual Design
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2389 | P a g e
Fig7: Stress of Actual Design
X. MODIFIED DESIGN OF THE CHARGING BELT CONVEYOR SYSTEM:- 10.1 By adding snub roller and idlers for increasing the wrap angle between belt and pulley.
Calculate stress developed in the belt with modified design by adding snub roller ,
Stressɓ =
Maximum tension in the belt,
T1=291.48 KN Tc=12.409KN
Tmax=T1+Tc=303.889 KN
Stressɓ=11.05× N/m2
Stressɓ=11.05 Mpa
Fig8: Boundry Condition of Modified Design Fig9: Meshing Model )f Modified Design
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2390 | P a g e
Fig10: Geometry of Modified Design Fig11: Stress of Modified Design
XI. SOLUTIONS SUGGESTED After completion of the project various suggestion were made to the company regarding the design and
operation of the conveyor belt system
1. It was advised to use the impact,transition,trainingand carrier roller idlers intheconveyor system.
2. The transition distance of the belt was not adequate and it was increased .
3. The installation of snub roller for proper belt tensioning.
4. The proper angle of wrapping between belt and pulley.
5. The proper troughing angle should be provided.
6. Inorder to avoid dust emission it was advised to install bag filter for collecting dust from the Skirt Board area.
XII. CONCLUSION & FUTURE SCOPE The material spillage from the conveyor belt is a significant problem not only from the point of view of
environment and government regulations , but also because of number of labour hours lost in the cleaning, cost
incurred due to frequent repairs or rollers and other conveyor parts etc.
Conveyor systems are present in all most in every manufacturing unit be it a soap plant, mineral and ore
processing facility, food and agro industry you name it. Thus knowing the basics of conveyor systems is
essential for a mechanical engineer both for maintenance and design applications.
REFERENCES
[1] R.S.Khurmi S.Chand Textbook of “Machine Design” & Co. Pvt.Ltd. Edition 2012 . ISBN : 81- 219- 2537-1
[2] Zhao, Lihua. "Typical failure analysis and processing of belt conveyor." Procedia Engineering 26 (2011):
942-946.
[3] Fedorko, Gabriel, et al. "Failure analysis of irreversible changes in the construction of rubber–textile
conveyor belt damaged by sharp-edge material impact." Engineering Failure Analysis 39 (2014): 135-148.
[4] Ariff, Tasnim F., et al. "Design Improvements and Fabrication of Conveyor Belt Cleaner and Washing
System at Westports Malaysia."
[5] Shinde, Suhas M., and B. Patil. "Design And Analysis Of A Roller Conveyor System For Weight
Optimization And Material Saving." International Journal on Emerging (2012).
[6] Molnár, Vieroslav, et al. "Analysis of asymmetrical effect of tension forces in conveyor belt on the idler roll
contact forces in the idler housing." Measurement52 (2014): 22-32.
[7] Shim, Hee-Jin, and Jung-Kyu Kim. "Cause of failure and optimization of a V-belt pulley considering fatigue
life uncertainty in automotive applications."Engineering Failure Analysis 16.6 (2009): 1955-1963.
[8] Fedorko, Gabriel, et al. "Failure analysis of belt conveyor damage caused by the falling material. Part I:
Experimental measurements and regression models." Engineering Failure Analysis 36 (2014): 30-38.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2391 | P a g e
VOICE NAVIGATION STICK FOR BLIND 1Pankaj Patil, 2Kunal Bonage, 3Bhimsen Gire, 4Pranjali R Phirke
1,2,3,4 Department of Electronics, Savitribai Phule Pune University, Pune, (India)
ABSTRACT
God gifted sense to human being which is an important aspect in our life is vision. We are able to see the beauty
of nature, things which happen in day-to-day life with the help of our eyes. But there are some people who lack
this ability of visualizing these things. They face many difficulties to move on with their daily life. The problem
gets worse when they move to an unfamiliar location. Visually impaired people face many challenges when
moving in unfamiliar public places. Only few of the navigation systems for visually impaired people can provide
dynamic interactions. None of these systems work perfectly for outdoors. Propose navigation device for the
visually impaired focus on travelling from one location to another. This focuses on designing a device for
visually impaired people that help them in travelling independently comfortable to use. The device is linked
with a GPS to identify the location of the blind person. Moreover, it provides voice alert to avoid obstacles
based on ultrasonic sensors. An emergency button is also added to the system. The whole device is designed to
be small and is used in conjunction with the stick.
Keywords — Blind People, GPS, Ultrasonic Sensor, Stick, Voice Navigation .
I. INTRODUCTION
Blindness or visual impairment is a condition that affects many people around the world. This condition leads to
the loss of the valuable sense of vision. Worldwide more than 160 million people are visually impaired with 37
million to be blind. The need for assistive devices was and will be continuous. There is a wide range of
navigation systems and tools existing for visually impaired individuals the blind person truly requirements and
identifying objects.
1.1Background There are 285 million people worldwide that have some level of visual impairment. The blind navigation system
catering needs of the blind people who are not able to move from one place to other place without the help of
others. Recent survey source says India is now become the country having world’s large number of blind
people. There are 37 million blind people across the globe, over them 15 million people are in India. The blind
travel in India depends on other guide like cane, people information, trained dogs. A guide dog is trained to
guide its users to avoid the accidents from objects and barriers. When a visually impaired person is using a
walking stick, they waving their walking stick and finds the obstacle by striking obstacles ahead of them. Hence
here a system is proposed to help this group of population.
1.2 Motivation God gifted sense to human being which is an important aspect in our life is vision. We are able to see the beauty
of nature, things which happen in day-to-day life with the help of our eyes. But there are some people who lack
this ability of visualizing these things. They face many difficulties to move on with their daily life. The problem
gets worse when they move to an unfamiliar location. Visually impaired people face many challenges when
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2392 | P a g e
moving in unfamiliar public places. As many of these people have difficulty knowing where they are or where
they are going, frequently feeling totally disorientated or even isolated, supplemental navigational guidance is
very important for them. Navigation involves updating one’s position and orientation while he or she is
travelling an intended route, and in the event the person becomes lost, reorienting and re-establishing a route to
the destination. Hence a system has to be found to minimize the difficulties of virtually impaired people to reach
their destination
1.3 Objective The paper main objective is to provide a talkative assistance to blind people. We are going to develop a
intelligent system that works efficiently good in outdoor. Current navigation device for the visually impaired
focuses on travelling from one location to another, this system focuses on designing a device for visually
impaired people that help them to travel independently which is comfortable to use. This device is used to help
blind people to move with the same ease and confidence as a sighted people. The device is linked with a GPS to
identify the location of the blind person. Moreover, it provides the voice alert to avoid obstacles based on
ultrasonic sensors. An emergency button is also added to the system. The whole device is designed to be small
and is used in conjunction with the stick.
Fig 1: Statistical Analysis
II. LITERATURE SURVEY There are several methods and devices used to guide visually impaired persons. Several research works are
being performed by many institutions throughout the world to offer the best navigational robot in terms of cost
effectiveness. This section gives a brief review on various navigational aids for blind individuals.
Blind and visually impaired people are at a disadvantage when they travel because they do not receive enough
information about their location and orientation with respect to traffic and obstacles on the way and things that
can easily be seen by people without visual disabilities. The conventional ways of guide dog and long stick only
help to avoid obstacles, not to know what they are. Navigation systems usually consist of three parts to help
people travel with a greater degree of psychological comfort and independence. Sensing the immediate
environment for obstacles and hazards, providing information about location and orientation during travel today
in the market different technologies like GPS, GPRS, etc are used to navigate visually impaired people. The
studies of various published international papers have been done. Before more technologically advanced
solutions to mobility aids are discussed it is useful to outline basic properties of the traditionally used primary
aids and explain their main properties and limitations.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2393 | P a g e
2.1 Stick
The most popular mobility hand held aid. It is usually foldable and adjustable to the height of the user. A blind
person using swing-like movements, “scan” the path in front in approx. 1 m distance (near -space
protection).The stick requires about 100 hours of training for skilful use, e.g. detecting drop-offs, walking up
and down the stairs.
Advantages: cheap, light-weight constructions available, effectively informs of shorelines, landmarks and
obstacles at ground-level, notifies others about visual disability of its user. Disadvantages: does not protect from
obstacles at torso and face level.
2.2 Guidance of Dog A specially trained dog assisting the blind in obstacle avoidance, but usually not aiding in way finding (unless
travelling a familiar path), e.g. the dog is trained to stop before obstacles, reacts to commands on walking
directions. In spite of their great usefulness, guide dogs are a rarely used aid - only about 1% of the visually
impaired use it. Most guide dog owners do not simultaneously use the dog and the stick.
Advantages: good in following familiar paths, good overall obstacle avoidance, trained for selective
disobedience when sensing danger to his owner.
Disadvantages: very costly guide dog service period is on average 6 years, regular dog up-keeping costs and
lifestyle changes.
2.3 Human Guide
A blind person walks hand in hand with a sighted guide.
Advantages/disadvantages: The most obvious, but in practice not a permanent solution for aiding the blind in
mobility and navigation. A blind person lacks privacy and can have a feeling of being a burden to his or her
guide.
III. WORKING
Fig 2: Proposed System
3.1 System Description The Fig 2 shows the block diagram of the walking stick unit that is present in the walking stick of the blind
people. In this paper, the main objective is GPS and GSM section, obstacle unit (IR SENSOR AND
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2394 | P a g e
ULTRASONIC SENSOR). The blind person will reach his destination place using voice. He will speak his
starting and destination place. All this detail will be displayed on LCD. When he wishes to go to any new
location he will enter the position using keyboard. His location will be trace using GPS. The co-ordinates given
by GPS are stored in EEPROM. And it is given to micro-controller. It will match the co-ordinates and then it
will display on LCD and announcement will be done on speaker. Accelerometer is fitted on the stick, thus blind
person turn to any direction such as left, right, forward and backward. So he will come to know the location of
that place he is facing too. Ultrasonic sensor and IR sensor is used to detect the obstacle such as vehicles, any
person etc. As soon as obstacle is detected the blind person is warned with the help of speaker thus avoiding any
kind of mishap.
3.1.1 Arm 7 This generation introduced the Thumb 16-bit instruction set providing improved code density compared to
previous designs. The most widely used ARM7 designs implement the ARMv4T architecture, but some
implement ARMv3 or ARMv5TEJ. All these designs use Von Neumann architecture, thus the few versions
comprising a cache do not separate data and instruction caches. Some ARM7 cores are obsolete. One
historically significant model, the ARM7DI is notable for having introduced JTAG based on-chip debugging;
the preceding ARM6 cores did not support it. The "D" represented a JTAG TAP for debugging; the "I" denoted
an Icebreaker debug module supporting hardware breakpoints and watch points, and letting the system be stalled
for debugging. Subsequent cores included and enhanced this support. It is a versatile processor designed for
mobile devices and other low power electronics. This processor architecture is capable of up to 130 MIPS on a
typical 0.13 µm process. The ARM7TDMI processor core implements ARM architecture v4T. The processor
supports both 32-bit and 16-bit instructions via the ARM and Thumb instruction sets.
The ARM7TDMI (ARM7+Thumb tag Debug fast Multiplier enhanced ICE) processor is a 32-
bit RISC CPU designed by ARM, and licensed for manufacture by an array of semiconductor companies. In
2009 it remains one of the most widely used ARM cores, and is found in numerous deeply embedded system
designs. The ARM7TDMI-S variant is the synthesizable core.
3.1.2 LCD LCD is used in a project to visualize the output of the application. We have used 16x2 LCD which indicates 16
columns and 2 rows. So, we can write 16 characters in each line. So, total 32 characters we can display on 16x2
LCD. LCD can also used in a project to check the output of different modules interfaced with the
microcontroller. Thus LCD plays a vital role in a project to see the output and to debug the system module wise
in case of system failure in order to rectify the problem.
3.1.3 Keypad
Keypad is basically used to provide the input to the microcontroller. The keypad consists of micro switches
which are connected to the microcontroller pins in a matrix format. Each key is assigned with the special
character or symbol or digit. When user press the key the respective assigned ASCII value of that key is
provided to the microcontroller via software. The keypad is also standard 4x4 which has 8 pin connector. The
4x4 keypad has the layout like the table shown below. BK is backspace while entering the password. EN is enter
and is used do enable/disable menu item or enable the system
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2395 | P a g e
Keyboards are the most widely used input device of the 8051, and the basic understanding of them is essential.
At the lowest level, keyboards are arranged in matrix form of rows and columns. The CPU accesses both rows
and columns through ports: therefore, with two 8-bit ports, an 8 X 8 matrix of keys can be connected to
microcontroller. When a key is pressed, a row and a column make a contact: otherwise, there is no connection
between them.
3.1.4 Scanning and Identifying the Keys The rows are connected to an output port and the columns are connected to an input port. If no key has been
pressed, reading the input port will yield 1s for all columns since they are all connected to high (VCC). If all the
rows are grounded and a key is pressed one of the columns will have 0 since the key pressed provides a path to
ground. It is the function of the microcontroller to scan the keyboard continuously detects and identifies the key
pressed.
3.1.5 GPS Modem The GPS smart receiver features the 16 channels .Ultra low power GPS architecture. This complete enabled
GPS receiver provides high position, velocity and time accuracy performances as well as high sensitivity and
tracking capabilities.
The ultra low power CMOS technology, the GPS receiver is ideal for many portable applications such as PDA,
Tablet PC, smart phone etc.
Benefits- 1. Ultra low power consumption
2. Easy and fast to install
3. Superior urban canyon performance
4. Low cost with high performance
Fig 3: GPS Component
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2396 | P a g e
3.1.6 Announcement System Announcement system is nothing but a speaker or headphone which is connected at the output of the system for
announcement purpose. As per the system application, according to the visual based guide, the respective saved
audio file is played using a speaker or headphone.
3.1.7 SD Card SD card is basically is used as an storage device which will required to store the required data. The system
database can be used to store in SD card in the form of .wav file and can be accessed from that whenever it is
required. SD card is interfaced with the system using a protocol called SPI protocol.
3.1.8 Accelerometer An accelerometer is an electromechanical device that will measure acceleration forces. These forces may be
static, like the constant force of gravity pulling at your feet, or they could be dynamic - caused by moving or
vibrating the accelerometer. By measuring the amount of static acceleration due to gravity, you can find out the
angle the device is tilted at with respect to the earth. By sensing the amount of dynamic acceleration, you can
analyze the way the device is moving. Accelerometers use the piezoelectric effect - they contain microscopic
crystal structures that get stressed by accelerative forces, which cause a voltage to be generated. Another way to
do it is by sensing changes in capacitance. If you have two microstructures next to each other, they have a
certain capacitance between them.
3.1.9 GSM Modem GSM (Global System for Mobile communication) is a digital mobile telephony system. With the help of GSM
module interfaced, we can send short text messages to the required authorities as per the application. GSM
module is provided by SIM uses the mobile service provider and send SMS to the respective authorities as per
programmed. This technology enables the system a wireless system with no specified range limits. GSM uses a
variation of time division multiple access (TDMA) and is the most widely used of the three
digital wireless telephony technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then
sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the
900 MHz or 1800 MHz frequency band.
3.1.10 IR Obstacle Sensor Here we are connecting an IR based obstacle sensor. The 50 ohm resister is used for current limiting. The
current through the LED is 5v / 50 ohm = 100 mump, which is high for an LED. But to increase the range of the
obstacle sensor we are using a lower range resistor (50 ohm).On the receiver side we have connected the IR
receiver in reverse bias. So as soon as the light falls in the IR receiver, the anode voltage increases and when the
anode voltage is more than the cathode voltage then the LED in forward bias mode and start conducting.
3.1.11 Ultrasonic Sensor Ultrasonic sensors are basically used to measure the distances between the obstacle / object and the sensor. The
ultrasonic sensor works on Doppler Effect. It consists of a ultrasonic transmitter and a receiver. The transmitter
transmits the signal in one direction. This transmitted signal is then reflected back by the obstacle and received
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2397 | P a g e
by the receiver. So the total time taken by the signal to get transmitted and to received back will be used to
calculate the distance between the ultrasonic sensor and the obstacle.
Fig 4: Working of Ultrasonic Sensor
3.1.12 Voice System Hm2007 The speech recognition is a complete easy to build programmable speech recognition circuit. Programmable in
the sense that you train the words (or vocal utterances) you want the circuit to recognize. This system allows
you to experiment with many facets of speech recognition technology.
IV. CONCLUSION
An attempt has been made to make a compact and portable device which is exclusively designed for visually
impaired people. It will allow the visually impaired person to travel through an unfamiliar environment with
ease. It can be said that the project provides Silicon Eye for visually impaired people.
REFERENCES
[1] Alshbatat, Abdel Ilah Nour "Automated Mobility and Orientation System for Blind or Partially."
INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS 568-582,
2013
[2] Harshad Girish Lele, Viten Vilas Lonkar, Varun Vasant Marathe, Mrunmayi Mohan Modak. "Electronic
path guidance for visually impaired people " The International Journal Of Engineering And Science
(IJES), 09-14, 2013
[3] Mahdi Safaa A., Muhsin Asaad H. and Al-Mosawi Ali I. "Using Ultrasonic Sensor for Blind and Deaf
persons Combines Voice." International Science Congress Association 50-52, 2012
[4] Lamya El alamy, Sara Lhaddad, Soukaina Maalal, Yasmine Taybi,Yassine Salih-Alj "Bus Identification
System for Visually Impaired Person."International Conference on Next Generation Mobile Applications,
Services and Technologies, pp.13-17, 2012.
[5] A. R. Garcia, R. Fonseca. A. Duran. "Electronic long cane for locomotion improving on visual impaired
people" IEEE, pp.58-61, 2011
[6] S. Sai Santhosh, T. Sasiprabha, R. Jeberson,. "BLI – NAV Embedded Navigation System for Blind People."
IEEE 277-282, 2010
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2398 | P a g e
[7] Mohd Helmy Abd Wahab, Amirul A. Talib, Herdawatie A.Kadir, Ayob Johari, A.Noraziah, Roslina M.
Sidek, Ariffin A. “Smart cane: assistive cane for visually Impaired people”, IJCSI, Vol.8 Issue 4, July
2011.
[8] http://www.who.int/topics/blindness/en/index.html
[9] “Electronic Interfaces Aiding the Visually Impaired in Environmental Access, Mobility and Navigation”
978-1-4244-7562-9/107©2010 IEEE.POLAND, pp. 13-15, 2010
[10] Shripad Bhatlawande, Manjunatha Mahadevappa, Jayanta Mukherjee, Mukul Biswas “Design,
Development and Clinical Evaluation of the Electronic Mobility Cane for Vision Rehabilitation”
10.1109/TNSRE.2014.2324974, IEEE Transactions on Neural Systems and Rehabilitation Engineering
[11] G.Gayathri, M.Vishnupriya, R.Nandhini, Ms.M.Banupriya “SMART WALKING STICK FOR
VISUALLY IMPAIRED”International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 3 Issue 3 March, 2014 Page No. 4057-4061
[12] Nandhini.N , Vinoth chakkaravarthy.G , G.Deepa Priya “Talking Assistance about Location Finding
both Indoor and Outdoor for Blind People” International Journal of Innovative Research in Science,
Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 2, February 2014.
[13] Arijit Datta “Advanced GPS & GSM Based Navigation System for Blinds” International Journal for
Research in Technological Studies Vol. 1, Issue 6 May 2014 | ISSN (online): 2348-1439.
[14] Srimathi Manickam, Proceeding of 5th national conference on VLSI, embedded, and communication and
networks ISSN:2320-0790. April 17 2014.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2399 | P a g e
A REVIEW OF CLOUD COMPUTING THREATS &
SECURITY ISSUES
1 Rahul Singh, 2 Punyaban Patel, 3Preeti Singh
1, 2, 3 Department of Computer Science & Engineering, CSIT, Durg (India)
ABSTRACT
As Cloud Computing is maturing with time, from being a buzzword & an exciting opportunity for the IT circle to
becoming a real, concrete technological model for organizations & businesses which they can migrate to and
take advantages of the features, freedoms & chances it offers. Anyone who aims to be successful in the near
future is working on getting the most out of this promising paradigm. With most opportunities & new
unexplored paths there are some risks involved. The cloud computing model is also a new avenue for the non-IT
world & everyone has their doubts & concerns. Security is the biggest concern among all the people &
organizations whether they are cloud users or cloud service providers. Whenever someone uploads data to a
remote location either for storage or processing, there is some worry about its safety. This Paper gives study of
cloud computing risks and serves as a source for threat recognition that will help cloud clients and vendors to
settle on educated choices about risk relief inside a cloud environment. Keywords – Attacks, Cloud Computing, Data Breach, DoS attack, Risk, Security, Threats, Virtualization
I. INTRODUCTION
In the recent past, cloud computing has developed from being just a promising business idea to one of the fastest
growing segments of the IT industry. It is providing seemingly boundless infrastructure to store consumer data
and execute programs. Today Cloud Computing is a booming deployment option for IT firms as Small and
Medium Business companies are realizing the potential of the idea that simply by moving onto the cloud they
can gain fast access to best business applications or remarkably improve their infrastructure resources, all at
very slim costs. The cloud offers several benefits like fast deployment, pay-for use, lower costs, scalability,
rapid provisioning, rapid elasticity, ubiquitous network access, greater resiliency, hypervisor protection against
network attacks, low-cost disaster recovery and data storage solutions, on-demand security controls, real time
detection of system tampering and rapid re-constitution of services [25].
Whenever a company is moving to the cloud or anyone is looking to use any of the cloud services the biggest
concern is of security. The cloud service providers hold the responsibility of any problems if things go wrong,
thus the providers must make sure that they get the security aspects right. According to IHS the global market
for cloud computing in April 2014 was estimated at about $70 billion, and is estimated to grow to about $250
billion by 2017 [42]. 42% of IT decision makers are planning to increase spending on cloud computing in 2015,
with the greatest growth in enterprises with over 1,000 employees [41]. Everybody and anybody who is going to
be successful in the next decade or so has a plan to attack the cloud. The traditional enterprise IT players,
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2400 | P a g e
whether they're on the hardware side or on the software side, whether it's an Oracle and a Microsoft or a Cisco
or an Avaya, or an HP or a Dell, has a plan to essentially address the cloud [42]. Fig.1 shows the top five
estimated tech spending increases in 2015. Cloud computing comes second, behind security technologies. This
graphic depicts the overall spending of the IT industry. As one would expect security is the most focused issue
in the IT world at the moment. And the sub-section of Cloud Computing is also expected to follow the trend.
Security is the most vital issue in the Cloud environment.
The next section acquaints the readers to the Cloud Computing Paradigm. The definitions, characteristics,
service & deployment models are presented. The section after that focuses on the threats & security issues
pertaining to the cloud environment. Various concerned issues & kinds of attacks are discussed.
Fig. 1: Top Five Forecasted Tech Spending Trends in 2015
II. THE CLOUD COMPUTING PARADIGM
Cloud Computing is a fairly new paradigm that has made quite an impact on the world of computing. It is said
to have evolved from Grid Computing, which is a model that gives the capacity to perform higher throughput
processing by exploiting numerous arranged machines to model a virtual machine architecture that has the
capacity appropriate procedure execution over a parallel infrastructure. Cloud computing refers to both the
applications conveyed as services over the Internet and the hardware infrastructure and programming platform
in the data centres that provide those services. It gives the facility to access shared resources and common
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2401 | P a g e
infrastructure, offering services as needed over the networked system to perform operations that meet changing
business needs, and all the while, end users are unaware of the location of physical resources and devices being
accessed. Fig.2 illustrates the cloud computing model.
2.1 Definitions of Cloud Computing
The term “Cloud Computing” itself doesn’t hint anything about what it means to anyone who doesn’t already
know what it is [30]. Many experts have given many definitions of the paradigm. Armbrust et al. (2009)
postulate: “Cloud Computing refers to both the applications delivered as services over the Internet and the
hardware and systems software in the data centers that provide those services. The services themselves have
long been referred to as Software as a Service (SaaS). The data center hardware and software is what we call a
Cloud” [1]. According to National Institute of Standard and Technology cloud is defined as “Cloud computing
is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned
and released with minimal management effort or service provider interaction”. This cloud model is composed of
five essential characteristics, three service models, and four deployment models [20]. Vaquero et al. (2009)
summarize proposed definitions and introduce a new one: “Clouds are a large pool of easily usable and
accessible virtualized resources (such as hardware, development platforms and/or services). These resources can
be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource
utilization. The pool of resources is typically exploited by a pay-per-use model in which guarantees are offered
by the Infrastructure Provider by means of customized SLAs” [37].
Fig. 2: The Cloud Computing Model
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2402 | P a g e
2.2 Essential Characteristics of Cloud Computing
· On-demand self-service: The consumer has the control over which service of the provided options he
or she is going to use & how much, as and when needed without any human interaction [30].
· Broad network access: Usually the Internet is the medium for providing services. These services can be
accessed through any device that has the capacity to access the internet, may it be a desktop computer,
a laptop or a mobile phone.
· Resource pooling: All the computing resources of the provider are pooled together in order to serve
multiple clients simultaneously. The resources, physical or virtual are assigned & revoked depending
on the user demand in real time. The users have no idea about the resources being provided are located.
They can be in a different country or even on a different continent [30].
· Rapid elasticity: There is a high degree of flexibility when it comes to the capabilities. They can be
increased or decreased, depending on the demand. It seems to the user that there are unlimited
resources at their disposal & they can use them, of-course on a pay-per-use basis.
· Measured service: Cloud systems manage & optimize the utilization of resources at some level of
abstraction depending on the type of service by applying measured use of the service. This provides
transparency between the provider & user of the service can be observed, kept in check & reported.
2.3 Cloud Computing Service Models
There are basically three service models in the Cloud Model, i.e. the services can be provided to the clients in
three forms. These service models are discussed next. Fig.3 illustrates the service models as layers that run one –
over – another & lists some examples of the available services.
· Software as a service (SaaS): In this model, the cloud client exploits programming running on the cloud
supplier's foundation as opposed to on the client's own particular equipment. The applications needed
are available from different customer gadgets through either a thin client interface, for example, a web
program (online email), or a program interface. In SaaS administrations, the client has no power over
the fundamental cloud framework, getting to applications through a web program or separate project
interface. An alternate definition of XaaS (Everything as a Service) that may comprehensively be
incorporated in SaaS is CaaS (Communication as a Service), which incorporates cloud administrations
for messaging and Voice Over Internet Protocol (VOIP).
· Platform as a service (PaaS): In this model, the cloud clients use their own applications and information
on stage devices, including programming apparatuses, having a place with and oversaw by the cloud
supplier. Application designers chipping away at portable applications generally utilize cloud-based
stages to create and dispatch their administrations. The cloud client does not oversee or control the
hidden cloud foundation, for example, system, servers, working frameworks, or capacity, yet has
control over the conveyed applications and maybe over arrangement settings for the application
facilitating environment.
· Infrastructure as a service (IaaS): In this model, the cloud supplier's transforming, stockpiling, systems
and other principal processing assets permit the cloud client to send and run programming, which can
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2403 | P a g e
incorporate working frameworks and applications. The cloud client does not oversee or control the
fundamental framework however has control over working frameworks, stockpiling and conveyed
applications, and may have constrained control of select systems administration parts (for instance, host
firewalls). Making utilization of the flexibility of IaaS for information stockpiling and transforming
limit permits an association or venture to get to processing foundation in an adaptable and auspicious
way.
Fig. 3: Service Models in Cloud Computing
2.4 Cloud Computing Deployment Models
· Private Cloud – The cloud infrastructure is owned or leased by a single organization and is operated
solely for that organization.
· Community Cloud – Several organizations that have similar polices, objectives, aims and concerns
share the cloud infrastructure.
· Public Cloud – A large organization owns the cloud infrastructure and sells cloud services to industries
or public.
· Hybrid Cloud – It is combination of two or more clouds. It enables data and application probability.
2.5 Benefits of Cloud Computing
Some benefits of cloud computing can be listed as:
· Reduced Cost: Organizations don't have to build the infrastructure needed for their IT needs. This
reduces the cost for organizations that move to the cloud environments as they can get resources as and
when needed & make payments incrementally.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2404 | P a g e
· Increased Storage: Cloud storage services provide huge storage space at trifling rates. People and
organizations can get as much storage they need and store much more data than on private computer
systems.
· Highly Automated: The cloud users don't need to worry about software updates & don't have to sweat
to keep up with the ne advances in the technology.
· Flexibility: The cloud computing model offers much more flexibility in comparison to the traditional
computing methods as services can be utilized on-demand & scaled with the changing needs.
· More Mobility: People can access information & services whenever they want, wherever they are,
rather than having to stay tied to their desks.
· Allows IT to Shift Focus: Experts can focus on R&D, no longer having to worry about constant server
updates and other computing issues. Governments & organizations are free to concentrate on
innovation.
III. THREATS AND SECURITY ISSUES
Cloud computing environment is for the most part expected as a potential expense saver and in addition supplier
of higher administration quality. Security, Availability, and Reliability are the significant quality concerns of
cloud administration clients, recommends that security in one of the noticeable test among all other quality
challenges. Each of these models has an alternate effect on application security. There is various security issues
connected with cloud computing however these issues fall into two general classes: Security issues confronted
by cloud providers and security issues confronted by their clients. A discussion of the various cloud threats &
security issues follows.
3.1 Abuse of Cloud Services
This threat is more of an issue for cloud service providers than cloud consumers, but it does raise a number of
serious implications for those providers [23]. Cloud providers lend computing resources & services to all the
clients whether they are individuals or small or enormous corporations. The clients don't have to buy and keep
up a large number of servers, as cloud service providers rent them all the servers they need for moderate prices.
However not all clients utilize this power as a windfall. For an attacker to gauge the encryption keys will take
years with a solitary server. Yet with the assistance of a great many servers it will get to be anything but difficult
to gauge the keys inside minutes.
3.2 Account Hijacking
Account or Service Hijacking incorporates assaults like phishing, extortion, and abuse of software
programming. This security risk emerges because of loss of credentials. In the event that the attackers get access
to your ids and passwords, they can without much of a stretch get access to your classified information and
bookkeeping data. Additionally they can control or erase your information, return misrepresented data, and
sidetrack your customer to some illegitimate site. To maintain a strategic distance from this, the associations or
people ought to shield their passwords and certifications from being imparted in the middle of clients and
administrations. Additionally legitimate verification system ought to be utilized.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2405 | P a g e
3.3 Authentication and Authorization
Most companies, if not all, are storing their employee information in some type of Lightweight Directory
Access Protocol (LDAP) servers [25]. In the case of SMB companies, a segment that has the highest SaaS
adoption rate, Active Directory (AD) seems to be the most popular tool for managing users (Microsoft White
Paper, 2010). With SaaS, the software product and services are facilitated outside of the corporate firewall.
Numerous times client credentials are put away in the SaaS suppliers' databases and inside the corporate IT
infrastructure. This implies SaaS clients must not forget to remove or disable the accounts as workers leave the
organization and create/re-enable accounts as people come onboard. Fundamentally, having numerous SaaS
products will expand IT administration overhead. Case in point, SaaS suppliers can give appoint the validation
procedure to the client's inside LDAP/AD server, with the goal that organizations can hold control over the
administration of clients.
3.4 Availability
The SaaS application needs to guarantee that clients are provided services all day and all night. This includes
rolling out architectural improvements at the application and infrastructural levels to include versatility and high
accessibility. A multi-level architectural design needs to be embraced, backed by load balancing techniques of
utilization cases, running on a variable number of servers. Versatility to equipment/programming failures, and in
addition to Denial of Service (DoS) attacks, needs to be developed starting from the earliest stage the
application. At the same time, an appropriate action plan for business continuity (BC) and disaster recovery
(DR) needs to be considered for any unplanned emergencies. This is essential to ensure the safety of the
enterprise data and minimal downtime for enterprises [25].
3.5 Backup
The Cloud service providers need to make sure that all confidential & important information is regularly backed
up to facilitate quick recovery in case of power failures or natural disasters. The backup of the data should be
kept at different locations which are geographically far away from each other, thus, minimizing the chances of
the same disaster or problem affecting both the original data location and the back-up location. The backup data
should be updated at regular intervals. The use of effective & powerful encryption techniques is recommended
to protect the backup data from accidental leakage.
3.6 Data Access
Information access issue is primarily identified with security strategies gave to the clients while getting to the
information. In an ordinary situation, a little business association can utilize a cloud gave by some other supplier
to completing its business forms. This association will have its own security approaches in light of which every
representative can have entry to a specific set of information. The security strategies may entitle a few
contemplations wherein a percentage of the workers are not offered access to certain measure of information.
The cloud service model must be sufficiently adaptable to consolidate the particular approaches set forward by
the association. The model must additionally have the capacity to give hierarchical limit inside the cloud in light
of the fact that different association will be sending their business forms inside a solitary cloud environment.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2406 | P a g e
3.7 Data Breaches
The CIOs of every organization has the hallucination of losing their sensitive internal data to their competitors.
In November 2012, researchers from the University of North Carolina, the University of Wisconsin and RSA
Corporation released a paper describing the fact that if multiple virtual machines are running on a single
physical server, than it may be possible to extract the private cryptographic keys used on one virtual machine by
sitting on other virtual machine using side channel timing information. In a multitenant environment, if a flaw
exists in a single tenant’s application cloud allow an intruder to access the application of all the clients present in
the environment. The impact of data breaches can be reduced by encrypting the data, but if you lose your
encryption key, your data will be lost automatically. Multiple copies of data are prepared to reduce the impact of
data loss but it will increase your exposure to data breaches [11].
3.8 Data Confidentiality Issue
The definitional outskirts of cloud computing are tremendously bantered about today. Cloud computing includes
the offering or stockpiling by clients they could call their own data on remote servers claimed or worked by
others and gets to through the Internet or different associations. Cloud computing services exist in numerous
varieties, including information stockpiling locales, feature destinations, charge readiness locales, individual
health record sites and numerous more. The whole substance of a client's capacity gadget may be put away with
a solitary cloud supplier or with numerous cloud suppliers. At whatever point an individual, a business, a
legislature office, or some other element offers data in the cloud, protection or confidentiality inquiries emerge.
All this important data is very valuable & the confidentiality must be maintained.
3.9 Data Integrity
Data integrity is one of the most critical elements in any system. Data integrity is easily achieved in a standalone
system with a single database. Data integrity in such a system is maintained via database constraints and
transactions [25]. Usually ACID (atomicity, consistency, isolation and durability) properties are followed during
transactions to ensure the integrity of data. Enter the universe of SOA and Cloud computing, and the issue of the
data integrity gets amplified considerably more, as there is a blend of on-reason and SaaS applications
uncovered as administration. SaaS applications are multi-tenant applications facilitated by a third gathering.
SaaS applications typically uncover their usefulness through XML based APIs (Application Program
Interfaces). Additionally, in SOA based situations, numerous on-reason applications uncover their usefulness
through SOAP and REST web benefits too. One of the greatest difficulties with web administrations is exchange
administration. At the convention level, HTTP (Hyper Text Transfer Protocol) does not help exchanges or
ensured conveyance, so the main alternative is to execute these at the API level. Albeit there are gauges
accessible for overseeing information honesty with web administrations, for example, WS-Transaction and WS-
Reliability, these guidelines are not yet develop and relatively few sellers have executed these. Most SaaS
sellers uncover their web administrations APIs with no backing for exchanges. Additionally, every SaaS
application may have diverse levels of accessibility and SLA (administration level understanding), which further
muddles administration of exchanges and information respectability crosswise over numerous SaaS
applications.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2407 | P a g e
3.10 Data Locality
In the cloud scenario, the customer has no idea where the data is getting stored. In many a cases, this can be a
problem. Due to compliance and data privacy laws in various countries, locality of data is of utmost importance
in many enterprise architectures. For example, in many European and South American countries, certain types
of data cannot leave the country because of potentially sensitive information. In addition to the issue of local
laws, there’s also the question jurisdiction, if an investigation is underway.
3.11 Data Loss
For cloud clients, data loss is a standout amongst the most concerning issue. A man lost all his personal records
because of absence of data security by the cloud administration. Obviously, information put away in the cloud
can be lost because of different reasons also. A coincidental or physical disaster like fire and earthquake can
cause the loss of valuable data. Moreover, if a client transfer its information to the cloud in the wake of
scrambling it and loses the encryption key because of any reason, the information will be lost too.
3.12 Data Security
In a conventional computing software deployment model, the delicate data of every undertaking keeps on
staying inside the venture limit and is liable to its physical, coherent and staff security and access control
strategies. Nonetheless, in the cloud demonstrate, the undertaking information is put away outside the venture
limit, at the cloud merchant end. Therefore, the cloud vendor must embrace extra security checks to guarantee
information security and anticipate ruptures because of security vulnerabilities in the application or through
noxious workers. This includes the utilization of solid encryption systems for information security and fine-
grained approval to control access to information. Malicious users can exploit weaknesses in the data security
model to gain unauthorized access to data. The following assessments test and validate the security of the
enterprise data stored at the SaaS vendor [25]:
· Cross-site scripting [XSS]
· Access control weaknesses
· OS and SQL injection flaws
· Cross-site request forgery [CSRF]
· Cookie manipulation
· Hidden field manipulation
· Insecure storage
· Insecure configuration.
3.13 Data segregation
Multi-occupancy is one of the significant attributes of distributed computing. As a consequence of multi-
occupancy various clients can store their information utilizing the applications gave by SaaS. In such a
circumstance, information of different clients will live at the same area. Interruption of information of one client
by an alternate gets to be conceivable in this environment. This interruption could be possible either by hacking
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2408 | P a g e
through the escape clauses in the application or by infusing customer code into the SaaS framework. A customer
can compose a veiled code and infuse into the application. In the event that the application executes this code
without confirmation, then there is a high capability of interruption into other's information. A SaaS model
ought to in this manner guarantee a reasonable limit for each client's information. The limit must be guaranteed
at the physical level as well as at the application level. The administration ought to be sufficiently insightful to
isolate the information from diverse clients. A malicious user can use application vulnerabilities to handcraft
parameters that bypass security checks and access sensitive data of other tenants. The following assessments test
and validate the data segregation of the SaaS vendor in a multi-tenant deployment [25]:
· SQL injection flaws
· Data validation
· Insecure storage
3.14 Denial of Service
Denial-of-service attack is like being caught in rush-hour traffic gridlock: there is no way to get to your
destination, and nothing you can do about it except sit and wait [23]. As a client, administration blackouts baffle
you, as well as power you to re-evaluate whether moving your discriminating information to the cloud to lessen
framework expenses was truly beneficial when its all said and done. Since cloud suppliers regularly bill
customers in view of the process cycles and circle space they expend, there is the likelihood that an assailant
will be unable to totally thump your administration off of the net, however may at present reason it to devour so
much transforming time that it gets to be excessively lavish for you to run and you will be compelled to bring it
down yourself.
3.15 Identity Management and Sign-On Process
Identity management (IdM) or ID management is a broad administrative area that deals with identifying
individuals in a system (such as a country, a network or an organization) and controlling the access to the
resources in that system by placing restrictions on the established identities. Identity management can involve
three perspectives [25]:
1. The pure identity paradigm: Creation, management and deletion of identities without regard to access
or entitlements.
2. The user access (log-on) paradigm: For example: a smart card and its associated data used by a
customer to log on to a service or services (a traditional view).
3. The service paradigm: A system that delivers personalized role based, online, on-demand, multimedia
(content), presence based services to users and their devices.
3.16 Insecure Interfaces & APIs
The interfaces or APIs used to interact with the service providers are prone to risks by attackers [11]. Most
providers strive to ensure security is well integrated into their service models, it is critical for consumers of
those services to understand the security implications associated with the usage, management, orchestration and
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2409 | P a g e
monitoring of cloud services. Reliance on a weak set of interfaces and APIs exposes organizations to a variety
of security issues related to confidentiality, integrity, availability and accountability [23].
3.17 Insufficient Due Diligence
Cloud computing is a standout amongst the most built up IT developments. Numerous organizations being
pushed to the cloud without a complete understanding of Cloud Service Provider (CSP) environment. Because
of this associations are assuming obscure level of danger. By embracing cloud advancements without fitting
comprehension will leave the association with number of issues. The gauge for any association to embrace this
new innovation is that they must have proficient assets and perform broad interior and CSP due diligence to
understand the concepts.
3.18 Malicious Insiders
A malicious insider, for example, a system programmer, in a improperly outlined cloud scenario can have access
to possibly sensitive data. From IaaS to PaaS and SaaS, the malicious insider has expanding levels of access to
more discriminating frameworks, and inevitably to information. Frameworks that depend exclusively on the
cloud service provider (CSP) for security are at extraordinary hazard here. Regardless of the possibility that
encryption is actualized, if the keys are not kept with the client and is just accessible at information use time, the
framework is still defenceless against malicious insider assault.
3.19 Network Security
In a cloud deployment model, sensitive data is obtained from the enterprises, processed by the SaaS application
and stored at the cloud vendor end. All data flow over the network needs to be secured in order to prevent
leakage of sensitive information. This involves the use of strong network traffic encryption techniques such as
Secure Socket Layer (SSL) and the Transport Layer Security (TLS) for security [25].
3.20 Shared Technology Issues
A trade off of an essential bit of imparted innovation, for example, the hypervisor, an imparted stage segment, or
an application in a SaaS environment uncovered more than simply the traded off client; rather, it uncovered the
whole environment to a capability of trade off and rupture. This defencelessness is risky on the grounds that it
possibly can influence a whole cloud without a moment's delay.
3.21 Vulnerability in Virtualization
Virtualization is one of the principle sections of a cloud environment. In any case this stances significant
security danger. Guaranteeing that diverse occasions running on the same physical machine are secluded from
one another is a noteworthy undertaking of virtualization which is not met totally in today's situation. The other
issue is the control of overseer on host and visitor working frameworks. Current VMMs (Virtual Machine
Monitor) don't offer impeccable confinement. Numerous bugs have been found in all mainstream VMMs that
permit getting away from VM. Virtual machine monitor ought to be 'root secure', implying that no benefit inside
the virtualized visitor environment grants obstruction with the host framework. Some vulnerability has been
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2410 | P a g e
found in all virtualization software which can be exploited by malicious, local users to bypass certain security
restrictions or gain privileges [25]. For example, the vulnerability of Microsoft Virtual PC and Microsoft Virtual
Server could allow a guest operating system user to run code on the host or another guest operating system.
IV. CONCLUSION
There is no doubt what so ever that cloud computing is providing benefits to IT enterprises with its various
facilities and on demand services in a cost effective manner. Every business whether big or small can benefit
from moving to the clouds. But there are various challenges and security problems which everyone must
consider before transferring the data to a cloud. Data Security is the biggest challenge faced by the cloud
community. So the way to better nature of administration and fruitful cloud computing activities is to have a
harmony in the middle of profits and the related risks. Cloud suppliers ought to include more assets and security
approaches to shield themselves from noxious assaults. This paper has presented an overview of most of the
issues concerning the security aspect of the cloud paradigm. As the clouds are in continual developmental phase,
the researchers have a lot of challenges in handling the security threats, energy conservation, resource
management, scheduling strategies, interoperability and reliability in cloud computing and make it a successful
and profitable technology.
REFERENCES
[1]. Armbrust M., et al. "A View of Cloud Computing", Communications of the ACM, April 2010, vol. 53,
no. 4, pg: 50-58, DOI:10.1145/1721654.1721672
[2]. Ashktorab V., Taghizadeh S.R., "Security Threats and Countermeasures in Cloud Computing", IJAIEM,
ISSN 2319 - 4847, Volume 1, Issue 2, October 2012, pg: 234-245
[3]. Buyya R., Yeo C. S., Venugopal S., Broberg J., and Brandic I., "Market-Oriented Cloud Computing:
Vision, Hype, and Reality for Delivering IT Services as Computing Utilities", in proceedings of the 10th
IEEE International Conference on High Performance Computing and Communications, HPCC'08,
Dalian, China, Sept. 2008.
[4]. Buyya R., Yeo C. S., Venugopal S., Broberg J., and Brandic I., "Market-Oriented Cloud Computing:
Vision, Hype, and Reality of Delivering Computing as the 5th Utility", Proceedings of the 2009 9th
IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGRID '09, ISBN: 978-0-
7695-3622-4 DOI: 10.1109/CCGRID.2009.97
[5]. Buyya, R., Broberg, J., Goscinski, A., "Cloud Computing: Principles and Paradigms", Wiley, 2011,
ISBN: 978-81-265-4125-6
[6]. Choubey R., Dubey R.,, Bhattacharjee J., "A Survey on Cloud Computing Security, Challenges and
Threats", IJCSE, ISSN: 0975-3397Vol. 3 No. 3, Mar 2011, pg: 1227-1231
[7]. Dargan S., "Security Threats in Cloud Computing Environment", Journal Of Information, Knowledge
And Research In Computer Engineering, ISSN: 0975 – 6760, VOLUME – 03, ISSUE – 02, pg: 619-621
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2411 | P a g e
[8]. Devangan K.K., Wanjari A., Dewangan S.K., "A Valued Analysis of Information Security, Threats and
Solutions for Cloud Computing", IJARCSEE, ISSN: 2277 – 9043, Volume 2, Issue 9, September 2013,
pg: 648-658
[9]. Dhingra M., "Cloud Data Encryption Ensuring Security", International Journal of Engineering Research
& Technology (IJERT), ISSN: 2278-0181, Vol. 4 Issue 01, January-2015, pg: 62-64
[10]. Gharehchopogh F.S., Rezaei R., Maleki I., "Mobile Cloud Computing: Security Challenges for Threats
Reduction", International Journal of Scientific & Engineering Research, ISSN: 2229-5518, Volume 4,
Issue 3, March-2013
[11]. Gupta S., Khandelwal S., "Cloud Computing Security Threats", International Journal of Engineering
Research & Technology (IJERT), ISSN: 2278-0181, Vol. 4 Issue 01, January-2015, pg:20-22
[12]. Hayes B., “Cloud computing”, Communications of the ACM, July 2008, Vol. 51, No. 7, pg. 9-11, DOI:
10.1145/1364782.1364786.
[13]. Inbarani W.S., et al., "A Survey on Security Threats and Vulnerabilities In Cloud Computing",
International Journal of Scientific & Engineering Research, ISSN 2229-5518, Volume 4, Issue 3, March -
2013, pg: 1-4
[14]. Joshi A.G., Shele R.R., "Overview on Security Threats and Solutions in Cloud Computing", International
Journal of Computer, Information Technology & Bioinformatics (IJCITB), ISSN: 2278-7593, Volume-2,
Issue-2, pg: 1-5
[15]. K. Valli Madhavi et al, "Cloud Computing: Security Threats and Counter Measures", International
Journal of Research in Computer and Communication technology, IJRCCT, ISSN: 2278-5841, Vol 1,
Issue 4, September 2012
[16]. K.L.Neela, V.Kavitha, R.K.Ramesh, "Cloud Computing: Threats and Security Issues", IJESRT, ISSN:
2277-9655, Vol. 2 Issue 8 Aug 2013, pg: 2070-2072
[17]. Kumar P. et al. "Security Threats to Cloud Computing", International Journal of IT, Engineering and
Applied Sciences Research (IJIEASR) ISSN: 2319-4413, Volume 2, No. 1, December 2013, pg: 25-29
[18]. Lee K., "Security Threats in Cloud Computing Environments", International Journal of Security and Its
Applications, Vol. 6, No. 4, October 201 2, pg: 25-32
[19]. Makkar G.D., Panwar V., "Cloud Computing Security: Risks and Threats", IJETTCS, ISSN 2278-6856,
Volume 3, Issue 2, March – April 2014, pg: 111-116
[20]. Mell P., Grance T., "The NIST Definition of Cloud Computing", NIST Special Publication 800-145,
September 2011, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[21]. Muthukumar V.P., Saranya R., "A Survey on Security Threats and Attacks in Cloud Computing",
Computer Science International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693,
Volume-2, Issue-11, pg: 120-125
[22]. Nicho M., Hendy M., "Dimensions Of Security Threats In Cloud Computing: A Case Study", Review of
Business Information Systems – Fourth Quarter 2013, Volume 17, Number 4, pg: 159-170
[23]. Raju M., Lanitha B., "Survey about Cloud Computing Threats", (IJCSIT) International Journal of
Computer Science and Information Technologies, Vol. 5 (1) , 2014, pg: 384-389
[24]. Rot A., Sobinska M., "IT Security Threats in Cloud Computing Sourcing Model", Proceedings of the
2013 Federated Conference on Computer Science and Information Systems, pp. 1141–1144
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2412 | P a g e
[25]. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing",
Elsevier Journal of Network and Computer Applications 34 (2011), pg: 1–11
[26]. Sabahi F., "Cloud Computing Security Threats and Responses", 978-1-61284-486-2/11/pg: 245-249,
©2011 IEEE
[27]. Shah B., Vania J., "A Literature Survey on Virtualization Security Threats in Cloud Computing",
International Journal of Science and Research (IJSR), ISSN (Online): 2319-7064, Volume 3 Issue 12,
December 2014, pg: 1137-1140
[28]. Shaikh F.B., Haider S., "Security Threats in Cloud Computing", 6th International Conference on Internet
Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates, 978-1-
908320-00-1/11/pg: 214-219 ©2011 IEEE
[29]. Singh R., Patel P., "Cloud Computing vs. Grid Computing: A Comparison”, in the Proceedings of
ICETPITM – 2015, International Conference on Exploring Trends and Practices in Information
Technology and Management, 5’Th – 6’Th January, 2015, St. Aloysius’ College, Jabalpur, M.P.
[30]. Singh R., Patel P., Sahoo B., “A Compendium of Cloud Computing”, International Journal of Advance
Computing Technique and Applications (IJACTA), ISSN: 2321-4546, Vol. 2, No. 1 (January, 2014), pg:
073-079
[31]. Solanke V.S., Kulkarni G.A., Katgaonkar P., Gupta S., "Mobile Cloud Computing: Security Threats",
Proceedings of International Conference on Electronics and Communication Systems (ICECS'14), pg:
550-553
[32]. Soofi A.A., Khan M.I., Fazal-e-Amin, "Encryption Techniques for Cloud Data Confidentiality",
International Journal of Grid Distribution Computing, ISSN: 2005-4262, Vol.7, No.4 (201 4), pp.1 1 -20,
http://dx.doi.org/10.14257/ijgdc.2014.7.4.02
[33]. Srivastava P., Chandan R.R., Singh R.K., "A perspective view of security threats in cloud Computing",
National Conference on Challenges & Opportunities to Computer science & Information technology in
Next Generation, (COTII-13),16thfeb-2013,AIMT,Lucknow
[34]. Te-Shun Chou, "Security Threats on Cloud Computing Vulnerabilities", International Journal of
Computer Science & Information Technology (IJCSIT) Vol 5, No 3, June 2013, pg: 79-88, DOI :
10.5121/ijcsit.2013.5306
[35]. Tiwari D., Dhariwal M.K., Kesharwani A., Tehariya S.K., "Security Threats in Cloud Computing",
IJMEMR, ISSN: 2320-9984 (Online), Volume 1, Issue 4, December 2013, pg: 5-12
[36]. Tiwari D., Tiwari D., "A survey ofcloud computing security threats", Proceedings of the International
Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV, pg: 47-51
[37]. Vaquero L. M., Rodero-Merino L., Caceres J., Lindner M., "A Break in the Clouds: Towards a Cloud
Definition", ACM SIGCOMM Computer Communication Review, Volume 39, Number 1, January 2009,
pg: 50-55
[38]. Yadav A.R., "Identified Vulnerabilitis And Threats In Cloud Computing", IOSR Journal of Computer
Engineering (IOSR-JCE), e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan –
Feb. 2015), pg: 01-04
[39]. Zhang Q., Cheng L., Boutaba R., "Cloud computing: state-of-the-art and research challenges", J Internet
Serv Appl (2010) 1: 7–18, Springer, DOI 10.1007/s13174-010-0007-6
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2413 | P a g e
[40]. Collett S., 'Forecast 2015: IT spending on an upswing",
http://www.computerworld.com/article/2840907/forecast-2015-it-spending-on-an-upswing.html,
accessed March 2015
[41]. Columbus L., "Roundup Of Cloud Computing Forecasts And Market Estimates, 2015",
http://www.forbes.com/sites/louiscolumbus/2015/01/24/roundup-of-cloud-computing-forecasts-and-
market-estimates-2015/, accessed March2015
[42]. Rebello J., IHS Technology, https://www.ihs.com/articles/videos/enterprise-cloud-computing.html,
accessed March 2015
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2414 | P a g e
SELECTIVE HARMONIC ELIMINATION WITH
REDUCED SWITCH TOPOLOGY IN MULTILEVEL
INVERTER Mrs. Sarika D Patil1, Sumant G Kadwane2
1Department of Electrical Engineering, Rajiv Gandhi College of Engineering & Research,
RTMNU Nagpur, (India) 2Department of Electrical Engineering, Yeshwantrao Chavan College of Engineering,
RTMNU Nagpur, (India)
ABSTRACT
A generalized formulation of Selective Harmonic Elimination (SHE) PWM for Multilevel Inverter is recently
formulated in literature which can eliminate a large number of lower order harmonics. Various methods for
calculating the firing angles for SHE PWM are known and still research in this area is ongoing. This paper
presents a MATLAB based approach for modeling and simulation method suitable for studying SHE methods
using Newton Raphson Method with reduced switch topology to apply them in various applications. In this
paper a cascaded 3-Phase, 7- Level, H-bridge Multilevel Inverter with reduced switch topology using
MATLAB/Simulinkc blocks is presented as a systematic approach. The primary contribution of this paper is that
the Simulink model developed can also be extended for higher level inverter applications also. The proposed
Model can generate stepped voltage waveform and can be programmed for a wide range of modulation indices.
Keywords: CHB-Cascaded H-Bridge, MLI- Multilevel Inverter, PWM – Pulse Width Modulation,
Reduced switch circuit. SHE- Selective Harmonic Elimination
I. INTRODUCTION Recently Multilevel Inverters are widely used in many industrial applications, where the requirement is medium
voltage and high power. Multilevel Inverter has been widely used for chemical, oil, and liquefied natural gas
plants, water plants, marine propulsion, power generation, energy transmission, and power-quality devices,
FACTS Devices [1-3]. Cascaded H-bridge converter topology is prominently used and particularly useful for
renewable energy and DSTATCOM applications [4-6]. While in comparison with traditional two-level voltage
source inverters, multilevel inverters have several advantages. The generalized problem for SHE is presented in
various papers having nonlinear equations with advanced computing methods like genetic algorithm, particle
swarm optimization, bee algorithm and bacterial foraging [8],[9],[10]. These papers primarily focus on the
method of solving the nonlinear equations but not the exact formulation of SHE problem with
MATLAB/Simulink. While this paper attempts to formulate the in depth MATLAB/Simulink based simulation
of SHE problem with Newton Raphson iterative Method with reduced number of switches.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2415 | P a g e
II.SWITCH REDUCTION TOPOLOGY
The number of power electronic switches (IGBTs and gate drives) in the single phase of suggested topology is
given by
Where k is the number of switches,
In the conventional cascaded multilevel inverter the number of power switches is given by
Fig. 4 compares the number of switches with the conventional cascaded multilevel inverter. As shown in this
figure, the suggested topology needs fewer switches for realizing m level voltages for output. This point reduces
the installation area and the number of the gate driver. For example, to generate seven levels of output voltage
(m=7), proposed topology needs 10 switches and conventional cascaded H-bridge multilevel inverter requires
12 switches. The main H-bridge cell of one inverter used for implementation of the multilevel inverter. The
full bridge inverter module includes four power switches to form an H-bridge. The Reference sine wave
is generated sine block with 120° displacement for each phase and amplitude as per the modulation index
requirement. Fig. 1 shows final configuration of seven level multilevel inverter with reduced switch connected
to the cascaded basic unit which reverse alternate waveform to get positive, zero and negative levels. For 0 < t <
(T/2), Sa, Sb are fired together and positive half of Vout is generated, for (T/2) < t < T, Sc, Sd are on and negative
half of output waveform is produced. It is obvious that period time of Vo is half of period time of Vout.. In
suggested topology, the maximum number of output phase voltage is given by
n, m are the number of DC voltage sources and the maximum number of levels of phase voltage, respectively. In
the conventional cascaded multilevel inverter, the relation between the number of DC voltage source and the
maximum number of levels of output phase voltage is similar to suggested topology. As a result, for the same
number of output phase voltage, the number of DC voltage source is the same. A multilevel cascade inverter
consists a number of H-bridge cells that are connected in series per phase, and each module requires a
separate DC source to generate voltage levels at the output of inverter. MATLAB/Simulink Model is designed
for Three Phase 7-Level Multilevel Inverter with three different firing angles as θ1, θ2 and θ3. These constant
values of firing angles are then compared with the sine wave through comparator and given to gate pulses of
respective switches(IGBT) in H- Bridge Model. For three phase generation the angles are displaced by 120° in
each phase.
Fig.1 Seven-Level Multilevel Inverter
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2416 | P a g e
v0
Time
T/2T
3vin
2vin
vin
-vin-2vin
-3vin
4 5 7 9 11 13
812162024
Cascaded H-bridge Inverter
Suggested Topology
No of switches
No. of voltage levels Fig.2 Output voltage waveform of 7-level Fig.3 Comparison of switches to output
multilevel inverter voltage levels
Total 3 H-Bridges per phase are configured in subsystem as shown in Fig.1. The input to the gate pulse of this
H-Bridge is given through input S1-S4. According to this, stepped waveform is obtained at the output side as
shown in Fig. 2.. Although the simulation is carried out for 7-Level inverter the number of H-Bridge block can
be added to increase the level as per formula given in (3) and number of switches required for suggested
topology is as shown in Fig.3. The results of this scheme are presented in section IV.
III. SELECTIVE HARMONIC ELIMINATION The dead band is not considered in this simulation model and complementary pulse is fed to the upper and lower
switches of each leg of H bridge inverter. Here sine wave is compared with firing angle θ. We need to calculate
the proper values of θ for evaluating the SHE algorithm. The values of three firing angles are set as θ1
=0.2129(rad), θ2 = 0.2996(rad) and θ3 =0.4107(rad).The H-Bridge blocks are connected in series to build a
phase for seven level multilevel inverter and three phases are build to form the entire three phase inverter. The
corresponding firing angles are generated through constants as per the values of θ. The Fourier series expansion
of the general multilevel stepped output voltage is given in (4), where n is the harmonic number of the output
voltage of inverter.
The switching angles can be chosen to obtain minimum voltage harmonics. Normally, these angles are chosen
so as to cancel the predominant lower frequency harmonics. The major difficulty for selective harmonic
elimination methods, including the fundamental switching frequency method and the Virtual Stage PWM
method, is to solve the transcendental equations for switching angles. To satisfy fundamental voltage and to
eliminate 5th and 7th harmonics, three nonlinear equations are as follows. These equations are solved by
iterative method such as the Newton-Raphson method suggested in [10]
(5)
(6)
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2417 | P a g e
(7)
IV. RESULTS AND DISCUSSIONS
Configuration shown in Fig. 1 has been simulated using MATLAB/SIMULINK to verify the capabilities of
mentioned inverter.
Fig.4 shows the PWM generated for 1-Phase of the multilevel Inverter fed to each switch of respective H-
Bridges connected in series. It is quite evident that these PWMs combined together results into a 7-Level
PWM pattern. The pattern of firing pulses is shown in Fig.4(A). The phase voltage of seven level inverter as
per the simulation explained in section 3. is shown in Fig.4(B). The DC sources of 12V each are used in the H-
Bridge blocks. The results show the step changes of 12V each and resulting amplitude of V36± amplitude of
the phase voltage. In consistent with these results the magnitude of V72± appears in Line Voltages as shown
in Fig. 4(C). The corresponding harmonics order in Bar Graph and List is obtained in Fig.4(D). These results are
obtained through FFT Analysis from Power GUI Block. The results are shown for modulation index M = 0.8.
Table 1:Switching Angles for M=0.8 Table 2: % of Harmonics & THD
M θ1 θ2 θ3
0.8 0.2129 0.2996 0.4107
5th Harmonic 7th Harmonic THD
0.35% 0.07% 12.51%
The results obtained from simulation of MATLAB/Simulink shows that the harmonic THD contents are
12.5% for phase voltage and 9.45% in line voltage using SPWM modulator. The third, fifth and seventh
harmonics are within 1% tolerance. 9th harmonic shall be automatically cancelled and other higher order
harmonics can be eliminated by conventional filter. While it is to be noted that the fundamental harmonic is
preserved and selected order of harmonics are very small which strongly confirms the validity of proposed
system.
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20
0.5
1
Time, s
PWM
1
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20
0.5
1
Time, s
PWM
2
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20
0.5
1
Time, s
PWM
3
(A)
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2418 | P a g e
(B)
(C)
(D)
Fig. 4 (A)Firing Pulses, (B) Phase voltage (C) Line voltage (D) Bar graph of FFT Analysis of line
voltage
V. CONCLUSION
In this study, the preferred inverter has fewer switches as compared to a traditional cascaded multilevel inverter.
But, the relation between the number of DC voltage source and the maximum number of levels of output phase
voltage is similar to that of conventional cascaded multilevel inverter. This topology increases capability and
reliability of the multilevel inverter circuitry. Due to switch reduction, losses across the switch get reduced.
Compared with traditional two level inverter total harmonic distortion of output voltage is decreased in the
suggested multilevel inverter topology. The harmonic distortions present in the load current and voltage
waveforms were observed and calculated through FFT analysis tool.The performance of recommended topology
and its controller are to be simulated using MATLAB/SIMULINK software and results are presented with novel
PWM technique which shows the ability of the reduced switch multilevel inverter.
REFERENCE
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2419 | P a g e
[1] S.Kouro, M. Malinowski, K Gopakumar, J. Pou, L.G. Franquelo,Wu Bin; J Rodriguez, M.A Pérez,
J.I.Leon, Recent Advances and Industrial Applications of Multilevel Converters, IEEE Trans on Industrial
Electronics, Vol 57 , Issue: 8, Page(s): 2553 – 2580, 2010
[2] T.A. Meynard, H. Foch, P. Thomas, J. Courault, R. Jakob, and M. Nahrstaedt, Multicell Converters: Basic
concepts and Industry Applications’, IEEE Trans on Industial Application, Vol.49, No. 5, pp 955-964,
Oct.2002.
[3] Mariusz Malinowski, K. Gopakumar, Jose Rodriguez, Marcelo A. Pérez, “A Survey on Cascaded
Multilevel Inverters”, IEEE Trans on Industrial Electronics., Vol. 57, No. 7, July 2010.
[4] N. Farokhnia, S. H. Fathi, and H. R. Toodeji, ‘Direct nonlinear control for individual DC voltage
balancing in cascaded multilevel DSTATCOM’, in Proc. IEEE Int. Conf. EPECS, 2009, pp. 1–8.
[5] L.M.Tolbert, F.Z.Peng, ‘Multilevel Converters as a utility interface for renewable energy system’, IEEE
conference, Vol.2,pp. 1271-1274, 2000
[6] L.G. Franquelo, J. Rodriguez, J. I. Leon, S. Kouro, R. Portillio, andM.A. M. Prats, ‘The age of multilevel
Converters arrive’, IEEE Trans on Industrial Electronics., Mag, Vol.2, No. 2, pp 28-39, June 2008.
[7] J. Rodriguez, J.S. lai, and F.Z. Peng, ‘ Multilevel Inverters: A Survey of topologies, controls , and
applications’, IEEE Trans on Industrial Electronics, Vol. 49, No. 4, pp 724-738, Aug 2002.
[8] Ayoub Kavousi, Behrooz Vahidi, Reza Salehi, Mohammad Kazem Bakhshizadeh, Naeem Farokhnia, S.
Hamid Fathi.: ‘Application of the Bee Algorithm for Selective Harmonic Elimination Strategy in
Multilevel Inverters’, IEEE Trans on Power Electronics, Vol. 27, No. 4, APRIL 2012.
[9] Mehrdad Tarafdar Hagh,, Hassan Taghizadeh, Kaveh Razi.: ‘Harmonic Minimization in Multilevel
Inverters Using Modified Species-Based Particle Swarm Optimization’, IEEE Transactions On Power
Electronics, Vol. 24, No. 10, October 2009.
[10] Jagdish Kumar, Biswarup Das, Pramod Agarwal,, Selective Harmonic Elimination Technique for
Multilevel Inverter, NPSC, IIT, Bombay , 2008.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2420 | P a g e
EMOTIONAL INTELLIGENCE & SOCIAL
ADAPTABILITY
Ms. Ranju Lal1, Ms. Manisha Dayal2 1Faculty of Management, KIET, Ghaziabad,(India)
2Faculty of Management MAIMS, Delhi,(India)
ABSTRACT
Emotional Intelligence is an umbrella term because its concept comprises various skills dispositions of the
individual which are generally called “soft skills or interpersonal and intrapersonal skills”. Emotional Intelligence has been found to be a predictor of life satisfaction, healthy psychological adaptation,
positive interactions with peers and family and higher parental warmth. Lower Emotional Intelligence has also been
found to be associated with violent behavior, illegal use of drugs and alcohol and participation in delinquent
behavior. Engelberg and Sjoberg (2004), Adeyemo (2005), and Safavi et al. (2008) who preached that emotional intelligence
was related quite strongly to social adjustment. Positive emotionality is associated with sociability (e.g. Argyle &
Lu, 1990), whereas persistent negative affect keeps other at bay (e.g. Furr & Funder, 1998). Accordingly, people
need to process emotional information and manage emotional dynamics intelligently to navigate the social world.
The purpose of this study is to investigate the role (or positive impact) and relation of Emotional Intelligence and
Social Adaptability. The present work is a compilation of few selected papers written by researchers aiming to
disseminate the knowledge generated by the previous researchers. In this article, we are presenting thoughts, ideas,
experiences and findings of the practitioners and academia’s across the globe.
Keywords: Emotional Intelligence, Adjustment, Social Adaptability, Emotions, Social Relationships.
I INTRODUCTION
Emotions play a very important role in our lives as emotions are basic primeval forces of great powers and
influences designed by nature. They enable individual to circumstances which demand the utmost efforts for
survival or success or to add colour and spice to our living.
Emotions are prime movers to thought and conduct, which gives best to life and important qualities to personality.
Emotions and feelings are interwoven with the network of reason and there is interconnectivity between emotions
and cognition.
The work by McKee, Goleman and Noyatzis has shown that the missing link in providing a much more accurate
explanation of how an individual was likely to be successful in work or life is the role played by how an individual
handles feelings or emotions. Consequently feelings:
· Direct us to what we want and / or need.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2421 | P a g e
· Determine our behaviour or actions toward what we want and / or need.
Allow us to access and act upon empathy for others.
· Facilitate relationship forming and inspire others.
· Create bond and a sense of higher purpose in groups, families, organizations and more.
The ability to express and control our own emotions is important, but so is our ability to understand, interpret, and
respond to the emotions of others. Imagine a world where you couldn’t understand when a friend was feeling sad or
when a co-worker was angry. Psychologist refers to this ability as Emotional Intelligence.
1.1 Emotional Intelligence
In 1990, Salovey and Mayer coined the term “Emotional Intelligence” and based their work on the non-cognitive
aspects of intelligence. These authors defined emotional intelligence as “a form of social intelligence that involves
the ability to monitor one’s own and others thinking and action.” In 1995, Goleman wrote his book, Emotional
Intelligence, based upon Salovey and Mayer’s work. Since then, emotional intelligence has become the hottest
buzzword everywhere.
EI or EQ embraces two aspects of intelligence:
- Understanding yourself, your goals, intentions, responses, behaviour and all.
- Understanding others and their feelings.
1.2 Four Branches of EI
Mayer & Salovey proposed a model that identified four different factors of Emotional Intelligence: the perception of
emotion, the ability reason using emotions, the ability to understand emotion and the ability to manage emotions.
1. Perceiving Emotions: the first step in understanding emotion is to accurately perceive them. In many cases, this
might involve understanding non-verbal signals such as body language and facial expressions. 2. Reasoning with emotions: the next step involves using emotions to promote thinking and cognitive activity.
Emotions help prioritize what we pay attention and react to; we respond emotionally to things that garner our
attention.
3. Understanding emotions: the emotions what we perceive can carry a wide variety if meaning. If someone is
expressing angry emotions, the observer must interpret the cause of their anger and what it might mean.
4. Managing emotions: the ability to manage emotions effectively is a key part of emotional intelligence.
Regulating emotions, responding appropriately and responding to the emotions of others are all important aspect of
emotional management.
Emotional Intelligence has been found to be a predictor of life satisfaction, healthy psychological adaptation,
positive interactions with peers and family and higher parental warmth. Lower Emotional Intelligence has also been
found to be associated with violent behaviour, illegal use of drugs and alcohol, and participation in delinquent
behaviour.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2422 | P a g e
1.3 Components of Emotional Intelligence
The main identifying characteristics of Emotional Maturity are made possible by the Emotional Intelligence
component:
1. Self-awareness: Recognize and understand your own moods and motivations and their effect on others. To
achieve this state, you must be able to monitor your own emotional state and identify your own emotions.Emotional
Maturity in this trait shows:
§ Confidence
§ Sense of humor (can laugh at self)
§ Aware of your impression on others (can read the reactions of others to know how you are perceived)
2. Self-Regulation: Controlling your impulses—instead of being quick to react rashly, you can reign in your
emotions and think before responding. You express yourself appropriately. Emotional Maturity in this trait shows:
§ Conscientiousand take personal responsibility for your own work/deeds.
§ Adaptable (and favorable) to change
§ When someone is complaining or is rude to you, you do not respond in kind. You respond in a manner
which would not escalate the situation. (At this point, you will also realize that when someone expresses anger at
you, they’re not always angry at you; they’re often just angry and want to take it out on someone.)
3. Internal Motivation: Internal motivation is marked by an interest in learning. It is also self-improvement vs. a
pursuit of wealth and status (as a pursuit of wealth and status is an external motivator). Emotional Maturity in this
trait shows:
§ Initiative and the commitment to complete a task
§ Perseverance in the face of adversity
4. Empathy: The ability to understand another person’s emotional reaction. This is only possible when one has
achieved self-awareness—as one cannot understand others until they understand themselves. Emotional Maturity in
this trait shows:
§ Perceptive of other’s emotions and taking an active interest in their concerns.
§ Proactive—able to anticipate someone’s needs and the appropriate reaction.
§ Social Situations such as office politics do not faze one who has a firm grasp of empathy.
5. Social Skills: Identifying social cues to establish common ground manage relationships and build
networks. Emotional Maturity in this trait shows:
§ Communication: Listening and responding appropriately
§ Influence and Leadership: The ability to guide and inspire others
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2423 | P a g e
§ Conflict Management: The ability to diffuse difficult situations using persuasion and negotiation.
1.4 Why Emotional Intelligence?
EI helps to predict success because it reflects how a person applies knowledge to the immediate situation. Emotional
Quotient measures “common sense” and the ability to get along in the world. EQ training is used in corporates,
employee development, leadership programs, and in education settings. From a leadership development perspective,
participants enhance their leadership capacities, improve communication, decrease workplace conflict, and improve
problem-solving skills. As a personal benefit, individuals are motivated and inspired to achieve their life goals, have
greater career success, build stronger personal relationships, increase their optimism, and are healthier.
1.5 Gender and Emotional Intelligence
Since females tend to be more emotional and intimate in relationships as compared to males, so their emotional
intelligence ought to be higher than that of males. This is perhaps because of the society, which socializes the
genders differently as has been found in studies by Duckelt and Raffali (1989) and Sandhu and Mehrotra (1999).
Moreover higher emotional intelligence among girls can also be explained in terms of their personality
characteristics. Similar findings were reported in studies by Tapia (1999) and Dunn (2002). They observe that girls
score higher with regard to empathy, social responsibilities and interpersonal relationships than boys. They were
more sensitive towards their relationships with parents, friends and siblings. All these traits help them to acquire
more emotional intelligence as compared to boys.
1.6 Urban/Rural Areas and Emotional Intelligence
The urban adolescents had comparatively better emotional intelligence and adjustment as against their rural
counterparts. This might be due to being prevalent nuclear family units in urban area where parents feel more
concerned of their wards activities and provide suitable guidance and emotional support to their children.
1.7 Adaptability / Adjustment To adapt comes from the Latin word – apere (to bind, to attach). Its past form, aptus (apte), when added to the
locution ad (to, towards) created the verb adaptare (to adjust to, in prevision of) (Rey, 2006). The present use of to
adapt emerged in 16th century, along with a few other derived meanings (aptitude to appropriate or to adhere).
Adjustment refers to the ability of an individual to fit into his environment. Adjustment is an important factor to
complete a person’s goal successfully. It is the process by which a living organism maintains a balance between its
needs and the circumstances that influence the satisfaction of these needs. The concept of adaptation has been at the heart of psychological modeling since its origin in psychological
adaptation. It is defined as the process of unceasing interaction between man and the ever-changing world within
which he evolves. But when the constraints continue, the adaptation system becomes exhausted and “adaptation”
illnesses appear (asthma, ulcers, hypertension or psychosomatic diseases).
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2424 | P a g e
1.8 Social Adaptability
Social Adaptability is the ability to form and maintain friendship according to the norms of one’s peer group reflects
the level of social competence of any person.
It’s an adjustment and adaptation to humans to other individuals and community groups working together for a
common purpose. Social adaptation occurs in the process of socialization and also with the aid of mechanisms of
social control, which include social pressure and state regulation.
Social adaptation becomes increasingly significantly when social change affects important aspects of life over
comparatively short periods of time. Such changes include migration, changes in age, rapid industrial development,
and major shifts of the population from the country to the city.
In socialist society, the process of social adaptation requires study and concentrated action. The failure of certain
individuals to adapt, combined with specific unfavourable situations, may adversely affect the individual’s conduct.
It is useful to study crime from the point of view of unsatisfactory social adaptation in order to understand the causes
of crime and to fight crime effectively.
A person who is socially inadaptive could be shy, withdrawn, or aggressive. The manifestations are:
· Difficulty in joining a group conversation
· Unable to see how his/her behaviour could affect the group
· Unable to see if his/her behaviour has caused any problem
· talks about a happy event with a stern expression
· gets into a fight for even a minor incidents
·
1.9 Relationships between Emotional Intelligence and Social Adjustment
Researchers realized that a child’s emotional life has an impact in his social adaptation (Gardner, 1993; Pekrun,
1992). Positive emotionality is associated with sociability (e.g., Argyle & Lu, 1990), whereas persistent negative
affect keeps other at bay (e.g., Furr & Funder, 1998). Accordingly people need to process emotional information and
manage emotional dynamics intelligently to navigate the social world. Kierstead (1999, page 4 of 8) quotes Mayer
and Salovey describing the role of EI, it states “EI plays a role in our friendships, parenting and intimate
relationships.”
Engelberg and Sjoberg(2004), Adeyemo(2005), and Safavi et al. (2008), who preached that Emotional Intelligence
was related quite strongly to social adjustment.Safavi et al. (2008) investigated the relationship between emotional
intelligence and socio-emotional adjustment in pre-university girl students in Tehran. The result showed that there
was a significant correlation between emotional intelligence and Socio-emotional adjustment.
Evidence for associations between EI ability and Social success have been summarized in a number of recent book
chapters and review articles (see Brackett, Lopes, Iveevic, Mayer & Salovey, 2004; Brackeet &Salovey, 2006;
Mayer, Salovey, Caruso, 2004). In general, studies have shown that EI ability has related to greater empathy
(Ciarrochi, Chan, & Caputi, 2000), less negative interactions with peers (Brackett, Mayer, & Warner, 2004), higher
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2425 | P a g e
quality relationships, less conflict and antagonism with friends (Lopes, Brackett, Nezlek, Schutz, Sellin, & Salovey,
2004; Lopes, Salovey, Starus, 2003), and lower levels of violence and drug problems (Brackett et al., 2004; Gil-
Olarte, Guil, & Mestre, 2004; Rubin, 1999; Trinidad & Johnson, 2002).
II CONCLUSION
Success of social adaptation of the person is reached by means of his personal and professional qualities, including a
high level of development of emotional intelligence. Schools have to develop teamwork and co-operation that are so
evident in activities so that children take part in and outside of school such as sports and productions. As Vygotsky
(1978) posited that social interaction plays a fundamental role in the development of cognition and that everything is
learned on two levels – first through interaction and then integrated into the individual’s mental structure.
Elias et al (1992) argued that the teaching emotional & social skills by the teacher are very important at school. It
can effect academic achievement positively not during the years that follows as well. Teaching these skills has a
long term effect on the achievement. Though the development of EI is a natural process, yet it can be enhanced as it
has been concluded that EI can be learned and it should be a component of leadership training.
2.1 Strategies To Incorporate Appropriate Social Skills:
· Learn how to begin and maintain conversation
· How to share
· How not to offend others
· Find solutions to problems
· Take part in team / group games
· Role play appropriate and inappropriate behaviour
· Discuss morale in human value stories
· Cues for body language
· Ways to find the level of emotion stated in a text
· Maintain a diary to develop inner dialogue
2.2 How To Improve Emotional Intelligence
· Observe how you react to people? Do not rush to the judgment before you know all the facts. Try to put
yourself in their place and be more open and accepting of their perspective and needs.
· Look at your current environment. Do you seek attention for your accomplishment? Humility can be a
wonderful quality and it doesn’t mean that you are shy or lack self-confidence.
· Do a self-evaluation. What are your weaknesses? Have courage to look at yourself honestly – it can change
your life.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2426 | P a g e
· Examine how you react to stressful situations? Do you blame others or become angry on them? The ability
to stay calm and in control in difficult situations is highly valued. Keep your emotions under control when
things go wrong.
· Take responsibility for your actions. Apologize – if you hurt someone’s feeling. People are usually more
willing to forgive and forget if you make an honest attempt to make things right.
· Examine how your actions will affect others – before you take those actions. If your decision will impact
others, put yourself in their place.
REFERENCES
[1] Boyatzis, R. E. (1994). Stimulating self-directed learning through the managerial assessment and Development
course, Journal of Management Education, 18(3), 304-323.
[2] Boyatzis, R. E., Golman, D., & Rhee, K. S. (in press). Clustering competence in emotional intelligence:
insights from the Emotional Competence Inventory (ECI). In R. Bar-on & J. D. Parker (Eds.), Handbook of
Emotional Intelligence. San Francisco, CA: Jossey-Bass.
[3] Davies, M. Stankov, L., * Roberts, R. D. (1998). Emotional Intelligence: in search of an elusive construct,
Journal of Personality and Social Psychology, 75, 989-1015.
[4] Gardner, H. (1983). Frames of mind. New York: Basic Books.
[5] Goleman, D. (1995). Emotional Intelligence. New York: Bantam.
[6] Goleman, D. (1998). Working with Emotional Intelligence, New York: Bantam.
[7] Gowing, m. (in press). Measurement of Individual Emotional Competence. In C. Cherniss & D. Goleman
(Eds.), Emotional competence in organizations.
[8] Mayer, J. D., Salovey, P., & Caruso, D. (1998b). competing models of emotional intelligence in R. J. Sternberg
(Ed.), handbook of human intelligence (2nd ed.,). New York: Cambridge University Press.
[9] Salovey, P., & Mayer, J. (1990). Emotional Intelligence, Imagination, Cognition, and Personality, 9(3), 185-
211.
[10] Salovey, P., Woolery, A., & Mayer, J. D. (in press). Emotional Intelligence: conceptualization and
measurement. In G. Fletcher & M. S. Clark (Eds.), The Blackwell Handbook of Social Psychology (Vol. 2:
Interpersonal Processes,). Oxford, England: Blackwell Publishers.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2427 | P a g e
BATTERY (Ni-Cd) CHARGING ANALYSIS OF
STAND- ALONE 300W SOLAR PHOTOVOLTAIC
SYSTEM AT CONSTANT SOLAR INSOLATION
Prashant Singh1, Sujil A2 , Prabhat Kumar 3
1PG Scholar Dept. of Electrical Engineering ACEIT, Jaipur (India)
2 Research Scholar Dept. of Electrical Engineering MNIT, Jaipur (India)
3 Assoc. Prof. Dept. of Electrical Engineering ACEIT, Jaipur (India) ABSTRACT Efficient energy storage is proving to be one of the most imperial alternative from the solar photovoltaic system
for power generation so far. Ni-Cd batteries is one of the widely acknowledged energy storage device that can
line up with other charge storing devices. The solitary features of battery (nickel-cadmium) are such that it also
praises other energy storage technologies. These batteries (Ni-Cd) have better performance characteristics than
other conventional battery in the field of rapid charging and discharging capability, high power density and
improved system efficiency. The very paper gives an insight the charging and discharging characteristics, voltage
and current through load of constant solar insolation. The dynamic model of 300W stand-alone solar photovoltaic
system with the very battery is simulated in matlab/Simulink environment. Key words: Blocking/Bypass diode, insolation, solar cell model, SOC, stand-alone system I. NTRODUCTION Energy is a decisive input for the industrial, social, and financial development and also plays a vital role in our
life. Energy crises occur mainly due to two reasons first one rapidly increasing world population and later is higher
living standard of human nowadays. If present trend continues, the world in the year 2000 A.D. will be more
crowded than that of today. Thus, it is important to explore more and more alternative energy sources like
sunlight, wind, and biomass and ocean energy. Photovoltaic energy are renewable, clean and eco-friendly energy
source and it can be used as in various applications [1]. Solar energy is one of the most promising alternatives
for conventional energy sources. Now a day’s photovoltaic solar energy has been widely used to generate
electricity [2-4]. Photovoltaic energy is emerging as an important distributed energy resource since few last
decades [5]. However, these renewable energy sources reduce from some imperfection when they are used as a
stand-alone energy sources. The naturally periodic properties of sun light causes power fluctuation on solar panel
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2428 | P a g e
system. In addition it is difficult to store the power generated by solar panel for night and future use when sunlight
is off [6-7]. Due to these reasons energy storage is required to maintain the power flow and also to manage systems
momentary power balance. So for energy storage from solar panel mainly batteries or super capacitor are Used.
This paper is further organizes as follows. Section II describes the photovoltaic cell. Section III explain the
modeling and simulation of solar PV system. In this section solar cell modeling and battery modeling is describes.
Section IV describes the case study and the result and analysis after successful simulation of proposed 300 W
stand-alone solar photovoltaic system. While conclusion are presented in section V.
II. DESCRIPTION OF PHOTOVOLTAIC CELL Solar cell is a device that converts the energy of sunlight directly into electricity by the photovoltaic effect [8].
The photovoltaic effect can be described the light, which is in the form of energy, strikes a PV cell and transfers
enough energy to cause the freeing of electrons. A built-in potential barrier in the cell acts on these electrons to
produce a voltage which can be used to drive a current through an electric circuit .The basic material for the
photovoltaic cells is high purified silicon (Si), which is obtained from sand or quartz. Photovoltaic cell are of
mainly three type’s monocrystalline silicon cell, polycrystalline silicon cell, amorphous silicon cell. Photovoltaic
cells are semiconductors that have weakly bonded electrons at a level of energy called valence band [9-10].
When energy strikes at the valance bond it release, that electrons and that electrons moves to another energy level
known as conduction band. At the conduction band, the electrons are able to conduct electricity through an
electrical load. Fig.1 shows the simple concept of photovoltaic system. PV cells use the energy of photons from
sunlight to break their band gap energy thereby producing DC current. Typically, PV cells produce low power
(approximately 2-
3Watts) [11] hence to develop more power, voltage multiple solar cell need to be connected in series or parallel
and overall meeting is known is module. Within a module the different cells are connected electrically in series or
in parallel although most modules have a series connection. Individual cells are usually connected into a series
string of cells (typically 36 or 72) to achieve the desired output voltage. In a series connection the same current
flows through all the cells and the voltage at the module terminals is the sum of the individual voltages of each cell.
When modules are connected in parallel the current will be the sum of the individual cell currents and the output
voltage will equal that of a single cell. The nominal voltage of a solar module is 12V and a PV module for
charging 12V batteries usually has 33 to 36 cells. Several module are connected in series, parallel, series-parallel
configuration to form an array. Photovoltaic (PV) systems are of a modular nature [12].because Solar cells can be
connected in series or parallel in virtually any number and combination. Therefore, PV systems may be realized in
an extraordinary broad range of power; from mille watt systems in watches or calculators to megawatt systems for
central power production.
III. MODELING & SIMULATION OF SOLAR (PV) SYSTEM The single line diagram of proposed 300W stand-alone solar photovoltaic (PV) system is given in fig.2 it consist
of a battery storage unit, an inverter, blocking and bypass diode and a charge controller.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2429 | P a g e
Fig.1. Concept of Photovoltaic Fig.3. Single exponential model of PV Cell
3.1 PV Cell Model Many equivalent circuits have been proposed in the literature [13-16] in order to assess the behavior of the PV
cell. The mathematical model of PV cell is represented by a current source with a diode connected in parallel as
shown in fig.3. This model has current constant source (ISC), connected with a diode a series resistance (Rs). The
modeling of the standalone solar PV system is based on the equivalent circuit diagram of the PV cell.
Functional block parameters which are used in PV cell model can be shown in table 1. Applying Kirchhoff’s
law to the node where ISC, diode, RP and RS meet, we get the following equation for the photovoltaic current.
On applying the
KCL
(1)
Diode Current
(2)
On applying the KVL
(3)
Table.1 Parameters of Battery
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2430 | P a g e
3.2 Battery Model
Batteries are the central part of the any stand-alone PV system. The battery block implements a generic
dynamic model parameterized to represent most popular types of rechargeable batteries.
Discharge model (i*>0) (4)
Charge model (i*<0)
(5)
Table 2 shows block parameter used to modify the battery specifications for the modelling.
Table.2 Parameters of Battery
Parameters Rating
Nominal voltage (V) 24
Rated capacity (AH) 165
Initial state-of-charge (%) 20
Maximum capacity (AH) 171.85
Fully charged voltage (V) 26.1316
Parameters Rating
Short-circuit current 7.97
Short-circuit voltage 22.1
Current at Pmax 7.46
Voltage at Pmax 18.19
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2431 | P a g e
PV Module
Power Conditioning
Blocking /Bypass diode
Charge Controller
Battery
Inverter
AC Load
DC Load
Fig.2. Single Line Diagram of 300W Stand-alone Solar PV System designed in Simulink/Simpower system
IV. SIMULATION RESULT AND ANALYSIS In this section the simulation result of proposed model is discussed. Such as result has also allowed the
validation of proposed model. In this paper, the simulation result obtained during constant solar insolation.
The proposed model consists of resistive + Inductive (2+j0.01) Ω type load. During simulation the
parameters values that are used to represent a battery, can be used as default values. The Simulink model
shown in fig.2 are simulated and observed output waveform are shown in fig.4.and fig.5. It produces an
output power of 271.49 W for a constant radiation of
1000 W/m2 and output voltage 36.23 V.Fig.6 shows the battery output voltage, output current and %SOC and
output voltage and output current of 300W solar PV system through load (Resistive Inductive) for
bat tery is shown in fig.7. The Charging and discharging cycle are confronted to the one provided by the
model. The cycle are displayed in fig.4 are simulated for 100*2000 sec.at constant moments of the day. The
number of cycles increases with the insolation as the photovoltaic electricity production gets higher. We
can see that the shape of the voltage during charging and discharging is well reproduced by the
simulation. At constant solar insolation 1000 W/m2 battery take 12.31 hours becoming full charge.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2432 | P a g e
Fig.4. Solar PV Output Power
Fig.5. Solar PV Output Voltage
Fig.6. Output current, voltage and state of charge of battery for initial charging-discharging time
Fig.7. Output voltage and current through load for initial SOC of battery
V. CONCLUSION
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2433 | P a g e
The most prevailing agony in today’s world power market is the shortage of fossils fuel. The planet is
progressively marching toward a satirical state of energy crises, owing to an escalating energy utilization which
is far greater than its supply. And the shortage of fossil fuel is providing the necessary nourishment for this
mushrooming problem. Hence the necessity to explore more and more alternative energy sources has become a
matter of utter significance but more important is to store that energy in appropriate device. Based upon the
result discussed above, we can say that these nickel Cadmium battery is better in comparison with other
conventional battery as general solution for power storage. What makes these batteries to stand a cut above
other battery is its durability and flexibility that can be adopted to serve in many roles for which conventional
batteries are not as well suited. It also consists high power density. The charging and discharging time of Ni-Cd
battery is also less in comparison with other conventional battery. By the end of this century, nearly all of the
economically available energy resources will be gone. From now until then, what remains will be rationed by
price. Thus these storage device may emerge as a boon for many application of power system in terms of
efficiency.
REFERENCES [1] Zang, Hai Yang, and Xiu Yang. "Simulation and analysis of two-level photovoltaic grid-connected
system." Advanced Materials Research. Vol. 433. 2012.
[2] K. Ding, X. Bian and H. Liu, ‘Matlab-Simulink Based Modeling to Study the Influence of no uniform
Insolation Photovoltaic Array’, Power and Energy Engineering Conference (AAEEC), 2011 Asia-Pacific, pp.
1–4, 25-28 March 2011.
[3] S.R. Chowdhury and H. Saha, ‘Maximum Power Point Tracking of Partially Shaded Solar Photovoltaic
Arrays’, Solar Energy Materials and Solar Cells, Vol. 94, N°9, pp. 1441 - 1447, 2010.
[4] Y. Jiang, A. Abu Qahouq and M. Orabi, ‘Matlab/Pspice Hybrid Simulation Modeling of Solar PV
Cell/Module’, Applied Power Electronics Conference and Exposition (APEC), Twenty-Sixth IEEE, pp.
1244 –1250, 2011.
[5] B. Kroposki, Member, & R. DeBlasio, “Technologies for the New Millennium: Photovoltaics as a
Distributed Resource,” 0-7803-6420-1/00 IEEE, pp 1798-1801, 2000.
[6] Onar O C, Uzunoglu M, Alam M S. Modeling, control and simulation of an autonomous wind-
turbine/photo-voltaic/fuel cell/Ultra-capacitor hybrid power system. J. Power Sources 2008; 185:1273-
1283.
[7] Datta M, Sengyu T, Yona A, Funabashi T, Kim C–H. Photovoltaic output power fluctuations
smoothing methods for single and multiple PV generators. J. Current Applied Physics 2010; 10:265-270.
[8] Sharma, S. Hasan Saeed DK. Non-Conventional Energy Resources. SK Kataria and Sons, 2009.
[9] G Liu, et al. “A general modeling method for I-V characteristics of geometrically and electrically confide
Photovoltaic arrays”. Energy Conversion and Management. vol. 52, pp. 3439 -3445, 2011.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2434 | P a g e
[10] AM Yahya, et al. “Behavior and performance of a photovoltaic generator in real time”. International
Journal of Physical Sciences. vol. 6, pp. 4361-4367, 2011.
[11] K Ishaque, et al. “Simple, fast and accurate two-diode model for photovoltaic modules”. Solar Energy
Materials and Solar Cells. vol. 95, pp. 586-594, 2011.
[12] S. J. Chiang, K. T. Chang & C. Y. Yen, “Residential Photovoltaic Energy Storage System,” IEEE
transactions on Industrial Electronics, vol. 45, no. 3, pp 385-394, June 1998.
[13] Minwon Purk, Bong-Tue Kim, In-Kmn Yu, 2001, "A novel Simulation Method for PV Power Generation
Systems using Real Weather Conditions", Industrial Electronics, 2001 Proceedings ISIE 2001, IEEE
International Symposium Vol.1 P. 526-530.
[14] Chen, Wei, Hui Shen, Bifen Shu, Hong Qin, and Tao Deng. "Evaluation of performance of MPPT devices
In PV systems with storage batteries." Renewable Energy 32, no. 9 (2007): 1611-1622. [15] Tsai, Huan-Liang, Ci-Siang Tu, and Yi-Jie Su. "Development of generalized photovoltaic model using
MATLAB/SIMULINK." In Proceedings of the world congress on Engineering and computer science, vol.
2008, pp. 1-6. Cite seer, 2008.
[16] Salmi, T., Bouzguenda, M., Ghastlie, A., & Masmoudi, A. (2012). Matlab/Simulink based modeling of
photovoltaic cell. International Journal of Renewable Energy Research (IJRER), 2(2), 213-218.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2435 | P a g e
ROLE OF BPO IN FINANCE & ACCOUNT Reepu
Department of Management, Punjab Institute of Technology, Nandgarh, Punjab (India)
ABSTRACT Business houses are posed with various challenges. Liberalization, Globalization and Privatisation have
uprooted the trade barriers instituting a ground for intense competition. CFOs therefore are under accuse
pressure of revenue maximization, diminution of operating costs, so as to add more value to the customer’s
deliverables. Outsourcing finance and account’s business processes have become a feasible option for CFOs.
Such BPOS offer a wide gamut of services order to cash, procure to pay and record to report. These automated
offerings support business core competencies enabling them to attain their strategic outcomes. India has been a
favourable hub of such services. The present study is an attempt to study the role of BPO in Finance and
Account.
Keywords: Finance & Account BPO, Globalization, Order to Cash, Procure to Pay, Record to
Report etc
I. INTRODUCTION Outsourcing is an accord in which a company outsources one or more services that could have been
manufactured in-house too. Outsourcing exists in one or more forms:
§ Professional Employer Organization: PEOs execute the HR functionality of organization. The contracted
organization will design a cost efficient methodology to manage the human resources, their payroll,
compensation etc. sharing with organization their expertise on administering, responsibility, risk
management, conformity to employment laws etc.
§ Business Process Outsourcing: It is delegation of certain IT enabled processes which do require a congenial
support from the human beings for its continuous functionality for e.g. data warehousing etc.
§ Application Service Provider: It is a variant of outsourcing which uses internet as a vehicle, for providing
software. Organizations may outsource any software and will be charged a monthly fee for it in contrast to a
traditional model where the software is once delivered and disbursements are hence concluded. For e.g.
many organizations use Peachtree etc accounting software which they can access via a login id and password
from anywhere. It reduces all the hassles related to software update, uphold, backups, recovery, theft,
malicious attacks etc. Organization is automatically oriented with the latest software; its web enabled utility
allows retrieval of information from anywhere.
§ E-Services: It unifies the operations of both BPO and ASP i.e. it is a deliverance of a software product which
may require human intervention.
Business Process Outsourcing connotes outsourcing in different fields. The provider of service normally
manages a certain business with the subsisting or by introducing a new technology for another party. In India
technical assistance, telemarketing, finance and accounting, conversion of data, insurance etc services have been
extensively popular as several UK, USA etc companies outsource ITES process from India only. It has also been
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2436 | P a g e
revealed that India has a market share of nearly 56% of business process outsourcing. Several contributing
factors include:
§ Economies of Scale: Outsourcing from India reduces the cost, increases the output and overall
performance of the company’s products is increased.
§ Professionalism: India constitutes various talented, benevolent, skilled professionals having upper hand in
technological orientations.
§ Risk Sharing: Outsourcing facilitates sharing of risks or may even lead to their mitigation.
§ Economical Labour force: Indian labour force has always been regarded as inexpensive in comparison to
others.
§ Geographical advantage: India possess geographical add on not embraced by everybody.
Finance and Accounting functions play a vital role in achieving the organizational strategic targets. Ever-
greening of a financial turmoil may cause business to cease its operations, as F&A has been considered the
lifeline of an organization. So, it should be assured that every activity in it must contribute to the overall value
addition for the organization. Then only businesses can sustain and generate massive revenue. Firms normally
outsource the following in context of F&A:
§ Order to cash
§ Procure to pay
§ Record to report
II. REVIEW OF RELATED LITERATURE There has been paucity of relevant literature. Kumar A. (2012) conducted a study to determine the incumbent
opportunities and threats in Indian BPO. He outlined that several external as well as internal challenges surround
the Indian BPO. Several ways to mitigate threats included abolition of unethical customs, management of
attrition rate, constructive brand equity etc. Meenakshi A. (2013) paper is an endeavour to contribute to the
literature of BPO in three ways. It evaluates primarily the workplace situation of BPOs. Second, it appraises the
different benefits an employee receives due to work-life balance. Third, several recommendations like review of
existing policy framework, improvement of compensation package, amiable workplace environment etc are also
portrayed which will enable a BPO worker to have authentic work-life balance. Hagargi (2013) researched that
their entails huge problems of working with Indian BPOs like health problems, sleeping disorders, depression,
eyesight etc. The paper put forward several solutions like free exercise class, day outs etc. out of which time
management has been considered an optimal one. Gupta (2013) performed an exploratory research to determine
the attrition rate in IT and BPO and found that an appraisal system from organization, adequate trainings and
alteration of timings will amplify employee morale. Tamizharasi K. et al (2014) advocated that BPO employees
suffer huge stress which may be due to workload, timing, recurrent nature of tasks, performance etc due to
which they bear several physical and mental problems.
III. FINANCE AND ACCOUNTS BPO
3.1 Need Globalisation has thronged the business with complexities, presenting numerous challenges. Due to innumerable
treaties there has been vigorous relaxation in the trade barriers leading to more interconnectedness. Although
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2437 | P a g e
company becomes viably open for different platforms, but it is besieged with an environment which is
incessantly changing. An intense competition prevails. Pressures to decrease cost, attaining adequate control,
supple and achieve organic and inorganic growth have become the crucial drivers to become successful. Further
to achieve this growth organization need to devise a combined approach accompanied with contemporary
technology which stays for long, is inexpensive and active through which its performance can be enhanced.
Due to Financial Sector Reforms there has been emergence of new regulatory bodies, standards etc demanding
compliance with the rules and regulations. Moreover an organization has to develop a persistent approach
towards knowledge management, patent, IPR etc so as to secure a competitive position. Acquisition and retain
of talent has posed certain major challenges in BPO so this issue has also gained importance. It has been
advocated that such issues and challenges can be easily triumphed over with the usage of a common
denominator i.e. F&A BPO.
3.2 Finance and Account Is Outsourced To Outperform One or All Functions as Described 3.2.1 Order to Cash
Order to cash is the focal facet of every business as it comprises of the entire set of events from where the
customer initiates the process of order placement, his requests are processed so as to obtain cash. Several BPOs
offer end to end products deeming the business type and its requirement. OTC commences from pre-sale
activity, order placement, accounts receivable and general ledger process. The order to cash procedure can be
described as:
Step1: Instigating with the presale activity it involves maintaining customer related data who seem to be active
buyers or some who have been fascinated with their portfolios. Information about such customers is retained in
an ERP. Many organizations even prefer to outsource a specialised package of CRM solutions. Product related
queries are elucidated well which will enable to convert the prospective into active leads.
Step2: During this stage received orders are processed i.e. a linkage is established between the customer, order,
inventory, purchase, vendor and payment modules. If the product is available in their warehouse then a pick-up
request is made but if the product is unavailable with them, they will forward the request to the vendor. Even a
customer is offered with wide payment alternatives from Credit to COD.
Step3: At this instant pick and drop facility is triggered i.e. after acquainting the order from the source or
warehouse, it is packed and is ready forwarded to its destination. Relevant entries are always done in ERP.
Step4: Then organization endeavours to deliver the consignment directly to the customer or may even opt for a
third party carrier. The fall in inventory is recorded to general ledger. The COGS of the goods dispatched is
computed in conjunction. The relevant information required for bill preparation is also documented.
Step5: Billing is prompted for which the modules of inventory, order and customer information are linked.
Meanwhile the accounts receivable data and selling information is also recorded in the general ledger.
Step 6: As soon as the cash is received transactions are classified, maintained and recorded in the general ledger
account. It will enable the management to make effective decisions.
Role of BPO in OTC can be explicated as BPOs have widespread offerings to realize the entire process. They offer a complete package for management of
order, sales, credit, accounts receivable, contracts, collection and billing targeting reduction in the cost,
mismanagement, cycle time, order returns, processing time and any other fall backs. Some BPOs also offer a
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2438 | P a g e
range of supporting activities like whenever an invoice is hoisted concurrently the statement is posted to the e-
mail account of the customer. In case the customer has huge outstanding and there prevails his unwillingness to
pay then even the legal proceedings are headed by them. Accounts receivable reports are also generated to
showcase the due obligations etc.
3.2.2 Procure to Pay Procure to Pay is a sequential series of activity involving purchase requisitions, expenditure corroboration or
processing of accounts payables in consonance with corporate governance.
Step 1: A formal purchase requisition is raised after reviewing the stock in hand and the anticipated demand.
Such requisitions can be a regular one- fulfilling the requisites of conventional manufacturing or it can be a
special\occasional one- placing orders for some special material. Such requisitions are made to ensure
replenishment of stock so that there is never a stock out problem. Whenever any (regular or special) requisitions
are raised following issues are always addressed: (a) Material Type, Quantity, Quality (b) Purchase Timing (c)
EOQ. The requisition copy is normally maintained in triplicate. One copy is send to authorising officer for
approval, second copy is remitted to storekeeper and third is retained by the Department initiating the request.
Step 2: When the purchase requisitions have been raised then a vendor for procuring the order is to be selected.
Organization may issue an open tender, limited tender or a single tender for the purpose of inviting quotations.
A supplier may be selected by taking into consideration parameters like price quotation, quantity per unit of
price, available capacity, supplier’s financial soundness and his management, delivery and payment terms,
product specifications etc. Organization must prepare a comparative statement of quotations for choosing an
optimal one.
Step 3: Once the supplier is selected then the purchase order is directed towards him. It may be regarded as an
agreement binding both the parties in several terms and conditions. Order copy is preserved with the material
receiving department, department which had initiated the request, accounts department and purchase
department.
Step 4: With the material shipment the receiving and inspection team embarks with unloading, unpacking of the
order, monitor the quantity, quality and type of material. Any delay in material receiving must be conveyed
before and any extension in terms of delivery dates should be charged with penalties.
Step 5: Finally entire set of bills for payment are evaluated against the quantity delivered and the prescribed
price. Moreover, a close eye is kept on if the bill is offered with any trade, cash and quantity discount or with
any type of levied taxes. Hence the disbursements are made according to the payment conditions.
Role of BPO in PTP can be expounded as: BPOs offer one to one service in connotation of PTP. Its package include modules for account payables
processing, database maintenance, intercompany credit management, arithmetical and other accuracy checks,
management of interface etc with an effort to abbreviate procurement cycle, cost and hence assuring suppliers
compliance with the regulations.
3.2.3 Record to Report International Accounting Standard has mandated the usage of accounting standards and principles for
consolidating the financial accounts. An organization has to post various transactions to General Ledger
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2439 | P a g e
Account. It must aggregate the different sub-ledgers and make necessary adjustments. They have to consolidate
and validate the presented information. Financial reporting is a requisite to meet the statutory requirements.
Management accounting and recording facilitates management to formulate policies and make effective
decisions.
Role of BPO in RTR can be described as: BPO may assist the management with the help of preparation of an automated reconciliation of cost and
financial accounts, balance sheet, VAT, etc. Other services include preparation of weekly, fortnightly, monthly
reports about MIS, accruals, prepayments, depreciation charges etc.
3.3 Impact The Finance and Accounting BPO performs both front end and back end operations at a reasonable price
yielding more efficacy than organization performing on its own. It vouches for economies of scale using the
latest technology, delivering a single platform for a multi business firm thereby, enabling them to handle remote
operations too. Multi-lingual support has mitigated the difference of country origin. F&A BPO makes
continuous investment to introduce certain modifications over the back end with the dynamics of time
bifurcating them with the traditional line of F&A BPO. So, who will not contract the operations with a third
party which make deliverables to them more quick, accurate, latest technology and ample support?
3.4 Advantages of F&A BPO § It enables an organization to realise not only their functional tactics but also their strategic outcomes,
thereby yielding an extensive sweep to the challenging areas.
§ It endures growth due to the formation of partnership.
§ Outsourcing helps organization to be competitively robust because they can focus more on their core
activities.
§ It helps them to diminish their operating costs.
§ Work replication is certainly avoided.
IV. CONCLUSION BPO plays an extensive role in Finance and Account. It facilitates an organization with several modules like
order to cash, procure to pay and record to report enhancing its revenue collections, effectual working capital
management and thus, contented stakeholders. Many organizations like Accenture, Sutherland Global Service,
Wipro, NCS etc. offer a wide array of F&A services. Buying such services from outside braces transparency,
tech support, assures accurate deliverables and reduction in operating costs. Package support for accounts
receivable, accounts payables, order management, reconciliation etc has made the entire processing more rapid
and precise enabling management to make powerful and proficient decisions.
REFERENCES [1] Kumar Anirudh, Business Opportunities: Special Reference to Business Process Outsourcing Sector in India,
Asia Pacific Journal of Marketing and Management Review, Vol.1 (4), December 2012.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2440 | P a g e
[2] Meenakshi A. et al, Work Organization and Work Life Balance in the BPO Sector, International Journal of
Scientific and Research Publications, Vol.3, Issue 6, June 2013.
[3] Hagargi, Work Life Balance in Indian ITES/BPO’s, Global Research Analysis, Vol.2, Issue 6, June 2013.
[4] Gupta V., An Analysis of Attrition: Retention Strategy for IT/BPO Industry, International Journal of
Advanced Research in Computer Science and Management Studies, Vol.1, Issue 7, December 2013.
[5]Tamizharasi K. et al, Work Stress and Job Performance Evaluation of BPO employees, International Journal
of Advanced Research in Computer and Communication Engineering, Vol.3, Issue 1, January 2014.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2441 | P a g e
EVOLUTIONARY PRACTICES IN HRM Reepu
Department of Management, Punjab Institute of Technology, Nandgarh, Punjab (India)
ABSTRACT Human Resource Management has undergone spectrum of evolutions infusing more competence and efficiency
in organizational frame work. From industrial revolution to bossy structure to scientific management to welfare
secretaries to contemporary world there has been several key deliverables. HRM engulfs huge array of
activities ranging from organizational development to maintaining employee relations. This paper is an attempt
to highlight some evolutionary practices like strategic HRM, E-learning, Computerised HRIS, and Performance
Feedback Mechanisms which have revolutionized the posture of Human Resource Management, enabling
personnel to outperform in work, achieve strategic objectives, value building, compliance regulation and
contrive the future of the organization.
Keywords – HRM, Strategic HRM, E-Learning, Computerised HRIS, Performance Feedback
Mechanisms etc
I. INTRODUCTION Human Resource Management embarks from organization, resourcing, HR development, reward management
and employee relation. HRM manoeuvres the growth of an entity from its prematurity to the trail of progression.
It can be described as an avant-garde forward looking approach stalking several evolutions that has made its
voyage completely successful. This branch of learning undertook from England where carpenters, masons etc
form an association for furnishing their tasks. Then industrial revolution in the 18th century demanded the use of
more machinery, steam etc instead of human resource. A sort of bossy revolution was also asserted infusing
more gaps between boss and employees. 19th century was the era of world wars but industrial psychology tend
to gain importance over that instance of time and an emphatic approach over combining psychological
principles to the industrial arena was uprooted stating more effectiveness in the working of labourers. Later,
father of scientific management F.W. Taylor portrayed several scientific management principles. With the
passage of time, around 1920s due to the rise of conflicts among employee and employer some organizations
initiated the concept of Welfare secretaries, whose task was to bridge the gap by communicating the employee
that the actions have been lodged for strengthening him only. Human Relations Movement was a consequence
of sequential studies performed at Hawthorne Facility of Western Electric at Chicago. The study concluded that
their performance increases in relation to the group in which they conduct their work. However, till 1960
managing the human resources was considered only a blue-collar job and the scope was limited to mere record
keeping. Eventually after this time frame the importance of human resource management grew and then began
the inclusion of several sub-systems, which ultimately saw several evolutions. Since 1984, Human Resource
Management has been regarded as vital for an organization (as per the Michigan School). Following underpins
the crucial activities of HRM:
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2442 | P a g e
Fig1. Scope of HRM
II. REVIEW OF RELATED LITERATURE
Watanabe K. (2005) researched that students from far areas, working ones and oriented to specialised domains
are beneficial with E-learning practices for correspondence courses and on campus courses utilizing E-learning
practices. According to this study, E-learning will soon become more popular vehicle of learning in Japanese
classrooms. Wright P.M etal (2007) identified variables like HR practice and organizational performance etc
which have been ignored over the time period and supported their findings with several literatures. Khera etal
(2012) conducted an empirical study with 127 respondents from top IT companies and found that the utmost
advantage of HRIS is that it enables to store information about employees, while secondary advantages include
that it enables to amass strategic actions performed by HR. Bal Y, etal (2013) prospects that SHRM plays a huge
role in developing innovativeness into an organizational performance. Hussain M (2013) found that research in
context of HRM is quite small and there exists several areas which need more attention.
III. EVOLUTIONARY PRACTICES
3.1 Performance Appraisal Performance appraisal have evolved from 90 degree where only superior tend to be the sole source for feedback,
180 degree where the outlook of self, superior and subordinate is of the point of interest and 270 degree in
which perspective of superior, subordinate is of worth credible and is used to compute ratings through Bias
Factor. 360 degree Feedback Method also deemed as multi-perspective, multi-rater, full-circle feedback, is a
popular feedback mechanism which undertakes the prospects of employer, customers, supervisors, subordinates
and peers. Few factors which drive such a feedback mechanism include the support of top level management,
consciousness of the decisive factor amongst the employees, authenticity of the parties involved, training
imparted so far and confidentiality of the data.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2443 | P a g e
Fig.2 Performance Appraisal This feedback is initiated with the help of determination of various objectives. Such objectives may be oriented
to assess the training needs, performance etc. of the employees. Next, after establishment of objectives comes
the phase of decision as to which employee is to be selected as well as its rater. Further, the decisive factor (e.g.
competency model) is plumped for performance. Such criterion must harmonize with software packages
because this vehicle will ease the processing. Later, a methodology for data collection is to be devised which
can be either outsourced or developed internally. The collected data must be analysed using the available
software packages and made ready for presentation. Organization must employ a pilot study before commencing
the entire project. It will enable to understand better the overall efficacies and hence prior modifications can also
be entailed. Hence after tweaking it to desired level, the feedback system should be kicked off, under the close
supervision of HR department. The data obtained from the feedback must be cautiously preserved as well as
shared amongst all. Another 540degree feedback system has also been developed in which client, superior,
peer, subordinate and self opinions are a valuable credence.
The evolutionary practice which has surpassed this traditional feedback system is 720 degree feedback system
taking into consideration both pre and post assessment intervention. This system rather than contemplating
merely the individual role it takes into account a bigger picture i.e. employee’s role at an organizational level. It
regards a profundity approach by measuring the employee’s performance though interviews. More emphasis is
laid on what actually matters or what is crucial for the organization for instance the perspective of clients; hence
with a superior response both the organization and its stakeholders will be gratified.
3.2 E-Learning Trainees have to learn consistently. This enables them to comprehend the various goals to be realized for
intrinsic accomplishment. Learning will serve as a constructive endeavour for the attainment of corporate goals
and objectives. To ease the process of learning learners must be given a gracious environment to learn. Relevant
feedbacks and rewards at appropriate times must be given. Trainees also focus on learning to suffice their basic
needs of living, social needs for surviving and for the achievement of their personal goals. Perpetual feedback
and encouragement will make the learning process more effective. But the process of retainment has become the
difficult task for the human brain as delineated:
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2444 | P a g e
Fig.3 Forgetting Curve With the advent of E-Learning, learning process has been stimulated and development of subject matter to
create expertise on the various specific skills has become the utmost important concern. E-Learning can be
described as the use of technological vehicle for acquisition, complete dissemination of knowledge. E-learning
entails the use of Instrumentional Design Model for generating modules comprising various learning principles
with variant styles. Appropriate outcomes will be acquainted with the establishment of adequate objectives,
supporting theories and an assessment sheet.Graphic Visualisers will enrich the content more. A healthier
learning will require the use of style sheets as recommended by the designer. Further for E-Learning both
Graphic designers and Tool experts play a significant role. Graphic designer have the mastery of multimedia and
may create an image etc. in a jiffy. Tool experts on the other hand, can easily embedd any video, audio etc with
the content. The module once created have to be reviewed by language experts- to assert the language
congruence, design review experts- to evaluate the designing arena, HI design reviewer- ensuring a learnable,
legible outcome.
Therefore, such E-Learning programmes would alleviate the training and development programmes without
mandating the requirement of space and time of learning. They will serve as a JIT tool for the trainees. Such E-
learning T&D programmes will definitely augment the productivity, skill set and efficiency of the employee
leading to lesser wastage of any resources. Once overwhelmed with the learning then an employee can easily
adapt the workable methodology used in the organization. Such a process will definitely intensify the employee
morale engulfed with reduced absenteeism as well as turnover. It will assure an enriched employee experience.
Hence an organization’s profitability, productivity will rise, fostering with better relationships between superior,
subordinate and labourers and hence an enhanced corporate image and trust.\
3.3 SHRM Strategy and HRM have been considered as two important disciplines of management. But the globalisation
have unwraped multitudinal dimensions leading to the origination of SHRM (Strategic Human Resource
Management) which is difficult to define but SHRM is generally perceived as a distinctive approach to
managing people which seeks to achieve competitive advantage through the strategic development of highly
committed and capable workforce [Appleby & Mavin (2000)]. Thus, SHRM integrates the functionalities of
recruitment, selection, training, development etc in congruence with the organisation’s strategic objectives, to
attain a perfect fit of the two.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2445 | P a g e
So, while traditional HRM orients to employee-employer relation, ruled with directives and is a sort of reactive
transaction. SHRM incorporates the analysis of all stakeholders so as to make necessary transformations,
directed with the rules in accordance to the dynamic conditions and is more proactive in nature.
An organizational diagnosis will enable to locate the organization’s strength and weakness and gauging the
strategies which can be translated to human practices i.e. human resources should be made accounatble through
its functions what the organization is indeed trying to achieve. It will enable personnels to understand the
pecuniary impact of their actions. Moreover it can be identified that if their activity is value driven or adds value
to an organization. Hence, aligning such outcomes with personnels will enable them to make full utilization of
their potential. The organization can become triumphant by pursuing the following:
1. Forecasting
2. SHR Formulation
3. Implementation and Control
Forecasting the events will usher them with the opportunities as well as the threats. There will always persist
some events which the organization can easily handle or which are under their control, on the other hand there
exists some over which the organization has little control. There may be some probablistic events, but there even
can exist various unforeseen circumstances which may taint their performance. Various forecasting models can
even be utilised. On reaching the conclusion of such events then a SHRM strategy must be developed. To
reduce any eccentric conduct an organization must develop first organizational objectives, vision, mission etc.
Then the HR strategy ensuring that relevant policies, procedures, philosophies etc must accustom with the
organizational fit. Once SHRM has been processed then hasty implementation with thoughtful consideration of
different aspects must be inherited. Resistance will be encountered during this phase, but deliberate attempts
should be made to the strategy’s introspective elements. Since it has been found that top notch have sustained
the cut throat competition with the help of their valuable resources, innovations etc.
3.4 Computerised Human Resource Information System Human Resource Information System is a system used to acquire, store, manipulate, analyse, retrieve and
distribute pertinent information about an organization’s human resources (Tannenbaum, 1990). Now-a-days
HRIS have driven several implications from HR Planning to Labour Relations. A computerised human resource
information system has evolved to account the information about employee from his date of recruitment to his
performance till date. Such a system is a constituent of various modules like e-recruit, performance
management, payroll, compensation, status and skill tracking, training, succession planning, etc. It maintains a
database for it. So hardware, management of database, software, development programme etc are an obstinate
requisite for CHRIS. Numerous HRIS software in this context have reportedly been developed like Abra Suite,
HRSOFT, Peoplesoft, CORT, Atlas Business Solutions, Human Resource MicroSystems, Oracle-HRMS, SAP
HR, Spectrum HR, Vantage HRA etc.
Making information to available online encompass several challenges like associating e-HR with the
organizational strategy, accustoming the unknowns with the technological assistance, checking the viability of
the information, performance augmentations etc. So, an organization may pursue the following trail:
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2446 | P a g e
§ Locate the various impositions of the current, future HR needs to the computerised HR information
systems.
§ Set out early, the desired outcomes from the CHRIS.
§ Make a declaration of the obligation.
§ Seek the available alternatives to meet the requirements.
§ Draw commendation taking into account the available financial structure, product line and other
supporting arrangements.
IV. CONCLUSION Human Resource Management has undergone numerous phases of evolutions steering more efficacy in the
discipline. The present paper trailed the evolution of Performance Feedback Mechanism from 90 degree to 720
degree seeking to improve the way in which employee performs the tasks. E-Learning on the other hand,
portrayed that human retention capacity diminishes with the passage of time, so there is a need of web enabled
system to access the theoretical framework whenever required. SHRM tries to unify two distinct branch of
learning’s to attain the organizational output. CHRIS has further addressed several emerging issues of
mismanagement etc.
REFERENCES [1] Michael Armstrong, A Handbook of Human Resource Management Practice, Kogan Page Publishers.
[2] Watanabe K., A Study on Needs for E-Learning - Through the Analysis of National Survey and Case
Studies, Progress in Informatics, No.2, pp.77-86, 2005.
[3] Wright P.M & Nishii, L.H., Strategic HRM and Organizational Behaviour: Integrating Multiple Level of
Analysis, CAHRS Working Paper Series, 2007.
[4] Khera etal, Human Resource Information System and its Impact on Human Resource Planning: A Perceptual
Analysis of Information Technology Companies, IOSR Journal of Business and Management, Vol.3, Issue
6, pp. 06-13, 2012.
[5] Bal Y. Etal., A Study on Determining the Relationship between Strategic HRM Practices and Innovation in
Organizations, Management, Knowledge and Learning, International Conference 2013.
[6] Hussain M and Ahmad M., Mostly Discussed Research Areas in Human Resource Management (HRM) – A
Literature Review, International Journal of Economics and Management Sciences, Vol.2, No.3, pp. 10-17,
2012.
[7] Morgan, Introduction to Psychology, Tata Mcgraw Hill.
[8] Rajib Lochan Dhar, Strategic Human Resource Management, Excel Books.
[9] Torress-Coronas, Teresa, Encyclopedia of Human Resources Information Systems: Challenges in E-HRM.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2447 | P a g e
STUDY AND PERFORMANCE ANALYSIS OF
SONET/SDH NETWORK ChinchuJoseph1, NijaP.S.2, Flintu Kunjukunjan3
1,2,3 Department of Electronics and Communication, SNSCT, Coimbatore (India)
ABSTRACT SONET/SDH is an international standard networking principle and a multiplexing method. The name of
hierarchy has been taken from the multiplexing method which is synchronous by nature. The evolution of this
system will assist in improving the economy of operability and reliability of a digital network. SONET/SDH
network has been designed only for voice traffic and it is leased line services. A huge amount of SONET/SDH
services from small granularities are expected to migrate towards Ethernet based services and traditional voice
platforms will be replaced voice over internet. This paper also covers the performance comparison of different
SDH data standards using optisystem software.
Keywords: ADM, PDH, POH, Regenerator, SOH, STM.
I. INTRODUCTION
Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET) refer to a group of fibre-
optic transmission rates that can transport digital signals with different capacities. SDH is based on repeated
hierarchy of fixed length frames that are designed to carry synchronous traffic channels. It eliminates group of
multiplexers by allowing single stage multiplexing and de-multiplexing thereby reducing hardware
complexities. The term Plesiochronous Digital Hierarchy (PDH) is used to describe allsuch digital standards before the advent
of SONET/SDH. This indicates asystem in which all parts operate on clock signals which have exactly thesame
rate (within a bounded error), but may have different phases. Such acharacteristic is arguably not a design
decision as much as it is an adjustmentto the realistically inevitable. The move to optical transmission systems
wasaccompanied by a move to a synchronous architecture, which means thatSONET/SDH performs
multiplexing in a strictly time division multiplexed manner.
II. SONET/SDH STANDARDS
The SDH standards exploit one common characteristic of all PDH networks namely 125 micro seconds
duration, i.e. sampling rate of audio signals (time for 1 byte in 64 k bit per second). This is the time for one
frame of SDH. The frame structure of the SDH is represented using matrix of rows in byte units as shown in
Figure.1.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2448 | P a g e
Fig.1. SDH frame structure
As the speed increases, the number of bits increases and the single line is insufficient to show the information on
Frame structure. The Frame structure contains 9 rows and number of columns depending upon synchronous
transfer mode level (STM). In STM-1, there are 9 rows and 270 columns. The first 9 rows and 9 columns
contain Section Overhead and 9 rows and 261 columns contain main information called Payload. Section
overhead containing information about the frame structure required by the terminal equipment. Each container
pointer will added to form virtual container. The interface speed of the STM-1 can be calculated as follows:
(270 columns x 9 rows x 8 bits x 1/125 s) = 155.52 Mbps.
In SDH, a single level definition called Synchronous Transport Module (STM) is used. It is more appropriate to
speakof STS frames at layers above the Photonic, and of OC signals at the Photonic layer. In this sense, the role
of the Photonic layer is to map STS frames onto OC signals. Table 1 shows the commonly used rates, together
withthe corresponding bit transfer rates, both raw and without overhead. One ofthe distinctions of SONET/SDH
from the old PDH approaches is that thefractional overhead remains constant at all levels of the digital hierarchy
inolder systems they usually increase at higher levels of the hierarchy.
Table 1. SONET/SDH Data Rate
III. SDH NETWORK ELEMENTS
3.1 Line Terminal Mux It can accept a number of tributary signals and multiplex them to the appropriate optical SDH. The input
tributaries can either be existing PDH signals such as 2, 34 and 140mbps or lower rate SDH signals The line
terminal multiplexer takes the range of input either 2, 34, 140, mbps and multiplex to the higher rate optical
carrier. Depending on the required regenerator spacing, optical interfaces of both 1310 nm and 1550nm are
generally available as the option, a line terminal interface for internal protection switching. Additional option on
line Terminal Multiplexer equipment provides for access to the order wire channel and the data communication
channels.
SDH Level
Data Rate
STM-1 155.52Mbps
STM-4 622.08Mbps
STM-16 2.4883Gbps
STM-64 9.95328Gbps
STM-256 39.8131Gbps
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2449 | P a g e
3.2 Regenerator Regenerators are required with spacing dependent on the transmission technology these are not just simple
signals regenerators but have alarm reporting and performance monitoring capability a fault can be quickly
isolated to the individual transmission section.The most basic element in the regenerator is when the
transmission is needed more than 50 km they terminate and regenerate the optical signal. wavelengths of
1310nm and 1550nm are preferred because glass fibre is peculiar transparent to light at these wavelength fibre is
even more transparent at 1550n than 1310 and so lower regenerators are needed the further the signal has to go
the greater the transmitter power.
3.3 Add/Drop Mux ADM’S are generally available at the STM-1 and STM-4 interface rates and signals with in ADM. it is possible
to add channels to, or drop channels from the through signal. The ADM function is the one of the major
advantages resulting from the SDH where the PDH network requires banks of hardwired back-back terminals
Add/Drop Mux is a network element which allows configurable of a subnet of a payload from a higher rate data
stream. It is the basic SDH building block for local access to synchronous networks. it generally offers STM-1
interfaces and operates in the thru-mode fashion .A wide variety of tributary signals, such as 2mbps can be
added. This capability is one of the key benefits provided by synchronous systems since ADM elements
supports a function the previously took banks to back-back equipment.
3.4 Synchronous DXC
Synchronous Digital Cross Connect function as a semi-permanent switches for transmission channels and can
switch at any level from 64kbps up to STM-1.DXC can be rapidly reconfigured under software control to
provide digital leased lines and other services of varying bandwidth. It is capability without need for de-
multiplexing makes the digital cross connect such a powerful tool, allowing rapid configuration of the transport
network to provide digital leased lines and other services. The synchronous DXC functions as a semi-permanent
switch for varying bandwidth transmission channels i.e. 2 Mbps under software control, the cross connect
devices can pick out and reroute one or more lower order channels from transmission signals without the need
of de-multiplexing.
IV. BLOCK DIAGRAM AND RESULTS
The main block diagram for SDH network is shown in the figure 2. The results are obtained based on this
architecture.
Fig.2. SONET/SDH architecture
The simulation is carried out for different bit rates such as 155.52Mbps (stm-1), 622.08Mbps (STM-2),
2.4883Gbps (STM-3), 9.48Gbps (STM-4) and analysed Q factor for each data rates. The eye diagram for each
data rates are shown below.
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2450 | P a g e
1. EYE Diagram for data rate 155.52Mbps(STM-1)
The Quality (Q) factor for STM-1 is 643.486
2. EYE Diagram for data rate 622.08Mbps(STM-2)
The Quality (Q) factor for STM-2 is 402.798
3. EYE Diagram for data rate 2.4883Gbps(STM-3)
The Quality (Q) factor for STM-3 is 142.7
4. EYE Diagram for data rate 9.95328Gbps (STM-4)
The Quality (Q) factor for STM-4 is 6.62663
International Conference On Recent Trends In Engineering Science And Management ISBN: 978-81-931039-2-0
Jawaharlal Nehru University, Convention Center, New Delhi (India), 15 March 2015 www.conferenceworld.in
2451 | P a g e
V. CONCLUSION
The simulative analysis shows a gradual decrease in Q factor corresponding increase in data rate. The Q factor
decreases from 643. 486 to 6.62663 for a bit rate 155.52Mbps to 9.95328Gbps. This shows that whenever the
packet size or data rate increases the quality will be reduce. So in order to increase the quality of service
operators can multiplex different data according to customer needs. The future works involves multiplexing the
different data rates to utilize the bandwidth efficiently without sacrificing the quality of services.
REFERENCES
[1] N.Jyothirmai, R. ManasaValli, A.Rama Krishna,“ SDH and its future trends”International Journal of
Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-1, Issue-6,
November 2012.
[2] Antˆonio Marcos Alberti&RoulienFernandes, “Ethernet-over-SDH: Technologies Review and Performance
Evaluation,” RevistaTelecomunicações, Vol. 13, Nº. 01, Maio De 2011.
[3] Gustavo Campos Sebastião, “Performance Comparison of Traditional SDH and NG-SDH Networks for IP
Traffic Transportation”, Departamento de EngenhariaElectrotécnica e de ComputadoresInstituto Superior
Técnico/ Instituto de Telecomunicações Lisbon, Portugal.
[4] R. Udayakumar1, V.Khanaa and K. P. Kaliyamurthie,“Optical Ring Architecture Performance
Evaluationusing Ordinary Receiver” Indian Journal of Science and Technology.
[5] Bhupender Sharma, RanjuKanwar, Sumitkumar, “Compression of Data and Routing in SONET with
Comparison of Various LANs”,International Journal of Emerging Technology and Advanced
EngineeringISSN 2250-2459, Volume 4, Issue 8, August 2014.
[6] Ghebretensaé Z., Harmatos J., and Gustafsson K, “Mobile broadband backhaul network migration from
TDM to carrier Ethernet,” IEEE Commun. Mag.,vol.48, no.10, pp.102-109, October 2010.