PROCEEDINGS OF IRAJ INTERNATIONAL CONFERENCE Date: 15th April, 2018 Venue: Pune, India Organized by In Association with Corporate Address IRAJ Plot No. 161, Dharma Vihar, Khandagiri, Bhubaneswar, 751030 Odisha, India www.iraj.in Publisher: IRAJ 2018, Pune International Conference No part of this book can be reproduced in any form or by any means without prior written permission of the publisher. Type set & printed by: R. K. Printers Khandagiri, Bhubaneswar About IRAJ Research Forum (IRF): The IRAJ Research Forum is an international non-profit academic association under ‘Peoples Empowerment Trust’ with the stated goals of promoting cooperation among scientists, defending scientific freedom, encouraging scientific responsibility, and supporting scientific education and science outreach for the betterment of all humanity. It is the one of the world's largest and most prestigious general scientific society. Objective of IRF: To provide a world class platform to researchers to share the research findings by organizing International/National Conferences. To use the research output of the conference in the class room for the benefits of the students. To encourage researchers to identify significant research issues in identified areas, in the field of Science, Engineering, Technology and Management. To help dissemination of their work through publications in a journal or in the form of conference proceedings or books. To help them in getting feedback on their research work for improving the same and making them more relevant and meaningful, through collective efforts. To encourage regional and international communication and collaboration; promote professional interaction and lifelong learning; recognize outstanding contributions of individuals and organizations; encourage scholar researchers to pursue studies and careers in circuit branches and its applications. To set up, establish, maintain and manage centers of excellence for the study of /on related subjects and discipline and also to run self supporting projects for the benefit of needy persons, irrespective of their caste, creed or religion. About Institute of Research and Journals: IRAJ is an advanced Non-profit technological forum under Peoples Empowerment Trust , for the Researchers & Scholars "to promote the progress of Science and Technology “ by displaying their knowledge in the vicinity of Science and Technology for the service of mankind and the advancement of general welfare. We are standing tall in the field of Research & Technology since 2013, our objective is to provide a platform which will promote, encourage and support Scholars, Researchers & Professionals to carry and accomplish their research work. Conference Committee Program Chair: Prof. R. M. Khaire Professor, COE, B. V University, India Prof. Deepak Ray COE, Bharati Vidyapeeath, Pune, India Prof. R. N. Barik Chairman, IRAJ Research Forum Mail: chairman@iraj.in Conference Convener: Miss. Sumita Nayak Mob: +91-8280047516 Mr. J.R. Pattanayak Mob: +91-8280047487 Publication Head: Mr. Manas Ranjan Prusty, IRAJ, India INTERNATIONAL ADVISORY MEMBERS Prof. Goodarz Ahmadi, Professor, Mechanical and Aeronautical Engineering, Clarkson University, USA Dr Chi Hieu Le, Senior Lecturer, University of Greenwich. Kent ME4 4TB. United Kingdom PROF. (ER.) Anand Nayyar Department of Computer Applications & I.T.KCL Institute of Management and Technology, Jalandhar G.T. Road,Jalandhar-144001, Punjab, India. Prof. R. M. Khaire, Professor, Dept. of Elex. and Telecommunication, B, V University, India Dr.P.Suresh, Professor, Karpagam College of Engineering, Coimbatore, Tamilnadu Mark Leeson Associate Professor (Reader) Area of Expertise: nanoscale communications, evolutionary algorithms, network coding and communication systems Dr. P. K. Agarwal Professor, Deptt. of Civil Engineering, MANIT Bhopal ,Ph. D: IIT Kanpur M.E: Civil Engg.IIT Roorkee, Membership: Indian Road Congress (IRC), Institute of Urban Transport (IUT) Shahriar Shahbazpanahi Islamic Azad University, Department of Civil Engineering, Sanandaj, Kurdistan, Iran, PhD (Structural Engineering), University Putra Malaysia, Malaysia , 2009-Present Harun Bin Sarip Head of Research and Innovation Dept, UniKL-MICET Doctorate: Université de La Rochelle, France Member : International Society of Pharmaceutical Engineer, Singapore Chapter Dr.Bilal Ali Yaseen Al-Nassar The World Islamic Sciences and Education University (WISE) Faculty of Business and Finance, Department of Management Information System (MIS), Amman- Jordan Dr. Md. Al-Amin Bhuiyan Associate Professor, Dept. of Computer Engineering King Faisal University, Al Ahssa 31982, Saudi Arabia Prof. (Er.) Anand nayyar Department of Computer Applications & I.T. KCL Institute of Management and Technology, Jalandhar, G.T. Road, Jalandhar-144001 Punjab, India Prof. Aleksandr Cariow Institution or Company: West Pomeranian University of Technology, Szczecin Dr. P. K. Agarwal Professor, Deptt. of Civil Engineering, MANIT Bhopal ,Ph. D: IIT Kanpur M.E: Civil Engg.IIT Roorkee, Membership: Indian Road Congress (IRC), Institute of Urban Transport (IUT) Prof. Lalit Kumar Awasthi, Professor, Department of Computer Science & Engineering National Institute of Technology(NIT-Hamirpur), PhD, IIT, Roorkee, M. Tech, IIT, Delhi Dr. Chandra Mohan V.P. Assistant Professor, Dept. of Mech. Engg., NIT Warangal, Warangal. Ph.D : Indian Institute of Technology(IIT),Delhi M.B.A: Alagappa University Dr. VPS Naidu Principal Scientist & Assoc. Prof., MSDF Lab, FMCD CSIR - National Aerospace Laboratories, Bangalore, India Prof. I.Suneetha, Associate Professor, Dept. of ECE, AITS, Tirupati, India Mr. P. Sita Rama Reddy Chief Scientist ,Mineral Processing Department, CSIR – Institute of Minerals & Materials Technology Bhubaneswar, India, M.Tech. (Chem. Engg., IIT, KGP) Dr.S. Chandra Mohan Reddy, Assistant Professor (SG) & Head,Dept. of Electronics & Communication Engineering, JNTUA College of Engineering, Pulivendula, Ph.D,J.N.T. University Anantapur, Anantapuramu Dr.P.C.Srikanth, Professor & Head, E&C Dept, Malnad College of Engineering, Karnataka, Senior Member IEEE, Secretary IEEE Photonics Society, M.Tech: IIT, Kanpur, Ph.D: In IISc Photonics lab Gurudatt Anil Kulkarni, I/C HOD E&TC Department, MARATHWADA MITRA MANDAL’S POLYTECHNIC TABLE OF CONTENTS Sl. No. 01. TITLES AND AUTHORS Ayn Rand: A Life of Paradox Page No. 1-4 Amruta Sharma, Ashutosh Dubey 02. Comparisons on the Ideal Man with Special Reference to Ayn Rand 5-7 Amruta Sharma, Ashutosh Dubey 03. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks 8-12 Ashok Nangare, Rahul Mahajan, Abhijit Somavanshi, Arman Tamboli, Amol Khutegave, Dhanraj Jadhav 04. A Secure Public Auditing of Cloud Data with Fragmentation and Replication 13-17 Neha R. Patil, S. R. Patil 05. A Survey on Text Mining and Machine Learning Techniques for Product Review Classification 18-21 Abhijit Vakte, Nishad Tardalkar, Damini Thorat, Ratanraj Sankeshwari, Madhuri Karnik 06. Sentimental Analysis on News Data for Stock Market Prediction 22-24 Juhi Gupta, Anshul Jain, Yash Bohra 07. MAKS: Server Health Monitoring using Kafka 25-28 Amit Kumar Srivastava, CRS Kumar 08. Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car 09. 29-33 Arun Nair, Shruti Kawade, Bryan Dias, Ivan George, Dhiraj K. Bhandarkar Design of Regenerative Brake Test Rig 34-38 Bhushan C. Nikampatil, Sanjay T. Satpute, Lalitkumarm. Jugulkar 10. Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by Incompressible Chevron Jet using CFD Harpreet Singh, Sunil Chandel 39-42 11. Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled Combat Vehicle 43-46 Harshal Pingale, S.V.Nimje, Nilesh Patel 12. Java 8 New Features and Development Standards 47-50 Madhuresh Kumar 13. Solar and Wind Advanced Weather Monitoring System at DMIETR Campus Sagar Parate, Rahul Chaudhari, Pranay Kakade, Chetan Bhatarkar, Shailesh Barde, Laxmikant Akkewar, Srushti Chafle 51-54 Editorial l Good teaching emanates from Research. The teachers’ love for research and their experience in research are vital for the growth of the institution. Any institution is judged by the level and extent of the research work it accomplishes. This sets in a regenerative cycle of excellence. Experience of research leads to quality teaching and quality teaching imparted to the young in turn enriches the research. The campus dynamics needs such type of research teaching research environment. Technology is the non-linear tool available to humanity, which can affect fundamental changes in the ground rules of economic competitiveness. Science is linked to technology through applications. Technology is linked to economy and environment through manufacture of knowledge products. Economy and environment are linked to technology, which promotes prosperity to the society. We have to use innovation to generate high value added products for becoming a global player. The foundation for academic excellence is the research. Let us take would like to give, how you young friends can become a great inventors or discoverers. What is the unique nature of thinking minds of discoverers and inventors of the world. "Inventions and discoveries have emanated from creative minds that have been constantly working and imaging the outcome in the mind. With imaging and constant effort, all the forces of the universe work for that inspired mind, thereby leading to inventions or discoveries". Now there are three unique friends to make you great; they are great books, great human beings and great teachers. Teachers should have the capacities to nurture the "creative minds" and "imagining minds". So this conference has been designed to stimulate the young minds including Research Scholars, Academicians, and Practitioners to contribute their ideas, thoughts and nobility in these disciplines of engineering. It is a pleasure to welcome all the participants, delegates and organizers to this International Conference on behalf of IRAJ Research Forum and ITR family members. This conference has received a great response from all parts of the country and abroad for the presentation and publication in the proceedings. I sincerely thank all the authors for their valuable contribution to this conference. I am indebted towards the Reviewers and Board of Editors for their generous gifts of time, energy and effort for the Conference. Editor-In Chief Prof. R. M. Khaire Professor, COE, B. V University, India AYN RAND: A LIFE OF PARADOX 1 AMRUTA SHARMA, 2ASHUTOSH DUBEY 1 Asst. Professor, School of Interdisciplinary Sciences, Symbiosis University of Applied Sciences, Badabangadda, Super Corridor, Near Airport, Indore 453112. 2 Professor and HOD, Department of English, Mata Jija Bai Govt. Girls’ P.G. College, Opposite to Collector Office, Near Lal Bagh Palace, Indore. E-mail: 1sharma_amruta@yahoo.co.in, 2ashudubey63@gmail.com Abstract - The paper presents a study of the inherent paradox in the life and works of Russian-American philosopher and novelist Ayn Rand. It presents the incidences from Rand’s own life where she absolutely diverted from her own philosophy. In addition to this, it combines and compares an analysis of her literary theory with the kind of characters she carved and the titles of her works again representing a contrasting image. This qualitative work undertakes an empirical study of her life and works and then critical analyzes and interprets the same for the purpose of this research paper. Keywords - Ayn Rand, We the Living, The Fountainhead, Anthem, Atlas Shrugged, Paradox, Philosophy, Objectivism. However as fate had it, Rand got a chance to visit her cousin in Chicago under the name of educational research in a foreign country and she escaped Russia never to come back. Rand supported herself by writing film scripts for some producers and chance made it possible for her to meet up with the owner of a production house Cecil B. DeMille himself, who offered her work. The work at DeMille’s office didn’t only change her literary career but also changed the course of Rand’s personal life as she met the love of her life Frank O’Connor there. Theron, she wrote plays and novels and took over the tumultuous and robust path to success. She used her novels to establish her radical and iconoclast philosophy of Objectivism which stirred a lot of controversies. Her novels received contrasting and extreme reviews and she faced a really tough time while establishing herself both as a novelist and a philosopher. Moreover, because she used her novels as a vehicle of her philosophy and also wrote extensively on the literary theory of romanticism and fiction writing, all of her works carry the same overtones of individualism and become a culmination of her first assertion in the field with We the Living. Her writings were always rejected by several publishers before the final print and she had a real hard time finding the right publisher for her books. Similar was the reception of her books, loaded with negative reviews and questions posed to counter her philosophy. But a master in the art of argumentative conversation she always answered her critics with her intellectual wit and vigour and established her novels to be the most influential after the Bible even today. I. INTRODUCTION Ayn Rand was a Russian-American novelist and philosopher whose birth year witnessed the bloody Sunday in Russia. The Russian life, its values and ethics changed manifolds during the initial years of Rand’s Life. She witnessed a life of the elite class and also bore the struggles of survival during the Bolshevik reign. She chose to be a writer at the tender age of eight in her life and started writing stories from thereon. Even as a reader Rand never liked stories imposing morality and loved the stories told in action rather than narrative. Rand was brought up by parents that encouraged individualism and education. And though she excelled academically she always found school routines to be boring and mundane. The reasoning philosopher in her always made her not only note down what she liked or disliked but it also probed her to define the logic behind her choices of doing so. She defined her beliefs and values, from religion to her earthly philosophy in her journals from the very childhood. She declared at the age of thirteen that she would be an atheist – asserting herself to be a person of reason. However, the comfort of her childhood and adolescence was soon taken with the red flags waving all over Russia. Her family was in miserable position with everything taken away by the Bolsheviks, including the roof over their head. But endowed with strong determination and will power from the very childhood, she enrolled in the state university as a history student and studied philosophy as well. It was during this time that Rand read many writers and developed her tastes for some of them. She also enrolled in the State Technicum for Screen Artswhere she learnt the art of writing screenplays and film reviews but the thought that she was living the Soviet always troubled her. What she wanted to portray in her stories and plays – heroism and individualism – was only a method of ruining what she was left with at hand, if done in Russia. II. MANUSCRIPT Starting with the very first novel of Rand, We the Living, the background of the novel is that of a communist setting. It seems that Rand sketches a virtual Russia in front of her readers. A world where Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 1 Ayn Rand: A Life of Paradox the most vibrant colour is red – the colour of the Bolsheviks. The novel opens with waving red flags and ends at the red of the blood. Rand herself confessed in the Foreword of We the Livingthat, “We the Livingis as near to an autobiography as I will ever write” (2). The whole novel reads like a muffled scream of that Rand wanted to make when she was in Russia. Secondly, her The Fountainhead, was an assertion of an individual who refuses to comply with the collective ideals. Howard Roark’s every act is an open challenge to the collective minds. Rand’s Anthemagain shows a ruin world captured by the collectivists where humans have altogether lost the meaning of the word ‘I’. Equality 7-2521 and Liberty 5-3000 are able to make a separate world of theirs. They are just able to achieve that end which Kira in We the Living is not able to actualize. Kira’s muffled scream gets a clear voice in Anthem. So, if We the Living was closest to an autobiography, then definitely the dynamic assertion of individualism that is made in The Fountainhead and Anthemare for sure an outcome of the fulfillment of Kira’s dreams and desires and thus a manifestation of the ideal world which Rand herself always yearned for. Moreover, Rand’s utopian fantasy comes to the uppermost surface in Atlas Shrugged where she creates a world of the innovators, of the doers, of the go-getters who migrate to a world where people trade value for value, each one contributes and everyone is unique. It is here that the core of Rand’s philosophy of Objectivism is concretized in the oath that everyone has to take before entering Atlantis - the utopian land of the prime movers “I SWEAR BY MY LIFE AND MY LOVE OF IT THAT I WILL NEVER LIVE FOR THE SAKE OF ANOTHER MAN, NOR ASK ANOTHER MAN TO LIVE FOR MINE”(Atlas Shrugged 670). However, when Rand was questioned about whether her philosophy had any influence from the part of her life she spent in Russia, she clearly refused. But if We the Living was the closest to a memoir, if she had ever written it, and further novels a culmination of the fulfillment of the lost dreams of Kira, then definitely the dramatic presentation of her philosophy in Atlas Shrugged has to have an impact of Rand’s personal experiences in life as well. Moving from Rand’s novels to her characters, there is a striking dichotomy in Rand’s characters if we look at them through gender perspective. All of Rand’s heroes – Howard Roark, John Galt, Equality 7-2521 are religious embodiments of Rand’s philosophy who exemplified Rand’s ideal man. From the very beginning of the novel to the end, they are the same flat character. But if we take a close look at Rand’s heroines from her very first novel’s Kira, to Dominique Francon, and Liberty 5-3000, all are portrayed as feeble, and dependent characters. Their motivations are never internal but always external, driven by the male protagonists of the novel. The female characters of Rand do not materialize Rand’s ideal man – which brings to notice another aspect that Rand never wrote about ideal human being but always mentioned the ideal man. Her women characters were the ones that surrendered – Kira selfabnegates herself for Leo Kovalensky; Dominique is raped by the hero Howard Roark; Liberty 5-3000 pleads to Equality 7-2521, “Do as you please with us, but do not send us away from you” (Anthem 83). To this intriguing split the only exception was the character of Dagny Taggart in Atlas Shrugged. Dagny was a powerful character but then Rand again shocked the world when she was asked a question that does she believe that one day a female president would be there in The White House. She replied saying, “I wouldn’t vote for her….. It is not to a women’s personal interest to hold men. It puts her in a very unhappy position. I don’t believe that any good woman would want that position” (Ayn Rand on Donahue 1979). She further added that she is not against leadership positions for women. Women can become senators and congressmen, which was alright, but not President. Now, it is not to be mentioned here, that a leadership position howsoever small it may be, is a leadership position only and will need almost the same characteristics. Further, if we take a look at the title of Rand’s works – whether novels or prose – they have always been thought provoking in the sense that they have juxtaposed terms that pose a question to the reader’s intellect. The split is implied and inevitable. In her novel, We the Living the people who are depicted as living, are the people who die in the novel – Andrei Taganov commits a suicide, Kira is shot dead, and Irina and Sasha are sent to labour camp in Siberia but to die. In addition to this, about the title of Anthem Rand said that she saw the story as an ode to man’s ego but named it Anthem because she found it as a religiously toned word demanding the reverence. However, while demanding that reverence Rand forgot to see the very core concept of an anthem, that is, it is always sung in unity, together. In its most general meaning, it is a song of praise sung together – which implies the Anthem to be a collective praise of individualism – a contradicting title in itself. The Fountainhead, earlier named as the Second-Hand Lives is another novel where the title is meant to be the original source from which stream flows. Here however, the way Roark’s character is depicted, he is shown as a fountainhead of ego, yes, but leading to no stream. Roark never does, nor ever wish to influence someone by his goodness. Moreover, the way Roark is, he neither would appreciate someone keeping him as a source, but would want them to be their own intellectual resource. In a sense then Roark’s goodness never flows, he exists for his own sake and that is how Rand actually defined his ideal man, an end in himself. This very fact then opposes the logic behind individualists being the Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 2 Ayn Rand: A Life of Paradox fountainhead. They exist for their own sake but not as a source for others. Like Howard Roark says in his courtroom speech. “No creator was prompted by a desire to serve his brothers, for his brothers rejected the gift he offered and that gift destroyed the slothful routine of their lives. His truth was his only motive. His own truth, and his own work to achieve it in his own way. A symphony, a book, an engine, a philosophy, an airplane or a building—that was his goal and his life. Not those who heard, read, operated, believed, flew or inhabited the thing he had created. The creation, not its users. The creation, not the benefits others derived from it. The creation which gave form to his truth. He held his truth above all things and against all men” (The Fountainhead). Moving further, if we look at the novel of Rand that brought the greatest name and fame to her – Atlas Shrugged, there is an allusion to Greek Titan Atlas who held the sky for eternity as a punishment by Zeus.Atlas was given this punishment because he was known for his endurance. With the name of Atlas, Virgil crowned the adjective which meant hard, and enduring. However, in Rand’s novels, all her heroes and doers are Atlas who carry the burden of the earth on their shoulders. And they unlike Atlas shrug from their duties, leading to a chaos in the world they leave behind. The allusion to Atlas and the verb shrug create a much needed dread but do not let the reader succumb to it. For it is also well known in mythology, that even when Atlas was once relieved from his punishment for a while by Heracles making a substitute for him, and he was tempted to shrug, he did not do it. Thus, the only question the title imposes is what if? In addition the titles of her novels, the titles of her prose works have been equally contradicting. For example, The Virtue of Selfishness is one such book the title of which intrigues the reader. Selfishness, which has denotative meaning as concern with one’s own self in the dictionary has a connotative morality attached with it that in itself assumes selfishness as a negative quality. When attaching the word Virtue with its title Rand made the room for argument herself because she tried to reveal the positive aspect of the negative trait. And although, her arguments in the book do suffice to her point very well, still the urge that the book’s name creates – to be virtuous by being selfish is something that is not still well accepted. She has created similar controversies by calling Capitalism as the unknown ideal, and questioning about the need of Philosophy in her book Philosophy: Who Needs It? Beyond her professional life if we venture into Rand’s personal life, she proclaimed to have received no help from anyone in her life but she very much took the help of her relatives in coming to the US and staying at their home in the initial years of her life at US. Asserting the philosophy of individualism, she developed a group of her fans, who came to her home at the weekends and discussed about her philosophy. Intriguingly, Rand named this group as ‘The Collective’. The very idea of a group of people named as the Collective discussing about Individualism was a mockery of the whole premise and idea of individualism. Rand also had an extra-marital affair with Nathaniel Branden which she justified talking about the oneness of romantic love and intellectual ideals. She demanded and thus got freedom from the spouses of both for carrying her affair with Branden but when Branden tried to break the bond, she did not respect his free will, but rather abused, accused and even slapped him thrice. She never thought ever, even for the slightest while, about Branden’s individual choices and assertions. When Branden wrote an apology, she did not even read the letter sent by Branden beyond two pages and just assumed what he had to say further. Similarly, even after opposing charity, tax systems and everything similar, all through her life, there is much debate on her availing the option of social security at the end of her life. Also, once in an interview by Mike Wallace she declared that a weak man or a woman doesn’t deserve to be loved. And when Wallace asked her about supporting her husband financially, and yet being loved by her, she changed the criteria for his value judgement altogether. She declared his worthiness for giving her the pleasure she wanted and not being an altruist in love. Thus Rand’s whole life was full of such confutations. Her novels which professed to establish her rationalistic and intellectual philosophy were full of sensuous and non-literary elements that did read like one of the cheap soap operas. She wrote at length about the virtue of reason over emotion but could not save herself from being a slave to her own emotions when it came to her personal life. And unlike her oath of Atlantis she always ruled the lives of other men and women around her with utmost dictatorship. Under the name of a rational philosophy she brought forth the concept of selfishness, where people who did not care for the underprivileged could justify and sanction their own acts under the name of Objectivism. CONCLUSION Though Rand created voluminous questions and controversies through her novels and her philosophy, she managed to justify every tenet of it by counter arguing and proving, at least through language, the baselessness and uselessness of other existing philosophies. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 3 Ayn Rand: A Life of Paradox [4] She further declared Objectivism to be the only philosophy based on rational self-interest and was successful in proving her case too whenever someone argued with her.At times she did not even hesitate to dismiss a question, without hearing it fully, calling it to be irrational and insulting. But what she could not do, was exemplify in person and in her writings as well, the perfect manifestation of her philosophy. And if she did it at all, in the characters of Roark and Galt, she created a separate world – peopleexisting in isolation – whichis not how human beings live. Also, it is only when a man exists in isolation does he need others the most, like Rand needed social security at the end of her life. She tried to create Atlantis in her real life, with the people of her concern, but failed miserably in the will to gain absolute power over their lives and mind just like the World Council, Ellsworth Toohey and the dictators of Atlas Shrugged. [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] REFERENCES [1] [2] [3] [15] Branden, Barbara. "Full Context Interview." Barbara Branden. Webmaster, 1998. Web. 20 Sept. 2017. Branden, Barbara. The Passion of Ayn Rand. New York: Anchor, 1987. Print. Britting, Jeff. Ayn Rand. Woodstock, New York: Overlook, 2004. Print. [16] [17] [18] Cunningham, Darryl. "Ayn Rand." Act-i-vate. N.p., n.d. Web. 28 Dec. 2015. Heller, Anne C. Ayn Rand and the World She Made. India: Tranquebar, 2010. Print. Rand, Ayn, and Michael S. Berliner. Letters of Ayn Rand. New York: Penguin USA, 1997. Print. Rand, Ayn, and Nathaniel Branden. The Virtue of Selfishness: A New Concept of Egoism. New York: New American Library, 1964. Print. Rand, Ayn, and Robert Mayhew. The Art of Nonfiction: A Guide for Writers and Readers. New York: Plume, 2001. Print. Rand, Ayn, and Tore Boeckmann. The Art of Fiction: A Guide for Writers and Readers. New York: Plume, 2000. Print. Rand, Ayn, David Harriman, and Leonard Peikoff. Journals of Ayn Rand. New York: Dutton, 1999. Print. Rand, Ayn, Michael S. Berliner, and Leonard Peikoff. Letters of Ayn Rand. New York: Plume, 1997. Books.google.co.in. Web. 5 Jan. 2016. Rand, Ayn,, Nathaniel Branden, Alan Greenspan, and Robert Hessen. Capitalism: The Unknown Ideal. New York: Signet, 2008. Print. Rand, Ayn. Anthem. New York: Signet, 2013. Print. Rand, Ayn. Atlas Shrugged. New York: New American Library, 1971. Print. Rand, Ayn. For the New Intellectual. New York: New American Library, 1964. Print. Rand, Ayn. The Fountainhead. New York: Signet, 1971. Print. Rand, Ayn. The Romantic Manifesto. New York: Signet, 1971. Print. Rand, Ayn. We the Living. New York: Signet, 2011. Print. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 4 COMPARISONS ON THE IDEAL MAN WITH SPECIAL REFERENCE TO AYN RAND 1 AMRUTA SHARMA, 2ASHUTOSH DUBEY 1 Asst. Professor, School of Interdisciplinary Sciences, Symbiosis University of Applied Sciences, Bada Bangadda, Super Corridor, Near Airport, Indore 453112. 2 Professor and HOD, Department of English, Mata Jija Bai Govt. Girls’ P.G. College, Opposite to Collector Office, Near Lal Bagh Palace, Indore. E-mail: 1sharma_amruta@yahoo.co.in, 2ashudubey63@gmail.com Abstract - The paper presents a comparative study of the concept of an ideal man as in different philosophies with special reference to the concept of ideal man by Russian-American philosopher Ayn Rand as portrayed in her novels. The paper aims to find the common thread, if any, that exists in all the definitions. This work considers the philosophical premises established by different thinkers in the world, presents an in-depth analysis and Rand’s ideal man and then compares and contrasts its implications with other premises. Keywords - Ayn Rand, Philosophy, Man, Ideal. choose. Man is endowed with a brain which helps him to decide beyond stimuli, talk beyond time, and think ahead of immediate circumstances, which other animals cannot do. Man though is an organic animal made of flesh and blood with basic instincts and sensory perceptions of pain and pleasure still he is far beyond the reach of any other on this planet. The individualistic view of man where he can assert his individual discretion makes him the master of his own destiny. In addition to this, the moral and religious nature of man helps him to achieve that which is beyond him, a union with the mystical. So being a complex creature that he is, Philosophers have hitherto explained man differently in different times and ages. The ancient era of philosophy considered human beings as an infinitely small element of the vast universe and were more inclined toward the powers of the universe. But since Socrates the view and importance of man has changed manifolds. Socrates was the first philosopher to have had a keen interest in human life and its intricacies. He sought at length discussions with people around him talking about their likes, dislikes, and many other things and then also probing an enquiry into why they thought what they thought. But Socrates never intended to influence the thinking of others rather wanted people to find out their own truths. However, we don’t have any written treatise from Socrates and it was only through his disciple Plato that we came to know about the Socratic phenomenon. Socrates did not undermine the importance of man but recognized and avouched his supremacy over all other animals. He considered social life and justice to be indispensable to human growth and also separated the material and intellectual existence of man as the soul and the body. He considered the soul to be the guidepost of a man and thereof laid a lot of stress on nurturing it as well. I. INTRODUCTION Ayn Rand was a Russian-American novelist and philosopher who established her philosophy of Objectivism through her novels. Her novels portray stories of individualists asserting themselves in the collective ideals present in the society. She believed in portraying man as he ought to be rather than man as he is. She had no interest and was actually against the fundamentals of Naturalism and Realism. Like her ideal Aristotle, she considered fiction of higher philosophical significance than history because, “history represents things as they are, while fiction represents them as they might be and ought to be” (The Romantic Manifesto 71). She insisted on the purpose of art, which she considered was to show not to instruct. And she said, that it is only through art that men can ever visualize their highest potentials. Writing on her beliefs and her philosophy, all of Rand’s novels portray the ideal man. Man as he should be and can be. She implanted the image of her ideal man mostly by showing how mostly men actually are. She asserted through negation. And that was the strength of her characterization. However, the way Rand has portrayed her ideal man is by drawing up the image of a man who has perfectly exemplified her philosophy. But Rand’s philosophy in itself was very controversial and so Rand’s ideal man’s image. Moreover, her image of the ideal man also could not meet most of the philosophies existing in the world. So, after defining Rand’s ideal man and ideal men of other philosophies, a comparison on the same has been undertaken to meet the closest semblance in the same. II. MANUSCRIPT Human beings are by far the most developed animals on earth and what sets them apart from all the other animals is their capacity to exercise their volition and Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 5 Comparisons on the Ideal Man with Special Reference to Ayn Rand He argued that the knowledge of one’s own thought, reasoning and nature would help man to understand, control and influence his own behaviour. In a sense then knowledge can take man to those heights which he himself doesn’t believe and know of. Furthermore, Aristotle added to the Greek thought and stressed on human being’s capacity to speak and meditate. But his most startling declaration was about the limitation of human knowledge and its validity. However, he stressed that the nature of education should be such that it helps to imbibe virtues. Aristotle’s method was more practical and liberal as well and he never denied to quench the desires of the material self, but he always warned not to forget the need for an absolute supremacy of reason in a man’s life and actions. It is there that Ayn Rand grabbed the essence of Aristotelian Ethics and set forth a new philosophy of her own, more suitable and apt to the age in which Rand was living. In addition to this when Rand defined her ideal man and the philosophy associated with him, she started right off from the need for a conscious philosophy and went to deliver a lengthy thesis defining the same. In this process she also sufficed reasons for not adhering to the current philosophies and the faults with them in general. Rand was in serious opposition of the view of man which tells that man is born with a sin, to suffer and repent. She hated the crucifixion of Jesus Christ for she considered that an ideal man is to be applauded not crucified. She turned down both mysticism and socialism as both these philosophies told men to do everything for either the supreme power which is unknown and unseen or the society which is nothing but a gang of powerful people. She argued that the Nietzschean egoists, representing absolute free will, came into being only to represent the other side of the altruist coin which induced a subconscious enmity in humans against morality as it tells man that he can either be happy or moral but not both. But Rand considered the worst part of all this as the quandary of human beings wherein they choose any which of these philosophies as and when it suits them. They just don’t stick to a code of ethics and therefore are even not concretely aware of their own conscious philosophy. Therefore Rand defined the philosophy of Objectivism keeping in mind man as he should be and not man as he actually is. She detailed an ideal man to be a man existing for himself not for others. She refuted the very idea of men as their brothers’ keepers. Her ideal man does not sacrifice for others nor expects any sacrifice from anyone. His philosophical premise is that of rational self-interest and the highest virtue for him is the pursuit of his very own happiness which he derives from adhering to his own conscious philosophy and principles in life. Rand also asserted Objectivism to be based on reality as it is with the reasoning capacity of an individual as a tool to realize and perceive this reality. Man must live by the sole reasoning and judgment of his mind, and his actions should also be only guided by his reason and nothing else. Rand also made it clear that to serve others is not a negative quality but if that’s assumed to be a compulsion on mankind then it is not correct. Moreover, she asserted that such a relationship can only be possible in long term when any man agrees with the other person’s values and philosophy. Thus her ideal man is not afraid to show his real self to others, he is productive and contributes for the betterment of society in some way or the other and never places anybody over and above his own individual and creative pursuits. Thereof comes the role of rational self-interest and rational-selfishness into Rand’s philosophy. She declared virtue and not feelings and emotions as the deciding factor in all kinds of relationships including romantic love. Further, if we take a look at the Jewish concept of man, it is quite the contrary of what Rand proposed. According to the Jewish beliefs a man is always in search of something greater than himself, a justification of his existence, a meaning for his being. And so, man never exists as an end but always questions his very existence – the question being – Will he also like other animals just take birth and die? Is that it? Or is there something greater in life? This quest of his own leads man to view his life as a need of God. Man exists for fulfilling God’s purpose on earth and thus he is neither useless nor unneeded. The Chinese philosophy however, sees man as the center of all affairs and unlike other schools of thought, wherein the existence of man is to suffer and repent for his own sins quite unknown to him, the Chinese school considers the nature of man and life as basically good. The dominant thought in Chinese considered man to be righteous because he had conscience, he could decide between right and wrong and is aware of his own choices, dislikes and likes. The Buddhist thought in China also transformed the concept of Nirvana which till then was considered to be something perceived in a distant and unknown world to something which could be achieved in this very body and this humanly existence itself. The Chinese considered every man to be endowed with the four fundamental qualities. “Men have these four beginnings just as they have their four limbs…..These four, love, righteousness, propriety and wisdom …..are not drilled into us from outside. We are originally provided with them” (Radhakrishnan and Raju 168). However later on Chinese thought also mentioned the importance of nurture in developing these traits and also laid quite a stress on imbibing strict discipline in man’s physical nature. An ideal man in the Chinese philosophy then is a man endowed with the perfect Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 6 Comparisons on the Ideal Man with Special Reference to Ayn Rand virtue, a man of Jen, who is kind and compassionate towards all beings. He is an earthly sage who resides in the world but whose mind dwells in the tranquil. In addition to the Chinese, the Hindu Philosophy’s ideal man is the man in search of Puruṣārtha which comprises of dharma which can be achieved through righteousness; artha which helps to gain economic well-being; kāma through which sensory pleasures can be experienced; and moksha that is liberation through spiritual pursuits. However out of these four Puruṣārthas, dharma is considered to be the most important because it is the only quality that sets him apart from other animals as is mentioned in the SubhashitSangrah of the Upanishads, “āhāra-nidrā-bhaya-maithunaṁ ca sāmānyam etat paśubhir narāṇām dharmo hi teṣām adhiko viśeṣo dharmeṇa hīnāḥ paśubhiḥ samānāḥ” The Hindu philosophy considers the soul to be the ultimate director of the course of human life. It considers the human body to be a chariot and the soul the charioteer, the drivers or horses of this chariot as the senses and the mind of an individual as the reigns. So, the ideal man is the one who through his mind can rein the senses of his body and through the charioteer and of his soul reach his ultimate goal of Moksha. Such a man is said to be made of the Sattva guna. Similarly, Rand declined the altruist and socialist philosophies because they lead to self-sacrifice, a renunciation of one’s own happiness. She also turned down the Nietzschean egoists who let desires and whims rule their actions, and let the aim of gratification decidethe course of their life.Rand propounded her philosophy of objectivism that asked man to rely of his very own mind, his rationale and act according to it not his emotions or feelings. However, in a nutshell there may be certain similarities and some disparities in all the philosophies regarding their ideal man, still we can infer that an ideal man in general is a detached seeker of self and of knowledge, guided by his rationale, practicing virtue, and a worldly sage with peace as his internalized capacity and quality. CONCLUSION [6] REFERENCES [1] [2] [3] [4] [5] After having studied different philosophies on the concept of man, we can infer that Socrates’ urge to “Know Thyself” (Sharma, Great Philosophers 8); with the Hindus assertion “AtmanamVidhi” (Krishnananda); Confucius’ stress on the study of nature of man; and the Jewish search of meaning can be seen as adding up to Rand’s rational self-interest in its most unselfish implication. Moreover, if we study Rand’s philosophy very closely, it coincides strangely with Buddha’s middle path of moderation. According to Buddha, men in search of their meaning either take the low course of sensory gratification and derive pleasure by satiating that which is unending or they take up the path of self-mortification which is the other extreme involving renunciation of all the pleasures of their life. But the right path, as he states in is Noble Eightfold Path, is the path of wisdom, of moderation and righteousness put in understanding, speech, aspiration, living, action, effort, concentration and attention. Buddha asserted, “Be ye lamps unto yourselves. Rely upon yourselves……Do not depend upon anything else but yourselves” (Götz 27). [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] Götz, Ignacio L. Conceptions of Happiness. Lanham, MD: U of America, 2010. Print. Nietzsche, Friedrich Wilhelm, and H. L. Mencken. The Antichrist. New York: Alfred A. Knopf, 1923. Gutenberg.org. The Project Gutenberg, 18 Sept. 2006. Web. 21 Sept. 2015. Packard Steve. “Ayn Rand Interviewed By Phil Donahue”. YouTube. YouTube, 5 May 2012. Web. 5 July 2015. Podritske Marlene, and Peter Schwartz. Objectively Speaking: Ayn Rand Interviewed. Lanham, MD: Lexington, 2009. Web. Prabhupada, Swami. “The Journey of Self-Discovery.” PrabhupadaBooks.com Srila Prabhupada's Original Books, prabhupadabooks.com/jsd/2/absolute_love. Radhakrishnan, Sarvepalli, and PoolaTirupati Raju. The Concept of Man. A Study in Comparative Philosophy. London: G. Allen and Unwin, 1960. Print. Rand, Ayn, and Nathaniel Branden. The Virtue of Selfishness: A New Concept of Egoism. New York: New American Library, 1964. Print. Rand, Ayn. Anthem. New York: Signet, 2013. Print. Rand, Ayn. Atlas Shrugged. New York: New American Library, 1971. Print. Rand, Ayn. For the New Intellectual. New York: New American Library, 1964. Print. Rand, Ayn. The Fountainhead. New York: Signet, 1971. Print. Rand, Ayn. The Romantic Manifesto. New York: Signet, 1971. Print. Rand, Ayn. We the Living. New York: Signet, 2011. Print. Sharma, Ram Nath. Great Philosophers of the World. Gurgaon: Spring, 2004. Print. Society Atlas. “The ideal man: Ayn Rand interviewed by James Day”. YouTube. YouTube, 23 July 2014. Web. 26 June 2015. TemplerSr Justin. “The 1959 Mike Wallace Ayn Rand Interview”. YouTube. YouTube, 01 November 2011. Web. 18 July 2015. Thera, Piyadassi. "Setting in Motion the Wheel of Truth." Book of Protection - First Discourse of the Buddha. Buddha Dharma Education Association &BuddhaNet, 2008. Web. 16 Aug. 2015. Watson, Lillian Eichler. Light from Many Lamps. New York: Simon & Schuster, 1988. Print. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 7 CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL MEDIA NETWORKS 1 ASHOK NANGARE, 2RAHUL MAHAJAN, 3ABHIJIT SOMAVANSHI, 4ARMAN TAMBOLI, 5AMOL KHUTEGAVE, 6DHANRAJ JADHAV 1,2,3,4,5 Savitribai Phule Pune University,India Professor, Savitribai Phule Pune University,India E-mail: 1nangareashok@gmail.com, 2rahuldyppif1@gmail.com, 3abhisom14@gmail.com, 4armantamboli111@gmail.com, 5 khuntegave99@gmail.com, 6dhanraj143_jadhav@rediffmail.com 6 Abstract - The past couple of years have seen the rise and advancement of a vivacious investigation stream on an outsized type of on-line Social Media Network (SMN)platforms. Perceiving unknown, however indistinguishable userss among various SMNs stays relate unmanageable disadvantage. Unmistakably, cross-stage investigation may encourage settle a few issues in social registering in every hypothesis and applications. Since open profiles will be copied and basically mimicked by userss with totally unique capacities, most current users distinguishing proof resolutions, that mainly target content mining of userss' open profiles, square measure delicate. A few examinations have endeavored to coordinate userss upheld the circumstance and fleeting request of users content still as scholarly class. Be that as it may, the areas square measure thin inside the lion's share of SMNs, and abstract type is difficult to differentiate from the short sentences of driving SMNs like S in an exceptionally Microblog and Twitter. In addition, since on-line SMNs square measure very cruciform, existing users distinguishing proof plans bolstered arrange structure aren't successful. This present reality companion cycle is extremely individual and almost no 2 userss share a consistent companion cycle. Thusly, it's a ton of right to utilize a cordial relationship structure to inquire about cross-stage SMNs. Since indistinguishable userss tend to arrange incomplete comparable cordial relationship structures in a few SMNs, we tend to arranged the Friend Relationship-Based User Identification (FRUI)algorithm. FRUI computes a match degree for all competitor User Matched Pairs (UMPs), and exclusively UMPs with prime positions square measure considered as indistinguishable userss. we tend to furthermore created 2 suggestions to help the power of the algorithmic program. Aftereffects of concentrated investigations exhibit that FRUI performs far superior than current system structure-based algorithm. Keywords - Cross-Platform, Social Media Network, Anonymous Identical Users, Friend Relationship, User Identification procedure of intersection various SMN stages to shading a complete picture of those practices. Regardless, cross-stage investigation faces different difficulties. As appeared in Fig.1, with the extension of SMN stages on the net, the cross-stage approach has coordinated various SMN stages to frame wealthier data and a great deal of finish SMNs for social registering assignments. SMN users sort the common scaffolds for these SMN stages. the main theme for cross-stage SMN investigation is users recognizable proof for different SMNs. Investigation of this subject establishes a framework for extra cross-stage SMN examination. Proposing a novel Friend Relationship-based User Identification (FRUI)algorithm. In our analysis of cross-platform SMNs, we deeply mined friend relationships and network structures. In the real world, people tend to have mostly the same friends in different SMNs, or the friend cycle is highly individual. The more matches in two un-mapped users’ known friends, the higher the probability that they belong to the same individual in the real world. Based on this fact, we proposed the FRUI algorithm. Since FRUI employs a unified friend relationship, it is apt to identify users from a heterogeneous network structure. Unlike existing algorithms [22], [23], [24], FRUI chooses candidate matching pairs from currently known identical users rather than unmapped ones. This operation reduces computational I. INTRODUCTION In the most recent decade, many sorts of social networking sites have emerged and contributed immensely to huge volumes of true data on social practices. Twitter 1, the most critical smaller scale blog benefit, has more than 600 million users and delivers upwards of 340 million tweets for every day [1]. Sina Microblog2, the primary Twitter-style Chinese miniaturized scale blog site, has a ton of than500 million records and creates run out a hundred million tweets for every day [2]. Because of this decent variety of on-line online networking systems (SMNs), people tend to utilize entirely unexpected SMNs for different capacities. for instance, Ren 3, a Facebook-style however antonymous SMN, is utilized in China for sites, though Sina Micro blog is utilized to share statuses (Fig.1). In various words, each existent SMN fulfills some user needs. Regarding SMN administration, coordinating mysterious users crosswise over various SMN stages will give incorporated subtle elements on each users and educate relating laws, such as focusing on administrations arrangements. In principle, the cross-stage investigations empower a bird's-eye perused of SMN user practices. In any case, about all current SMN-construct ponders center with respect to one SMN stage, yielding fragmented data. Subsequently, this examination researches the Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 8 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks complexity, since only a very small portion of unmapped users are involved in each iteration. Moreover, since only mapped users are exploited, our solution is scalable and can be easily extended to online user identification applications. In contrast with current algorithms [22], [23], [24], FRUI requires no control parameters. (3) Providing concrete demonstrations of FRUI performance with three synthetic networks and two major online SMNs in China: Sina Microblog and RenRen. The synthetic networks include Erdos Renyi(ER) [25] random net-works, Watts Strogatz (WS) [26] small-world networks and Barabasi Albert preferential attachment model (BA) [27] networks. Findings show that FRUI is superior to NS in these networks. Moreover, FRUI is effective for the deanonymization task, since the user identification task is similar to the de anonymization problem One of the foremost fascinating challenges within the space of social computing and social media analysis is that the questionable community analysis. A accepted barrier in cross-community (multiple website) analysis is that the disjunction of those websites. during this paper, our aim is to supply proof on the existence of a mapping among identities across multiple communities, providing a way for connecting these websites. Our studies have shown that easy, nonetheless effective approaches, that leverage social media's collective patterns are often used to seek out such a mapping. The utilized ways with success reveal this mapping with sixty six accuracy 3) Connecting users across social media sites: a behavioral-modeling approach AUTHORS : R. Zafarani and H. Liu, Social media is enjoying a vital role in our existence. folks typically hold varied identities on completely different social media sites. User-contributed internet information contains numerous data that reflects individual interests, policy making and alternative behaviors. To integrate these behaviors data, it's useful to spot users across social media sites. This paper focuses on the challenge of characteristic unknown users across completely different social media sites. a technique to relate user’s identities across social media sites by mining users’ behavior data and options is introduced. the strategy has 2 key parts. the primary part distinguishes completely different users by analyzing their common social network behaviors and finding robust opposing characters. The second part constructs a model of behavior options that helps to get the distinction of users across social media sites. the strategy is evaluated through 2 experiments on Twitter and Sina Weibo. The results of experiments show that the strategy is effective. Fig. 1. Cross-platform research to merge a variety of SMNs. II. LITERATURE SURVEY 1) How unique and traceable are user nemeses’? AUTHORS: D. Perito, C. Castelluccia, M.A. Kaafar, and P. Manils, 4) Privacy in the age of aug-mented reality," AUTHORS: A. Acquisti, R. Gross and F. Stutzman, This paper explores the chance of linking user profiles solely by viewing their usernames. The intuition is that the chance that 2 usernames talk to constant physical person powerfully depends on the "entropy" of the username string itself. Our experiments, supported crawls of real net services, show that a major portion of the users' profiles will be joined exploitation their usernames. To the simplest of our data, this is often the primary time that usernames area unit thought of as a supply of knowledge once identification users on the web. 2) Connecting corresponding across communities AUTHORS: R. Zafarani and H. Liu, We investigate the practicability of mixing in public on the market we have a tendency tob a pair of.0 knowledge with ready-made face recognition computer code for the aim of large-scale, machinecontrolled individual re-identification. 2 experiments illustrate the flexibility of characteristic strangers online (on a chemical analysis website wherever people shield their identities by mistreatment pseudonyms) and offline (in a public space), supported photos created in public on the market on a social network website. a 3rd proof-of-concept experiment illustrates the flexibility of inferring strangers' personal or sensitive data (their interests and social insurance numbers) from their faces, by combining face recognition, data processing algorithms, and applied identities Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 9 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks mathematics re-identification techniques. The results highlight the implications of the convergence of face recognition technology and increasing on-line selfdisclosure, and also the emergence of "personally predictable'' data, or PPI. They raise questions about the longer term of privacy in associate "augmented'' reality world during which on-line and offline knowledge can seamlessly mix. dimensions. we tend to build a rest decide to deploy Associate in Nursing integrated system Finding Memo that uses all the 3 dimensions of Associate in Nursing identity to go looking for a user on multiple social networks. The system exploits a glorious identity on one social network to go looking for her identities on alternative social networks. we tend to check our system on 2 preferred and distinct social networks { Twitter and Facebook. we tend to show that the integrated system offers higher accuracy than the individual algorithms. we tend to report experimental endings within the paper 5) I seek you: searching and matching individuals in social networks AUTHORS: M. Motoyama and G. Varghese, An online user joins multiple social networks so as to en- joy die rent services. On every joined social network, she creates Associate in Nursing identity and constitutes its 3 major dimensions specifically professional lupus erythematous, content and affiliation network. She for the most part governs her identity formulation on any social network and thus will manipulate multiple aspects of it. With no international identifier to mark her presence unambiguously within the on-line domain, her on-line identities stay unlinked, isolated and difficult to go looking. Earlier analysis has explored the higher than mentioned dimensions, to go looking Associate in Nursing link her multiple identities with an assumption that the thought of dimensions are least disturbed across her identities. However, majority of the approaches are restricted to exploitation of 1 or 2 III. PROPOSED SYSTEM We proposed the FRUI algorithm. Since FRUI employs a unified friend relationship, it is apt to identify users from a heterogeneous network structure. Unlike existing algorithms, FRUI chooses candidate matching pairs from currently known identical users rather than unmapped ones. This operation reduces computational complexity, since only a very small portion of unmapped users are involved in each iteration. Moreover, since only mapped users are exploited, our solution is scalable and can be easily extended to online user identification applications. Adm in U ser Lo g in R eg is te r L o g in D et ec t Ne w U ser A pp ly A lgo rit h m D atab as e C reate M an y Ac co u nt De te ct A no n ym o u s U se r P os t C o m m en t Fig. 2. Architecture Diagram the best approach to recognize clients crosswise over totally unique SMNs. Peritoet al. [3] computed the likeness of screen names and known clients exploitation parallel classifiers. Correspondingly, Liu et al. [4] coordinated clients in Associate in Nursing unattended approach exploitation screen names. Za farani and Liu [5] anticipated an approach to outline crosswise over totally unique SMN stages, by experimentation affirming numerous theories. On IV. SYSTEM IMPLEMENTATION Profile-Based User Identification Several studies addressing anonymous user identification have centered on public profile attributes, as well as screen name, gender, birthday, town and profile image. A screen name is that the openly required profile include in many SMNs. it's been wide investigated as Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 10 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks prime of this work, they [6] further built up a client mapping technique by displaying client conduct on screen names. Among open profile traits, the profile picture is another component that has gotten broadened examine. Rapacious al. [7] self-tended to the user recognizable proof assignment with a face acknowledgment run the show. In spite of the fact that each screen name and profile picture will decide users, they can not be connected to monster SMNs. this can be because of a few users could have indistinguishable screen name and profile pictures. For instance, a few users have the screen name "John Smith" on Facebook. than, arrange based client distinguishing proof stances many real difficulties, with few examinations to make on. To address this disadvantage, Bartunovet al. proposed relate approach bolstered contingent irregular fields alluded to as Joint Link-Attribute (JLA).JL A considered each profile at-tributes and system properties. To break down security and lack of clarity, Narayanan and Shmatikov created NS, construct for the most part totally in light of star grouping. CONCLUSION This examination tended to the matter of user recognizable proof crosswise over SMN stages related offered an imaginative answer. As a key side of SMN, arrange structure is of prevail significance and helps settle de-anonymization users ID assignments. In this way, we tend to design a steady net-work structure-based users distinguishing proof answer. We tend to conjointly build up a totally interesting companion relationship-based algorithmic program known as FRUI. To improve the intensity of FRUI, we tend to de-scribed 2 recommendations and tended to the quality. At last, we tend to check our algorithmic program in each simulated net-works and ground-truth systems. Results of our exact tests uncover that net-work structure will finish fundamental user distinguishing proof work. Our FRUI algorithmic program is direct, by and by temperate, and performed obviously better than NS, the current situation with craftsmanship organize structure-based users distinguishing proof answer. In projections once crude content data is disseminated, inadequate, or difficult to get on account of protection settings, FRUI is remarkably appropriate for cross-stage undertakings. In addition, our determination might be essentially connected to any SMNs with kinship systems, including Twitter, Face-book and Foursquare. It can even be stretched out to various examinations in social processing with cross-stage issues like focused on advancing data recovery, cooperative separating, and notion investigation and extra. Moreover, since exclusively the Adjacent Users range unit worried in each cycle strategy, our method is ascendible and can be essentially connected to huge datasets and on-line users recognizable proof applications. Identifying anonymous users across multiple SMNs is difficult work. In this manner, exclusively some of indistinguishable users with totally unique epithets might be perceived with this strategy. This investigation designed the motivation for more examinations on this issue. At last, it's our expectation that a last approach might be produced to detect every single indistinguishable users with totally unique epithets. Diverse user recognizable proof systems might be connected in the meantime to take a gander at numerous SMN plat-shapes. These procedures region unit integral and not totally Content-Based User Identification Content-Based User Identification arrangements resolve to recognize users supported the days and locations that users post content,as well because the literary genre of the content. Zhenget al. [18] projected a structure for origin distinguishing proof exploitation the abstract kind of on-line messages and order techniques. Almishari and Tsudik anticipated connecting clients crosswise over entirely unexpected SMNs by misusing the artistic class of authors.Kong and Zhang anticipated Multi-Network Anchoring (MNA) to delineate. They figured the joined similitudes of client's social, spatial, fleeting and message information in various SMNs, and analyzed a stable coordinating disadvantage between 2 sets of client accounts.Goga et al. [21] misused the geo-area snared to clients' posts, and users’ literary genre to deal with user identification tasks. Table 1 NETWORKS OF THE GROUND TRUTH DATASET Fig. 3. Chart Graph OF NETWORKS OF THE GROUND TRUTH DATASET Network Structure-Based User Identification System structure-construct examines with respect to user distinguishing proof over different SMNs range unit acclimated recognize indistinguishable users completely by user arrange structures and seed, or priori distinguished users. As demonstrated higher Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 11 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks [5] R. Zafarani and H. Liu, "Connecting corresponding identities across communities," Proc. of the 3rd International ICWSM Con-ference, pp. 354-357, 2009. [6] R. Zafarani and H. Liu, "Connecting users across social media sites: a behavioral-modeling approach, " Proc. of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’13), pp.41-49, 2013. [7] Acquisti, R. Gross and F. Stutzman, "Privacy in the age of aug-mented reality," Proc. National Academy of Sciences, 2011. [8] T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, "Identifying users across social tagging systems,” Proc. of the 5th International AAAI Conference on Weblogs and Social Media, pp. 522-525, 2011. [9] M. Motoyama and G. Varghese, "I seek you: searching and matching individuals in social networks," Proc. of the 11th inter-national workshop on Web Information and Data Management (WIDM’09), pp. 67-75, 2009. [10] O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer, "Large-scale Correlation of Accounts across Social Networks," Tech-nical report, 2013. unrelated, since a definitive call may confide in human user's contribution. In this manner, we propose misuse these methodologies synergistically and considering qualities and shortcomings for the best results. REFRENCES [1] [2] [3] [4] Wikipedia, "Twitter, " http://en.wikipedia.org/wiki/Twitter. 2014. Xinhuanet, "Sina Microblog Achieves over 500 Million Users," http://news.xinhuanet.com/tech/201202/29/c_122769084.htm. 2014. D. Perito, C. Castelluccia, M.A. Kaafar, and P. Manils, "How unique and traceable are usernames?," Privacy Enhancing Technol-ogies(PETS’11), pp. 1-17, 2011. J. Liu, F. Zhang, X. Song, Y.I. Song, C.Y. Lin, and H.W. Hon, "What's in a name?: an unsupervised approach to link users across communities," Proc. of the 6thACM international conference on Web search and data mining(WDM’13), pp. 495-504, 2013. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 12 A SECURE PUBLIC AUDITING OF CLOUD DATA WITH FRAGMENTATION AND REPLICATION 1 NEHA R. PATIL, 2S. R. PATIL 1 Department of Computer Engineering, A. C. Patil College of Engineering, Kharghar, Navi Mumbai, India Professor, Department of Computer Engineering, A. C. Patil College of Engineering, Kharghar, Navi Mumbai, India E-mail: 1nehapatil18393@gmail.com, 2srpatil@acpce.ac.in 2 Abstract - Outsourcing data to a third-party administrative control, as is done in cloud computing, it gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. Cloud storage can make data users store and access their files any time, from anywhere and with any device. To ensure the security of the outsourced data, data user needs to periodically check data integrity. There are existing auditing schemes that are based on PKI. There is auditor to check integrity but for that he needs to must validate the certificates of data user before auditing data integrity. Thus, It result in a large amount of computation cost. Especially, it brings heavy burden to the auditor in the multi user setting. Overcome this problem, in this paper, we propose an efficient ID based auditing protocol for cloud data integrity based on ID Based Cryptography. It supports batch auditing in the multi-user setting. Finally, extensive security and simulation results show that our ID-based auditing protocols are secure and efficient especially it reduces the computation cost of the auditor in the multi-user setting. It improves security by creating of replica of each file block and store it on different nodes. If the attacker attacks on the cloud, then he/she will not get any information of file as every block of files are spread on the nodes except adjacent nodes. Thus purpose of this work is to develop an auditing scheme which possesses the capabilities such as privacy preserving, public auditing, maintaining the data integrity along with confidentiality. And also it must support batch auditing and data dynamics operations. Thus the new auditing scheme is been developed by considering all these requirements. Keywords - Cloud Security, ID-based Auditing; Security Proof, The CDH Problem, Data Integrity Checking be considered and are important requirements from user’s point of view. To achieve all of these requirements, new techniques or methods should be developed and implemented. Although cloud storage provides great advantages and conveniences for the users, it faces many new security challenges since the user no longer possesses their data locally. The users might worry whether their data are lost or corrupted due to hardware errors and software bugs. I. INTRODUCTION Cloud computing can be considered as a new computing standard that can provide services on demand at a minimal cost. The well-known and commonly used services models in the cloud paradigm are Software as a Services, Platform as a Servicesand Infrastructure as a Services and Storage as a Services. Here the mainly focus on Storage as a Services. Storage as a Service is one of the important services of cloud computing in which data is remotely maintained, managed and backed up. The service is available to users over a network, which is usually the internet. It allows the user to store files online so that the user can access them from any location via the internet. The provider cloud makes them available to the user online by keepingthe uploaded files on an external server. This gives cloud storage service provider ease and convenience, but can potentially be costly. Cloud storage has its benefits, but it is also important to remain secure while taking advantage of cloud technology.In short, issues in cloud data security include data privacy, data protection, data availability, data location and secure transmission. The security challenges in the cloud include threats, data loss, services disruption and outside malicious attacks. Data integrity in the cloud system means preserving information integrity. The data should not be lost or modified by unauthorized users. Cloud computing providers are trusted to maintain data integrity and accuracy. Therefore security, integrity, privacy and confidentiality of the stored data on the cloud should II. MOTIVATION In PKI the auditor must validate the certificates of data user before auditing data integrity. Thus, it results in a large amount of computation cost. Especially, it brings heavy burden to the audit. Existing system need to obtain public key certificate from certificate authority (CA) and verify the validity of public key certificate, it increase computation cost and communication overhead. Proposed IBC allows data user to obtain public keys without the corresponding private keys. That is, contrary to traditional public key derivation schemes, IBC does not require to compute the private key before producing the public key. Indeed, data users can directly use ID based public keys to encrypt data before storage at no extra cost of communication. Here in IBC permits to data user to use the same ID based public key under the different PKG, That is, a ID based public key corresponds to multiple private keys. Thus, it alleviates data user’s storage burden to public keys. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 13 A Secure Public Auditing of Cloud Data with Fragmentation and Replication consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality. III. OBJECTIVE 1. 2. Develop a system an ID-based public auditing protocol by ID-based cryptography. Develop the system support batch auditing in the multi-user setting. 3. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure. The migration of users assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are faces the security concerns. In [1] Ali et al. has given survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues. IV. REVIEW OF LITERATURE 1. Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud [4], Juels et al. solve this open problem and propose the first POR scheme with public verifiability and constant communication cost: in proposed scheme, the message exchanged between the prover and verifier is composed of constant number of group elements; different from existing private POR constructions, scheme allows public verification and releases the data owners from the burden of staying online. We achieved these by tailoring and uniquely combining techniques such as constant size polynomial commitment and homomorphic linear authenticators. Thorough analysis shows that proposed scheme is efficient and Practical. And prove the security of our scheme based on the Computational Diffie-Hellman Problem, the Strong Diffie-Hellman assumption and the Bilinear Strong Diffie-Hellman assumption. 4. Introduce a model for provable data possession(PDP) that allows a client that has stored data at an Untrusted server to verify that the server possesses the original data without retrieving it.In [3] the model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDPmodel for remote data checking supports large data sets in widely-distributed storage systems. Remote data integrity checking is of crucial importance in cloud storage. It can make the clients Wang[5] verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifiers cost. From the two points, propose a novel remote data integrity checking model: IDDPDP (identity-based distributed provable data possession) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational DiffieHellman) problem. 2. Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy ondemand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability and security, which traditionally has been expected by both Enterprises and individuals with high service-level requirements. In order to facilitate rapid deployment of cloud data storage service and regain security assurances with outsourced data dependability, efficient methods that enable on-demand data correctness verification on behalf of cloud data owners have to be designed. In [2] Wang et al. propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established. With public audit ability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed. 5. The Cloud storage service has made the users to access their data anywhere anytime without any trouble. Available systems that provide support for the remote data integrity are useful for quality of service testing but do not deal with server failure or handling misbehaving servers. In [6],Ahire et.al. The proposed system guarantees the integrity of the storage on the server where the data of the users of the cloud are stored. It achieves robust cloud storage security and rapid location of data errors with the Such an auditing service not only helps save data owners computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. We describe approaches and system requirements that should be brought into Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 14 A Secure Public Auditing of Cloud Data with Fragmentation and Replication results provided by the audit mechanism performed by the external auditor. Furthermore, it supports dynamic operations that are secure and efficient in outsourced data. The external auditor performs the public audit to maintain the integrity of data stored in the cloud. The deletion correction code is used in the distribution of files and the ability to depend on Byzantine failure. Data integrity is assured with the help of the verification key along with data encrypted by deletion that also allows management of the accuracy of storage and the identification of the server in the cloud that behaves badly. The system involves four entities: data users, the cloud server, the third party auditor and private key generator(PKG).Their roles are identified as follows:– 1. Data user: it is an entity which has a large amount of data files to be outsourced to the cloud storage for data maintenance and computation. In general, it is a resource-constrained entity. Here file will encrypt by encryption Aes algorithm and store in fragments in way owner of file will enter no. of fragments and according to that file will split. Also along with no. of fragment its replica will create and it will store on nodes. T-coloring: Fragment and its replica will store in order of t-coloring in way that fragment of one file will not stored in adjusant node .Also for replica. So hacker will not get any idea about the all fragment of one files storage location. Another User will get his file after entering files secrete key which is sent by user on mail by Owner of the file. At time of downloading merging is performed by system 6. Ali et al.[7] propose the division and replication of data in the cloud for optimal performance and security (DROPS) that collectively solve security and performance issues. In the DROPS methodology, we divide a file into fragments and replicate the fragmented data into the nodes of the cloud. Each of the nodes only stores a fragment of a particular data file that ensures that even in the case of a successful attack, no significant information is revealed to the attacker. Furthermore, the nodes that store the fragments are separated with a certain distance using the T color table to prohibit an attacker from guessing fragment positions. Furthermore, the DROPS methodology is not based on traditional cryptographic techniques for data security; what alleviates the system of computationally expensive methodologies. We show that the probability of locating and endangering all the nodes that store the fragments of a single file is extremely low. We also compared the performance of the DROPS methodology with ten other schemes. The highest level of security with a slight performance overload was observed. 2. Cloud Server : it is an entity which has unlimited storage space and computation capability. And it is responsible for storing and maintaining the outsourced data and can provide the data access to the data user. 3. The auditor: it is a trusted third-party which has expertise and capabilities to provide data auditing service on behalf of data users with cloud servers. When auditor got knows the fragment is loosed at that time he will place fragment by its replica. 4. Private Key generator: it is responsible to set up the whole system parameter and issue private key for each data users. Cloud storage paradigm is to let the data users upload the large data files to the cloud servers in order to relieve of the burden of storage and computation of data users. However, it results in a potential problem: data user no longer possesses their data locally. Thus, it is of very importance for the data user to ensure that their data are being correctly stored and maintained. That is a reason why data users should be equipped with certain security measures so that they can periodically verify the integrity of the out sourced data even without the existence of local copies. Key will generate at the time of encryption. 7. Proposed ID-RDPC model suitable for companyoriented cloud storage. And it is not ID-based auditing since data tag generation algorithm is not ID-based signature, but a PKI-based signature. It also increases computation cost[8]. V. SYSTEM OVERVIEW Figure 01: System architecture Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 15 A Secure Public Auditing of Cloud Data with Fragmentation and Replication VI. EXPERIMENTAL RESULT Figure 02:X-Axis File length Y-axis Time to upload file Explanation: Graph shows time to upload file after fragmentation and encryption and perform T-Coloring for fragment placement. Figure 03:X-Axis File length Y-axis Time to download Explanation: Graph shows time to download file by getting all fragment from each node for particular file and decrypt and then download the file. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 16 A Secure Public Auditing of Cloud Data with Fragmentation and Replication Figure 04: Time to check public auditing Explanation: Graph shows time to audit the user file on number of node. Number 1 2 3 4 5 File length 87891 40 148766 24 5847 Time(ms) 208 60 219 34 29 Table 1: Shows file length and time to upload (ms) CONCLUSION [6] In this paper, propose an ID-based public auditing protocol by combining the ID-based cryptography. This system increase the data confidentiality..Finally, This auditing protocol is also extended to support batch auditing in the multi-user setting. Proposed Outsourcing data to a third-party administrative control, as is done in cloud computing, gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Here we are storing user uploaded files replica, so when stored file is hacked by user then replica file can get user from another location. [7] [8] [9] [10] [11] REFERENCES [1] [2] [3] [4] [5] [12] M.Ali, S.U.Khan, A.V.Vasilakos, Security in cloud computing: Opportunities and challenges,Inf.Sci.305(1)(2015)357383. C.Wang,K.Ren,W.Lou,J.Li,Toward publicly auditable secure cloud data storage services,IEEENetw.24(4)(2010)1924. H.Wang,Identity based distributed provable data possession in multi clouds storage, IEEET. Serv. Compsut.8(2)( 2015)328340. A.Juels,B.S.KaliskiJr.,Pors: Proofs of retrievability for largefiles,in:Proceedings of the 14thACMConference on Computer and Communications Security(CCS07),2007,pp.584597. H.Wang,Identity based distributed provable data possession in multi clouds torage, IEEET.Serv.Compsut.8(2)(2015)328340. [13] [14] Study and Implementation of Secure Storage Service in Cloud Computing Mrs. PramilaKailas Ahire, Prof. R.V. Patil, IJRACET, 2015. Mazhar Ali, Student Member, IEEE, Kashif Bilal, Student Member, IEEE, Samee U. Khan, Senior Member, IEEE, BharadwajVeeravalli, Senior Member, IEEE, Keqin Li, Senior Member, IEEE, and Albert Y. Zomaya, Fellow, IEEE ”DROPS: Division and Replicationof Data in Cloud for Optimal Performance and Security”, IEEE Trans. on CloudComputing., 2015. Jianhong Zhang Pengyan Li Jian Mao, IPad: ID-based public auditing for the outsourceddata in the standard model Springer Science+Business Media New York 2015-16 S.G.Ateniese,R.Burns,R.Curtmola,J.Herring,L.Kissner,Z.Peterson,D. Song,Provable datapossession at untrusted stores,in:Proceedingsofthe14thACM Conference on Computer andCommunications Security(CCS07),2007,pp.598609. G.Ateniese, S.Kamara,J.Katz, Proofs of storage from homomorphic identification protocols,in:Proceedings of the International Conference on Theory and Application of Cryptologyand Information Security: Advances in Cryptology,2009,pp.319333. J.Zhang,W.Tang,J.Mao,Efficient public verification proof of retrievability scheme in cloud,Clust.Comput.17(4)(2014)14011411. G.Calandriello, P.Papadimitratos, A.Lioy,J. P.Hubaux,Efficient and robust pseudonymousauthenticationinVANET,in:ProceedingsoftheVANET, 2007,2007,pp.1928. E.C.Chang,J.Xu,Remote integrity check with dishoneststorageserver,in:Proceeding s of the 13th European Symposium Researchin Computer Security( ESORICS08),2008,pp.223237. JianhongZhanga, Qiaocui Dong, Efficient ID-based public auditing for the outsourceddata in cloud storage, 0020-0255/ 2016 Elsevier Inc. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 17 A SURVEY ON TEXT MINING AND MACHINE LEARNING TECHNIQUES FOR PRODUCT REVIEW CLASSIFICATION 1 ABHIJIT VAKTE, 2NISHAD TARDALKAR, 3DAMINI THORAT, 4RATANRAJ SANKESHWARI, 5 MADHURI KARNIK 1,2,3,4 UG Student, Vishwakarma Institute of Information Technology. Pune, Assistant Professor, Vishwakarma Institute of Information Technology. Pune E-mail: 1 abhijit.vakte@viit.ac.in, 2nishad.tardalar@viit.ac.in, 3damini.thorat@viit.ac.in, 4ratanraj.sankeshwari@viit.ac.in, 5 madhur.chavan@viit.ac.in 5 Abstract - Expansion in Communication resulted large amount of real time text data being generated these days. In order to exploit and to extract useful information, it has become imperative to organize this data. Text mining / Text classification can be considered as an effective and efficient solution to this problem. Text mining can be described as a knowledge intensive process used to extract useful information from text data by exploring new patterns. It uses algorithms to transform text into data that can be analyzed by applying Machine Learning and NLP techniques. As text mining is rapidly evolving and growing technology, it facilitates businesses and companies to get deeper insights into their customer base and assist them in re-evaluating the customer demands. As the prominence of E-commerce is increasing rapidly, the number of customer reviews and feedbacks received is growing rapidly over the period of time. The number of reviews can be in thousands, making it difficult for the manufacturers to consider them all for product improvement and consumer support. This article focuses on this issue and attempts to extract some useful information from the customer reviews and ratings that can be used is enhancing the product quality and improving the consumer support which intern improves the overall customer experience. Keywords - E-Commerce, Machine Learning, Product Quality, Text Mining potential value in dealing with large and complex unstructured datasets. Unstructured data contains the irrelevant and noisy information which has to be eliminated. In order to trodden that irrelevant information, feature selection approach has been embraced in this paper. Feature selection is a long existing, novel method which aims on increasing the quality of the data set by considering the factors of relevance, novelty and interestingness. There exist two questions in feature selection approach first question is ‘what are the features for machine learning which can represent the text in the effective way? ’And the second is: ‘what is the best way to prune a large set of features down to a manageable set of most discriminating features?’ For the first question we can say, it depends upon the processing power, language and corpora working with and most importantly the specific problem you are tackling .For the second question: We can try various approaches in order to prune the feature sets including: classifiers which classify and build the relevant information. I. INTRODUCTION With each passing day, social media and its applications are creating large amount of information, most of which is text form. Due to the rapid expansion of Internet and E-commerce, such huge amount of information is generated is these applications as well. Due to this change in trend, the focus of product based organizations is shifting from salesmanship to consumerism and has led many organizations to obtain consumer information/ data. Nowadays, customers collect information about the product of their choice from the internet before going forward with the purchase. This prevents wastage of time and money and helps customers get the products at reasonable price, fulfilling their needs. Improved Customer satisfaction and shopping experience are really very important. Hence it has become a convention for the E-commerce merchant to facilitate their customer to review the products and express their notions about the products. With increase in the popularity and customer base of E-commerce, the number of reviews received is also increasing rapidly. Thousands of reviews are received, some long and some short in length making it difficult for the manufacturers to keep a track of all the reviews. The aim here is to mine and extract useful information from the product reviews and facilitate businesses to identify repeatedly reported issues. Availability of this knowledge will help manufacturers in enhancing the product and support quality. Text mining is the mushrooming process of discovering, extracting information from large unstructured textual resources. Text mining has high Figure 1: Text Mining Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 18 A Survey on Text Mining and Machine Learning Techniques for Product Review Classification The problem of classification has been widely studied in the database, data mining, and information retrieval communities. Some key methods, which are commonly used for text classification are Decision Trees, Pattern Based Classifiers, SVM Classifier, Neural Network classifier, Bayesian classifier etc [7].One of these techniques can be used for text classification. The entire process of knowledge extraction can be accomplished by following the below mentioned steps: 1) Crawling product reviews from community sites / preferred Manufacturers’ customer forum. 2) Apply text Pre-processing steps to mine the raw text obtained. 3) Build a text data classifier and then apply it on comment data to predict the defined target class. 4) Identify Sub-classes under each main class through Associate Rule mining by deriving key patterns 5) Represent the obtained results in statistical format. The above mentioned steps can be explained in an elaborate manner as follows: based summaries from customer reviews crawled for Product-X. Here issues refer to sub-level issues such as Product related and Support related problems reported from customer point of view. A training set of reviews was prepared manually that contains all three categories of reviews (Product, Support & Other) for training the text classifier. In order to get good classification results on textual data, Support Vector Machine technique was used to classify the remaining review comments for further processing The limitations of this approach is that the classification model expects minimum 10–15 words after removing non-usable characters during preprocessing. Hence, smaller size review comments are not taken into consideration. It is difficult to identify all the issues reported in different scenarios other than the defined key phrase list, The key phrase list should be updated and refined well to capture all different problems. The features of SVM are that it is a linear classifier, handles high dimensional data well, can handle nonlinear decision boundaries, works with large size unlabeled and small size labeled data. While its limitations are that it has High time and space complexity during training and testing. In [3] V.Srividya and R.Anitha have mentioned various steps of Data Preprocessing. These steps are: 1) Tokenization: Tokenization is the process of breaking a stream of text into words, phrases, symbols, or other meaningful elements called tokens .The aim of the tokenization is the exploration of the words in a sentence. 2) Stop word removal: Many words in text documents occur very frequently but are essentially meaningless as they are used to join words together in a sentence and nothing else. These words are known as Stop Words and it is commonly understood that stop words do not contribute to the context or content of textual documents. Due to their high frequency of occurrence, their presence in text mining presents problem in understanding the content of the text. Stop words are very frequently used common words like ‘and’, ‘are’, ‘this’ etc. They are not useful in classification of documents. So they must be removed. A. Data Extraction This is the data extraction step. In order to obtain the customer reviews data, we need to crawl the customer forum websites. There are various APIs and Web Browser Extensions available today that can be used for this task. Some of them are: 1) KIMINO. 2) Site Spider, Mark II. 3) Web Scraper. 4) Data Scraper. B. Data pre-processing This is data preprocessing step. [20]Text preprocessing is the most important phase for any text mining task. It plays a crucial role in deriving the right patterns from the data. The typical text preprocessing involves following intermediate steps: 1) Tokenization 2) Stop word removal 3) Stemming In [4] Dr.Vijayarani, Ms.Ilamathi and Ms.Nithya have discussed various methods of stop word removal. a) The classic method: The classic method is based on removing stop words obtained from precompiled lists b) Method Based on Zipf’s Law: Addition to classic stop list, three stop word creation methods moved by Zipf‟s law are used, including: removing most frequent words and removing words that occur once We also consider removing words with low inverse document frequency (IDF) c) Mutual Information method: The mutual information method is a supervised method that C. Data Classification This is text classification step. In any classification task, it is important to have labels for the data in order to train the classifier. The goal of text classification is to identify the right label for each input in the test dataset. There are various algorithms that can be used for text classification II. RELATED WORK The system using SVM is proposed by Chandrasekhar Rangu, Shuvojit Chatterjee and Srinivasa Rao Valluru in [1]. In this research they have proposed processes of identifying the issue- Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 19 A Survey on Text Mining and Machine Learning Techniques for Product Review Classification works by computing the mutual information between a given term and a document class (e.g., positive, negative), providing a suggestion of how much information the term can tell about a given class 3) Stemming: This method is used to identify the root/stem of a word. For example, the words connect, connected, connecting, connections all can be stemmed to the word “drive”. The purpose of this method is to remove various suffixes, to reduce the number of words, to have accurately matching stems, to save time and memory space. In stemming, translation of morphological forms of a word to its stem is done assuming each one is semantically related. There are two points are considered while using a stem. Words that do not have the same meaning should be kept separate. Morphological forms of a word are assumed to have the same base meaning and hence it should be mapped to the same stem there are various stemming algorithms available that can be used for this task. Figure 2: Stemming In [5] Nayak, Kanine, Chandavekar have mentioned classification of stemming algorithms into categories such as: a) Truncating methods: As suggested by the name itself, truncating methods are related to prefix or suffix removal. This method includes algorithms such as: i) Lovins Stemmer: The Lovins stemmer removes the longest suffix from a word. It is a single pass algorithm by nature; hence, it removes maximum of one suffix from a word. ii) Porters Stemmer: It is based on the idea that the suffixes in the English language (approximately 1200) are mostly made up of a combination of smaller and simpler suffixes. It has five steps, and within each step, rules are applied until one of them passes the conditions iii) Paice Stemmer: It is an iterative algorithm with one table containing about 120 rules indexed by the last letter of a suffix. On each iteration, it tries to find an applicable rule by the last character of the word. iv) Dawson Stemmer: It is an extension of the Lovins approach. It is very complex, lacks a standard reusable implementation but it covers more suffixes than Lovins. b) Statistical methods: These are based on statistical analysis and techniques. Most of these methods remove the affixes after performing some statistical procedures. i) N-gram stemmer: In this algorithm stringsimilarity approach is used to convert word inflation to its stem. It is language independent. ii) HMM Stemmer: This stemmer is based on the concept of the Hidden Markov Model (HMMs). This method does not require prior linguistic knowledge as it is based on unsupervised learning. iii) YASS Stemmer: This algorithm uses clustering of lexicons .This clustering is done based on hierarchical approach and distance measure. c) Mixed methods: These are based on both the Truncating and statistical methods of stemming i) Krovetz Stemmer: It is based on the inflectional property of words and the language syntax; it effectively and accurately removes inflectional suffixes and is very complicated in nature. ii) Xerox Stemmer: This is a language based stemmer which works well for English language. It uses the suffix and prefix database created for English language.In [7] Vijayan, Bindu have discussed various Text Classification Algorithms that include the below mentioned algorithms: i. Decision Trees: Decision trees are designed with the use of a hierarchical division of the underlying data space with the use of different text features. The hierarchical division of the data space is designed in order to create class partitions which are more skewed in terms of their class distribution. For a given text instance, we determine the partition that it is most likely to belong to, and use it for the purposes of classification. ii. Pattern (Rule)-based Classifiers: In rule-based classifiers we determine the word patterns which are most likely to be related to the different classes. We construct a set of rules, in which the left hand side corresponds to a word pattern, and the right-hand side corresponds to a class label. These rules are used for the purposes of classification iii. SVM Classifiers: SVM Classifiers attempt to partition the data space with the use of linear or non-linear delineations between the different classes. The key in such classifiers is to determine the optimal boundaries between the different classes and use them for the purposes of classification. iv. Neural Network Classifiers: Neural networks are used in a wide variety of domains for the purposes of classification. In the context of text data, the main difference for neural network classifiers is to adapt these classifiers with the use of word features. We note that neural network classifiers are related to SVM Classifiers; indeed, they both are in the category of discriminative classifiers, which are in contrast with the generative classifiers. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 20 A Survey on Text Mining and Machine Learning Techniques for Product Review Classification v. vi. vii. Bayesian (Generative) Classifiers: In Bayesian classifiers (also called generative classifiers); we attempt to build a probabilistic classifier based on modeling the underlying word features in different classes. The idea is then to classify text based on the posterior probability of the documents belonging to the different classes on the basis of the word presence in the documents. Rocchio Algorithm: Rocchio method finds the centroid of each class from the training set of documents and classifies a text document to the nearest possible centroid class. KNN: K Nearest Neighbor is an instance-based, non-parametric text classifier which uses similarity measurement (dot product, cosine similarity) as a criterion for classifying the documents. classification system demands appropriate choice of classifier along with proper data pre-processing which would definitely improve the outcome of classification. For future work, more advanced text mining techniques, and algorithms can be used to improve the classification mechanism and the system can be made more robust. The system can be improved to process Dynamic data i.e. the real time reviews information and mine them on the go to derive the meaningful insights and inferences. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Table 1: Comparison between Classification algorithms [16] CONCLUSION AND FUTURE WORK [17] Recently, text classification has gained a lot of importance, comprising of steps like text extraction, text pre-processing and classification. It can be clearly inferred that pre-processing plays a vital role in text classification. Various pre-processing techniques and classification algorithms are stated in the survey, all the algorithms have their own features and limitations. An efficiently performing [18] [19] [20] DOI 10.1109/TKDE.2015.2405553, IEEE Transactions of knowledge and data engineering. Agrawal, R. & Srikant, R. 1994. Fast algorithm for mining association rules. VLDB’94, 1994. Evaluating Preprocessing Processing Techniques in Text Categorization V.SriVidhya,R.Anitha Dr.S.Vijayarani, International Journal of Computer Science & Communication Networks, Vol 5(1), 7-16 International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page No.!6874-16879 Ms.Anjali Ganesh Jivani, A Comparitive Study of Stemming Algorithms,Anjali Ganesh Jivani et al,Int,J.Comp.Tech.Appl., Vol2(6),1930-1938,ISSN:2229-6093 A Comprehensive Study of text Classification Algorithms Vikas k Vijayan, Bindu K.R, Latha Parameswaran. Data Preprocessing Evaluation for Text Mining Dasa Munkova, Michal Munk, Martin Vozar. Effective Text Classification using Multi-level fuzzy neural network Shima Zobeidi, Marjan Naderan, Seyad Alavi. A survey of data mining techniques for quality improvement in process industries V.Sharmila, M.Shanmugasundaram. Survey on preprocessing techniques for text mining Arjun nayak, naveen chandvekar. Incremental Short Text Summarization On Comments In Real Time From Social Network Services Dhivyabharathi.s1, Suriya.k2,Shalini.R3 and Vinitha.R4 Text Summarization on Comment Streams from Social Network Services ChengYing Liu, Chi-Yao Tseng, Ming-Syan Chen, Fellow, IEEE IncreSTS: Towards Real-Time Incremental Short Social Network Services Cheng-Ying Liu, Chi-Yao Tseng, MingSyan Chen, Fellow, IEEE The text mining handbook Ronan Feldman. Tightly-coupled Convolutional Neural Network with Spatialtemporal Memory for Text Classification Shiyao Wang† and Zhidong Deng. Text Summarization using Clustering Technique Anjali R. Deshpande #1, Lobo L. M. R. Stop Words in Review Summarization Using TextRank Sonya Rapinta Manalu, Willy. Online Product Review Summarization Priya Pawar Siddhesha Tandel Shweta Bore Nikita Patil Sentiment Analysis and Text Summarization of Online Reviews: A Survey Pankaj Gupta, Ritu Tiwari and Nirmal Robert. Preprocessing Techniques for Text Mining Vairaprakash Gurusamy Subbu Kannan. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 21 SENTIMENTAL ANALYSIS ON NEWS DATA FOR STOCK MARKET PREDICTION 1 JUHI GUPTA, 2ANSHUL JAIN, 3YASH BOHRA 1,2,3 K.J Somaiya Institute of Engineering and Information Technology E-mail: 1juhi.gupta@somaiya.edu, 2anshul.jain@somaiya.edu, 3y.bohra@somaiya.edu Abstract - Everyone wants to get rich real quick. Best way to headstart is to invest into the stock markets. Intensive analysis involves going through all the news articles see there historic data to learn how the company has evolved over time and other information we could get over the internet. Now imagine automating the whole process using machine learning. We will be using news article headline and past historic stock price as dataset to train and test the model .In this paper we will take news from New york time using NYtimes api, historic price using yahoo finance and use vader algorithm to extract the sentiment analysis and by using Linear regression machine learning algorithm we can predict future stock price. Keywords - Machine learning, Sentiment analysis, Prediction, Stock market Data Collection: We consider two aspect to predict the stock market movement. first one is Social data from news and the other prime source of information is the historic price of the stock.News are collected from the New York times and historic data is collected from the yahoo finance for that particular stock. Data Preprocessing: Data preprocessing involves cleaning the data collected.We create pickled data which includes the news headlines,stock price volume and date. Data Preprocessing seems the most difficult task. I. INTRODUCTION The proposed idea is to take non quantifiable data like financial news articles of a particular company and predicting its future stock movement with news sentiment classification. Assuming that news articles have impact on stock market based on the research conducted by a small community stating that Various external online data sources that include: Google Trends, Wikipedia, Google Search, Financial news, Technical indicators, Macroeconomic indicators and the models using the features from these external sources along with the traditional stock market data improve the performance for the stock market prediction. They got more than 85% accuracy for the movement prediction and less than 1% MAPE for the price prediction, it was an attempt to study relationship between news and stock trend[1]. Thus we used classification models which depict polarity of news articles being positive or negative.[1-2] People use social networking sites, like facebook twitter etc. to express their views and opinions about a particular topic such as news, movie, event and remarks related to product[2]. This information available from social network is beneficial for business analyst for mining the user opinion about their products and considers these opinions as feedback to improve their policies, planning and process for product development.[1-4] Sentiment analysis is used to extract such opinion and remarks of users by classifying them as positive, negative and neutral sentiment. In simple terms sentiment analysis is a technique used to extract intelligent information based on the person’s opinion from raw data available on the internet. 2. SENTIMENTAL ANALYSIS Sentimental analysis is the heart of this project. We are going to use python ML libraries to extract the features from the news headlines collected. We are going to use vader algorithm for extracting the feature.Vader algorithm is the best choice for this project since it is humanly automated so also contains some abbreviations and slang words which are recurring in the online news headlines. We will Extract the feature and classify the emotions into 4 ie. Positive, negative, neutral and compound. We will store the value for each headlines with the extracted features for that particular day. 3. MODEL TRAINING Model training includes dividing the data into training set and testing set. Usual policy is to use 60% of the data for the training the machine and 40% of the data as the testing set. Although the choice of the algorithm affects the way training and testing set should be handled. We are going to use Multi Layer Perceptron algorithm to implement our system. Multi-Layer Perceptron (MLP) is a supervised learning algorithm that learns a function F(.): R^M → R^O where M is number of dimensions for input and O is number of dimensions of output. II. THEORY 1. DATA PREPROCESSING COLLECTION AND Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 22 Sentimental Analysis on News Data for Stock Market Prediction It can learn a non -linear approximat or for either classification or regression. We will be using MLP classifier in this model. MLP classifier uses back propagation. We have used six MLP parameters:1. hidden_layer_size 2. activation 3. Solver 4. alpha 5. learning_rate_init 6. batch_size 4. CORRELATION ANALYSIS OF PRICE AND SENTIMENTS After training and testing model we get coefficients which will basically tell us how is the stock market price is related to the news headlines and the historic price of the particular stock. Positive coefficients determine that two factors are directly related and negative coefficients tells us that data is inversely proportional.This correlation model is going to help us to predict the stock price of the new data set. Fig 2: Process of the proposed system V. RESULT AND DISCUSSION 5. PLOTTING FROM NEW DATA Whenever new data set consisting of news and historic price of the stock is given to the model. Model would be able to predict the expected stock price for the day. Fig 3: Prediction graph IV. DESIGN FLOWCHART Machine Learning Algorithm MLP Vader Algorithm Accuracy Precision 65.96% 0.659 Table 1: Result of our Proposed Model The above table describe that when we use Vader algorithm (sentiment algorithm) and Multi Layer Perceptron (Machine learning algorithm), we have got above Accuracy and Precision. CONCLUSION Sometimes its very difficult for a naive user to start with the stock market analysis. Our project gives a platform and automates the task of the user of going through the news,current trends and historic price of the stock. After so much research in this area finally analyst are coming to the conclusion that method of analysing social data with historic price will give us good results like 80% accuracy. Our project considers both the important aspect ie. news and historic price to predict the stock market movement Fig 1: Flowchart of the process for creating prediction model Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 23 Sentimental Analysis on News Data for Stock Market Prediction [3] REFERENCES [1] [2] [4] Jinjian (James) Zhai Nicholas (Nick) Cohen and Anand Atreya “Sentiment analysis of news articles for financial signal prediction”, nlp.stanford.edu International conference on Signal Processing, Communication, Power and Embedded System “Sentiment Analysis of Twitter Data for Predicting Stock Market Movements”, (SCOPES)-2016 [5] [6] [7] Graham Bowley, “Wall Street Computers Read the News, and Trade on It”, New York Times, Dec 21, 2010. Anshul Mittal “Stock Prediction Using Twitter Sentiment Analysis”, Stanford University Twitter mood predicts the stock market, arXiv:1010.3003v1 [cs.CE] 14 Oct 2010 Jasmina Smailovic Miha GrcarNada Lavrac Martin Znidarsic “Predictive Sentiment Analysis of Tweets: A Stock Market Application”, Alec Go, Lei Huang and Richa Bhayani, ”Twitter Sentiment Analysis”, CS224N Final Report, 2009. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 24 MAKS: SERVER HEALTH MONITORING USING KAFKA 1 AMIT KUMAR SRIVASTAVA, 2CRS KUMAR 1,2 Defence Institute of Advanced Technology, Pune, Maharasthra E-mail: 1amit_mcse16@diat.ac.in, 2suthikshnkumar@diat.ac.in Abstract - Big Data Analytics has immense potential to change the way Server Health Monitoring is being done. Use of Big data analytics can help Network Administrators to become more proactive and well informed. This paper proposes a design for Big Data Platform based Server Health Monitoring system MAKS (Monitoring and Alerting system using Kafka and Spark). Big Data can not only provide high server availability and hence low down time, it can also help in achieving more secured cyber space. Hadoop is deployed for numerous real world problem, but since Hadoop has its own technical limitations in handling real-time streaming data, a much faster application is required to deal with requirements of fast event driven based approach of companies. Hadoop fulfills the requirement to store data in HDFS and to execute analysis, whereas Kafka is the one that delivers high speed in terms of transportation and data distribution to several locations. Spark streaming integrated with Kafka provides a very efficient solution to this problem. The motive of this paper is to propose a design model, using Spark and Kafka for Serve health Monitoring. Keywords - Server Health Monitoring, Alerting, Kafka, Big Data, Spark. Besides they have very low degree of customization are per organizational requirement. And the solutions which exist in commercial world come with a high price and user is not aware of the code in background to check for any vulnerabilities. MAKS is an attempt to make a monitoring system from the scratch with Spark and Kafka as the platform. Developing this system also provides a chance to understand and work on Big Data Ecosystem, this knowledge can be used later for developing solutions to other problems in the large corporate network deployments. I. INTRODUCTION In the today’s world data is ever growing from various sources like social media platform, IoT, sensing devices etc. There is a massive input of structured and unstructured data termed as Big Data. Big data platform has huge potential in effectively churning out most relevant information for different type of consumers of the data in different business deployment. Any business depends heavily on the stability of their IT network and infrastructure and it is a fact the cost of downtime is becoming an increasingly growing concern. Not only does downtime can cause a major loss of business productivity but it also affects the quality of service that is provided to the customer which further can cause severe damage to your business reputation. Server Monitoring MAKS can help to alleviate such issues. The basic motive of server monitoring is to make sure that all the servers in your infrastructure are functioning as they should be in the deployment. In other words server monitoring is the process of reviewing and analyzing a server for availability, operations, performance, security and other operations related processes. Numerous server monitoring tools are used to check for issues caused by burdened or crashed servers, network connections and other devices. They safeguard the health and security of companies IT environment, allowing the software and hardware to function with a reduced risk of problems. These tools not only deliver customers with an improved user experience but they can also save enormous sums of money for production networks of all sizes. By getting constant updates on the status of the network infrastructure, System Administrator can stay ahead of network problems and avoid downtime. Monitoring applications available at present in open source don’t have a high scalability and reliability. II. CHALLENGES PROCESSING IN REAL TIME A typical server deployment in any industry will have deal with millions of alerts being generated per second that needs to log for effective monitoring. This type of problem belongs to the category of real time streaming. The generation and continuous utilization of real time streaming information makes new challenges for information frameworks. For continuous information deployment of MapReducestyle Big Data are no sufficiently adequate. Hadoop gives numerous extraordinary instruments (for instance, the circulated HDFS record framework, or Hive, to question HDFS with SQL queries), but handling applications like streaming and processing the same is not efficient in Hadoop deployment. Taking care of huge volumes of real-time ongoing information streams produced by frameworks like IoT or large network deployments has created essential difficulties for big companies. Prior innovations and devices were not prepared to handle the issues raised because of the scale and speed of these frameworks. But as per the recent trends in Internet applications, activity data is now an integral part of production data and is required for various analytics as per user need. This necessitated the steep Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 25 MAKS: Server Health Monitoring using Kafka ascend to real-time analytics rather than traditional big data analytics. Apache Kafka deployed in role of a streaming platform provides low-latency, high-throughput, fault-tolerant publish and subscribe design and is able to process streams of events. Kafka is able to provide reliable, sub-second responses to support both customer-side applications and connecting downstream systems with real-time data. Producer, Consumer, Topic and Broker are main parts of a Kafka deployment and they are explained in subsequent paragraphs. Topic is a stream of particular type of message. A producer is an entity that can publish messages to a topic. The messages that are published by the producers are then stored at a collection of servers called brokers. A consumer is the entity that will be using the data and it can subscribe to one or more topics from the brokers. They can consume the subscribed messages by fetching data from the brokers. Consumers need to first create one or more message streams for the topic, to subscribe to a topic. The messages are then published to that topic will be evenly distributed into these sub-streams. An iterator interface over each message stream maintains the continual stream of messages being produced. The consumer iterates over every message in the stream and then the processing of the payload of the message is done. The architecture of Kafka is such that it supports both the point-to point delivery model in which multiple consumers jointly consume a sole copy of all messages in a topic, as well as the publish/subscribe model in which multiple consumers each fetch its own individual copy of a topic. The overall architecture of Kafka is shown in Figure 2. Since Kafka is distributed in nature, a typical Kafka cluster consists of multiple brokers. III. INTRODUCTION TO TECHNOLOGY A. SPARK Apache Spark was developed to be a lightning-fast cluster computing technology, primarily meant for Big Data applications for combining batch, streaming, and interactive analytics on user data.The key feature of Spark is its in-memory cluster computing that dramatically increases the processing speed of any computation based application. Spark provides a great management benefit in terms of reducing the number of separate tools required to achieve the purpose.Some of the noteworthy features of Spark are faster processing, dynamicity, real-time stream processing, in-memory computation in Spark, re-usability. The machine in which spark application runs is referred to as a Driver node. Driver’s main role is to execute various parallel operations on worker nodes or cluster. Spark uses idea of a Resilient Distributed Dataset (RDD). Each RDD represents a read-only collection of objects partitioned across a set of machines that can be rebuilt if a partition is lost. B. SPARK STREAMING Spark Streaming was developed as an extension of the core Spark API. Spark’s single execution engine and integrated programming model for batch and streaming lead to some exceptional benefits over other traditional streaming systems. The main objective was to enable highly scalable, highthroughput, fault-tolerant stream processing for live data streams. Data can be consumed from many sources like Kafka, Flume or TCP sockets, and can be processed using multifaceted algorithms expressed with high-level functions like map, reduce and join. Data can then be finally processed and pushed out to filesystems, databases, and live dashboards. Besides machine learning and graph processing algorithms on data streams can also be applied in Spark. Figure 2 D. ZOOKEEPER Zookeeper helps in distributed co-ordination service and this design of publisher, broker, and subscriber. It provides a centralized service for maintaining configuration, providing name and for distributed synchronization. This way it helps in maintaining a synchronization across the cluster. ZooKeeper data is kept in-memory, which means ZooKeeper can achieve high throughput and low latency numbers. ZooKeeper is replicated. Like the distributed processes it coordinates, ZooKeeper itself is intended to be replicated over a sets of hosts called an ensemble. Figure 1 C. APACHE KAFKA Apache Kafka is a quick, versatile, durable, faulttolerant pub-sub data streaming platform and thus is invested to address a large number of these business issues. It is a distributed streaming platform which is capable of handling trillions of events a day. Initially perceived as a messaging queue, Kafka is based on a concept of a distributed commit log. Kafka has quickly evolved from messaging queue to a developed streaming platform. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 26 MAKS: Server Health Monitoring using Kafka E. CASSANDRA Apache Cassandra is a Java based database, which makes it an easy to integrate with other JVM based applications like Apache Spark and Kafka. Another important characteristics of Cassandra is data replication which makes it highly available and faulttolerant. Replication means that each data is stored at more than one location. This is because, even if a node fails, the user should be able to recover the data with simplicity from another location. F. SPRING-BOOT Spring is a widespread Java-based framework for making web and enterprise applications. In contrast to many other frameworks, which concentrate on solely on one area, Spring framework offers extensive variety of features addressing the solutions to problems of present day business. Spring framework offers elasticity to configure beans in numerous ways such as XML, Annotations, and JavaConfig. The Spring team formed Spring Boot to address the complication of configuration earlier present in Spring. In the proposed application design of MAKS Spring Boot is used for developing the dashboard application. Spring Boot runs spring data support for Cassandra database there by making it easy to develop data access class and entity class. Figure 3 MAKS is developed into three modules: SHM Data Producer, SHM Data Processor and SHM Dashboard. These modules are standalone applications written in Java and can be built and run independently. SHM Data Processor: In MAKS the role of data processor is taken by a Spark Streaming application which consumes SHM data streams and processes them for analysis. SHM data processor provides the following metrics: Find all the servers which are deployed on the network and their ping response. This will also help the Network Administrator to find out if any server is out of network at a given time. This data is stored in a Cassandra database. Find various health parameters of the server like CPU Usage, Memory Consumption, I/O, Network, Disk Usage, Processes etc. for last 10 secs and store them in the Cassandra database. Generate an alarm message if any health parameters crosses a pre-defined value of the threshold, indicating a deterioration in server health. Send an email to the System administrator alerting him about the Server Health. SHM Data Producer: Servers deployed on the production network act as data producer for the Kafka. They generate SHM data which is sent to the message broker. In MAKS, server health messages are generated by a java program running in background of all the servers which are to be monitored. MAKS is an agent based model, where this java program is capturing the server health data like CPU utilization, Memory Usage, Free disk space on various Linux servers deployed on the network and forwarding them in form of SHM data to the broker. This data can be a churned out by a single Producer program or it may be coded in different programs as per the need and complexity of the system design. SHM Dashboard: A dashboard is important as it gets automated data feeds and provides a complete, easy to comprehend picture of the whole deployment. In MAKS dash board is designed on Spring Boot application. Cassandra is chosen as a database. Here springboot application fetches data from the Cassandra database and sends it to the web page. Server Health is displayed in form of graphical charts and tables. The architecture diagram for SHM Data monitoring Application is illustrated in Figure 3 below. Dashboard deployment can also be achieved by using other freeware tools like JFREECHARTS. Database maintained at Cassandra can be further utilized for finding out hidden information from the data using IV. MAKS APPLICATION DESIGN Server Health monitoring application MAKS is developed by integrating Spark Streaming and Kafka coordinated by Zookeeper. This application processes real time server statistics data are sent by various production serversin form of Server Health Monitoring (SHM) data and use that data to monitor their health and predict the overall health of the Network. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 27 MAKS: Server Health Monitoring using Kafka data analytics. Design of a good dashboard requires detailed input from user so that an efficient display can be provided. predictive data analysis using R language or similar platforms. REFERENCES CONCLUSION [1] MAKS can be used for maintaining high server availability via real time monitoring. The proposed design is capable of handling real time streaming server health data by using fast platforms like Kafka and Spark. Spark’s single execution engine and unified programming model for batch and streaming lead to some unique benefits over other traditional streaming systems. Kafka being a novel framework for preparing of substantial pieces of information is ideal for a fetch based utilization model where Kafka enables a purchaser to consume messages at its own speed. MAKScan achieve good results by providing effective and efficient monitoring. Further the data stored in Cassandra database can be stored for [2] [3] [4] [5] Mohsen Marjani, Fariza Nasaruddin, Abdullah Gani, “Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges,” IEEE Access (Volume: 5) Page(s): 5247 – 5261, 29 March 2017 Lukasz KUFEL,”Tools for Distributed Systems Monitoring,” Foundations of Computing Sciences and Decision Sciences Vol. 41(2016), DOI: 10.1515/fcds-2016-0014No. 4 Jun Liu; Feng Liu, Nirwan Ansari, “Monitoring and analyzing big traffic data of a large-scale cellular network with Hadoop,“IEEE Network Year: 2014, Volume: 28, Issue: 4 Pages: 32 – 39 M. Chen, S. Mao, and Y. Liu, “Big data: a survey,” Mobile Networks and Applications, vol. 19, no. 2, pp. 171–209, 2014. W. B. Ali, ``Big data-driven smart policing: big data-based patrol car dispatching,'' J. Geotech. Transp. Eng., vol. 1, no. 2, pp. 116, 2016. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 28 PERFORMANCE ENHANCEMENT AND ANALYSIS BY REDUCING WEIGHT OF UNSPRUNG MASS OF FORMULA STUDENT RACING CAR 1 ARUN NAIR, 2SHRUTI KAWADE, 3BRYAN DIAS, 4IVAN GEORGE, 5DHIRAJ K. BHANDARKAR 1,2 St. John College of Engineering and Management, Palghar (East), Maharashtra 5 Assist. Prof., Faculty of Mechanical Engineering, SJCEM E-mail: 1anair3096@gmail.com, 2shrutikawade1996@gmail.com, 3bryandias4@gmail.com, 4ivan.h.george@gmail.com Abstract - This paper is to redesign the unsprung mass of SAE SUPRA vehicle with a primary focus on reducing the weight of overall assembly. The design of the wheel assembly is critical due to the forces acting on the wheel assembly during accelerating, braking, cornering and tilting. Furthermore, the Wheel Assembly is an important part of an automobile and its failure is hazardous endangering human life. Therefore it is required to design the Wheel Assembly and its components considering all the factors leading to the failure by developing a safe design. It must also be noted, the components should be designed in such a way that they have a minimum weight at the same time care must be taken that they do not cross a certain limit of stress value. In this study, the design of the Wheel Assembly for R10 Rims has been presented. The weight of the Vehicle is considered to be 300 kg along with the driver. The forces acting on the components, the failure criteria is illustrated. The study deals with finding out the dimensions of the individual components and also detecting the probable regions of stress concentration. The main objective is to redesign and reduce the unsprung weight by 30% compared to 2017 model by the team. The design procedure follows all the rules laid down by FSAE Rule Book for Formula Type Cars. Keywords - Unsprung Mass, Reducing Weight, Wheel Assembly, SAE SUPRA, FSAE I. INTRODUCTION II. COMPONENTS OF UNSPRUNG MASS SAE SUPRA is a Student project that involves a complete design and fabrication of an open wheel formula-style race car. Being a race-car, the primary goal is to achieve the best performance to weight ratio. The reduction of weight in any area will allow for better vehicle performance overall. An automobile is said to function appropriately only when all its systems are working as they are required to work. Most of the vehicle’s weight is supported by a suspension system. It suspends the body and associated parts so that they are insulated from the road shocks and vibrations that would otherwise be transmitted to the passengers and the vehicle itself. However, other parts of the vehicle are not supported by the suspension system such as wheel axles, wheel bearing, hub, tires, brakes, steering and suspension parts are not supported by the springs. This mass is called unsprung mass. Light weight construction is important for the racing. Thus generally unsprung weight should be kept as low as possible. The unsprung mass must be lower than the sprung mass and also should be as least as possible to provide proper drive stability and load balancing of the vehicle. There are a lot of forces acting on the wheels in the static and especially in the dynamic condition. Thus utmost care must be taken while designing the Wheel Assembly. The objective of Optimization is always to find the best possible and suitable dimension. Here, R10 rims have been used along with 16 x 6 x 10 tires. The Weight of the vehicle is considered to be 300 kg along with the driver. All the forces have been found out on the above basis and according to the above mentioned Wheels. The design procedure follows all the rules laid down by SAE Rule Book for Formula Type Cars. 1. 2. 3. 4. 5. Wheels Hub Upright Brake disc Brake caliper III. DESIGN CONSIDERATION 1) Getting the prerequisite parameters from the suspension and steering geometry Considering the Front Wheel Assembly the Parameters are as follows King Pine Inclination: 6.1° Caster Angle: 0° Track Width: 1200 mm Wheel Diameter: 406.4 mm 2) Brake Calculation Mass of vehicle (m) = 300 kg At 40 kmph Velocity (v) = 11.11 m/s Distance (s) = 8 m ² Braking force = = 2314.35 N . Force on one wheel= = 578.59 N Braking torque on one wheel = 528.59 x 9.5 x 25.4 x 10-3 = 139.614 Nm Similarly, At 100 kmph v = 27.78 m/s s=8m Braking torque = 872.897 Nm Wilwood PS-1, Piston diameter (d2) = 1.12 inch = 28.448 mm Area (A2) = 0.99 inch2 = 638.7 mm2 Using Pulsar rear Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 29 Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car Diameter of bore (d1) = 14mm Area (A1) = 153.94 mm2 Force of 2000 N Pedal ratio = 4:1 Force on master (F1) = 2000 x 4 = 8000 N F2 = = . . Therefore selecting SKF 6008 as the bearing suitable for front wheel assembly Therefore C=13200 Therefore P actual=3583.03N As this is greater than the previously assumed load Therefore, it is safe for our design = 33192.153 N b) Rear Bearing Similarly, Considering 300 kg vehicle the load on rear will be 200 kg Assuming entire load acts on a single bearing Therefore, radial force is considered 1.5G Therefore Fr = 1.5*200*9.81 =2943 N C = 16263.15 N Approximately C = 16500 N Therefore selecting SKF 510001 as the bearing suitable for rear wheel assembly For 2nd piston, Total Clamping Force = 2 x 33192.1= 66384.306 N Frictional Force = 66384.306 x 0.4 = 26553.7224 N Case 1: Considering 180 mm disc Braking torque = 26553.7724 x 0.09 =2389.84 Nm Case 2: Considering 120 mm disc Braking Torque = 1593.223 Nm 4) Design of Hub a) Determining the forces acting on the Hub: Torque on the Brake Disk Petal: A torque of 105Nm is acting on the Brake Disk Petal. The Force acting on each hole ÷ = Case 3: Considering 150 mm disc Braking torque = 1991.53 Nm 3) Bearing Calculation a) Front Bearing Let us consider 50:50 weight distribution of load Therefore considering 300 kg vehicle the load on front will be 150 kg Considering that this entire load acts on a single bearing Therefore, radial force is considered 1.5G Therefore Fr = 1.5 × 150 × 9.81 =2207.25N ÷ Force due to Side Impact: Here the side Impact force is taken to be 2G = 2 × g × vehicle mass Impact force = 2 × 9.81 × 300 = 5886 N Impact force on 1 petal = 5886/4 = 1471.5 N Axial force is considered 1G Therefore Fa = 1 × 150 × 9.81=1471.5N Now let us consider P = 1.5Fr…standard practice P = 1.5 × 2207.25 = 3310.875N Now, = ( ′10) Loads on Bearing: The load on 1 bearing is 750 N The load on 2nd bearing is 750 N For ball bearing k=3 Therefore let us consider l’10 =50mr Therefore C =3310.875 × 50 = 12197.368N Approximately, C =12500N The axial load on the bearing is 1450 N b) Design of Wheel Petal Shear Failure of Petal Allowable stress in the Hub in shear = τ = 56.875 N/mm2 Force acting on Petal as obtained is 846.77 N Now, τ = Therefore from PSG page no 4.12, 4.13 Bearing SKF6007 SKF6008 6008-RZ SKF6206 SKF6207 SKF6208 / = = 846.77 N Torque on the Wheel Petal: The Force acting on each hole = 486.11 N D (mm) D (mm) B (mm) C (N) C0 (N) N (rpm) 35 62 14 12500 8800 13000 40 68 15 13200 9800 10000 40 68 15 17800 11600 22000 30 62 16 15300 10000 13000 35 72 17 20000 13700 10000 40 80 18 22800 Table 1 Bearing selection 16000 10000 56.675 = . ×( × ) t x b = 7.43 =7.5 Where, t= thickness of Wheel Petal b= distance between the hole and the end of petal If t = 10mm b= 0.743 mm If t = 15mm b= 0.495 mm This bending is due to the force of 846.77 N. The radius of effective bending is 54 mm Mb = 846.77 × 54 Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 30 Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car Mb = 45738 N-mm Now, By Flexural Equation, σ = 2) Geometric modelling of Brake disc. σb= 113.75 N/mm2 y= 2b=d I = x t x d3 = . / t=10mm, d=16mm Total thickness is = width + diameter of hole =16+10 = 26 mm Figure 2: Brake disc Geometric model 3) Geometric modelling of Upright c) Design of Brake Disk Petal Allowable stress in the Hub in shear =τ =56.875 N/mm2 σ = σb= 113.75 N/mm2 I = x b x t3 t= thickness of petal b= width of petal =26 mm as found from above calculation Force acting on Petal as obtained is 846.77 N Now, . = / t = 9.62 The thickness of petal is taken as 10 mm. . 56.675 = × ( × ) t x b = 7.44 If t = 4mm, b = 1.86 mm Figure 3: Upright Geometric model Thus the width of the petal is taken to be 5mm. V. DESIGN ANALYSIS IV. GEOMETRIC MODELLING 1) 1) Material: alumec 89 Ultimate tensile strength: 590 MPa Yield strength: 550 MPa Geometric modelling of Hub. Analysis of Hub Figure 4: Stress Analysis of hub Figure 1: Hub Geometric model Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 31 Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car 2) Figure 5: Total deformation of hub Figure 8: Stress Analysis of Brake disc Figure 6: FOS of hub Figure 9: Deformation of Brake disc Analysis of Brake disc 3) Analysis of Upright Thermal Analysis The following boundary conditions were applied on the brake discConvection = 90 W/m2K Heat power = 2203.896 W Initial temperature = 30℃ The thermal properties of brake disc material are: Thermal conductivity = 36 W/mK Thermal expansion coefficient = 12µm/mK Figure 10: Stress Analysis of Upright Figure 11: Total Deformation of Upright Figure 7: Thermal Analysis of Brake disc Static Structural Analysis The following boundary conditions were applied to the brake discPressure = 25116078.09 N/m² Frictional force = 33192.1N The mechanical material properties of the brake disc material areUltimate tensile stress: 630 MPa Yield stress: 530 MPa Figure 12: FOS of Upright Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 32 Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car criteria for enduring the loads encountered by formula student vehicle. The FEA analysis prove that the assembly is able to endure loads in real track condition. The reduced unsprung mass makes the vehicle easy to handle while improving its acceleration timing. This paper provides a basic layout encompassing key factors for designing all components involved in the design of wheel assembly which would be instrumental for improvement in the future design. VI. ANALYSIS RESULT COMPONENT HUB BRAKE DISC UPRIGHT Material Alumec 89 EN 8 Alumec 89 Ultimate tensile strength 590 MPa 630 MPa 590 MPa Yield Strength 550 MPa 530 MPa 550 MPa Max stress 189 MPa 198 MPa 147 MPa Max Deformation 0.43mm 0.6117mm 0.134mm F.O.S 2.7 2.5 REFERENCES [1] 3.4 [2] [3] All the values obtained from analysis are less than their allowable values. Hub, brake disc and upright design are safe based on strength and rigidity criteria. [4] CONCLUSION [5] The design procedure was done by keeping the suspension geometry as primary reference for upright design. The hub is made with minimum weight Joijode Vrushabh Umesh and Yadav Abhishek “Designing and Optimization of Wheel Assembly of a Formula Student Car”, IJCET E –ISSN 2277 – 4106, P-ISSN 2347 – 5161 Mr. MAHENDRA LAXMAN SHELAR “Design Analysis and Optimization of Steering Knuckle Using Numerical Methods and Design of Experiments” Badih A. Jawad and Jason Baumann “Design of Formula SAE Suspension”, Lawrence Technological University, SAE TECHNICAL PAPER SERIES 2002-01- 3310 M. Miwa, Y. Kawasaki & A. Yoshimura “Influence of vehicle unsprung-mass on dynamic wheel load” Technology Research and Development Department (KOMAKI), General Technology Division, ISSN 1743-3509 Prem J*.,Raghupathi P and Kalaiyarasan A “Analysis Of Magnesium Alloy Wheel For Four Wheeler”, Muthayammal Engineering College, Tamil Nadu, pp. 13126- 13130. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 33 DESIGN OF REGENERATIVE BRAKE TEST RIG 1 BHUSHAN C. NIKAMPATIL, 2SANJAY T. SATPUTE, 3LALITKUMARM. JUGULKAR 1,2,3 Rajarambapu Institute of Technology, Sakhrale, Sangli, Maharashtra, India E-mail: bpatil034@gmail.com, 2sanjay.satpute@ritindia.edu,3lalitkumar.jugulkar@ritindia.edu 1 Abstract - This paper discusses about design of regenerative brake test rig for three-wheeler with the use of kinetic energy recovery principle. Paper also discusses in detail about steps carried out in designing test rig. This paper is divided into three parts designs of flywheel, coupling device and cone clutch. Flywheel is used for kinetic energy recovery since it has long life and high energy density as well as maximum power output. For flywheel design new electric power train vehicle standards are used. For transmission of power from motor to rear axle chain drive is used since it has positive drive and higher efficiency. For engagement and disengagement of flywheel cone clutch is used. After theoretical design calculations all the results are cross checkedand give proposed test setup. Keywords - Regenerative Braking, Flywheel, Kinetic Energy Recovery System, Chain Drive, Cone Clutch efficiency gets improved. Regenerative braking not only improves the efficiency by saving the energy but also improves the performance of vehicle by boosting the acceleration of vehicle [11]. With increasingly serious environmental pollution and energy crisis problem, electric cars more and more get people’s attention and favor. The world’s biggest carmaker also continuously introduces new electric vehicles. Due to characteristics of the electric vehicle’s motor and battery, it is convenient for recycling braking energy. Research and design of braking regeneration system are always focus to the electric car manufacturers. At present, there is no uniform standard for the evaluation and test of pure electric vehicle braking energy recycling system. Industrialization and commercialization of pure electric vehicles requires establishment of a unified and reasonable test methods for braking energy recovery [7]. I. INTRODUCTION Braking is one of the key features of vehicle in which producing force that opposes the motion of wheel, thereby reducing vehicle’s speed or bringing it to a halt. When the brakes are applied, hydraulic pressure actuates in the master cylinder as a result of which brake pads under pressure rub against the surface of rotor. Thus, the friction comes into play and kinetic energy of rotor and eventually wheel gets hampered. In this process, kinetic energy gets converted into heat energy which is dissipated to the surroundings. Hence, a part of energy extracted from engine gets wasted and further energy is required to accelerate the vehicle [11]. Regenerative braking system is an energy recovery system that recovers significant amount of kinetic energy of vehicle that unnecessarily gets wasted during braking. The recovered energy is stored in a suitable storage system (battery or flywheel). “Stop and go”, “decelerate and accelerate”, that’s usually the scene of traffic in the city which results in a lot of braking. The kinetic energy of vehicle is given by equation: II. COMPONENTS BRAKE TEST RIG OF REGENERATIVE 1. Flywheel Flywheel is a heavy rotating mass that stores the kinetic energy or the mechanical energy of rotating wheel in the same form (rotational energy). This process of recovering energy is more efficient. The losses involved during energy transformation are avoided, because the energy is being transmitted in the mechanical form throughout the cycle. In case of recovering the energy through motor/generator and battery system, energy losses occur as mechanical energy is being transformed into electrical energy while charging the battery and during discharging electrical energy gets converted into mechanical form. 1 . .= 2 Where, E=rotational energy of flywheel I=moment of inertia of flywheel =angular velocity of flywheel 1 . .= . 2 Where, E=kinetic energy of vehicle m=mass of vehicle and v = velocity of vehicle Ideally, this is the amount of energy which is available for recuperation when brakes are applied. This energy which usually gets wasted on the application of conventional brakes can be recovered with the help of regenerative braking. The efficiency of regenerative braking mainly depends on the type of energy storage system and drive train. Energy storage system should be good enough to store the energy and should also be capable to release the stored energy or power. The transmission system should be efficient to transmit the power to the driving wheels to propel the vehicle. The amount of work done by engine is reduced and thus the fuel consumption is reduced. Hence the fuel economy and overall 30 % Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 34 Design of Regenerative Brake Test Rig The amount of energy stored by flywheel depends upon its mass, radius and rotational velocity. Thus, the maximum energy stored by flywheel can be enhanced by increasing moment of inertia and angular velocity of flywheel [11]. 2. Motor The motor which is used in electric vehicles is BLDC (Brushless DC motor). This motor is the heart of the whole electric vehicles. BLDC motor control is the main control of inverter, the commutation which is achieved to control the order of conduction on the inverter arm bridge. If BLDC motor to get control, we must know the rotor location, thus it can determine the commutation. Hall Effect sensor are the sensors which are used commonly for predict the rotor position [1]. 3. Coupling devices Device used for engagement of flywheel and motor during normal running condition. And disengagement of flywheel and motor during braking so motor act as generator. To get more accuracy of test result ensures minimum losses during engagement and disengagement. A freewheel or overrunning clutch is a device in a transmission that disengages the driveshaft from the driven shaft when the driven shaft rotates faster than the driveshaft. When a vehicle going downhill or any situation where the driver takes his or her foot off the accelerator pedal, closing the throttle; the wheels want to drive the engine, possibly at a higher RPM. To avoid this from happening we use a freewheel unit which disengages the driven shaft from the driveshaft. 4. Power electronics Sophisticated electronic circuit is necessary to decide when the motor should reverse, while specialized electric circuits route the electricity generated by the motor into the vehicle's batteries. In some cases, the energy produced by these types of brakes is stored in a series of capacitors for later use. In addition, since vehicles using these kinds of brakes also have a standard friction braking system, the vehicle's electronics must decide which braking system is appropriate at which time [15]. 5. Control Electronics A microcontroller is required to read the Hall Effect sensor feedback and decide the required combination of the switching [2]. A Hall effect sensor is a transducer that varies its output voltage in response to a magnetic field. Hall effect sensors are used for proximity, switching, positioning, speed detection, and current sensing applications. correspondingly results in a raise of the speed of the flywheel. A typical FES system mainly includes three parts: flywheel rotor, motor/generator and power conversion subsystem. In electromechanical systems, the flywheel rotor is accelerated by motor generator when operating in motor mode, the energy stored in the flywheel rotor is increased by accelerating the rotor to higher speeds, i.e. the FES is being charged. When required the energy stored in the flywheel rotor can be released by operating motor generator in generator mode producing electricity. A flywheel is a heavy rotating body that acts as a reservoir of energy. The energy is stored in flywheel in the form of kinetic energy, The flywheel acts as an energy bank between the source of power and the driven machinery. The functions of the flywheel are as follows: 1. To store and release energy when needed during the work cycle 2. To reduce the power capacity of the electric motor or engine 3. To reduce the amplitude of speed fluctuations Flywheel Materials Traditionally, flywheels are made of cast iron. From design considerations, cast iron flywheels offer the following advantages 1. Cast iron flywheels are the cheapest. 2. Cast iron flywheel can be given any complex shape without involving machining operations 3. Cast iron flywheel has excellent iron flywheel has excellent ability to damp vibrations. However, cast iron has poor tensile strength flywheel compared to steel. The failure of cast iron is sudden and total. The machinability of cast iron flywheel is poor compared to steel flywheel. IV. DESIGN PHASE To find kinetic energy . .= . ………M= 320 kg, v = 25 km/hr 1 . . = × 320 × 6.944 2 . . = 7716.0493 To find Power . . = Power = 7716.0493/10 …… Stopping time 10 s = 771.60 W To find dimensions of flywheel 1 . .= 2 2 = 60 2 × 2000 = = 209.4395 / 60 III. FLYWHEEL ENERGY STORAGE SYSTEM FES works by accelerating a rotor (flywheel) to a tremendously high speed and maintaining the energy in the system as rotational energy. When energy is extracted from the system, the flywheel rotational speed is reduced a consequence of the principle of conservation of energy, adding energy to the system Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 35 Design of Regenerative Brake Test Rig = = = The chain drive is intermediate between belt and gear drives. It has some features of belt drives and some of gear drives. The advantages of the chain drives compared with belt and gear drives are as follows: 1. Chain drives can be used for long as well as short center distances. 2. Chain drive is positive drive 3. Efficiency of chain drive is from 96 % to 98% 4. Atmospheric conditions and temperatures do not affect the performance of chain drives. 2 2 2 = 2 1 . .= 4 7716.0493 = = 0.056 1 × 7100 × 4 × 0.01 × 209.4395 Roller Chains It consists of alternate links made of inner and outer link plates. A roller chain consists of following five parts a. Pin b. Bushing c. Roller d. Inner link plate e. Outer link plate ........ρ = 7100kg/m3 for Grey Cast Iron FG 200 Thus, diameter of flywheel is taken as 112 mm 1. To find kW rating of chain Assumptions a. No. of teeth on driving sprocket ( )= 21 b. Speed reduction 3:1, hence no. of teeth on driven sprocket ( )= 63 c. Simple roller chain with only 1 strand K1 = 1 Ks = 1.4 (Service factor for heavy shock) K2 = 1.26 (Tooth correction factor) × ℎ = × 0.7716 × 1.4 ℎ = 1 × 1.26 = 0.85733 Figure 1: Design of Flywheel Analysis of flywheel 2. Selection of chain From Design data book Therefore, chain number 08 A is selected at 2000 rpm Data for 08 A are as follows From design data book we have Pitch 12.7 mm Roller diameter(d1) 7.95 mm Width (b1) 7.85 mm Transverse Pitch 14.38 mm Figure 2: Modal analysis of Flywheel Modal analysis shows that for 3382.2 Hz frequency maximum deformation is 82.225 mm. Here operating range of frequency is near about 210 Hz hence assumptions made during design were correct and design is safe. 3. To find pitch circle diameter of driving and driven pulley 12.7 = = = 85.21 Design of Coupling Device A chain drive consists of an endless chain wrapped around two sprockets. A chain can be defined as a series of links connected by pin joints. The sprocket is a toothed wheel with a special profile for the teeth. = = 12.7 = 254.78 Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 36 Design of Regenerative Brake Test Rig 4. To find No. of chain links Assumptions a. The number of pitches or links of the chain should be always even. b. The number of teeth on driving sprocket should be always odd. Analysis of sprocket The center distance between sprocket wheel should be between 30 P to 50 P Taking mean value = 40 P ( ) = 40 = 40 × 12.7 ∴ = 508 No. of links = 123 5. Corrected center distance (a) a = 507.24 mm Figure 4: Static structural analysis of sprocket Dimensions of driving sprocket wheel Static structural analysis shows that for chain tension of 704.16 N, maximum deformation is 4.62e-5 mm. Sprocket design is capable to handle such small deformation. Hence, assumptions made during design were correct and design is safe. Design of cone clutch Cone clutches are friction clutches. They are simple in construction and are easy to disengage. However, the driving and driven shafts must be perfectly coaxial for efficient functioning of the clutch. A cone clutch consists of two working surfaces, inner and outer cone For design of cone clutch uniform wear theory considered. Required conditions Power = 0.85 kW N= 2000 rpm From design calculations following results are obtained Torque to be transmitted = 4.05 Nm Material for shaft C45 Diameter of shaft = 20 mm Semi Cone angle = 12.5 0 Figure 3: Design of sprocket a) b) c) d) e) f) Outer Diameter = 91.86 mm Root diameter = 77.05 mm Tooth flank radius = 30.7138 mm Tooth side radius = 12.7 mm Tooth Width = 7.4575 mm Tooth side relief = 1.58 mm To find tension in the chain × × = 60 × 1000 21 × 12.7 × 2000 = 60000 = 8.89 / Chain tension is given by 1000 × = 1000 × 6.26 = 8.89 = 704.16 N for 08 A Braking load = 2500 N ∴ = 2500 = 3.55 704.16 Figure 5: Proposed Test Setup Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 37 Design of Regenerative Brake Test Rig [6] CONCLUSIONS Design is important stage for any product development process. As it decides life of product. In this paper initial design of regenerative brake test set up has been discussed. Each component design is cross verified and has been found safe. Theoretical design calculations were analytically compared with the help of FEA software. Modal analysis of flywheel shows that for 3382.2 Hz frequency maximum deformation is 82.225 mm. Here operating range of frequency is near about 210 Hz. Also, Static structural analysis shows that for chain tension of 704.16 N, maximum deformation is 4.62e5 mm. Sprocket design is capable to handle such small deformation. In above both cases assumptions made during design were correct and design is safe. [7] [8] [9] [10] [11] REFERENCES [1] [2] [3] [4] [5] [12] Soniya K. Malode, R. H. Adware., (2016) ‘Regenerative Braking System in Electric Vehicles’, International Research Journal of Engineering and Technology (IRJET), Vol. 03 Issue. 03 Sayed Nashit, Sufiyan Adhikari, Shaikh Farhan, Srivastava Avinash, Amruta Gambhire., (2016) ‘Design, Fabrication and Testing of Regenerative Braking Test Rig for BLDC Motor’, International Research Journal of Engineering and Technology (IRJET), Vol. 03 Issue. 05 Guizhou Ren, Guoqing Ma, Ning Cong., (2015) ‘Review of electrical energy storage system for vehicular applications’, Renewable and Sustainable Energy Reviews, 41, pp. 225-236 Tai-Ran Hsu. (2013) ‘On a flywheel-based regenerative braking system for Regenerative energy recovery’, Proceeding of Green Energy and System Conference, Long Beach, CA, USA. Junzhi Zhang, Xin Lu, JunliangXue, and Bos Li. (2008) ‘Regenerative braking system for series hybrid city bus’, The World Electric Vehicle Journal, Vol 2, Issue 4 [13] [14] [15] [16] [17] Bambang Sampurno, AriefAbdurrakhman, Herry Sufyan Hadi. (2015), ‘Development of Electrical Kinetic Energy Recovery System (KERS) on Motorcycle’, International Conference on Advanced Mechatronics, Intelligent Manufacture, and Industrial Automation, Surabaya, Indonesia. Gopi Krishnan, N. and Wani, K., "Design and Development of a Hybrid Electric Two-Wheeler," SAE Technical Paper 2015-26-0118, 2015, doi:10.4271/2015-26-0118. Naoki Kobayashi, ‘Development of Electric Motor for Electric motorcycle for Business use’ SAE Technical Paper 2011-32-0560,2011, doi:21009560 Joseph Hartley, Andrew Day, Ion Campean, Rod G Mclellan, John Richmond, ‘Braking System for a Full Electric Vehicle with Regenerative Braking’ SAE Technical Paper 2010-011680,2010 Guirong, Z., (2012), June. Research of the regenerative braking and energy recovery system for electric vehicle. In World Automation Congress (WAC), 2012 (pp. 1-4). IEEE. Vishwakarma, D. and Chaurasia, S., 2016. Regenerative Braking System. Imperial International Journal of EcoFriendly Technologies (IIJET), 1, pp.30-33. Patel, P., Chandra, H. and Sahoo, T., 2015, August. Study on associated effects. In Transportation Electrification Conference (ITEC), 2015 IEEE International (pp. 1-8). IEEE. Liu, Z., Ortmann, W.J., Nefcy, B., Colvin, D. and Connolly, F., 2017. Methods of Measuring Regenerative Braking Efficiency in a Test Cycle. SAE International Journal of Alternative Powertrains, 6(2017-01-1168), pp.103-112. Nian, X., Peng, F. and Zhang, H., 2014. Regenerative braking system of electric vehicle driven by brushless DC motor. IEEE Transactions on Industrial Electronics, 61(10), pp.5798-5808. George Dobre, Mihai Robert Vladu, Power transmissions Proceeding of 4th International Conference on Power Transmissions (PT12), held at 20–23June 2012, in Sinaia, Romania., Springer pp. 347-355. Bhandari, V.B., 2010. Design of machine elements. Tata McGraw-Hill Education. http://auto.howstuffworks.com/auto-parts/brakes/braketypes/regenerative braking.html Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 38 EFFECT OF NOZZLE TO PLATE DISTANCE ON LOCAL HEAT TRANSFER DISTRIBUTION BY INCOMPRESSIBLE CHEVRON JET USING CFD 1 HARPREET SINGH, 2SUNIL CHANDEL 1 2 PG Student, Department of Mechanical Engineering, Girinagar, Pune (Mah.) Asisstant Professor, Department of Mechanical Engineering, Girinagar, Pune (Mah.) E-mail: 1harpreet910@hotmail.com, 2sunilchandel@diat.ac.in Abstract - In this paper, numerical simulation was performed to analyze the effect of nozzle to plate distance on heat transfer performance of an incompressible hot jet by a chevron nozzle on a flat surface. Influence is studied at the nozzle to plate distance (z/d) 1, 2, 4, 6, 8 and 10 for Reynolds number of 28,000. Numerical analysis has been done by solving conservation equations of momentum, mass and energy with two equations based RNG k- ε turbulence model and Energy model to determine the local distribution of Nusselt number on the plate. A change in Nusselt number distribution is observed, for lower nozzle to plate distance (z\d ≥ 4) secondary peak in the Nusselt number is present. From nozzle to plate distance (z/d ≤ 6), the Nusselt number decreases gradually from the stagnation point in the radial direction. Keywords - Chevron Nozzle, Nusselt Number, Heat Transfer, Computational Fluid Dynamics number from 3600 to 27600 and observed that there rise in the Nusselt number due to the transition from laminar to turbulent flow at plate. They further decrease the nozzle plate spacing which increases the velocity of the flow in the gap which is responsible for shifting the zone of the transition from laminar to turbulent flow towards the stagnation point. I. NOMENCLATURE a b d Nu Re z - Height of Chevron Penetration depth Diameter of nozzle Nusselt number Reynolds number Nozzle to plate distance Vinze et al. [4] conducted experiment and determine the effect of impinging jet temperature on heat transfer distribution on smooth plate. In his experiment, it was observed that heat transfer does not depend much on the temperature of jet. However, jet having ambient temperature does maximum heat transfer than compared to heated air jet. Another experiment is conducted by Vinze et al. [5] to study influence of shape of nozzle on heat transfer distribution. It was observed that the shape of nozzle has great influence on the heat transfer distribution. Circular jet experiences the highest rate of heat transfer compared that to square jet and then to triangular nozzle. It was also observed that the compressibility affects Nusselt number distribution only in the stagnation region and has negligible influence in transition and wall jet region. II. INTRODUCTION Jet impingement method is used for enhancing heat transfer. These methods are used in steel manufacturing industries, in cooling of Gas Turbine blades, to cool down the material during grinding, in cooling of combustion chamber wall and paper and textile mills. Many researches are done to increase the heat transfer by changing various arrangements like non-circular nozzles (square, triangular, circular and elliptical), fixing the tabs at the nozzle exit (Chevron nozzle) and nozzle profiles (contoured nozzle, pipe nozzle and orifice). A chevron is basically a triangular tab which may be inclined at an angle towards central axis of pipe fixed at periphery of pipe exit. These tabs generate turbulence and they increases heat transfer. Chevron nozzle is the least explored, although it appears to have more potential in increasing the heat transfer. Nabadavis et al. [6] did the numerical investigation emphasizes on studying the heat transfer characteristics when a high velocity air jet impinges upon a flat plate having constant heat flux. He observed that the heat transfer rate increases with the increase of Reynolds number of the jet and also there is an optimum value for jet distance to nozzle diameter for maximum heat transfer when all the other parameters were kept fixed. Many studies are carried out to study the method to increase the heat transfer. Jambunathan et al. [1] and Viskanta [2] provided comprehensive review on jet impingement heat transfer. They studied the impingement of jet for Reynolds number ranging from 5000-1,24,000 by changing the jet diameter, profile of flow device and nozzle to plate distance. Lytle and Webb (1994)[3] studied the distribution of Nusselt number on flat plate due to impingement of jet for low jet exit to plate spacing and Reynolds Vinze et al. [7] carried an experimental study to investigate the influence of the chevrons on local heat transfer distribution for impinging incompressible jets Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 39 Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by Incompressible Chevron Jet using CFD at Reynolds number of 28,000, 35,000 and 40,000. He observed that Nusselt number increases with the increase in the number of chevrons and also with the increase in the tip angle for a given number of chevrons. Yan et al. [8] numerically studied the heat transfer characteristics of a circular air jet impinging on a flat plate. He numerically studied seven turbulent models for predicting this type of flow and heat transfer is investigated and observed that the (RNG) k-epsilon model, (SST) k-omega model and the large Eddy simulation (LES) produces better results than others turbulent model. Figure 2: Physical domain B. Meshing Unstructured mesh is created using ANSYS ICEM CFD software. Grid generation is one of the important stages of the simulation. Fine meshing is done on the nozzle as compared to the enclosure. Mesh independent study is done and optimum value of number of nodes and element for the simulation is found out as shown in Table 2. III. GEOMETRY AND MODELLING A. Geometry Description For this simulation geometry is created using ANSYS SPACECLAIM design modeller. Figure 2 shows the physical domain of the modelling for z/d = 8. Air flow at high velocity passes through chevron nozzle of diameter 10.8 mm having 4 numbers of triangular tabs. The length of each chevron is a = .43d i.e. 4.644 mm as shown in Figure 1. Jet is impinged on a thin foil of stainless steel having size 150mm x 130mm and thickness of .08mm. This plate is not created in ANSYS SPACE CLAIM program because of its thickness .08mm, which is very less, it is difficult to perform meshing operation on the plate. Shell conduction technique is used in ANSYS FLUENT to specify thickness of the plate rather than creating it in ANSYS SPACECLAIM. Table 1 shows the distance between the plate and the nozzle for different z/d ratio. An enclosure is created between the plate and nozzle. Nozzle to plate distance distance 1 2 4 6 8 10 Nozzle to plate distance Number of ratio (z/d) Number of nodes elements 1 2 4 6 8 10 696683 1016734 1817381 2530348 3410251 4110553 118775 172462 306532 425960 573211 690370 Table 2 Number of nodes at different nozzle to plate ratio C. Turbulent Model The RNG k-epsilon model was derived using a statistical technique called renormalization group theory. It is similar in form to the standard k-epsilon model which is the most common model used in CFD to simulate mean flow characteristics for turbulent flow conditions. It is a two equation model which gives a general description of turbulence by means of two transport equations. The first transported variable determines the energy in the turbulence and the second transported determines the rate of dissipation of the turbulent kinetic energy. Nozzle to plate ratio(z/d) (mm) 10.8 21.6 43.2 64.8 86.4 108 Table 1 Nozzle to plate distances of geometry Figure 1: Geometry of chevron Nozzle Figure 3: Local distribution of Nusselt number for nozzle to plate distance z/d = 1 Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 40 Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by Incompressible Chevron Jet using CFD Figure 4: Local distribution of Nusselt number for nozzle to plate distance z/d = 2 Figure 7: Local distribution of Nusselt number for nozzle to plate distance z/d = 8 Figure 5: Local distribution of Nusselt number for nozzle to plate distance z/d = 4 Figure 8: Local distribution of Nusselt number for nozzle to plate distance z/d = 10 For turbulent kinetic energy k (ρk) + (ρku ) = α μ + G +G − (1) α μ + ρε − Y + S In these equations, G represents the generation of turbulence kinetic energy due to the mean velocity gradients. G is the generation of turbulence kinetic energy due to buoyancy. Y represents the contribution of the fluctuating dilatation in compressible turbulence to the overall dissipation rate. The quantities α and α are the inverse effective Prandtl numbers for k and ε, respectively. S and S are user-defined source terms. For dissipation ε (ρε) + C (ρεu ) = (G + C G ) − C ρ − R +S (2) D. Energy Model ANSYS Fluent solves the energy equation in the following form: [ ] + ∇ . v⃗[ρE + p] = ∇ . K ∇T − ∑ h J ⃗ + τ . V⃗ + S (3) where Keff is the effective conductivity (k+kt, where kt is the turbulent thermal conductivity, defined according to the turbulence model being used), and Jj is the diffusion flux of species j. The first three terms on the right-hand side of represent energy transfer due to conduction, species diffusion, and viscous dissipation, respectively. Sh includes the heat of Figure 6: Local distribution of Nusselt number for nozzle to plate distance z/d = 6 Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 41 Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by Incompressible Chevron Jet using CFD chemical reaction, and any other volumetric heat sources defined. CONCLUSION A numerical study is carried out to investigate the influence of nozzle to plate distance on local heat transfer distribution for impinging incompressible chevron jet on smooth flat plate at Reynolds number of 28,000. From the study it is concluded that the maximum heat transfer at a nozzle to plate distance of six nozzle diameter at 28,000 Reynolds number. A secondary peak in the Nusselt number distribution is observed for lower nozzle to plate distances (z/d≤4). E. Boundary conditions The mass flow rate of inlet of pipe for Reynolds number 28,000 is .00454 Kg/sec having turbulence intensity of 5% and hydraulic diameter of .0108 m. The direction of flow of air is at negative-y direction. The temperature at inlet of the nozzle is set to 350 K. The wall of the nozzle is thermally insulated, so heat flux through the nozzle wall is set to 0. All the sides of enclosure except the plate side of the enclosure are set to pressure - outlet. Thickness is given to plate side of enclosure using shell conduction technique of .08 mm and temperature of 300 K. REFERENCES [1] RESULTS AND DISCUSSION [2] The Nusselt number distribution for different z/d ratio is shown in Figure 3, Figure 4, Figure 5, Figure 6,Figure 7 and Figure 8. The Nusselt number distribution shows that for lower nozzle to plate distances (z/d ≤ 4), a secondary peak in the Nusselt number is present. The presence of secondary peak may be because of the fluid acceleration taking place due to sudden change in flow direction which results in increase in rate of heat transfer. Among all cases, highest Nusselt number is measured at the stagnation point and z/d = 6. For nozzle to plate distance z/d ≥ 6, the Nusselt number decreases gradually from the stagnation point in the radial direction forming inverted bell shape.The Mach number is in the range of 0.014-0.2, hence the jets are incompressible. [3] [4] [5] [6] [7] [8] Viskanta R.,”Heat transfer to impinging isothermal gas and flame jets”, Experimental Thermal and Fluid Science (1993), Vol. 6, 111-134 Jambunathan K., Lai E., “Moss M.A. and Button B.L., A review of heat transfer data for single circular jet impingement”, International journal of Heat and Fluid Flow (1992). Lytle D. and Webb B.W., “Air jet impingement heat transfer at low nozzle-plate spacing”, International Journal for Heat and Mass Transfer (1994), Vol. 37, 1687-1697. Ravish Vinze, S. Chandel, M.D. Limaye, S.V. Prabhu, “Influence of jet temperature and nozzle shape on the heat transfer distribution between a smooth plate and impinging air jets”, International Journal of Thermal Sciences (2016), 136-151. Ravish Vinze, S. Chandel, M.D. Limaye, S.V. Prabhu, “Effect of compressibility and nozzle configuration on heat transfer by impinging air jet over a smooth plate”, International Journal of Thermal Sciences (2016), 136-151. Asem Nabadavis and Dipti Prasad Mishra, “Numerical Investigation of Jet Impingement Heat Transfer on a Flat plate”, Carbon – Science and Technology (2016), 1-12. Ravish Vinze, S. Chandel, M.D. Limaye, S.V. Prabhu, “Local heat transfer distribution between smooth flat surface and impinging incompressible air jet from a chevron nozzle”, International Journal of Thermal Sciences (2016), 136-151. Y. Y. Yan, J. Maltson, “Numerical Study on Stagnation Point Heat Transfer by Jet Impingement in a Confined Narrow Gap”, University of Nottingham. . Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 42 TOPOLOGY OPTIMIZATION AND MANUFACTURING ASPECTS FOR HULL STRUCTURE OF WHEELED COMBAT VEHICLE 1 HARSHAL PINGALE, 2S.V.NIMJE, 3NILESH PATEL 1 M.Tech student, Defence Institute of Advanced Technology (DU),Pune–411025,India Asst.Professor, Defence Institute of Advanced Technology (DU),Pune–411025,India 3 Scientist, DRDO–Vehicles Research and Development Establishment, Ahmednagar–414006,India E-mail: 1hppingale54@gmail.com, 2sunil.nimje@diat.ac.in, 3nrpatel@vrde.drdo.in 2 Abstract - Light weight design of hull structure chassis of wheeled combat vehicle is quite challenging task considering requirement of lower chassis weight with high stiffness during military operations and cross country mobility aspects. The research work presents structural topology optimization of hull structure of combat vehicle to obtain optimal material distribution within available space pertaining to required stiffness parameters and boundary constraints. Optimal weight of vehicle is computed using density method by defining minimum compliance and volume as objective function of the topology optimization study. Present study highlights problem formulation with solid isotropic material with penalisation (SIMP) optimization technique. Various static and dynamic loading conditions have been considered for optimization of vehicle structure. Based on the output of the optimization study, suitable recommendations have been made for hull structure designer in terms of optimal layout configuration of structural members in the early stage of design. Keywords - Topology Optimization, Chassis Design, Combat Vehicle, Compliance, Finite Element Analysis. seeking for the most optimal distributing form structural stiffness in design space or the best way to pass power, in order to achieve optimization of some behaviors or alignment of the structure weight. Topology optimization is the first step in design of structural optimization, followed by shape optimization and size optimization. With maturation and improvement of shape and size optimization design in structure, the topology optimization has been becoming the hotspot and the difficult problem in structural optimization design research field. Because of the topology optimization’s singularity feasible region, its main problem is a big difference between the global optimal solution and local optimal solution. But the application of topology optimization in practical engineering, often due to the numerical instability phenomena which led to the boundary shape optimization that the results are not clear, it is exist the main numerical problem that is checkerboard format, grid-dependent and local maximum or minimum in topology optimization process [1]. An optimization that only allows discrete design variables (void or material) is unfortunately not a realistic alternative when dealing with large numbers of design variables [2]. Because of this, a continuous measure of material existence, , is introduced. Where and 0 is interpreted as void and 1 as solid material. Value in between might be interpreted as a material with a lower density and Young's modulus. The induction of a continuous measure of material presence in an element has been done for computational reason; however, it is still desirable to have discrete design variables (void or material). One way to make the design variable more discrete is to use the SIMP method (Solid Isotropic Material with Penalization) [3]. I. INTRODUCTION Chassis design of a combat vehicle is challenging task considering the following major requirements of chassis:a) To provide support for various subsystems, e.g. power pack, transmission, drivelines, weapon system, crew compartment, etc. b) To withstand various static and dynamic loads generated due to various terrain conditions and vehicle dynamics c) To provide protection against ballistic and blast threats. Combat vehicles have various configurations based on role of the vehicle on battle field e.g. Armoured Fighting Vehicles (AFVs), Armoured personnel Carrier (APC), Recce and support vehicles, etc. combining operational mobility with tactical offensive and defensive capabilities. AFVs can be wheeled or tracked. Topology optimization is a powerful tool in many areas of design such as structural mechanics, optics and electronics. The field emerged from structural design and so topology optimization applied in this context is also known as structural optimization. Applying topology optimization to structural design typically includes considering quantities such as weight, stiffness, stresses, displacements, buckling loads and resonant frequencies, with some measure of these defining the objective function and others constraining the system. For other applications aerodynamic performance, conductance, optical performance may be of interest, in which case the underlying state equations are very different to those considered in the structural case. Topology optimization, also called structural layout optimization, the basic idea is a design method that Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 43 Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled Combat Vehicle III. TOPOLOGY FORMULATION respect to hull structure of wheeled combat vehicle as shown in Figure 1. There are various types of component developments processes going on depending on project and application. OPTIMIZATION To formulate the structural optimization problem, an objective function, design and state variables needs to be introduced as described in [4]. The objective function (f), represents an objective that could either be maximized or minimized. A typical objective could be the volume or stiffness of a structure. Moreover, some structural design domain and state variables associated to the objective function needs to be defined. The design variables (x) describes the design of the structure, it may represent the geometry. The state variables (y) represents the structural response which can for example be recognized as stress, strain or displacement. Furthermore, the state variables depend on the design variables y(x). The objective function is subjected to the design and state variable constraints to steer the optimization to a sought solution. min x subject to Figure 1. Isometric view of model. Vehicle dimensions are length=6.3m, Breadth=2.5m, Height=1.8m and total payload of vehicle consisting of self-weight and external load= 13.5 ton. Loading conditions were extended to the 3g case for safe design. Material properties are given in Table 1. f ( x, y ( x)) design constraint on x state constraint on y ( x ) equilibrium constraint Yield Stress (y) Tensile Strength Modulus of Elasticity Mass Density () Poisson’s Ratio (ν) (1) A state function g(y) that represents state variables can be introduced, for example displacement in a certain direction. This state function can be incorporated as a constraint to the optimization task, where it is usually formulated such that g(y) ≤ 0. Consider the case where g(y) is represented by a displacement vector g(u(x)) in a discrete finite element problem. To establish the state function, this requires that nodal displacement is solved for u ( x ) K ( x ) 1 f ( x) Table 1. Material properties. B. Meshing scheme It is very important to establish the finite element model for a complex structure. The model not only affects the analysis process, but also influences the reliability of the results. This work is done by Altair, the finite element pre-processor used in this work is HyperMesh. HyperMesh is easy to learn and has an interface environment integrated with Optistruct [5,6]. Mesh Convergence study has been done two get proper results. Meshed model of vehicle is shown in Figure 2 and details of meshing are given in Table 2. (2) where K is the global stiffness matrix and f is the global load vector. This means that the optimization task can be expressed in a so-called nested formulation where the equilibrium constraint is taken care of by the state function formulation min x subject to f ( x) g (u ( x)) 0 750 MPa 1100 MPa 210 GPa 7800 kg/m3 0.3 Mesh Type (2D) Element Size No. of Elements No. of Nodes Mixed 10 mm 255699 255977 Table 2. Meshing details. (3) The optimization task presented in equation (1) is called simultaneous formulation in comparison. Equation (3) is usually solved by evaluating derivatives of f and g with respect to x. IV. TOPOLOGY VEHICLE OPTIMIZATION OF A. Geometric Modeling The different steps have been taken during the current component development process are explained with Figure 2. Meshed model. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 44 Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled Combat Vehicle C. Performing Topology Optimization A detailed topology optimization study was carried out on the existing design to realize the critical load paths and thereby obtain an insight on the optimal configuration. This is achieved through the use of a density function based on load distribution over the finite elements by using optimization parameters given in Table 3. Figure 4. Topology optimization nephogram of hull structure. Figure 5. Iso surface of topology optimization. Figure 3. The iterative process used in OptiStruct. Objective function Minimize Compliance Design variable State constraint Volume fraction 0.3 Response volume Element density The surfaces of the resulting beams are uneven because of the limitation given by the element mesh. Also, it could see irrational how some beams are crooked. However, the load paths are, after some iterative steps, relatively clear and easy for an engineer to understand. It is in the nature of topology optimization that the resulting structure is exposed to tension and compression. With a minimum exposure to bending and torsion, along with the manufacturing constraints (MINDIM), it is hence most natural that the beams are circular. Compliance and total Table 3. Topology optimization parameters [7]. OptiStruct has the advantage of being capable to solve the major kinds of optimization problems. It is able to solve problems with millions of design variables, which this research will be dealing with. The iterative workflow can be seen in Figure 3. RESULTS 500 Compliance×104 V. OPTIMIZATION DISCUSSION 600 AND 400 300 200 The topology optimization nephogram and iso surface of topology are shown in Figure 4 and Figure 5 respectively. Although the result of optimization is rough comparatively, it still can be seen that the basic shape profile consistent with the traditional design, the link between the objective function compliance and the number of iterations shown in Figure 6. 100 0 0 10 20 No. of Iterations Figure 6. Convergence curve. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 45 30 40 Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled Combat Vehicle This is especially true for such a complex structure that is investigated in this project. CONCLUSION A recommendation is made to present topology optimization at early stage where the big decisions are made where design concepts and load paths are more valuable than a detailed design. Topology optimization should be done parallel to the design during development of a vehicle. It is a powerful tool to use for giving input to designers. Topology optimization is best to use in the early phase of design where knowledge of the structure is low and the design freedom is high. By applying topology optimization early, great knowledge of the load paths and weaknesses in the structure are received early and will help the designer to make good decisions. To use topology optimization as a tool for material placement is more systematic than to use more or less guesses based on experience. REFERENCES [1] [2] [3] [4] [5] [6] [7] Xiao Weihua, “The Application of Topology Optimization Theory in Three-dimensional Radial Gate Design.”ICICTA,2011, pp. 244-46. Altair OptiStruct Manual, HyperWorks 10. Klarbring, Anders; w. Christensen, Peter; “An Introduction to Structural Optimization.” ISBN 978-1-4020-866-6, 2009, pp. 188-189. Martin Philip Bendsøe and Noboru Kikuchi,“ Generating optimal topologies in structural design using a homogenization method.”Computer Methods in Applied Mechanics and Engineering, 71(2):197-224, November 1988. Altair Engineering Inc, “Weight Optimization of Turbine Blades,” 2011. Altair Product Design, “Airbus Selects Altair as a Product Development Partner for Ongoing Aircraft Design Programs.” 2012. Case Study - OptiStruct Drives Weight Reduction in Commercial Aircraft: Door Support Arm Design Optimization, Altair Engineering, Inc.,2010. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 46 JAVA 8 NEW FEATURES AND DEVELOPMENT STANDARDS MADHURESH KUMAR Magadh University, Bodh Gaya, Bihar E-mail: call2madhuresh@gmail.com Abstract - This paper presents new features added in JDK platform (JDK 8). With no doubts, java 8 release is considered one of the important releases in the java world since java 5. It brings lots of new features to the Java as a language, its compiler, libraries, tools and the JVM (Java virtual machine) itself. We know that the changes to Java 8 are a lot of ways more profound than the other changes to Java in its history. The features and enhancements allow us to write programs more easily—instead of writing tedious code like the following (to sort a list of apples in inventory based on their weight), In this paper we are going to take a look on all these changes and show the different usage scenarios on real examples. The objective of development standards is to promote a consistent approach to java code formatting and design pattern across all contributors to the code base. A consistent approach makes it much easier for new java developers joining the development or support team, and to experienced java developers reviewing and/or modifying existing code. Wherever possible, the standards will be supported by the development tools (specifically Eclipse) to make it as easy as possible for the standards to be adhered as well. Keywords - JDK 1.8, JVM, Stream, Lambda Expressions, Eclipse functional interface before java 8 that will surprise you but we have used informally, earlier known as simple abstract method interface. For example, The Runnable Interface which has just one method called run() and Comparator Interface has compare() method. Functional interfaces are new feature introduced in java 8. To create the functional interface, annotate the interface with @FunctionalInterface and should not have more than one abstract method. I. INTRODUCTION Java is evolved over the years and java 8 brings major changes to the programming language and additional more features when we compare to different java versions. Java 8 is now not a just an object oriented programming language, also supports functional style programming and parallel processing. Several companies and programmers are still working with previous java versions, which are understandable, since there are a lot of problems with migrating from older version to new version. Many companies have started working on new version of java. There are very few good reasons to do this, because java 8 has come up with some important improvements to the programming language. The java coding standards are very important to every programmer for several reasons. The main goal of the recommendation of coding standard is to improve readability, scalability, uniform approach for solving the problem, there by understanding, maintainability and general quality of the code. It helps programmers to understand new code more quickly and thoroughly. There is very minimal chance that any software is developed and maintained for its whole life by original author. For example, Deprecation of Java methods and interfaces and their members are a warning to developers that the class or interface is been superseded and will eventually be removed. Any new usage of deprecated classes or interfaces and their members makes transition to the new class or interface and eventual removal of older technology difficult. II. FEW IMPORTANT FEATURES JAVA 8 Functional Interface is used for passing functionality to Lambda expressions. Lambda expressions are used to express Anonymous classes in java 8 in short hand notation and also it also helps the Lambda expressions to understand which method to pick for execution at runtime. B. Lambda Expressions Lambda expressions are one of the most popular and vital new feature of java 8. They introduce functional programming and parallel processing concept to java, which is completely Object-Oriented programming language. It permits us to write more readable, maintainable and concise code and conjointly give to use API terribly simply and effectively. Lambdas expressions are an anonymous function and don’t have a name and do not belong to any class. The conception of lambda expression was first NEW A. Functional Interfaces Interfaces which have just only one abstract method are called functional interfaces. We have also used Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 47 Java 8 New Features and Development Standards introduced in LISP programming language and java is last programming language which has implemented concept of lambda expressions. Lambdas are more concise syntax to implement a “functional interface” conjointly referred to as Single Abstract Method interface. It can be used where application allows an inner class (e.g. Runnable, callable) to define a single method. Lambdas can be used for Stream processing where checked exceptions (Layered Exception, Query Exception, and Call Exception) will not be thrown. programming, streams supports Aggregate Operations. The usual Aggregate operations are map, sort, and match, reduce and filter. It only has body and parameter list. In term of parameter, Lambda expression may or may not have parameters. Consider Streams in the following cases to potentially clarify the code. In Java Programming, when we iterate the data through the collections, normally we use either for loop or iterations and its visible in code. But in java 8, Stream API provides methods like foreach, filter, map and which internally iterates through the elements. These kinds of iterations are called internal iterations. 1. 2. 3. Example without using Lambda Expression: 4. 5. Use Streams where a single variable is being iterated & item indices are not involved. Use Streams statelessly. Prefer filter, map, count and sum usage – avoid more complicated reductions since these are difficult for other developers to follow. Use meaningfully named variables to aid understanding & debuggability. Generally, most of developer prefer explicit 'for' loop to using Stream.forEach().we can use collect( Collectors.toList()) to collect resulting stream back to a list, for an imperative 'for loop' to iterate over. D. Optional 'Optional' is a wrapper type able to hold optional values. Java 8 APIs use it for methods (eg. Stream.findFirst). which may not find a result. Its most useful capability is function chaining – Optional supports the map and filter operations, but does not execute these on an 'empty' value and will just return Optional.empty of the appropriate result type. Now, the below example is with the help of lambda expression. III. CODE DEVELOPMENT STANDARDS A. Eclipse In a matter of minutes, we can add some tools to eclipse that help us to keep consistently formatted code (as well as keeping consistent with coding standards that do not relate directly to the format of our code). C. Stream API with Collections Stream API is one of the very important features introduced in Java 8, which is defined in java.util.stream package. A stream API represents a sequence of constituents and supports different kind of operations and instance does not modify from source. Stream API can be used with collections when we need to process bulk data operation by using Map, List, Array List, Set and other data structure. The source can be refers to a collections, Arrays and IO operation who provide data to the Stream API. Stream maintains the order of data as it presents in source. As like Java 8 supports functional Formatter: The eclipse Java > Code Style > Formatter Preference page allow us to manage our code formatter profiles for the Java code formatter. Installation: To use it in your workspace: 1. Select Window > Preferences from the menu bar. 2. Select Java > Code Style > Formatter. 3. Press Import..., browse to the file sonatacore/ide/eclipse/JavaFormatter.xml and press OK. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 48 Java 8 New Features and Development Standards Formatting files/sections: To use the formatter when coding to format a section of code, highlight that section and press Ctrl + Shift + F. You can also format the entire file by doing that same without highlighting anything. Formatting an entire file should be avoided when modifying existing files since it causes difficulties when comparing revisions. Class Naming (and types in general): Class or type names should concisely convey the high-level (business level) purpose of the type within the Project codebase, but be able to differentiate it from likely others. 1. 2. The name should convey the domain entity it expresses or interacts with; Plus the technical role (eg. DAO, Service, Integration layer, Strategy) it plays. Choose names with the degree of generality/ specificity appropriate for long-term design expectations (see below). Save Actions: You can also tell eclipse to automatically format the code you modified when you save the file. To do this: 3. 1. 2. 3. Remember that: Select Window > Preferences from the menu bar. Select Java > Editor > Save Actions. Select perform the selected actions on save, Format source code, Format edited lines (you should not format the entire file for the same reasons as mentioned above) and Organize imports. 1. 2. 3. Check Style: A java check style configuration includes in the java project that is designed to match the java formatter. It can be used to check your code against the coding standards and display warnings in the editor where the coding standards are violated. This makes it very easy to make sure we are writing consistent code. Generality vs Specificity of Naming: Simple names indicate more general behavior & a simple, more obvious & easier-to-understand system. Longer names indicate more-specific behavior & should be used in more-specific usecases (not the most general or default usecase). Plug-in Installation: The configuration file requires in the eclipse-cs plugin found at http://eclipse-cs.sourceforge.net/. The instructions are on the website but if you are familiar with installing eclipse plug-ins, all you need to know is the update site which is: http://eclipsecs.sf.net/update/. 1. 2. After you have installed the plug-in, you need to import the check style configuration and activate it for your projects: 1. 2. 3. 4. Select Window > Preferences from the menu bar. Select Checkstyle. Press New.... Choose the External Configuration File type, provide the complete path of file and press OK. 3. 4. Simple names are often best; use these for longterm general/ primary behavior. Remember having identified these types as general, the implementations can be evolved forwards; they don't have to meet all future requirements now, just be reasonably identified & evolvable to do so. Naming must of course be sufficiently selective, to distingueish the type within project. Use longer and specific names for functionality which is not the general standard. General functionality should be named in terms of the high-level business purpose (in abstract), not the technical details which it encapsulates. Now, for every project you want to use it with: 1. 2. Naming should convey business purpose, first & foremost. Implementation details, unless relevant to the calling contract, should be encapsulated and therefore not exposed in the name. Generally-named classes can evolve forwards with required general business functionality, but it is hard to rename overly-generally named types. Right click on the project. Select Checkstyle > Activate Checkstyle. Method Naming: Method names must concisely convey the high-level (business level) purpose of the method within the java project codebase. B. Class & Method Naming Guidelines Naming is one the most important aspects of design, as it very crucial to establishing and conveying the meaning & sense of a design to others. 1. These guidelines establish conventions for naming of classes & methods. Method names must generally convey a verb and an entity – in OO programming, the object class may sometimes imply one of these (typically the entity). Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 49 Java 8 New Features and Development Standards 2. 3. 4. Simple names are often best; use these for longterm general/ primary behavior Remember having identified these methods as general, the implementations can be evolved forwards; they don't have to meet all future requirements now, just be reasonably identified & evolvable to do so. More specific behaviors should be given qualified (more specific) names. Significant Operations or Values in Code: Other significant code elements can be commented. Elements which may be worth commenting include: 1. 2. 3. Success or failure return values Important calculations or operations Significant values Properties: Properties (getter & setter) with minimal behavior, should be considered as a single logical element. C. Java Coding Commenting & Documentation Guidelines Class-level Javadoc: Class Javadoc must establish the purpose & key lifecycle/ interactions/ usage of a class within the wider codebase. 1. 2. Properties with minimal behavior should be given a single Javadoc. Methods with no behavior (just state) should be written on a single line. REFERENCES 1. 2. 3. 4. 5. Headline stating the business name of the class (which should be its purpose); qualified with the context in which to understand that purpose. Bullet points stating key business or technical facts important to know, when using the class. Provide key interaction and usage. Where possible, link to the relevant functional spec. It is allowable to state the @author. [1] [2] [3] Method Javadoc: Method Javadoc must establish the purpose & usage of a method within the class. 1. 2. 3. 4. 5. 6. [4] [5] Headline stating the business name of the method (which should be its purpose); qualified with any further context needed to understand that purpose. Bullets below stating significant business or technical "wrinkles" which are important to know. eg. answered behavior if data is not found. exceptions, formal parameter & return value descriptions etc are considered fairly obvious. They are preferred not to formalize for most cases (unless otherwise ambiguous). treat properties Within the class, separate distinct topical groups of methods with additional whitespace or dash bars. [6] [7] [8] [9] Pankaj Kumar August 3, 2013 [Online]. Available at http://www.journaldev.com/1789/java-reflection-tutorialfor-classes-methods-fields-constructors-annotations-andmuch-more#get-class-object [Accessed at 27/01/2015] Andreas Jan 30 '14, How to get Method Parameter names in Java 8 using reflection? [Online]. Available at http://stackoverflow.com/questions/21455403/how-to-getmethod-parameter-names-in-java-8-using-reflection [Accessed at 25/01/2015] Oracle. (2014) Compact Profile [Online]. Available at http://docs.oracle.com/javase/8/docs/technotes/guides/compa ctprofiles/compactprofiles.html [Accessed at 20/01/2015] AJITESH, K. (2014) Why & When Use Java 8 Compact Profiles? [Online]. Available at http://vitalflux.com/whywhen-use-java-8-compact-profiles/ [Accessed at 05/02/2015] Jim Connors-Oracle. (2013) An Introduction to Java 8 Compact Profiles [Online]. Available at https://blogs.oracle.com/jtc/entry/a_first_look_at_compact [Accessed at 07/02/2015] Slides from deck presented at EclipseCon Europe 2011, on November 2nd in Ludwigsburg, Germany [Online]. Available at http://www.oracle.com/technetwork/articles/ javase/beta2-135158.html [Accessed at 15/02/2015] Mario, F. (2013) Why We Need Lambda Expressions in Java Part 1 [Online]. Available at http://java.dzone.com/articles/why-we-need-lambdaexpressions 03.27.2013 [Accessed at 25/02/2015] Brian, G. (2014) java magazine, Lambda Expression, pg6 [Online]. Available at http://www.oraclejavamagazinedigital.com/javamagazine_open/20140304#pg7 [Accessed at 17/02/2015] Anton, A. (2013) Java 8 Revealed: Lambdas, Default Methods and Bulk Data Operations [Online]. Available at http://zeroturnaround.com/rebellabs/java-8-revealedlambdas-default-methods-and-bulk-data-operations/ [Accessed at 19/02/2015] Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 50 SOLAR AND WIND ADVANCED WEATHER MONITORING SYSTEM AT DMIETR CAMPUS 1 SAGAR PARATE, 2RAHUL CHAUDHARI, 3PRANAY KAKADE, 4CHETAN BHATARKAR, 5 SHAILESH BARDE, 6LAXMIKANT AKKEWAR, 7SRUSHTI CHAFLE 1,2,3,4,5,6 B.E Final Year, Department of Electrical Engineering, DMIETR, Wardha. Assistant Professor, Department of Electrical Engineering, DMIETR, Wardha. E-mail: 1sparate2907@gmail.com, 2rchaudhari661@gmail.com, 3pranaykakade3@gmail.com, 4 bhatarkar.chetan001@gmail.com, 5shaileshbarde94@gmail.com, 6laxmikantakkewar@gmail.com, 7 srushtichafle@yahoo.com 7 Abstract - In present non-renewable energy source is decreasing day-by-day due to it overuses. . In the 21st century, nonrenewable sources are no longer fit to full fill our demand. Thus we required by using a conventional source like wind and solar we need to generating energy. This especially important country likes India where supply to demand ratio is very low. In this paper, we identify the geographical area for solar and wind energy generation at low cost. We can achieve and monitor atmospheric weather condition such as temperature, humidity, light intensity etc. Our system is designed which gathered all the parameter which are essentially of weather monitoring system. Keywords - Micro-controller Atmega328, Sensors, Wi-Fi Module, Wi-Fi Router. see the all reading directly on the PC as well as mobile. I. INTRODUCTION Weather monitoring system has been continuously monitoring system and thus we calculate and I. determine atmospheric conditions via sensors. Whether is determine by basic factors such as temperature, humidity, cloudiness, visibility, pressure and wind etc. Sun is the major contributor of our planet heat energy from sun create imbalanced in the temperature also wind which are different placed to placed in different regions. The sea plays a regulating effect on the climate, due to which there is an significant difference in the temperature, pressure and humidity between the interior regions of the country and the coastal areas. Especially country like India has several geographical advantage for implementation of power plants based on the renewable energy sources such as wind and solar. The tropic of cancer passes through Indian sub-continent, so the temperature factor is abundant to suitable all the needs of solar energy generation. Indian sub-continent is also near to the equator which gives into a tropical climate and monsoons. This type of climates is characterized by highly and regular winds across over the country. In fact, temperature conditions at very good particularly, In the states like Gujarat, Maharashtra, Rajasthan, Madhya Pradesh (M.P) & Chhattisgarh (C.G). However, analysis of weather in this regions are done foe these within the states to identify naturally cloudy or shadow regions like this. METHODOLOGY The weather station is built around open source microcontroller boards and electronic component. which our module is setup on the top of building being light in weight on indoor section of model sensors are setup for calculating the required the parameters and it stores in digital SD card (memory card). In this way calculate it for weekly, monthly and yearly on that basis. 1. Measured Variables The prototype whether station only measures six fundamentals whether data; temperature humidity, barometric pressure, wind speed, solar radiation. The prototype ran for one month the gathered data for this month test run were then interrupted and analysed to determine developed whether monitoring system for the desired specification of project. 2. Monitoring Hardware Our system is mainly based on microcontroller (Atmega328); it is the main interactive part of our system. It can also work as multifunctional work as in our project. Also required some intended sensor hardware are used in module such like as for temperature, humidity and wind speed on which application uses that sensors. DHT-22 is used measured temperature and humidity. For solar radiation pyranometer meter is used and for calculating wind anemometer is used. The above data is store micro SD card and real time clock (RTC) is used to detect date and time. 3. Data logging & Visualization By using this various sensors it can collected a lot more data and I was created to display current readings and logged data visualized through a graph which can be further display shown with the We are design a system, which can predict whether a particular places/areas is suitable for establishment the solar power plant as well as wind energy generation of plant. We are design and implemented at low cost and reliable system/module. We use WiFi router in module for collecting all type of sensor data (temp, wind, solar radiation) etc. Then we can Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 51 Solar and Wind Advanced Weather Monitoring System at DMIETR Campus microcontroller to interface with an SD card whether data recording during the setting interval and WI-FI module is also used for the continuously data collection. rectifies the ac input to the pulsating dc, which would further made constant at 5V with the help of filtercapacitor arrangement and voltage stabilizer so that any change in ac would not proportionally change to dc. In the design all parameters are connected to the microcontroller like pyranometer, anemometer and dht11. Pyranometer measures the solar radiation in W/m2, anemometer measures the wind speed or air velocity in kmph, dht11 which is measures the temperature in ⁰C and humidity in %. One SD storage board is connected to the microcontroller for storage of collecting data. Real time clock (RTC) is also interface with atmega328 for time and date. II. COMPONENTS USED Component Name Microcontroller circuit Board Pyranometer Anemometer SD Storage Board RTC WI-FI Module Specification Control all the parameters Measuring the solar radiations in W/m2 Measuring the Air velocity or Wind speed II. in kmph They are small storage device that are used to store the data backup such as the text, the pictures, audio and video. The clock/calendar provides seconds, minutes, hours, day, date, month and year qualified data. .Convenient, wireless technology, portability, and multiple connections. IV. TESTING TemperatureSolar panel placed at 35° for maximum power output with temperature rating 15° to 30°. 12noon to 3pm temperature is more compared with other time intervals. Here is the graph temperature vs. date. III. HARDWARE AND CIRCUIT DESIGN OF PROPOSED METER Graph1: Temperature in °C vs. Date HumidityHumidity affects efficiency of solar panel as it affects the current of solar panels. However, it has little effects on output voltages. When humidity is low then current is increase. The humidity is measured for a random sample of months or day and reading was taken every one day of month. Here is graph of humidity vs. date. Figure. : Circuit Diagram of Proposed Design From the design, first all input signal is applied to the circuit which is 230V AC. The bridge rectifier Graph2: Humidity in % vs. Date Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 52 Solar and Wind Advanced Weather Monitoring System at DMIETR Campus Wind speedWhen wind speed is low then insufficient torque exerted by the wind on the turbine blades to make them rotates. However, the speed increases, there is sufficient torque to produce electrical power. Here graph of wind speed in kmph vs. date. Graph3: Wind speed in kmph vs. date Table 1. Comparison of Temperature Measurements Table 2 Comparison of wind speed measurement RESULT CONCLUSION The graph for temperature and humidity represented in figure shows a trend for 12hour cycle, the highest temperature occurred between 1pm to 3pm. During those intervals the humidity is lowest and least temperature obtained between 5:30 pm to 8 pm during that period humidity is highest. The two variables are inversely proportional, sense the humidity decreases has the temperature is increases and vise-versa when the temperature decrease humidity is increases. This research focuses on analysed whether condition on various times and calculating what actual condition of whether condition of whether system. It can be monitoring, analysed it at low cost by advanced micro-controller (Adriano 328) platform and free wed service eponyms org the developed system readings with the various sensors where consistent and give the correct value throughout the one month testing and calculating it. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 53 Solar and Wind Advanced Weather Monitoring System at DMIETR Campus REFERENCES [1] [2] [3] Dev Gaurav, Dishant Mittal, Bhavya Vaidya, Jimmy Mathew, “A GSM Based Low Cost Weather Monitoring System For Solar and Wind Energy Generation”, The Fifth International Conference on the Application of Digital Information and Web Technologies (ICADIWT 2014). N.Manjula, Vinusha Mandava, “Low cost weather monitoring system for solar energy generation using WSN technology”, International Journal of Scientific Engineering and Technology Research- ISSN No.2319-8885, Aug-2015 Jess Christopher B. Lopez, Harreez M. Villaruz, “Low-cost weather monitoring system with online logging and data visualization”, 8th IEEE international confernce humanoid, [4] [5] [6] nanotechnology, IT communication and control, environmental management (HNICEM) The institute of Electrical and Electronics Engineers Inc.(IEEE)-Philippine Section 9-12 December 2015 Water front hotel, Cebu, Philippines Hanif M., M. Ramzan, M. Rahman, M. Khan, M. Amin and M. Aamir, “Studing Power Ouput of PV Solar Panel at Different Temperature and Tilled Angle”,. Isesco Journal of Science and Technology, volume 8, November 14, 2012. E. Gertz and P. Di Justo, “Humidity, Temperature and Dew Point”, in Environmental Monitoring with Arduino, 2012. P. Bhosale and V. Dixit. “Agricon-Weather Monitoring System and Irrigation Controller”, IOSRJECE, vol. 1, no. 6, pp. 5-11, August 2012. Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India 54