Uploaded by Abhijit Vakte

Proceedings

advertisement
PROCEEDINGS OF
IRAJ
INTERNATIONAL CONFERENCE
Date: 15th April, 2018
Venue: Pune, India
Organized by
In Association with
Corporate Address
IRAJ
Plot No. 161, Dharma Vihar, Khandagiri, Bhubaneswar, 751030
Odisha, India
www.iraj.in
Publisher: IRAJ
2018, Pune International Conference
No part of this book can be reproduced in any form or by any means without prior written
permission of the publisher.
Type set & printed by:
R. K. Printers
Khandagiri, Bhubaneswar
About IRAJ Research Forum (IRF):
The IRAJ Research Forum is an international non-profit academic association under
‘Peoples Empowerment Trust’ with the stated goals of promoting cooperation
among scientists, defending scientific freedom, encouraging scientific responsibility, and
supporting scientific education and science outreach for the betterment of all humanity. It is
the one of the world's largest and most prestigious general scientific society.
Objective of IRF:
 To provide a world class platform to researchers to share the research findings by






organizing International/National Conferences.
To use the research output of the conference in the class room for the benefits of the
students.
To encourage researchers to identify significant research issues in identified areas, in
the field of Science, Engineering, Technology and Management.
To help dissemination of their work through publications in a journal or in the form of
conference proceedings or books.
To help them in getting feedback on their research work for improving the same and
making them more relevant and meaningful, through collective efforts.
To encourage regional and international communication and collaboration; promote
professional interaction and lifelong learning; recognize outstanding contributions of
individuals and organizations; encourage scholar researchers to pursue studies and
careers in circuit branches and its applications.
To set up, establish, maintain and manage centers of excellence for the study of /on
related subjects and discipline and also to run self supporting projects for the benefit
of needy persons, irrespective of their caste, creed or religion.
About Institute of Research and Journals:
IRAJ is an advanced Non-profit technological forum under Peoples Empowerment Trust ,
for the Researchers & Scholars "to promote the progress of Science and Technology “ by
displaying their knowledge in the vicinity of Science and Technology for the service of
mankind and the advancement of general welfare. We are standing tall in the field of
Research & Technology since 2013, our objective is to provide a platform which will
promote, encourage and support Scholars, Researchers & Professionals to carry and
accomplish their research work.
Conference Committee
Program Chair:
Prof. R. M. Khaire
Professor, COE,
B. V University, India
Prof. Deepak Ray
COE, Bharati Vidyapeeath,
Pune, India
Prof. R. N. Barik
Chairman, IRAJ Research Forum
Mail: chairman@iraj.in
Conference Convener:
Miss. Sumita Nayak
Mob: +91-8280047516
Mr. J.R. Pattanayak
Mob: +91-8280047487
Publication Head:
Mr. Manas Ranjan Prusty, IRAJ, India
INTERNATIONAL ADVISORY MEMBERS
Prof. Goodarz Ahmadi,
Professor, Mechanical and Aeronautical Engineering,
Clarkson University, USA
Dr Chi Hieu Le,
Senior Lecturer, University of Greenwich.
Kent ME4 4TB. United Kingdom
PROF. (ER.) Anand Nayyar
Department of Computer Applications &
I.T.KCL Institute of Management and Technology,
Jalandhar G.T. Road,Jalandhar-144001, Punjab, India.
Prof. R. M. Khaire,
Professor, Dept. of Elex. and Telecommunication,
B, V University, India
Dr.P.Suresh,
Professor, Karpagam College of Engineering,
Coimbatore, Tamilnadu
Mark Leeson
Associate Professor (Reader)
Area of Expertise: nanoscale communications, evolutionary
algorithms, network coding and communication systems
Dr. P. K. Agarwal
Professor, Deptt. of Civil Engineering,
MANIT Bhopal ,Ph. D: IIT Kanpur
M.E: Civil Engg.IIT Roorkee, Membership:
Indian Road Congress (IRC), Institute of Urban Transport (IUT)
Shahriar Shahbazpanahi
Islamic Azad University,
Department of Civil Engineering, Sanandaj,
Kurdistan, Iran, PhD (Structural Engineering),
University Putra Malaysia, Malaysia ,
2009-Present
Harun Bin Sarip
Head of Research and Innovation Dept, UniKL-MICET
Doctorate: Université de La Rochelle, France
Member : International Society of Pharmaceutical Engineer,
Singapore Chapter
Dr.Bilal Ali Yaseen Al-Nassar
The World Islamic Sciences and Education University (WISE)
Faculty of Business and Finance, Department of Management
Information System (MIS), Amman- Jordan
Dr. Md. Al-Amin Bhuiyan
Associate Professor, Dept. of Computer Engineering
King Faisal University, Al Ahssa 31982, Saudi Arabia
Prof. (Er.) Anand nayyar
Department of Computer Applications & I.T.
KCL Institute of Management and Technology,
Jalandhar, G.T. Road, Jalandhar-144001
Punjab, India
Prof. Aleksandr Cariow
Institution or Company: West Pomeranian University of
Technology, Szczecin
Dr. P. K. Agarwal
Professor, Deptt. of Civil Engineering,
MANIT Bhopal ,Ph. D: IIT Kanpur
M.E: Civil Engg.IIT Roorkee,
Membership: Indian Road Congress (IRC),
Institute of Urban Transport (IUT)
Prof. Lalit Kumar Awasthi,
Professor, Department of Computer Science & Engineering
National Institute of Technology(NIT-Hamirpur),
PhD, IIT, Roorkee, M. Tech, IIT, Delhi
Dr. Chandra Mohan V.P.
Assistant Professor, Dept. of Mech. Engg., NIT Warangal,
Warangal. Ph.D : Indian Institute of Technology(IIT),Delhi
M.B.A: Alagappa University
Dr. VPS Naidu
Principal Scientist & Assoc. Prof., MSDF Lab, FMCD
CSIR - National Aerospace Laboratories,
Bangalore, India
Prof. I.Suneetha,
Associate Professor, Dept. of ECE, AITS, Tirupati, India
Mr. P. Sita Rama Reddy
Chief Scientist ,Mineral Processing Department, CSIR –
Institute of Minerals & Materials Technology
Bhubaneswar, India, M.Tech. (Chem. Engg., IIT, KGP)
Dr.S. Chandra Mohan Reddy,
Assistant Professor (SG) & Head,Dept. of Electronics &
Communication Engineering, JNTUA College of Engineering,
Pulivendula, Ph.D,J.N.T. University Anantapur, Anantapuramu
Dr.P.C.Srikanth,
Professor & Head, E&C Dept, Malnad College of Engineering,
Karnataka, Senior Member IEEE, Secretary IEEE Photonics
Society, M.Tech: IIT, Kanpur, Ph.D: In IISc Photonics lab
Gurudatt Anil Kulkarni,
I/C HOD E&TC Department, MARATHWADA MITRA
MANDAL’S POLYTECHNIC

TABLE OF CONTENTS
Sl. No.
01.
TITLES AND AUTHORS
Ayn Rand: A Life of Paradox
Page No.
1-4
 Amruta Sharma, Ashutosh Dubey
02.
Comparisons on the Ideal Man with Special Reference to Ayn Rand
5-7
 Amruta Sharma, Ashutosh Dubey
03.
Cross-Platform Identification of Anonymous Identical Users in Multiple Social
Media Networks
8-12
 Ashok Nangare, Rahul Mahajan, Abhijit Somavanshi, Arman Tamboli, Amol
Khutegave, Dhanraj Jadhav
04.
A Secure Public Auditing of Cloud Data with Fragmentation and Replication
13-17
 Neha R. Patil, S. R. Patil
05.
A Survey on Text Mining and Machine Learning Techniques for Product Review
Classification
18-21
 Abhijit Vakte, Nishad Tardalkar, Damini Thorat, Ratanraj Sankeshwari,
Madhuri Karnik
06.
Sentimental Analysis on News Data for Stock Market Prediction
22-24
 Juhi Gupta, Anshul Jain, Yash Bohra
07.
MAKS: Server Health Monitoring using Kafka
25-28
 Amit Kumar Srivastava, CRS Kumar
08.
Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass
of Formula Student Racing Car

09.
29-33
Arun Nair, Shruti Kawade, Bryan Dias, Ivan George, Dhiraj K. Bhandarkar
Design of Regenerative Brake Test Rig
34-38
 Bhushan C. Nikampatil, Sanjay T. Satpute, Lalitkumarm. Jugulkar
10.
Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by
Incompressible Chevron Jet using CFD
 Harpreet Singh, Sunil Chandel
39-42
11.
Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled
Combat Vehicle
43-46
 Harshal Pingale, S.V.Nimje, Nilesh Patel
12.
Java 8 New Features and Development Standards
47-50
 Madhuresh Kumar
13.
Solar and Wind Advanced Weather Monitoring System at DMIETR Campus
 Sagar Parate, Rahul Chaudhari, Pranay Kakade, Chetan Bhatarkar, Shailesh
Barde, Laxmikant Akkewar, Srushti Chafle

51-54
Editorial
l
Good teaching emanates from Research. The teachers’ love for research and their
experience in research are vital for the growth of the institution. Any institution is judged by
the level and extent of the research work it accomplishes. This sets in a regenerative cycle of
excellence. Experience of research leads to quality teaching and quality teaching imparted to
the young in turn enriches the research. The campus dynamics needs such type of research
teaching research environment.
Technology is the non-linear tool available to humanity, which can affect fundamental
changes in the ground rules of economic competitiveness. Science is linked to technology
through applications. Technology is linked to economy and environment through
manufacture of knowledge products. Economy and environment are linked to technology,
which promotes prosperity to the society. We have to use innovation to generate high value
added products for becoming a global player. The foundation for academic excellence is the
research.
Let us take would like to give, how you young friends can become a great inventors
or discoverers. What is the unique nature of thinking minds of discoverers and inventors of
the world. "Inventions and discoveries have emanated from creative minds that have been
constantly working and imaging the outcome in the mind. With imaging and constant effort,
all the forces of the universe work for that inspired mind, thereby leading to inventions or
discoveries". Now there are three unique friends to make you great; they are great books,
great human beings and great teachers. Teachers should have the capacities to nurture the
"creative minds" and "imagining minds".
So this conference has been designed to stimulate the young minds including
Research Scholars, Academicians, and Practitioners to contribute their ideas, thoughts and
nobility in these disciplines of engineering. It is a pleasure to welcome all the participants,
delegates and organizers to this International Conference on behalf of IRAJ Research Forum
and ITR family members. This conference has received a great response from all parts of the
country and abroad for the presentation and publication in the proceedings. I sincerely thank
all the authors for their valuable contribution to this conference. I am indebted towards the
Reviewers and Board of Editors for their generous gifts of time, energy and effort for the
Conference.
Editor-In Chief
Prof. R. M. Khaire
Professor, COE,
B. V University, India
AYN RAND: A LIFE OF PARADOX
1
AMRUTA SHARMA, 2ASHUTOSH DUBEY
1
Asst. Professor, School of Interdisciplinary Sciences, Symbiosis University of Applied Sciences, Badabangadda, Super
Corridor, Near Airport, Indore 453112.
2
Professor and HOD, Department of English, Mata Jija Bai Govt. Girls’ P.G. College, Opposite to Collector Office, Near Lal
Bagh Palace, Indore.
E-mail: 1sharma_amruta@yahoo.co.in, 2ashudubey63@gmail.com
Abstract - The paper presents a study of the inherent paradox in the life and works of Russian-American philosopher and
novelist Ayn Rand. It presents the incidences from Rand’s own life where she absolutely diverted from her own philosophy.
In addition to this, it combines and compares an analysis of her literary theory with the kind of characters she carved and the
titles of her works again representing a contrasting image. This qualitative work undertakes an empirical study of her life and
works and then critical analyzes and interprets the same for the purpose of this research paper.
Keywords - Ayn Rand, We the Living, The Fountainhead, Anthem, Atlas Shrugged, Paradox, Philosophy, Objectivism.
However as fate had it, Rand got a chance to visit her
cousin in Chicago under the name of educational
research in a foreign country and she escaped Russia
never to come back.
Rand supported herself by writing film scripts for
some producers and chance made it possible for her
to meet up with the owner of a production house
Cecil B. DeMille himself, who offered her work. The
work at DeMille’s office didn’t only change her
literary career but also changed the course of Rand’s
personal life as she met the love of her life Frank
O’Connor there.
Theron, she wrote plays and novels and took over the
tumultuous and robust path to success. She used her
novels to establish her radical and iconoclast
philosophy of Objectivism which stirred a lot of
controversies. Her novels received contrasting and
extreme reviews and she faced a really tough time
while establishing herself both as a novelist and a
philosopher.
Moreover, because she used her novels as a vehicle of
her philosophy and also wrote extensively on the
literary theory of romanticism and fiction writing, all
of her works carry the same overtones of
individualism and become a culmination of her first
assertion in the field with We the Living.
Her writings were always rejected by several
publishers before the final print and she had a real
hard time finding the right publisher for her books.
Similar was the reception of her books, loaded with
negative reviews and questions posed to counter her
philosophy. But a master in the art of argumentative
conversation she always answered her critics with her
intellectual wit and vigour and established her novels
to be the most influential after the Bible even today.
I. INTRODUCTION
Ayn Rand was a Russian-American novelist and
philosopher whose birth year witnessed the bloody
Sunday in Russia. The Russian life, its values and
ethics changed manifolds during the initial years of
Rand’s Life. She witnessed a life of the elite class and
also bore the struggles of survival during the
Bolshevik reign. She chose to be a writer at the tender
age of eight in her life and started writing stories from
thereon. Even as a reader Rand never liked stories
imposing morality and loved the stories told in action
rather than narrative.
Rand was brought up by parents that encouraged
individualism and education. And though she
excelled academically she always found school
routines to be boring and mundane. The reasoning
philosopher in her always made her not only note
down what she liked or disliked but it also probed her
to define the logic behind her choices of doing so.
She defined her beliefs and values, from religion to
her earthly philosophy in her journals from the very
childhood. She declared at the age of thirteen that she
would be an atheist – asserting herself to be a person
of reason.
However, the comfort of her childhood and
adolescence was soon taken with the red flags waving
all over Russia. Her family was in miserable position
with everything taken away by the Bolsheviks,
including the roof over their head. But endowed with
strong determination and will power from the very
childhood, she enrolled in the state university as a
history student and studied philosophy as well. It was
during this time that Rand read many writers and
developed her tastes for some of them. She also
enrolled in the State Technicum for Screen Artswhere
she learnt the art of writing screenplays and film
reviews but the thought that she was living the Soviet
always troubled her. What she wanted to portray in
her stories and plays – heroism and individualism –
was only a method of ruining what she was left with
at hand, if done in Russia.
II. MANUSCRIPT
Starting with the very first novel of Rand, We the
Living, the background of the novel is that of a
communist setting. It seems that Rand sketches a
virtual Russia in front of her readers. A world where
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
1
Ayn Rand: A Life of Paradox
the most vibrant colour is red – the colour of the
Bolsheviks. The novel opens with waving red flags
and ends at the red of the blood. Rand herself
confessed in the Foreword of We the Livingthat, “We
the Livingis as near to an autobiography as I will ever
write” (2). The whole novel reads like a muffled
scream of that Rand wanted to make when she was in
Russia.
Secondly, her The Fountainhead, was an assertion of
an individual who refuses to comply with the
collective ideals. Howard Roark’s every act is an
open challenge to the collective minds.
Rand’s Anthemagain shows a ruin world captured by
the collectivists where humans have altogether lost
the meaning of the word ‘I’. Equality 7-2521 and
Liberty 5-3000 are able to make a separate world of
theirs. They are just able to achieve that end which
Kira in We the Living is not able to actualize. Kira’s
muffled scream gets a clear voice in Anthem.
So, if We the Living was closest to an autobiography,
then definitely the dynamic assertion of individualism
that is made in The Fountainhead and Anthemare for
sure an outcome of the fulfillment of Kira’s dreams
and desires and thus a manifestation of the ideal
world which Rand herself always yearned for.
Moreover, Rand’s utopian fantasy comes to the
uppermost surface in Atlas Shrugged where she
creates a world of the innovators, of the doers, of the
go-getters who migrate to a world where people trade
value for value, each one contributes and everyone is
unique. It is here that the core of Rand’s philosophy
of Objectivism is concretized in the oath that
everyone has to take before entering Atlantis - the
utopian land of the prime movers “I SWEAR BY MY
LIFE AND MY LOVE OF IT THAT I WILL
NEVER LIVE FOR THE SAKE OF ANOTHER
MAN, NOR ASK ANOTHER MAN TO LIVE FOR
MINE”(Atlas Shrugged 670).
However, when Rand was questioned about whether
her philosophy had any influence from the part of her
life she spent in Russia, she clearly refused. But if We
the Living was the closest to a memoir, if she had
ever written it, and further novels a culmination of the
fulfillment of the lost dreams of Kira, then definitely
the dramatic presentation of her philosophy in Atlas
Shrugged has to have an impact of Rand’s personal
experiences in life as well.
Moving from Rand’s novels to her characters, there is
a striking dichotomy in Rand’s characters if we look
at them through gender perspective. All of Rand’s
heroes – Howard Roark, John Galt, Equality 7-2521
are religious embodiments of Rand’s philosophy who
exemplified Rand’s ideal man. From the very
beginning of the novel to the end, they are the same
flat character. But if we take a close look at Rand’s
heroines from her very first novel’s Kira, to
Dominique Francon, and Liberty 5-3000, all are
portrayed as feeble, and dependent characters. Their
motivations are never internal but always external,
driven by the male protagonists of the novel. The
female characters of Rand do not materialize Rand’s
ideal man – which brings to notice another aspect that
Rand never wrote about ideal human being but
always mentioned the ideal man. Her women
characters were the ones that surrendered – Kira selfabnegates herself for Leo Kovalensky; Dominique is
raped by the hero Howard Roark; Liberty 5-3000
pleads to Equality 7-2521, “Do as you please with us,
but do not send us away from you” (Anthem 83).
To this intriguing split the only exception was the
character of Dagny Taggart in Atlas Shrugged. Dagny
was a powerful character but then Rand again
shocked the world when she was asked a question
that does she believe that one day a female president
would be there in The White House. She replied
saying, “I wouldn’t vote for her….. It is not to a
women’s personal interest to hold men. It puts her in
a very unhappy position. I don’t believe that any good
woman would want that position” (Ayn Rand on
Donahue 1979). She further added that she is not
against leadership positions for women. Women can
become senators and congressmen, which was alright,
but not President. Now, it is not to be mentioned here,
that a leadership position howsoever small it may be,
is a leadership position only and will need almost the
same characteristics.
Further, if we take a look at the title of Rand’s works
– whether novels or prose – they have always been
thought provoking in the sense that they have
juxtaposed terms that pose a question to the reader’s
intellect. The split is implied and inevitable. In her
novel, We the Living the people who are depicted as
living, are the people who die in the novel – Andrei
Taganov commits a suicide, Kira is shot dead, and
Irina and Sasha are sent to labour camp in Siberia but
to die.
In addition to this, about the title of Anthem Rand
said that she saw the story as an ode to man’s ego but
named it Anthem because she found it as a religiously
toned word demanding the reverence. However,
while demanding that reverence Rand forgot to see
the very core concept of an anthem, that is, it is
always sung in unity, together. In its most general
meaning, it is a song of praise sung together – which
implies the Anthem to be a collective praise of
individualism – a contradicting title in itself.
The Fountainhead, earlier named as the Second-Hand
Lives is another novel where the title is meant to be
the original source from which stream flows. Here
however, the way Roark’s character is depicted, he is
shown as a fountainhead of ego, yes, but leading to
no stream. Roark never does, nor ever wish to
influence someone by his goodness. Moreover, the
way Roark is, he neither would appreciate someone
keeping him as a source, but would want them to be
their own intellectual resource. In a sense then
Roark’s goodness never flows, he exists for his own
sake and that is how Rand actually defined his ideal
man, an end in himself. This very fact then opposes
the logic behind individualists being the
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
2
Ayn Rand: A Life of Paradox
fountainhead. They exist for their own sake but not as
a source for others. Like Howard Roark says in his
courtroom speech.
“No creator was prompted by a desire to serve his
brothers, for his brothers rejected the gift he offered
and that gift destroyed the slothful routine of their
lives. His truth was his only motive. His own truth,
and his own work to achieve it in his own way. A
symphony, a book, an engine, a philosophy, an
airplane or a building—that was his goal and his life.
Not those who heard, read, operated, believed, flew
or inhabited the thing he had created. The creation,
not its users. The creation, not the benefits others
derived from it. The creation which gave form to his
truth. He held his truth above all things and against
all men” (The Fountainhead).
Moving further, if we look at the novel of Rand that
brought the greatest name and fame to her – Atlas
Shrugged, there is an allusion to Greek Titan Atlas
who held the sky for eternity as a punishment by
Zeus.Atlas was given this punishment because he was
known for his endurance. With the name of Atlas,
Virgil crowned the adjective which meant hard, and
enduring. However, in Rand’s novels, all her heroes
and doers are Atlas who carry the burden of the earth
on their shoulders. And they unlike Atlas shrug from
their duties, leading to a chaos in the world they leave
behind. The allusion to Atlas and the verb shrug
create a much needed dread but do not let the reader
succumb to it. For it is also well known in mythology,
that even when Atlas was once relieved from his
punishment for a while by Heracles making a
substitute for him, and he was tempted to shrug, he
did not do it. Thus, the only question the title imposes
is what if?
In addition the titles of her novels, the titles of her
prose works have been equally contradicting. For
example, The Virtue of Selfishness is one such book
the title of which intrigues the reader. Selfishness,
which has denotative meaning as concern with one’s
own self in the dictionary has a connotative morality
attached with it that in itself assumes selfishness as a
negative quality. When attaching the word Virtue
with its title Rand made the room for argument
herself because she tried to reveal the positive aspect
of the negative trait. And although, her arguments in
the book do suffice to her point very well, still the
urge that the book’s name creates – to be virtuous by
being selfish is something that is not still well
accepted.
She has created similar controversies by calling
Capitalism as the unknown ideal, and questioning
about the need of Philosophy in her book Philosophy:
Who Needs It?
Beyond her professional life if we venture into
Rand’s personal life, she proclaimed to have received
no help from anyone in her life but she very much
took the help of her relatives in coming to the US and
staying at their home in the initial years of her life at
US.
Asserting the philosophy of individualism, she
developed a group of her fans, who came to her home
at the weekends and discussed about her philosophy.
Intriguingly, Rand named this group as ‘The
Collective’. The very idea of a group of people
named as the Collective discussing about
Individualism was a mockery of the whole premise
and idea of individualism.
Rand also had an extra-marital affair with Nathaniel
Branden which she justified talking about the oneness
of romantic love and intellectual ideals. She
demanded and thus got freedom from the spouses of
both for carrying her affair with Branden but when
Branden tried to break the bond, she did not respect
his free will, but rather abused, accused and even
slapped him thrice. She never thought ever, even for
the slightest while, about Branden’s individual
choices and assertions. When Branden wrote an
apology, she did not even read the letter sent by
Branden beyond two pages and just assumed what he
had to say further.
Similarly, even after opposing charity, tax systems
and everything similar, all through her life, there is
much debate on her availing the option of social
security at the end of her life.
Also, once in an interview by Mike Wallace she
declared that a weak man or a woman doesn’t deserve
to be loved. And when Wallace asked her about
supporting her husband financially, and yet being
loved by her, she changed the criteria for his value
judgement altogether. She declared his worthiness for
giving her the pleasure she wanted and not being an
altruist in love.
Thus Rand’s whole life was full of such confutations.
Her novels which professed to establish her
rationalistic and intellectual philosophy were full of
sensuous and non-literary elements that did read like
one of the cheap soap operas.
She wrote at length about the virtue of reason over
emotion but could not save herself from being a slave
to her own emotions when it came to her personal
life.
And unlike her oath of Atlantis she always ruled the
lives of other men and women around her with
utmost dictatorship.
Under the name of a rational philosophy she brought
forth the concept of selfishness, where people who
did not care for the underprivileged could justify and
sanction their own acts under the name of
Objectivism.
CONCLUSION
Though Rand created voluminous questions and
controversies through her novels and her philosophy,
she managed to justify every tenet of it by counter
arguing and proving, at least through language, the
baselessness and uselessness of other existing
philosophies.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
3
Ayn Rand: A Life of Paradox
[4]
She further declared Objectivism to be the only
philosophy based on rational self-interest and was
successful in proving her case too whenever someone
argued with her.At times she did not even hesitate to
dismiss a question, without hearing it fully, calling it
to be irrational and insulting.
But what she could not do, was exemplify in person
and in her writings as well, the perfect manifestation
of her philosophy. And if she did it at all, in the
characters of Roark and Galt, she created a separate
world – peopleexisting in isolation – whichis not how
human beings live. Also, it is only when a man exists
in isolation does he need others the most, like Rand
needed social security at the end of her life.
She tried to create Atlantis in her real life, with the
people of her concern, but failed miserably in the will
to gain absolute power over their lives and mind just
like the World Council, Ellsworth Toohey and the
dictators of Atlas Shrugged.
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
REFERENCES
[1]
[2]
[3]
[15]
Branden, Barbara. "Full Context Interview." Barbara
Branden. Webmaster, 1998. Web. 20 Sept. 2017.
Branden, Barbara. The Passion of Ayn Rand. New York:
Anchor, 1987. Print.
Britting, Jeff. Ayn Rand. Woodstock, New York: Overlook,
2004. Print.
[16]
[17]
[18]
Cunningham, Darryl. "Ayn Rand." Act-i-vate. N.p., n.d.
Web. 28 Dec. 2015.
Heller, Anne C. Ayn Rand and the World She Made. India:
Tranquebar, 2010. Print.
Rand, Ayn, and Michael S. Berliner. Letters of Ayn Rand.
New York: Penguin USA, 1997. Print.
Rand, Ayn, and Nathaniel Branden. The Virtue of
Selfishness: A New Concept of Egoism. New York: New
American Library, 1964. Print.
Rand, Ayn, and Robert Mayhew. The Art of Nonfiction: A
Guide for Writers and Readers. New York: Plume, 2001.
Print.
Rand, Ayn, and Tore Boeckmann. The Art of Fiction: A
Guide for Writers and Readers. New York: Plume, 2000.
Print.
Rand, Ayn, David Harriman, and Leonard Peikoff. Journals
of Ayn Rand. New York: Dutton, 1999. Print.
Rand, Ayn, Michael S. Berliner, and Leonard Peikoff. Letters
of Ayn Rand. New York: Plume, 1997. Books.google.co.in.
Web. 5 Jan. 2016.
Rand, Ayn,, Nathaniel Branden, Alan Greenspan, and Robert
Hessen. Capitalism: The Unknown Ideal. New York: Signet,
2008. Print.
Rand, Ayn. Anthem. New York: Signet, 2013. Print.
Rand, Ayn. Atlas Shrugged. New York: New American
Library, 1971. Print.
Rand, Ayn. For the New Intellectual. New York: New
American Library, 1964. Print.
Rand, Ayn. The Fountainhead. New York: Signet, 1971.
Print.
Rand, Ayn. The Romantic Manifesto. New York: Signet,
1971. Print.
Rand, Ayn. We the Living. New York: Signet, 2011. Print.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
4
COMPARISONS ON THE IDEAL MAN WITH SPECIAL REFERENCE
TO AYN RAND
1
AMRUTA SHARMA, 2ASHUTOSH DUBEY
1
Asst. Professor, School of Interdisciplinary Sciences, Symbiosis University of Applied Sciences, Bada Bangadda, Super
Corridor, Near Airport, Indore 453112.
2
Professor and HOD, Department of English, Mata Jija Bai Govt. Girls’ P.G. College, Opposite to Collector Office, Near Lal
Bagh Palace, Indore.
E-mail: 1sharma_amruta@yahoo.co.in, 2ashudubey63@gmail.com
Abstract - The paper presents a comparative study of the concept of an ideal man as in different philosophies with special
reference to the concept of ideal man by Russian-American philosopher Ayn Rand as portrayed in her novels. The paper
aims to find the common thread, if any, that exists in all the definitions. This work considers the philosophical premises
established by different thinkers in the world, presents an in-depth analysis and Rand’s ideal man and then compares and
contrasts its implications with other premises.
Keywords - Ayn Rand, Philosophy, Man, Ideal.
choose. Man is endowed with a brain which helps
him to decide beyond stimuli, talk beyond time, and
think ahead of immediate circumstances, which other
animals cannot do.
Man though is an organic animal made of flesh and
blood with basic instincts and sensory perceptions of
pain and pleasure still he is far beyond the reach of
any other on this planet. The individualistic view of
man where he can assert his individual discretion
makes him the master of his own destiny. In addition
to this, the moral and religious nature of man helps
him to achieve that which is beyond him, a union
with the mystical.
So being a complex creature that he is, Philosophers
have hitherto explained man differently in different
times and ages. The ancient era of philosophy
considered human beings as an infinitely small
element of the vast universe and were more inclined
toward the powers of the universe. But since Socrates
the view and importance of man has changed
manifolds.
Socrates was the first philosopher to have had a keen
interest in human life and its intricacies. He sought at
length discussions with people around him talking
about their likes, dislikes, and many other things and
then also probing an enquiry into why they thought
what they thought. But Socrates never intended to
influence the thinking of others rather wanted people
to find out their own truths.
However, we don’t have any written treatise from
Socrates and it was only through his disciple Plato
that we came to know about the Socratic
phenomenon. Socrates did not undermine the
importance of man but recognized and avouched his
supremacy over all other animals. He considered
social life and justice to be indispensable to human
growth and also separated the material and
intellectual existence of man as the soul and the body.
He considered the soul to be the guidepost of a man
and thereof laid a lot of stress on nurturing it as well.
I. INTRODUCTION
Ayn Rand was a Russian-American novelist and
philosopher who established her philosophy of
Objectivism through her novels. Her novels portray
stories of individualists asserting themselves in the
collective ideals present in the society. She believed
in portraying man as he ought to be rather than man
as he is. She had no interest and was actually against
the fundamentals of Naturalism and Realism. Like
her ideal Aristotle, she considered fiction of higher
philosophical significance than history because,
“history represents things as they are, while fiction
represents them as they might be and ought to be”
(The Romantic Manifesto 71). She insisted on the
purpose of art, which she considered was to show not
to instruct. And she said, that it is only through art
that men can ever visualize their highest potentials.
Writing on her beliefs and her philosophy, all of
Rand’s novels portray the ideal man. Man as he
should be and can be. She implanted the image of her
ideal man mostly by showing how mostly men
actually are. She asserted through negation. And that
was the strength of her characterization.
However, the way Rand has portrayed her ideal man
is by drawing up the image of a man who has
perfectly exemplified her philosophy. But Rand’s
philosophy in itself was very controversial and so
Rand’s ideal man’s image. Moreover, her image of
the ideal man also could not meet most of the
philosophies existing in the world. So, after defining
Rand’s ideal man and ideal men of other
philosophies, a comparison on the same has been
undertaken to meet the closest semblance in the same.
II. MANUSCRIPT
Human beings are by far the most developed animals
on earth and what sets them apart from all the other
animals is their capacity to exercise their volition and
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
5
Comparisons on the Ideal Man with Special Reference to Ayn Rand
He argued that the knowledge of one’s own thought,
reasoning and nature would help man to understand,
control and influence his own behaviour. In a sense
then knowledge can take man to those heights which
he himself doesn’t believe and know of.
Furthermore, Aristotle added to the Greek thought
and stressed on human being’s capacity to speak and
meditate. But his most startling declaration was about
the limitation of human knowledge and its validity.
However, he stressed that the nature of education
should be such that it helps to imbibe virtues.
Aristotle’s method was more practical and liberal as
well and he never denied to quench the desires of the
material self, but he always warned not to forget the
need for an absolute supremacy of reason in a man’s
life and actions.
It is there that Ayn Rand grabbed the essence of
Aristotelian Ethics and set forth a new philosophy of
her own, more suitable and apt to the age in which
Rand was living. In addition to this when Rand
defined her ideal man and the philosophy associated
with him, she started right off from the need for a
conscious philosophy and went to deliver a lengthy
thesis defining the same. In this process she also
sufficed reasons for not adhering to the current
philosophies and the faults with them in general.
Rand was in serious opposition of the view of man
which tells that man is born with a sin, to suffer and
repent. She hated the crucifixion of Jesus Christ for
she considered that an ideal man is to be applauded
not crucified.
She turned down both mysticism and socialism as
both these philosophies told men to do everything for
either the supreme power which is unknown and
unseen or the society which is nothing but a gang of
powerful people.
She argued that the Nietzschean egoists, representing
absolute free will, came into being only to represent
the other side of the altruist coin which induced a
subconscious enmity in humans against morality as it
tells man that he can either be happy or moral but not
both.
But Rand considered the worst part of all this as the
quandary of human beings wherein they choose any
which of these philosophies as and when it suits
them. They just don’t stick to a code of ethics and
therefore are even not concretely aware of their own
conscious philosophy.
Therefore Rand defined the philosophy of
Objectivism keeping in mind man as he should be
and not man as he actually is. She detailed an ideal
man to be a man existing for himself not for others.
She refuted the very idea of men as their brothers’
keepers. Her ideal man does not sacrifice for others
nor expects any sacrifice from anyone. His
philosophical premise is that of rational self-interest
and the highest virtue for him is the pursuit of his
very own happiness which he derives from adhering
to his own conscious philosophy and principles in
life.
Rand also asserted Objectivism to be based on reality
as it is with the reasoning capacity of an individual as
a tool to realize and perceive this reality. Man must
live by the sole reasoning and judgment of his mind,
and his actions should also be only guided by his
reason and nothing else.
Rand also made it clear that to serve others is not a
negative quality but if that’s assumed to be a
compulsion on mankind then it is not correct.
Moreover, she asserted that such a relationship can
only be possible in long term when any man agrees
with the other person’s values and philosophy.
Thus her ideal man is not afraid to show his real self
to others, he is productive and contributes for the
betterment of society in some way or the other and
never places anybody over and above his own
individual and creative pursuits. Thereof comes the
role of rational self-interest and rational-selfishness
into Rand’s philosophy. She declared virtue and not
feelings and emotions as the deciding factor in all
kinds of relationships including romantic love.
Further, if we take a look at the Jewish concept of
man, it is quite the contrary of what Rand proposed.
According to the Jewish beliefs a man is always in
search of something greater than himself, a
justification of his existence, a meaning for his being.
And so, man never exists as an end but always
questions his very existence – the question being –
Will he also like other animals just take birth and die?
Is that it? Or is there something greater in life? This
quest of his own leads man to view his life as a need
of God. Man exists for fulfilling God’s purpose on
earth and thus he is neither useless nor unneeded.
The Chinese philosophy however, sees man as the
center of all affairs and unlike other schools of
thought, wherein the existence of man is to suffer and
repent for his own sins quite unknown to him, the
Chinese school considers the nature of man and life
as basically good.
The dominant thought in Chinese considered man to
be righteous because he had conscience, he could
decide between right and wrong and is aware of his
own choices, dislikes and likes. The Buddhist thought
in China also transformed the concept of Nirvana
which till then was considered to be something
perceived in a distant and unknown world to
something which could be achieved in this very body
and this humanly existence itself. The Chinese
considered every man to be endowed with the four
fundamental qualities. “Men have these four
beginnings just as they have their four limbs…..These
four, love, righteousness, propriety and wisdom
…..are not drilled into us from outside. We are
originally provided with them” (Radhakrishnan and
Raju 168).
However later on Chinese thought also mentioned the
importance of nurture in developing these traits and
also laid quite a stress on imbibing strict discipline in
man’s physical nature. An ideal man in the Chinese
philosophy then is a man endowed with the perfect
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
6
Comparisons on the Ideal Man with Special Reference to Ayn Rand
virtue, a man of Jen, who is kind and compassionate
towards all beings. He is an earthly sage who resides
in the world but whose mind dwells in the tranquil.
In addition to the Chinese, the Hindu Philosophy’s
ideal man is the man in search of Puruṣārtha which
comprises of dharma which can be achieved through
righteousness; artha which helps to gain economic
well-being; kāma through which sensory pleasures
can be experienced; and moksha that is liberation
through spiritual pursuits.
However out of these four Puruṣārthas, dharma is
considered to be the most important because it is the
only quality that sets him apart from other animals as is mentioned in the SubhashitSangrah of the
Upanishads,
“āhāra-nidrā-bhaya-maithunaṁ ca
sāmānyam etat paśubhir narāṇām
dharmo hi teṣām adhiko viśeṣo
dharmeṇa hīnāḥ paśubhiḥ samānāḥ”
The Hindu philosophy considers the soul to be the
ultimate director of the course of human life. It
considers the human body to be a chariot and the soul
the charioteer, the drivers or horses of this chariot as
the senses and the mind of an individual as the reigns.
So, the ideal man is the one who through his mind
can rein the senses of his body and through the
charioteer and of his soul reach his ultimate goal of
Moksha. Such a man is said to be made of the Sattva
guna.
Similarly, Rand declined the altruist and socialist
philosophies because they lead to self-sacrifice, a
renunciation of one’s own happiness. She also turned
down the Nietzschean egoists who let desires and
whims rule their actions, and let the aim of
gratification decidethe course of their life.Rand
propounded her philosophy of objectivism that asked
man to rely of his very own mind, his rationale and
act according to it not his emotions or feelings.
However, in a nutshell there may be certain
similarities and some disparities in all the
philosophies regarding their ideal man, still we can
infer that an ideal man in general is a detached seeker
of self and of knowledge, guided by his rationale,
practicing virtue, and a worldly sage with peace as his
internalized capacity and quality.
CONCLUSION
[6]
REFERENCES
[1]
[2]
[3]
[4]
[5]
After having studied different philosophies on the
concept of man, we can infer that Socrates’ urge to
“Know Thyself” (Sharma, Great Philosophers 8);
with the Hindus assertion “AtmanamVidhi”
(Krishnananda); Confucius’ stress on the study of
nature of man; and the Jewish search of meaning can
be seen as adding up to Rand’s rational self-interest
in its most unselfish implication.
Moreover, if we study Rand’s philosophy very
closely, it coincides strangely with Buddha’s middle
path of moderation. According to Buddha, men in
search of their meaning either take the low course of
sensory gratification and derive pleasure by satiating
that which is unending or they take up the path of
self-mortification which is the other extreme
involving renunciation of all the pleasures of their
life. But the right path, as he states in is Noble
Eightfold Path, is the path of wisdom, of moderation
and righteousness put in understanding, speech,
aspiration, living, action, effort, concentration and
attention. Buddha asserted,
“Be ye lamps unto yourselves. Rely upon
yourselves……Do not depend upon anything else but
yourselves” (Götz 27).
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
Götz, Ignacio L. Conceptions of Happiness. Lanham, MD: U
of America, 2010. Print.
Nietzsche, Friedrich Wilhelm, and H. L. Mencken. The
Antichrist. New York: Alfred A. Knopf, 1923.
Gutenberg.org. The Project Gutenberg, 18 Sept. 2006. Web.
21 Sept. 2015.
Packard Steve. “Ayn Rand Interviewed By Phil Donahue”.
YouTube. YouTube, 5 May 2012. Web. 5 July 2015.
Podritske Marlene, and Peter Schwartz. Objectively
Speaking: Ayn Rand Interviewed. Lanham, MD: Lexington,
2009. Web.
Prabhupada, Swami. “The Journey of Self-Discovery.”
PrabhupadaBooks.com Srila Prabhupada's Original Books,
prabhupadabooks.com/jsd/2/absolute_love.
Radhakrishnan, Sarvepalli, and PoolaTirupati Raju. The
Concept of Man. A Study in Comparative Philosophy.
London: G. Allen and Unwin, 1960. Print.
Rand, Ayn, and Nathaniel Branden. The Virtue of
Selfishness: A New Concept of Egoism. New York: New
American Library, 1964. Print.
Rand, Ayn. Anthem. New York: Signet, 2013. Print.
Rand, Ayn. Atlas Shrugged. New York: New American
Library, 1971. Print.
Rand, Ayn. For the New Intellectual. New York: New
American Library, 1964. Print.
Rand, Ayn. The Fountainhead. New York: Signet, 1971.
Print.
Rand, Ayn. The Romantic Manifesto. New York: Signet,
1971. Print.
Rand, Ayn. We the Living. New York: Signet, 2011. Print.
Sharma, Ram Nath. Great Philosophers of the World.
Gurgaon: Spring, 2004. Print.
Society Atlas. “The ideal man: Ayn Rand interviewed by
James Day”. YouTube. YouTube, 23 July 2014. Web. 26
June 2015.
TemplerSr Justin. “The 1959 Mike Wallace Ayn Rand
Interview”. YouTube. YouTube, 01 November 2011. Web.
18 July 2015.
Thera, Piyadassi. "Setting in Motion the Wheel of Truth."
Book of Protection - First Discourse of the Buddha. Buddha
Dharma Education Association &BuddhaNet, 2008. Web. 16
Aug. 2015.
Watson, Lillian Eichler. Light from Many Lamps. New York:
Simon & Schuster, 1988. Print.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
7
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS
IDENTICAL USERS IN MULTIPLE SOCIAL MEDIA NETWORKS
1
ASHOK NANGARE, 2RAHUL MAHAJAN, 3ABHIJIT SOMAVANSHI, 4ARMAN TAMBOLI, 5AMOL
KHUTEGAVE, 6DHANRAJ JADHAV
1,2,3,4,5
Savitribai Phule Pune University,India
Professor, Savitribai Phule Pune University,India
E-mail: 1nangareashok@gmail.com, 2rahuldyppif1@gmail.com, 3abhisom14@gmail.com, 4armantamboli111@gmail.com,
5
khuntegave99@gmail.com, 6dhanraj143_jadhav@rediffmail.com
6
Abstract - The past couple of years have seen the rise and advancement of a vivacious investigation stream on an outsized
type of on-line Social Media Network (SMN)platforms. Perceiving unknown, however indistinguishable userss among
various SMNs stays relate unmanageable disadvantage. Unmistakably, cross-stage investigation may encourage settle a few
issues in social registering in every hypothesis and applications. Since open profiles will be copied and basically mimicked
by userss with totally unique capacities, most current users distinguishing proof resolutions, that mainly target content
mining of userss' open profiles, square measure delicate. A few examinations have endeavored to coordinate userss upheld
the circumstance and fleeting request of users content still as scholarly class. Be that as it may, the areas square measure thin
inside the lion's share of SMNs, and abstract type is difficult to differentiate from the short sentences of driving SMNs like S
in an exceptionally Microblog and Twitter. In addition, since on-line SMNs square measure very cruciform, existing users
distinguishing proof plans bolstered arrange structure aren't successful. This present reality companion cycle is extremely
individual and almost no 2 userss share a consistent companion cycle. Thusly, it's a ton of right to utilize a cordial
relationship structure to inquire about cross-stage SMNs. Since indistinguishable userss tend to arrange incomplete
comparable cordial relationship structures in a few SMNs, we tend to arranged the Friend Relationship-Based User
Identification (FRUI)algorithm. FRUI computes a match degree for all competitor User Matched Pairs (UMPs), and
exclusively UMPs with prime positions square measure considered as indistinguishable userss. we tend to furthermore
created 2 suggestions to help the power of the algorithmic program. Aftereffects of concentrated investigations exhibit that
FRUI performs far superior than current system structure-based algorithm.
Keywords - Cross-Platform, Social Media Network, Anonymous Identical Users, Friend Relationship, User Identification
procedure of intersection various SMN stages to
shading a complete picture of those practices.
Regardless, cross-stage investigation faces different
difficulties. As appeared in Fig.1, with the extension
of SMN stages on the net, the cross-stage approach
has coordinated various SMN stages to frame
wealthier data and a great deal of finish SMNs for
social registering assignments. SMN users sort the
common scaffolds for these SMN stages. the main
theme for cross-stage SMN investigation is users
recognizable proof for different SMNs. Investigation
of this subject establishes a framework for extra
cross-stage SMN examination.
Proposing a novel Friend Relationship-based User
Identification (FRUI)algorithm. In our analysis of
cross-platform SMNs, we deeply mined friend
relationships and network structures. In the real
world, people tend to have mostly the same friends in
different SMNs, or the friend cycle is highly
individual. The more matches in two un-mapped
users’ known friends, the higher the probability that
they belong to the same individual in the real world.
Based on this fact, we proposed the FRUI algorithm.
Since FRUI employs a unified friend relationship, it
is apt to identify users from a heterogeneous network
structure. Unlike existing algorithms [22], [23], [24],
FRUI chooses candidate matching pairs from
currently known identical users rather than unmapped
ones. This operation reduces computational
I. INTRODUCTION
In the most recent decade, many sorts of social
networking sites have emerged and contributed
immensely to huge volumes of true data on social
practices. Twitter 1, the most critical smaller scale
blog benefit, has more than 600 million users and
delivers upwards of 340 million tweets for every day
[1]. Sina Microblog2, the primary Twitter-style
Chinese miniaturized scale blog site, has a ton of
than500 million records and creates run out a hundred
million tweets for every day [2].
Because of this decent variety of on-line online
networking systems (SMNs), people tend to utilize
entirely unexpected SMNs for different capacities. for
instance, Ren 3, a Facebook-style however
antonymous SMN, is utilized in China for sites,
though Sina Micro blog is utilized to share statuses
(Fig.1). In various words, each existent SMN fulfills
some user needs. Regarding SMN administration,
coordinating mysterious users crosswise over various
SMN stages will give incorporated subtle elements on
each users and educate relating laws, such as focusing
on administrations arrangements. In principle, the
cross-stage investigations empower a bird's-eye
perused of SMN user practices. In any case, about all
current SMN-construct ponders center with respect to
one SMN stage, yielding fragmented data.
Subsequently, this examination researches the
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
8
Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
complexity, since only a very small portion of
unmapped users are involved in each iteration.
Moreover, since only mapped users are exploited, our
solution is scalable and can be easily extended to
online user identification applications. In contrast
with current algorithms [22], [23], [24], FRUI
requires no control parameters.
(3) Providing concrete demonstrations of FRUI
performance with three synthetic networks and two
major online SMNs in China: Sina Microblog and
RenRen. The synthetic networks include Erdos
Renyi(ER) [25] random net-works, Watts Strogatz
(WS) [26] small-world networks and Barabasi Albert
preferential attachment model (BA) [27] networks.
Findings show that FRUI is superior to NS in these
networks. Moreover, FRUI is effective for the deanonymization task, since the user identification task
is similar to the de anonymization problem
One of the foremost fascinating challenges within the
space of social computing and social media analysis
is that the questionable community analysis. A
accepted barrier in cross-community (multiple
website) analysis is that the disjunction of those
websites. during this paper, our aim is to supply proof
on the existence of a mapping among identities across
multiple communities, providing a way for
connecting these websites. Our studies have shown
that easy, nonetheless effective approaches, that
leverage social media's collective patterns are often
used to seek out such a mapping. The utilized ways
with success reveal this mapping with sixty six
accuracy
3)
Connecting users across social media
sites: a behavioral-modeling approach
AUTHORS : R. Zafarani and H. Liu,
Social media is enjoying a vital role in our existence.
folks typically hold varied identities on completely
different social media sites. User-contributed internet
information contains numerous data that reflects
individual interests, policy making and alternative
behaviors. To integrate these behaviors data, it's
useful to spot users across social media sites. This
paper focuses on the challenge of characteristic
unknown users across completely different social
media sites. a technique to relate user’s identities
across social media sites by mining users’ behavior
data and options is introduced. the strategy has 2 key
parts. the primary part distinguishes completely
different users by analyzing their common social
network behaviors and finding robust opposing
characters. The second part constructs a model of
behavior options that helps to get the distinction of
users across social media sites. the strategy is
evaluated through 2 experiments on Twitter and Sina
Weibo. The results of experiments show that the
strategy is effective.
Fig. 1. Cross-platform research to merge a variety of SMNs.
II. LITERATURE SURVEY
1)
How unique and traceable are user
nemeses’?
AUTHORS:
D. Perito, C. Castelluccia, M.A.
Kaafar, and P. Manils,
4)
Privacy in the age of aug-mented reality,"
AUTHORS: A. Acquisti, R. Gross and F. Stutzman,
This paper explores the chance of linking user
profiles solely by viewing their usernames. The
intuition is that the chance that 2 usernames talk to
constant physical person powerfully depends on the
"entropy" of the username string itself. Our
experiments, supported crawls of real net services,
show that a major portion of the users' profiles will be
joined exploitation their usernames. To the simplest
of our data, this is often the primary time that
usernames area unit thought of as a supply of
knowledge once identification users on the web.
2)
Connecting
corresponding
across communities
AUTHORS: R. Zafarani and H. Liu,
We investigate the practicability of mixing in public
on the market we have a tendency tob a pair of.0
knowledge with ready-made face recognition
computer code for the aim of large-scale, machinecontrolled individual re-identification. 2 experiments
illustrate the flexibility of characteristic strangers online (on a chemical analysis website wherever people
shield their identities by mistreatment pseudonyms)
and offline (in a public space), supported photos
created in public on the market on a social network
website. a 3rd proof-of-concept experiment illustrates
the flexibility of inferring strangers' personal or
sensitive data (their interests and social insurance
numbers) from their faces, by combining face
recognition, data processing algorithms, and applied
identities
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
9
Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
mathematics re-identification techniques. The results
highlight the implications of the convergence of face
recognition technology and increasing on-line selfdisclosure, and also the emergence of "personally
predictable'' data, or PPI. They raise questions about
the longer term of privacy in associate "augmented''
reality world during which on-line and offline
knowledge can seamlessly mix.
dimensions. we tend to build a rest decide to deploy
Associate in Nursing integrated system Finding
Memo that uses all the 3 dimensions of Associate in
Nursing identity to go looking for a user on multiple
social networks. The system exploits a glorious
identity on one social network to go looking for her
identities on alternative social networks. we tend to
check our system on 2 preferred and distinct social
networks { Twitter and Facebook. we tend to show
that the integrated system offers higher accuracy than
the individual algorithms. we tend to report
experimental endings within the paper
5)
I seek you: searching and matching
individuals in social networks
AUTHORS: M. Motoyama and G. Varghese,
An online user joins multiple social networks so as to
en- joy die rent services. On every joined social
network, she creates Associate in Nursing identity
and constitutes its 3 major dimensions specifically
professional lupus erythematous, content and
affiliation network. She for the most part governs her
identity formulation on any social network and thus
will manipulate multiple aspects of it. With no
international identifier to mark her presence
unambiguously within the on-line domain, her on-line
identities stay unlinked, isolated and difficult to go
looking. Earlier analysis has explored the higher than
mentioned dimensions, to go looking Associate in
Nursing link her multiple identities with an
assumption that the thought of dimensions are least
disturbed across her identities. However, majority of
the approaches are restricted to exploitation of 1 or 2
III. PROPOSED SYSTEM
We proposed the FRUI algorithm. Since FRUI
employs a unified friend relationship, it is apt to
identify users from a heterogeneous network
structure.
Unlike existing algorithms, FRUI chooses candidate
matching pairs from currently known identical users
rather than unmapped ones. This operation reduces
computational complexity, since only a very small
portion of unmapped users are involved in each
iteration.
Moreover, since only mapped users are exploited, our
solution is scalable and can be easily extended to
online user identification applications.
Adm in
U ser
Lo g in
R eg is te r
L o g in
D et ec t Ne w U ser
A pp ly A lgo rit h m
D atab as e
C reate M an y Ac co u nt
De te ct A no n ym o u s U se r
P os t C o m m en t
Fig. 2. Architecture Diagram
the best approach to recognize clients crosswise over
totally unique SMNs. Peritoet al. [3] computed the
likeness of screen names and known clients
exploitation parallel classifiers. Correspondingly, Liu
et al. [4] coordinated clients in Associate in Nursing
unattended approach exploitation screen names. Za
farani and Liu [5] anticipated an approach to outline
crosswise over totally unique SMN stages, by
experimentation affirming numerous theories. On
IV. SYSTEM IMPLEMENTATION
 Profile-Based User Identification
Several studies addressing anonymous user
identification have centered on public profile
attributes, as well as screen name, gender, birthday,
town and profile image.
A screen name is that the openly required profile
include in many SMNs. it's been wide investigated as
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
10
Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
prime of this work, they [6] further built up a client
mapping technique by displaying client conduct on
screen names. Among open profile traits, the profile
picture is another component that has gotten
broadened examine. Rapacious al. [7] self-tended to
the user recognizable proof assignment with a face
acknowledgment run the show. In spite of the fact
that each screen name and profile picture will decide
users, they can not be connected to monster SMNs.
this can be because of a few users could have
indistinguishable screen name and profile pictures.
For instance, a few users have the screen name "John
Smith" on Facebook.
than, arrange based client distinguishing proof
stances many real difficulties, with few examinations
to make on. To address this disadvantage, Bartunovet
al. proposed relate approach bolstered contingent
irregular fields alluded to as Joint Link-Attribute
(JLA).JL A considered each profile at-tributes and
system properties. To break down security and lack
of clarity, Narayanan and Shmatikov created NS,
construct for the most part totally in light of star
grouping.
CONCLUSION
This examination tended to the matter of user
recognizable proof crosswise over SMN stages
related offered an imaginative answer. As a key side
of SMN, arrange structure is of prevail significance
and helps settle de-anonymization users ID
assignments. In this way, we tend to design a steady
net-work structure-based users distinguishing proof
answer. We tend to conjointly build up a totally
interesting companion relationship-based algorithmic
program known as FRUI. To improve the intensity of
FRUI, we tend to de-scribed 2 recommendations and
tended to the quality. At last, we tend to check our
algorithmic program in each simulated net-works and
ground-truth systems.
Results of our exact tests uncover that net-work
structure will finish fundamental user distinguishing
proof work. Our FRUI algorithmic program is direct,
by and by temperate, and performed obviously better
than NS, the current situation with craftsmanship
organize structure-based users distinguishing proof
answer. In projections once crude content data is
disseminated, inadequate, or difficult to get on
account of protection settings, FRUI is remarkably
appropriate for cross-stage undertakings.
In addition, our determination might be essentially
connected to any SMNs with kinship systems,
including Twitter, Face-book and Foursquare. It can
even be stretched out to various examinations in
social processing with cross-stage issues like focused
on advancing data recovery, cooperative separating,
and notion investigation and extra. Moreover, since
exclusively the Adjacent Users range unit worried in
each cycle strategy, our method is ascendible and can
be essentially connected to huge datasets and on-line
users recognizable proof applications.
Identifying anonymous users across multiple SMNs is
difficult work. In this manner, exclusively some of
indistinguishable users with totally unique epithets
might be perceived with this strategy. This
investigation designed the motivation for more
examinations on this issue. At last, it's our
expectation that a last approach might be produced to
detect every single indistinguishable users with
totally unique epithets. Diverse user recognizable
proof systems might be connected in the meantime to
take a gander at numerous SMN plat-shapes. These
procedures region unit integral and not totally
 Content-Based User Identification
Content-Based User Identification arrangements
resolve to recognize users supported the days and
locations that users post content,as well because the
literary genre of the content. Zhenget al. [18]
projected a structure for origin distinguishing proof
exploitation the abstract kind of on-line messages and
order techniques. Almishari and Tsudik anticipated
connecting clients crosswise over entirely unexpected
SMNs by misusing the artistic class of authors.Kong
and Zhang anticipated Multi-Network Anchoring
(MNA) to delineate. They figured the joined
similitudes of client's social, spatial, fleeting and
message information in various SMNs, and analyzed
a stable coordinating disadvantage between 2 sets of
client accounts.Goga et al. [21] misused the geo-area
snared to clients' posts, and users’ literary genre to
deal with user identification tasks.
Table 1
NETWORKS OF THE GROUND TRUTH DATASET
Fig. 3. Chart Graph OF NETWORKS OF THE GROUND
TRUTH DATASET
 Network Structure-Based User Identification
System structure-construct examines with respect to
user distinguishing proof over different SMNs range
unit acclimated recognize indistinguishable users
completely by user arrange structures and seed, or
priori distinguished users. As demonstrated higher
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
11
Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
[5]
R. Zafarani and H. Liu, "Connecting corresponding identities
across communities," Proc. of the 3rd International ICWSM
Con-ference, pp. 354-357, 2009.
[6] R. Zafarani and H. Liu, "Connecting users across social
media sites: a behavioral-modeling approach, " Proc. of the
19th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining (KDD’13), pp.41-49, 2013.
[7] Acquisti, R. Gross and F. Stutzman, "Privacy in the age of
aug-mented reality," Proc. National Academy of Sciences,
2011.
[8] T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff,
"Identifying users across social tagging systems,” Proc. of the
5th International AAAI Conference on Weblogs and Social
Media, pp. 522-525, 2011.
[9] M. Motoyama and G. Varghese, "I seek you: searching and
matching individuals in social networks," Proc. of the 11th
inter-national workshop on Web Information and Data
Management (WIDM’09), pp. 67-75, 2009.
[10] O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer,
"Large-scale Correlation of Accounts across Social
Networks," Tech-nical report, 2013.
unrelated, since a definitive call may confide in
human user's contribution. In this manner, we
propose misuse these methodologies synergistically
and considering qualities and shortcomings for the
best results.
REFRENCES
[1]
[2]
[3]
[4]
Wikipedia, "Twitter, " http://en.wikipedia.org/wiki/Twitter.
2014.
Xinhuanet, "Sina Microblog Achieves over 500 Million
Users,"
http://news.xinhuanet.com/tech/201202/29/c_122769084.htm. 2014.
D. Perito, C. Castelluccia, M.A. Kaafar, and P. Manils, "How
unique and traceable are usernames?," Privacy Enhancing
Technol-ogies(PETS’11), pp. 1-17, 2011.
J. Liu, F. Zhang, X. Song, Y.I. Song, C.Y. Lin, and H.W.
Hon, "What's in a name?: an unsupervised approach to link
users across communities," Proc. of the 6thACM
international conference on Web search and data
mining(WDM’13), pp. 495-504, 2013.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
12
A SECURE PUBLIC AUDITING OF CLOUD DATA WITH
FRAGMENTATION AND REPLICATION
1
NEHA R. PATIL, 2S. R. PATIL
1
Department of Computer Engineering, A. C. Patil College of Engineering, Kharghar, Navi Mumbai, India
Professor, Department of Computer Engineering, A. C. Patil College of Engineering, Kharghar, Navi Mumbai, India
E-mail: 1nehapatil18393@gmail.com, 2srpatil@acpce.ac.in
2
Abstract - Outsourcing data to a third-party administrative control, as is done in cloud computing, it gives rise to security
concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security
measures are required to protect data within the cloud. Cloud storage can make data users store and access their files any
time, from anywhere and with any device. To ensure the security of the outsourced data, data user needs to periodically
check data integrity. There are existing auditing schemes that are based on PKI. There is auditor to check integrity but for
that he needs to must validate the certificates of data user before auditing data integrity. Thus, It result in a large amount of
computation cost. Especially, it brings heavy burden to the auditor in the multi user setting. Overcome this problem, in this
paper, we propose an efficient ID based auditing protocol for cloud data integrity based on ID Based Cryptography. It
supports batch auditing in the multi-user setting. Finally, extensive security and simulation results show that our ID-based
auditing protocols are secure and efficient especially it reduces the computation cost of the auditor in the multi-user setting.
It improves security by creating of replica of each file block and store it on different nodes. If the attacker attacks on the
cloud, then he/she will not get any information of file as every block of files are spread on the nodes except adjacent nodes.
Thus purpose of this work is to develop an auditing scheme which possesses the capabilities such as privacy preserving,
public auditing, maintaining the data integrity along with confidentiality. And also it must support batch auditing and data
dynamics operations. Thus the new auditing scheme is been developed by considering all these requirements.
Keywords - Cloud Security, ID-based Auditing; Security Proof, The CDH Problem, Data Integrity Checking
be considered and are important requirements from
user’s point of view. To achieve all of these
requirements, new techniques or methods should be
developed and implemented. Although cloud storage
provides great advantages and conveniences for the
users, it faces many new security challenges since the
user no longer possesses their data locally. The users
might worry whether their data are lost or corrupted
due to hardware errors and software bugs.
I. INTRODUCTION
Cloud computing can be considered as a new
computing standard that can provide services on
demand at a minimal cost. The well-known and
commonly used services models in the cloud
paradigm are Software as a Services, Platform as a
Servicesand Infrastructure as a Services and Storage
as a Services. Here the mainly focus on Storage as a
Services. Storage as a Service is one of the important
services of cloud computing in which data is
remotely maintained, managed and backed up. The
service is available to users over a network, which is
usually the internet. It allows the user to store files
online so that the user can access them from any
location via the internet. The provider cloud makes
them available to the user online by keepingthe
uploaded files on an external server. This gives cloud
storage service provider ease and convenience, but
can potentially be costly. Cloud storage has its
benefits, but it is also important to remain secure
while taking advantage of cloud technology.In short,
issues in cloud data security include data privacy,
data protection, data availability, data location and
secure transmission. The security challenges in the
cloud include threats, data loss, services disruption
and outside malicious attacks. Data integrity in the
cloud system means preserving information integrity.
The data should not be lost or modified by
unauthorized users. Cloud computing providers are
trusted to maintain data integrity and accuracy.
Therefore
security,
integrity,
privacy and
confidentiality of the stored data on the cloud should
II. MOTIVATION
In PKI the auditor must validate the certificates of
data user before auditing data integrity. Thus, it
results in a large amount of computation cost.
Especially, it brings heavy burden to the audit.
Existing system need to obtain public key certificate
from certificate authority (CA) and verify the validity
of public key certificate, it increase computation cost
and communication overhead. Proposed IBC allows
data user to obtain public keys without the
corresponding private keys. That is, contrary to
traditional public key derivation schemes, IBC does
not require to compute the private key before
producing the public key. Indeed, data users can
directly use ID based public keys to encrypt data
before storage at no extra cost of communication.
Here in IBC permits to data user to use the same ID
based public key under the different PKG, That is, a
ID based public key corresponds to multiple private
keys. Thus, it alleviates data user’s storage burden to
public keys.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
13
A Secure Public Auditing of Cloud Data with Fragmentation and Replication
consideration, and outline challenges that need to be
resolved for such a publicly auditable secure cloud
storage service to become a reality.
III. OBJECTIVE
1.
2.
Develop a system an ID-based public auditing
protocol by ID-based cryptography.
Develop the system support batch auditing in the
multi-user setting.
3. The cloud computing, upsurges the capabilities of
the hardware resources by optimal and shared
utilization. The above mentioned features encourage
the organizations and individual users to shift their
applications and services to the cloud. Even the
critical infrastructure. The migration of users assets
(data, applications, etc.) outside the administrative
control in a shared environment where numerous
users are faces the security concerns. In [1] Ali et al.
has given survey details the security issues that arise
due to the very nature of cloud computing.
Moreover, the survey presents the recent solutions
presented in the literature to counter the security
issues.
IV. REVIEW OF LITERATURE
1. Proofs of Retrievability with Public Verifiability
and Constant Communication Cost in Cloud [4],
Juels et al. solve this open problem and propose the
first POR scheme with public verifiability and
constant communication cost: in proposed scheme,
the message exchanged between the prover and
verifier is composed of constant number of group
elements; different from existing private POR
constructions, scheme allows public verification and
releases the data owners from the burden of staying
online. We achieved these by tailoring and uniquely
combining techniques such as constant size
polynomial commitment and homomorphic linear
authenticators. Thorough analysis shows that
proposed scheme is efficient and Practical. And
prove the security of our scheme based on the
Computational Diffie-Hellman Problem, the Strong
Diffie-Hellman assumption and the Bilinear Strong
Diffie-Hellman assumption.
4. Introduce a model for provable data
possession(PDP) that allows a client that has stored
data at an Untrusted server to verify that the server
possesses the original data without retrieving it.In [3]
the model generates probabilistic proofs of
possession by sampling random sets of blocks from
the server, which drastically reduces I/O costs. The
client maintains a constant amount of metadata to
verify the proof. The challenge/response protocol
transmits a small, constant amount of data, which
minimizes network communication. Thus, the
PDPmodel for remote data checking supports large
data sets in widely-distributed storage systems.
Remote data integrity checking is of crucial
importance in cloud storage. It can make the clients
Wang[5] verify whether their outsourced data is kept
intact without downloading the whole data. In some
application scenarios, the clients have to store their
data on multi-cloud servers. At the same time, the
integrity checking protocol must be efficient in order
to save the verifiers cost. From the two points,
propose a novel remote data integrity checking
model: IDDPDP (identity-based distributed provable
data possession) in multi-cloud storage. The formal
system model and security model are given. Based
on the bilinear pairings, a concrete ID-DPDP
protocol is designed. The proposed ID-DPDP
protocol is provably secure under the hardness
assumption of the standard CDH (computational
DiffieHellman) problem.
2. Cloud computing is the long dreamed vision of
computing as a utility, where data owners can
remotely store their data in the cloud to enjoy ondemand high-quality applications and services from a
shared pool of configurable computing resources.
While data outsourcing relieves the owners of the
burden of local data storage and maintenance, it also
eliminates their physical control of storage
dependability and security, which traditionally has
been expected by both
Enterprises and individuals with high service-level
requirements. In order to facilitate rapid deployment
of cloud data storage service and regain security
assurances with outsourced data dependability,
efficient methods that enable on-demand data
correctness verification on behalf of cloud data
owners have to be designed. In [2] Wang et al.
propose that publicly auditable cloud data storage is
able to help this nascent cloud economy become
fully established. With public audit ability, a trusted
entity with expertise and capabilities data owners do
not possess can be delegated as an external audit
party to assess the risk of outsourced data when
needed.
5. The Cloud storage service has made the users to
access their data anywhere anytime without any
trouble. Available systems that provide support for
the remote data integrity are useful for quality of
service testing but do not deal with server failure or
handling misbehaving servers. In [6],Ahire et.al. The
proposed system guarantees the integrity of the
storage on the server where the data of the users of
the cloud are stored. It achieves robust cloud storage
security and rapid location of data errors with the
Such an auditing service not only helps save data
owners computation resources but also provides a
transparent yet cost-effective method for data owners
to gain trust in the cloud. We describe approaches
and system requirements that should be brought into
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
14
A Secure Public Auditing of Cloud Data with Fragmentation and Replication
results provided by the audit mechanism performed
by the external auditor. Furthermore, it supports
dynamic operations that are secure and efficient in
outsourced data. The external auditor performs the
public audit to maintain the integrity of data stored in
the cloud. The deletion correction code is used in the
distribution of files and the ability to depend on
Byzantine failure. Data integrity is assured with the
help of the verification key along with data encrypted
by deletion that also allows management of the
accuracy of storage and the identification of the
server in the cloud that behaves badly.
The system involves four entities: data users, the
cloud server, the third party auditor and private key
generator(PKG).Their roles are identified as
follows:–
1. Data user: it is an entity which has a large amount
of data files to be outsourced to the cloud storage for
data maintenance and computation. In general, it is a
resource-constrained entity. Here file will encrypt by
encryption Aes algorithm and store in fragments in
way owner of file will enter no. of fragments and
according to that file will split. Also along with no.
of fragment its replica will create and it will store on
nodes. T-coloring: Fragment and its replica will store
in order of t-coloring in way that fragment of one
file will not stored in adjusant node .Also for replica.
So hacker will not get any idea about the all fragment
of one files storage location.
Another User will get his file after entering files
secrete key which is sent by user on mail by Owner
of the file. At time of downloading
merging is
performed by system
6. Ali et al.[7] propose the division and replication of
data in the cloud for optimal performance and
security (DROPS) that collectively solve security and
performance issues. In the DROPS methodology, we
divide a file into fragments and replicate the
fragmented data into the nodes of the cloud. Each of
the nodes only stores a fragment of a particular data
file that ensures that even in the case of a successful
attack, no significant information is revealed to the
attacker. Furthermore, the nodes that store the
fragments are separated with a certain distance using
the T color table to prohibit an attacker from
guessing fragment positions. Furthermore, the
DROPS methodology is not based on traditional
cryptographic techniques for data security; what
alleviates the system of computationally expensive
methodologies. We show that the probability of
locating and endangering all the nodes that store the
fragments of a single file is extremely low. We also
compared the performance of the DROPS
methodology with ten other schemes. The highest
level of security with a slight performance overload
was observed.
2. Cloud Server : it is an entity which has unlimited
storage space and computation capability. And it is
responsible for storing and maintaining the
outsourced data and can provide the data access to
the data user.
3. The auditor: it is a trusted third-party which has
expertise and capabilities to provide data auditing
service on behalf of data users with cloud servers.
When auditor got knows the fragment is loosed at
that time he will place fragment by its replica.
4. Private Key generator: it is responsible to set up
the whole system parameter and issue private key for
each data users. Cloud storage paradigm is to let the
data users upload the large data files to the cloud
servers in order to relieve of the burden of storage
and computation of data users. However, it results in
a potential problem: data user no longer possesses
their data locally. Thus, it is of very importance for
the data user to ensure that their data are being
correctly stored and maintained. That is a reason why
data users should be equipped with certain security
measures so that they can periodically verify the
integrity of the out sourced data even without the
existence of local copies. Key will generate at the
time of encryption.
7. Proposed ID-RDPC model suitable for companyoriented cloud storage. And it is not ID-based
auditing since data tag generation algorithm is not
ID-based signature, but a PKI-based signature. It also
increases computation cost[8].
V. SYSTEM OVERVIEW
Figure 01: System architecture
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
15
A Secure Public Auditing of Cloud Data with Fragmentation and Replication
VI. EXPERIMENTAL RESULT
Figure 02:X-Axis File length Y-axis Time to upload file
Explanation: Graph shows time to upload file after fragmentation and encryption and perform T-Coloring for
fragment placement.
Figure 03:X-Axis File length Y-axis Time to download
Explanation: Graph shows time to download file by getting all fragment from each node for particular file and
decrypt and then download the file.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
16
A Secure Public Auditing of Cloud Data with Fragmentation and Replication
Figure 04: Time to check public auditing
Explanation: Graph shows time to audit the user file on number of node.
Number
1
2
3
4
5
File length
87891
40
148766
24
5847
Time(ms)
208
60
219
34
29
Table 1: Shows file length and time to upload (ms)
CONCLUSION
[6]
In this paper, propose an ID-based public auditing
protocol by combining the ID-based cryptography.
This system increase the data confidentiality..Finally,
This auditing protocol is also extended to support
batch auditing in the multi-user setting. Proposed
Outsourcing data to a third-party administrative
control, as is done in cloud computing, gives rise to
security concerns. The data compromise may occur
due to attacks by other users and nodes within the
cloud. Here we are storing user uploaded files
replica, so when stored file is hacked by user then
replica file can get user from another location.
[7]
[8]
[9]
[10]
[11]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[12]
M.Ali, S.U.Khan, A.V.Vasilakos, Security in cloud computing:
Opportunities and challenges,Inf.Sci.305(1)(2015)357383.
C.Wang,K.Ren,W.Lou,J.Li,Toward publicly auditable secure cloud
data storage services,IEEENetw.24(4)(2010)1924.
H.Wang,Identity based distributed provable data possession in multi
clouds storage, IEEET. Serv. Compsut.8(2)( 2015)328340.
A.Juels,B.S.KaliskiJr.,Pors:
Proofs
of
retrievability
for
largefiles,in:Proceedings of the 14thACMConference on Computer
and Communications Security(CCS07),2007,pp.584597.
H.Wang,Identity based distributed provable data possession in multi
clouds torage, IEEET.Serv.Compsut.8(2)(2015)328340.
[13]
[14]
Study and Implementation of Secure Storage Service in Cloud
Computing Mrs. PramilaKailas Ahire, Prof. R.V. Patil, IJRACET,
2015.
Mazhar Ali, Student Member, IEEE, Kashif Bilal, Student Member,
IEEE, Samee U. Khan, Senior Member, IEEE, BharadwajVeeravalli,
Senior Member, IEEE, Keqin Li, Senior Member, IEEE, and Albert
Y. Zomaya, Fellow, IEEE ”DROPS: Division and Replicationof Data
in Cloud for Optimal Performance and Security”, IEEE Trans. on
CloudComputing., 2015.
Jianhong Zhang Pengyan Li Jian Mao, IPad: ID-based public auditing
for the outsourceddata in the standard model Springer
Science+Business Media New York 2015-16
S.G.Ateniese,R.Burns,R.Curtmola,J.Herring,L.Kissner,Z.Peterson,D.
Song,Provable
datapossession
at
untrusted
stores,in:Proceedingsofthe14thACM Conference on Computer
andCommunications Security(CCS07),2007,pp.598609.
G.Ateniese, S.Kamara,J.Katz, Proofs of storage from homomorphic
identification protocols,in:Proceedings of the International
Conference on Theory and Application of Cryptologyand Information
Security: Advances in Cryptology,2009,pp.319333.
J.Zhang,W.Tang,J.Mao,Efficient public verification proof of
retrievability scheme in cloud,Clust.Comput.17(4)(2014)14011411.
G.Calandriello, P.Papadimitratos, A.Lioy,J. P.Hubaux,Efficient and
robust
pseudonymousauthenticationinVANET,in:ProceedingsoftheVANET,
2007,2007,pp.1928.
E.C.Chang,J.Xu,Remote
integrity
check
with
dishoneststorageserver,in:Proceeding s of the 13th European
Symposium
Researchin
Computer
Security(
ESORICS08),2008,pp.223237.
JianhongZhanga, Qiaocui Dong, Efficient ID-based public auditing
for the outsourceddata in cloud storage, 0020-0255/ 2016 Elsevier
Inc.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
17
A SURVEY ON TEXT MINING AND MACHINE LEARNING
TECHNIQUES FOR PRODUCT REVIEW CLASSIFICATION
1
ABHIJIT VAKTE, 2NISHAD TARDALKAR, 3DAMINI THORAT, 4RATANRAJ SANKESHWARI,
5
MADHURI KARNIK
1,2,3,4
UG Student, Vishwakarma Institute of Information Technology. Pune,
Assistant Professor, Vishwakarma Institute of Information Technology. Pune
E-mail: 1 abhijit.vakte@viit.ac.in, 2nishad.tardalar@viit.ac.in, 3damini.thorat@viit.ac.in, 4ratanraj.sankeshwari@viit.ac.in,
5
madhur.chavan@viit.ac.in
5
Abstract - Expansion in Communication resulted large amount of real time text data being generated these days. In order to
exploit and to extract useful information, it has become imperative to organize this data. Text mining / Text classification
can be considered as an effective and efficient solution to this problem. Text mining can be described as a knowledge
intensive process used to extract useful information from text data by exploring new patterns. It uses algorithms to transform
text into data that can be analyzed by applying Machine Learning and NLP techniques. As text mining is rapidly evolving
and growing technology, it facilitates businesses and companies to get deeper insights into their customer base and assist
them in re-evaluating the customer demands. As the prominence of E-commerce is increasing rapidly, the number of
customer reviews and feedbacks received is growing rapidly over the period of time. The number of reviews can be in
thousands, making it difficult for the manufacturers to consider them all for product improvement and consumer support.
This article focuses on this issue and attempts to extract some useful information from the customer reviews and ratings that
can be used is enhancing the product quality and improving the consumer support which intern improves the overall
customer experience.
Keywords - E-Commerce, Machine Learning, Product Quality, Text Mining
potential value in dealing with large and complex
unstructured datasets. Unstructured data contains the
irrelevant and noisy information which has to be
eliminated. In order to trodden that irrelevant
information, feature selection approach has been
embraced in this paper. Feature selection is a long
existing, novel method which aims on increasing the
quality of the data set by considering the factors of
relevance, novelty and interestingness.
There exist two questions in feature selection
approach first question is ‘what are the features for
machine learning which can represent the text in the
effective way? ’And the second is: ‘what is the best
way to prune a large set of features down to a
manageable set of most discriminating features?’ For
the first question we can say, it depends upon the
processing power, language and corpora working
with and most importantly the specific problem you
are tackling .For the second question: We can try
various approaches in order to prune the feature sets
including: classifiers which classify and build the
relevant information.
I. INTRODUCTION
With each passing day, social media and its
applications are creating large amount of information,
most of which is text form. Due to the rapid
expansion of Internet and E-commerce, such huge
amount of information is generated is these
applications as well. Due to this change in trend, the
focus of product based organizations is shifting from
salesmanship to consumerism and has led many
organizations to obtain consumer information/ data.
Nowadays, customers collect information about the
product of their choice from the internet before going
forward with the purchase. This prevents wastage of
time and money and helps customers get the products
at reasonable price, fulfilling their needs. Improved
Customer satisfaction and shopping experience are
really very important. Hence it has become a
convention for the E-commerce merchant to facilitate
their customer to review the products and express
their notions about the products. With increase in the
popularity and customer base of E-commerce, the
number of reviews received is also increasing rapidly.
Thousands of reviews are received, some long and
some short in length making it difficult for the
manufacturers to keep a track of all the reviews.
The aim here is to mine and extract useful
information from the product reviews and facilitate
businesses to identify repeatedly reported issues.
Availability of this knowledge will help
manufacturers in enhancing the product and support
quality. Text mining is the mushrooming process of
discovering, extracting information from large
unstructured textual resources. Text mining has high
Figure 1: Text Mining
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
18
A Survey on Text Mining and Machine Learning Techniques for Product Review Classification
The problem of classification has been widely studied
in the database, data mining, and information
retrieval communities. Some key methods, which are
commonly used for text classification are Decision
Trees, Pattern Based Classifiers, SVM Classifier,
Neural Network classifier, Bayesian classifier etc
[7].One of these techniques can be used for text
classification.
The entire process of knowledge extraction can be
accomplished by following the below mentioned
steps:
1)
Crawling product reviews from community
sites / preferred Manufacturers’ customer forum.
2)
Apply text Pre-processing steps to mine the
raw text obtained.
3)
Build a text data classifier and then apply it
on comment data to predict the defined target class.
4)
Identify Sub-classes under each main class
through Associate Rule mining by deriving key
patterns
5)
Represent the obtained results in statistical
format.
The above mentioned steps can be explained in an
elaborate manner as follows:
based summaries from customer reviews crawled for
Product-X. Here issues refer to sub-level issues such
as Product related and Support related problems
reported from customer point of view. A training set
of reviews was prepared manually that contains all
three categories of reviews (Product, Support &
Other) for training the text classifier. In order to get
good classification results on textual data, Support
Vector Machine technique was used to classify the
remaining review comments for further processing
The limitations of this approach is that the
classification model expects minimum 10–15 words
after removing non-usable characters during
preprocessing. Hence, smaller size review comments
are not taken into consideration. It is difficult to
identify all the issues reported in different scenarios
other than the defined key phrase list, The key phrase
list should be updated and refined well to capture all
different problems.
The features of SVM are that it is a linear classifier,
handles high dimensional data well, can handle
nonlinear decision boundaries, works with large size
unlabeled and small size labeled data. While its
limitations are that it has High time and space
complexity during training and testing.
In [3] V.Srividya and R.Anitha have mentioned
various steps of Data Preprocessing. These steps are:
1)
Tokenization: Tokenization is the process of
breaking a stream of text into words, phrases,
symbols, or other meaningful elements called tokens
.The aim of the tokenization is the exploration of the
words in a sentence.
2)
Stop word removal: Many words in text
documents occur very frequently but are essentially
meaningless as they are used to join words together in
a sentence and nothing else. These words are known
as Stop Words and it is commonly understood that
stop words do not contribute to the context or content
of textual documents. Due to their high frequency of
occurrence, their presence in text mining presents
problem in understanding the content of the text. Stop
words are very frequently used common words like
‘and’, ‘are’, ‘this’ etc. They are not useful in
classification of documents. So they must be
removed.
A.
Data Extraction
This is the data extraction step. In order to obtain the
customer reviews data, we need to crawl the customer
forum websites. There are various APIs and Web
Browser Extensions available today that can be used
for this task. Some of them are:
1)
KIMINO.
2)
Site Spider, Mark II.
3)
Web Scraper.
4)
Data Scraper.
B.
Data pre-processing
This is data preprocessing step. [20]Text preprocessing is the most important phase for any text
mining task. It plays a crucial role in deriving the
right patterns from the data. The typical text
preprocessing involves following intermediate steps:
1)
Tokenization
2)
Stop word removal
3)
Stemming
In [4] Dr.Vijayarani, Ms.Ilamathi and Ms.Nithya
have discussed various methods of stop word
removal.
a)
The classic method: The classic method is
based on removing stop words obtained from precompiled lists
b)
Method Based on Zipf’s Law: Addition to
classic stop list, three stop word creation methods
moved by Zipf‟s law are used, including: removing
most frequent words and removing words that occur
once We also consider removing words with low
inverse document frequency (IDF)
c)
Mutual Information method: The mutual
information method is a supervised method that
C.
Data Classification
This is text classification step. In any classification
task, it is important to have labels for the data in order
to train the classifier. The goal of text classification is
to identify the right label for each input in the test
dataset. There are various algorithms that can be used
for text classification
II. RELATED WORK
The system using SVM is proposed by
Chandrasekhar Rangu, Shuvojit Chatterjee and
Srinivasa Rao Valluru in [1]. In this research they
have proposed processes of identifying the issue-
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
19
A Survey on Text Mining and Machine Learning Techniques for Product Review Classification
works by computing the mutual information between
a given term and a document class (e.g., positive,
negative), providing a suggestion of how much
information the term can tell about a given class
3)
Stemming: This method is used to identify
the root/stem of a word. For example, the words
connect, connected, connecting, connections all can
be stemmed to the word “drive”. The purpose of this
method is to remove various suffixes, to reduce the
number of words, to have accurately matching stems,
to save time and memory space. In stemming,
translation of morphological forms of a word to its
stem is done assuming each one is semantically
related. There are two points are considered while
using a stem. Words that do not have the same
meaning should be kept separate. Morphological
forms of a word are assumed to have the same base
meaning and hence it should be mapped to the same
stem there are various stemming algorithms available
that can be used for this task.
Figure 2: Stemming
In [5] Nayak, Kanine, Chandavekar have mentioned
classification of stemming algorithms into categories
such as:
a)
Truncating methods: As suggested by the
name itself, truncating methods are related to prefix
or suffix removal. This method includes algorithms
such as:
i)
Lovins Stemmer: The Lovins stemmer
removes the longest suffix from a word. It is a single
pass algorithm by nature; hence, it removes
maximum of one suffix from a word.
ii)
Porters Stemmer: It is based on the idea
that the suffixes in the English language
(approximately 1200) are mostly made up of a
combination of smaller and simpler suffixes. It has
five steps, and within each step, rules are applied
until one of them passes the conditions
iii)
Paice Stemmer: It is an iterative algorithm
with one table containing about 120 rules indexed by
the last letter of a suffix. On each iteration, it tries to
find an applicable rule by the last character of the
word.
iv)
Dawson Stemmer: It is an extension of the
Lovins approach. It is very complex, lacks a standard
reusable implementation but it covers more suffixes
than Lovins.
b)
Statistical methods: These are based on
statistical analysis and techniques. Most of these
methods remove the affixes after performing some
statistical procedures.
i)
N-gram stemmer: In this algorithm stringsimilarity approach is used to convert word inflation
to its stem. It is language independent.
ii)
HMM Stemmer: This stemmer is based on
the concept of the Hidden Markov Model (HMMs).
This method does not require prior linguistic
knowledge as it is based on unsupervised learning.
iii)
YASS Stemmer: This algorithm uses
clustering of lexicons .This clustering is done based
on hierarchical approach and distance measure.
c)
Mixed methods: These are based on both
the Truncating and statistical methods of stemming
i)
Krovetz Stemmer: It is based on the
inflectional property of words and the language
syntax; it effectively and accurately removes
inflectional suffixes and is very complicated in
nature.
ii)
Xerox Stemmer: This is a language based
stemmer which works well for English language. It
uses the suffix and prefix database created for English
language.In [7] Vijayan, Bindu have discussed
various Text
Classification Algorithms that
include the below mentioned algorithms:
i. Decision Trees: Decision trees are designed with
the use of a hierarchical division of the
underlying data space with the use of different
text features. The hierarchical division of the
data space is designed in order to create class
partitions which are more skewed in terms of
their class distribution. For a given text instance,
we determine the partition that it is most likely to
belong to, and use it for the purposes of
classification.
ii. Pattern (Rule)-based Classifiers: In rule-based
classifiers we determine the word patterns which
are most likely to be related to the different
classes. We construct a set of rules, in which the
left hand side corresponds to a word pattern, and
the right-hand side corresponds to a class label.
These rules are used for the purposes of
classification
iii. SVM Classifiers: SVM Classifiers attempt to
partition the data space with the use of linear or
non-linear delineations between the different
classes. The key in such classifiers is to
determine the optimal boundaries between the
different classes and use them for the purposes of
classification.
iv. Neural Network Classifiers: Neural networks
are used in a wide variety of domains for the
purposes of classification. In the context of text
data, the main difference for neural network
classifiers is to adapt these classifiers with the
use of word features. We note that neural
network classifiers are related to SVM
Classifiers; indeed, they both are in the category
of discriminative classifiers, which are in
contrast with the generative classifiers.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
20
A Survey on Text Mining and Machine Learning Techniques for Product Review Classification
v.
vi.
vii.
Bayesian (Generative) Classifiers: In Bayesian
classifiers (also called generative classifiers); we
attempt to build a probabilistic classifier based
on modeling the underlying word features in
different classes. The idea is then to classify text
based on the posterior probability of the
documents belonging to the different classes on
the basis of the word presence in the documents.
Rocchio Algorithm: Rocchio method finds the
centroid of each class from the training set of
documents and classifies a text document to the
nearest possible centroid class.
KNN: K Nearest Neighbor is an instance-based,
non-parametric text classifier which uses
similarity measurement (dot product, cosine
similarity) as a criterion for classifying the
documents.
classification system demands appropriate choice of
classifier along with proper data pre-processing
which would definitely improve the outcome of
classification.
For future work, more advanced text mining
techniques, and algorithms can be used to improve
the classification mechanism and the system can be
made more robust. The system can be improved to
process Dynamic data i.e. the real time reviews
information and mine them on the go to derive the
meaningful insights and inferences.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Table 1: Comparison between Classification algorithms
[16]
CONCLUSION AND FUTURE WORK
[17]
Recently, text classification has gained a lot of
importance, comprising of steps like text extraction,
text pre-processing and classification. It can be
clearly inferred that pre-processing plays a vital role
in text classification. Various pre-processing
techniques and classification algorithms are stated in
the survey, all the algorithms have their own features
and limitations. An efficiently performing
[18]
[19]
[20]
DOI 10.1109/TKDE.2015.2405553, IEEE Transactions of
knowledge and data engineering.
Agrawal, R. & Srikant, R. 1994. Fast algorithm for mining
association rules. VLDB’94, 1994.
Evaluating Preprocessing Processing Techniques in Text
Categorization V.SriVidhya,R.Anitha
Dr.S.Vijayarani, International Journal of Computer Science
& Communication Networks, Vol 5(1), 7-16
International Journal of Engineering and Computer Science
ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page
No.!6874-16879
Ms.Anjali Ganesh Jivani, A Comparitive Study of Stemming
Algorithms,Anjali Ganesh Jivani et al,Int,J.Comp.Tech.Appl.,
Vol2(6),1930-1938,ISSN:2229-6093
A Comprehensive Study of text Classification Algorithms
Vikas k Vijayan, Bindu K.R, Latha Parameswaran.
Data Preprocessing Evaluation for Text Mining Dasa
Munkova, Michal Munk, Martin Vozar.
Effective Text Classification using Multi-level fuzzy neural
network Shima Zobeidi, Marjan Naderan, Seyad Alavi.
A survey of data mining techniques for quality improvement
in process industries V.Sharmila, M.Shanmugasundaram.
Survey on preprocessing techniques for text mining Arjun
nayak, naveen chandvekar.
Incremental Short Text Summarization On Comments In
Real Time From Social Network Services Dhivyabharathi.s1,
Suriya.k2,Shalini.R3 and Vinitha.R4 Text Summarization on
Comment Streams from Social Network Services ChengYing Liu, Chi-Yao Tseng, Ming-Syan Chen, Fellow, IEEE
IncreSTS: Towards Real-Time Incremental Short Social
Network Services Cheng-Ying Liu, Chi-Yao Tseng, MingSyan Chen, Fellow, IEEE
The text mining handbook Ronan Feldman.
Tightly-coupled Convolutional Neural Network with Spatialtemporal Memory for Text Classification Shiyao Wang† and
Zhidong Deng.
Text Summarization using Clustering Technique Anjali R.
Deshpande #1, Lobo L. M. R.
Stop Words in Review Summarization Using TextRank
Sonya Rapinta Manalu, Willy.
Online Product Review Summarization Priya Pawar
Siddhesha Tandel Shweta Bore Nikita Patil
Sentiment Analysis and Text Summarization of Online
Reviews: A Survey Pankaj Gupta, Ritu Tiwari and Nirmal
Robert.
Preprocessing Techniques for Text Mining Vairaprakash
Gurusamy Subbu Kannan.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
21
SENTIMENTAL ANALYSIS ON NEWS DATA FOR STOCK MARKET
PREDICTION
1
JUHI GUPTA, 2ANSHUL JAIN, 3YASH BOHRA
1,2,3
K.J Somaiya Institute of Engineering and Information Technology
E-mail: 1juhi.gupta@somaiya.edu, 2anshul.jain@somaiya.edu, 3y.bohra@somaiya.edu
Abstract - Everyone wants to get rich real quick. Best way to headstart is to invest into the stock markets. Intensive analysis
involves going through all the news articles see there historic data to learn how the company has evolved over time and other
information we could get over the internet. Now imagine automating the whole process using machine learning. We will be
using news article headline and past historic stock price as dataset to train and test the model .In this paper we will take news
from New york time using NYtimes api, historic price using yahoo finance and use vader algorithm to extract the sentiment
analysis and by using Linear regression machine learning algorithm we can predict future stock price.
Keywords - Machine learning, Sentiment analysis, Prediction, Stock market
Data Collection: We consider two aspect to predict
the stock market movement. first one is Social data
from news and the other prime source of information
is the historic price of the stock.News are collected
from the New York times and historic data is
collected from the yahoo finance for that particular
stock.
Data Preprocessing: Data preprocessing involves
cleaning the data collected.We create pickled data
which includes the news headlines,stock price
volume and date. Data Preprocessing seems the most
difficult task.
I. INTRODUCTION
The proposed idea is to take non quantifiable data
like financial news articles of a particular company
and predicting its future stock movement with news
sentiment classification. Assuming that news articles
have impact on stock market based on the research
conducted by a small community stating that Various
external online data sources that include: Google
Trends, Wikipedia, Google Search, Financial news,
Technical indicators, Macroeconomic indicators and
the models using the features from these external
sources along with the traditional stock market data
improve the performance for the stock market
prediction.
They got more than 85% accuracy for the movement
prediction and less than 1% MAPE for the price
prediction, it was an attempt to study relationship
between news and stock trend[1]. Thus we used
classification models which depict polarity of news
articles being positive or negative.[1-2]
People use social networking sites, like facebook
twitter etc. to express their views and opinions about
a particular topic such as news, movie, event and
remarks related to product[2]. This information
available from social network is beneficial for
business analyst for mining the user opinion about
their products and considers these opinions as
feedback to improve their policies, planning and
process for product development.[1-4] Sentiment
analysis is used to extract such opinion and remarks
of users by classifying them as positive, negative and
neutral sentiment. In simple terms sentiment analysis
is a technique used to extract intelligent information
based on the person’s opinion from raw data available
on the internet.
2. SENTIMENTAL ANALYSIS
Sentimental analysis is the heart of this project. We
are going to use python ML libraries to extract the
features from the news headlines collected. We are
going to use vader algorithm for extracting the
feature.Vader algorithm is the best choice for this
project since it is humanly automated so also contains
some abbreviations and slang words which are
recurring in the online news headlines.
We will Extract the feature and classify the emotions
into 4 ie. Positive, negative, neutral and compound.
We will store the value for each headlines with the
extracted features for that particular day.
3. MODEL TRAINING
Model training includes dividing the data into
training set and testing set. Usual policy is to use 60%
of the data for the training the machine and 40% of
the data as the testing set. Although the choice of the
algorithm affects the way training and testing set
should be handled.
We are going to use Multi Layer Perceptron
algorithm to implement our system. Multi-Layer
Perceptron (MLP) is a supervised learning algorithm
that learns a function
F(.): R^M → R^O where M is number of
dimensions for input and O is number of dimensions
of output.
II. THEORY
1.
DATA
PREPROCESSING
COLLECTION
AND
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
22
Sentimental Analysis on News Data for Stock Market Prediction
It can learn a non -linear approximat or for either
classification or regression. We will be using MLP
classifier in this model. MLP classifier uses back
propagation.
We have used six MLP parameters:1. hidden_layer_size
2. activation
3. Solver
4. alpha
5. learning_rate_init
6. batch_size
4. CORRELATION ANALYSIS OF PRICE AND
SENTIMENTS
After training and testing model we get coefficients
which will basically tell us how is the stock market
price is related to the news headlines and the historic
price of the particular stock. Positive coefficients
determine that two factors are directly related and
negative coefficients tells us that data is inversely
proportional.This correlation model is going to help
us to predict the stock price of the new data set.
Fig 2: Process of the proposed system
V. RESULT AND DISCUSSION
5. PLOTTING FROM NEW DATA
Whenever new data set consisting of news and
historic price of the stock is given to the model.
Model would be able to predict the expected stock
price for the day.
Fig 3: Prediction graph
IV. DESIGN FLOWCHART
Machine
Learning
Algorithm
MLP
Vader Algorithm
Accuracy
Precision
65.96%
0.659
Table 1: Result of our Proposed Model
The above table describe that when we use Vader
algorithm (sentiment algorithm) and Multi Layer
Perceptron (Machine learning algorithm), we have
got above Accuracy and Precision.
CONCLUSION
Sometimes its very difficult for a naive user to start
with the stock market analysis. Our project gives a
platform and automates the task of the user of going
through the news,current trends and historic price of
the stock. After so much research in this area finally
analyst are coming to the conclusion that method of
analysing social data with historic price will give us
good results like 80% accuracy. Our project considers
both the important aspect ie. news and historic price
to predict the stock market movement
Fig 1: Flowchart of the process for creating prediction model
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
23
Sentimental Analysis on News Data for Stock Market Prediction
[3]
REFERENCES
[1]
[2]
[4]
Jinjian (James) Zhai Nicholas (Nick) Cohen and Anand
Atreya “Sentiment analysis of news articles for financial
signal prediction”, nlp.stanford.edu
International
conference
on
Signal
Processing,
Communication, Power and Embedded System “Sentiment
Analysis of Twitter Data for Predicting Stock Market
Movements”, (SCOPES)-2016
[5]
[6]
[7]
Graham Bowley, “Wall Street Computers Read the News,
and Trade on It”, New York Times, Dec 21, 2010.
Anshul Mittal “Stock Prediction Using Twitter Sentiment
Analysis”, Stanford University
Twitter mood predicts the stock market, arXiv:1010.3003v1
[cs.CE] 14 Oct 2010
Jasmina Smailovic Miha GrcarNada Lavrac Martin Znidarsic
“Predictive Sentiment Analysis of Tweets: A Stock Market
Application”,
Alec Go, Lei Huang and Richa Bhayani, ”Twitter Sentiment
Analysis”, CS224N Final Report, 2009.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
24
MAKS: SERVER HEALTH MONITORING USING KAFKA
1
AMIT KUMAR SRIVASTAVA, 2CRS KUMAR
1,2
Defence Institute of Advanced Technology, Pune, Maharasthra
E-mail: 1amit_mcse16@diat.ac.in, 2suthikshnkumar@diat.ac.in
Abstract - Big Data Analytics has immense potential to change the way Server Health Monitoring is being done. Use of Big
data analytics can help Network Administrators to become more proactive and well informed. This paper proposes a design
for Big Data Platform based Server Health Monitoring system MAKS (Monitoring and Alerting system using Kafka and
Spark). Big Data can not only provide high server availability and hence low down time, it can also help in achieving more
secured cyber space. Hadoop is deployed for numerous real world problem, but since Hadoop has its own technical
limitations in handling real-time streaming data, a much faster application is required to deal with requirements of fast event
driven based approach of companies. Hadoop fulfills the requirement to store data in HDFS and to execute analysis, whereas
Kafka is the one that delivers high speed in terms of transportation and data distribution to several locations. Spark streaming
integrated with Kafka provides a very efficient solution to this problem. The motive of this paper is to propose a design
model, using Spark and Kafka for Serve health Monitoring.
Keywords - Server Health Monitoring, Alerting, Kafka, Big Data, Spark.
Besides they have very low degree of customization
are per organizational requirement. And the solutions
which exist in commercial world come with a high
price and user is not aware of the code in background
to check for any vulnerabilities. MAKS is an attempt
to make a monitoring system from the scratch with
Spark and Kafka as the platform. Developing this
system also provides a chance to understand and
work on Big Data Ecosystem, this knowledge can be
used later for developing solutions to other problems
in the large corporate network deployments.
I. INTRODUCTION
In the today’s world data is ever growing from
various sources like social media platform, IoT,
sensing devices etc. There is a massive input of
structured and unstructured data termed as Big Data.
Big data platform has huge potential in effectively
churning out most relevant information for different
type of consumers of the data in different business
deployment. Any business depends heavily on the
stability of their IT network and infrastructure and it
is a fact the cost of downtime is becoming an
increasingly growing concern. Not only does
downtime can cause a major loss of business
productivity but it also affects the quality of service
that is provided to the customer which further can
cause
severe
damage
to
your
business
reputation. Server Monitoring MAKS can help to
alleviate such issues.
The basic motive of server monitoring is to make sure
that all the servers in your infrastructure are
functioning as they should be in the deployment. In
other words server monitoring is the process of
reviewing and analyzing a server for availability,
operations, performance, security and other
operations related processes. Numerous server
monitoring tools are used to check for issues caused
by burdened or crashed servers, network connections
and other devices. They safeguard the health and
security of companies IT environment, allowing the
software and hardware to function with a reduced risk
of problems. These tools not only deliver customers
with an improved user experience but they can also
save enormous sums of money for production
networks of all sizes.
By getting constant updates on the status of the
network infrastructure, System Administrator can
stay ahead of network problems and avoid downtime.
Monitoring applications available at present in open
source don’t have a high scalability and reliability.
II.
CHALLENGES
PROCESSING
IN
REAL
TIME
A typical server deployment in any industry will have
deal with millions of alerts being generated per
second that needs to log for effective monitoring.
This type of problem belongs to the category of real
time streaming. The generation and continuous
utilization of real time streaming information makes
new challenges for information frameworks. For
continuous information deployment of MapReducestyle Big Data are no sufficiently adequate. Hadoop
gives numerous extraordinary instruments (for
instance, the circulated HDFS record framework, or
Hive, to question HDFS with SQL queries), but
handling applications like streaming and processing
the same is not efficient in Hadoop deployment.
Taking care of huge volumes of real-time ongoing
information streams produced by frameworks like
IoT or large network deployments has created
essential difficulties for big companies. Prior
innovations and devices were not prepared to handle
the issues raised because of the scale and speed of
these frameworks. But as per the recent trends in
Internet applications, activity data is now an integral
part of production data and is required for various
analytics as per user need. This necessitated the steep
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
25
MAKS: Server Health Monitoring using Kafka
ascend to real-time analytics rather than traditional
big data analytics.
Apache Kafka deployed in role of a streaming
platform provides low-latency, high-throughput,
fault-tolerant publish and subscribe design and is able
to process streams of events. Kafka is able to provide
reliable, sub-second responses to support both
customer-side
applications
and
connecting
downstream systems with real-time data. Producer,
Consumer, Topic and Broker are main parts of a
Kafka deployment and they are explained in
subsequent paragraphs.
Topic is a stream of particular type of message. A
producer is an entity that can publish messages to a
topic. The messages that are published by the
producers are then stored at a collection of servers
called brokers. A consumer is the entity that will be
using the data and it can subscribe to one or more
topics from the brokers. They can consume the
subscribed messages by fetching data from the
brokers. Consumers need to first create one or more
message streams for the topic, to subscribe to a topic.
The messages are then published to that topic will be
evenly distributed into these sub-streams. An iterator
interface over each message stream maintains the
continual stream of messages being produced. The
consumer iterates over every message in the stream
and then the processing of the payload of the message
is done.
The architecture of Kafka is such that it supports both
the point-to point delivery model in which multiple
consumers jointly consume a sole copy of all
messages in a topic, as well as the publish/subscribe
model in which multiple consumers each fetch its
own individual copy of a topic. The overall
architecture of Kafka is shown in Figure 2. Since
Kafka is distributed in nature, a typical Kafka cluster
consists of multiple brokers.
III. INTRODUCTION TO TECHNOLOGY
A. SPARK
Apache Spark was developed to be a lightning-fast
cluster computing technology, primarily meant for
Big Data applications for combining batch,
streaming, and interactive analytics on user data.The
key feature of Spark is its in-memory cluster
computing that dramatically increases the processing
speed of any computation based application. Spark
provides a great management benefit in terms of
reducing the number of separate tools required to
achieve the purpose.Some of the noteworthy features
of Spark are faster processing, dynamicity, real-time
stream processing, in-memory computation in Spark,
re-usability. The machine in which spark application
runs is referred to as a Driver node. Driver’s main
role is to execute various parallel operations on
worker nodes or cluster. Spark uses idea of a
Resilient Distributed Dataset (RDD). Each RDD
represents a read-only collection of objects
partitioned across a set of machines that can be
rebuilt if a partition is lost.
B. SPARK STREAMING
Spark Streaming was developed as an extension of
the core Spark API. Spark’s single execution engine
and integrated programming model for batch and
streaming lead to some exceptional benefits over
other traditional streaming systems. The main
objective was to enable highly scalable, highthroughput, fault-tolerant stream processing for live
data streams. Data can be consumed from many
sources like Kafka, Flume or TCP sockets, and can be
processed using multifaceted algorithms expressed
with high-level functions like map, reduce and join.
Data can then be finally processed and pushed out to
filesystems, databases, and live dashboards. Besides
machine learning and graph processing algorithms on
data streams can also be applied in Spark.
Figure 2
D. ZOOKEEPER
Zookeeper helps in distributed co-ordination service
and this design of publisher, broker, and subscriber. It
provides a centralized service for maintaining
configuration, providing name and for distributed
synchronization. This way it helps in maintaining a
synchronization across the cluster. ZooKeeper data is
kept in-memory, which means ZooKeeper can
achieve high throughput and low latency numbers.
ZooKeeper is replicated. Like the distributed
processes it coordinates, ZooKeeper itself is intended
to be replicated over a sets of hosts called an
ensemble.
Figure 1
C. APACHE KAFKA
Apache Kafka is a quick, versatile, durable, faulttolerant pub-sub data streaming platform and thus is
invested to address a large number of these business
issues. It is a distributed streaming platform which is
capable of handling trillions of events a day. Initially
perceived as a messaging queue, Kafka is based on a
concept of a distributed commit log. Kafka has
quickly evolved from messaging queue to a
developed streaming platform.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
26
MAKS: Server Health Monitoring using Kafka
E. CASSANDRA
Apache Cassandra is a Java based database, which
makes it an easy to integrate with other JVM based
applications like Apache Spark and Kafka. Another
important characteristics of Cassandra is data
replication which makes it highly available and faulttolerant. Replication means that each data is stored at
more than one location. This is because, even if a
node fails, the user should be able to recover the data
with simplicity from another location.
F. SPRING-BOOT
Spring is a widespread Java-based framework for
making web and enterprise applications. In contrast to
many other frameworks, which concentrate on solely
on one area, Spring framework offers extensive
variety of features addressing the solutions to
problems of present day business. Spring framework
offers elasticity to configure beans in numerous ways
such as XML, Annotations, and JavaConfig. The
Spring team formed Spring Boot to address the
complication of configuration earlier present in
Spring.
In the proposed application design of MAKS Spring
Boot is used for developing the dashboard
application. Spring Boot runs spring data support for
Cassandra database there by making it easy to
develop data access class and entity class.
Figure 3
MAKS is developed into three modules: SHM Data
Producer, SHM Data Processor and SHM Dashboard.
These modules are standalone applications written in
Java and can be built and run independently.
SHM Data Processor: In MAKS the role of data
processor is taken by a Spark Streaming application
which consumes SHM data streams and processes
them for analysis. SHM data processor provides the
following metrics:
 Find all the servers which are deployed on the
network and their ping response. This will also
help the Network Administrator to find out if any
server is out of network at a given time. This data
is stored in a Cassandra database.
 Find various health parameters of the server like
CPU Usage, Memory Consumption, I/O,
Network, Disk Usage, Processes etc. for last 10
secs and store them in the Cassandra database.
 Generate an alarm message if any health
parameters crosses a pre-defined value of the
threshold, indicating a deterioration in server
health.
 Send an email to the System administrator
alerting him about the Server Health.
SHM Data Producer: Servers deployed on the
production network act as data producer for the
Kafka. They generate SHM data which is sent to the
message broker. In MAKS, server health messages
are generated by a java program running in
background of all the servers which are to be
monitored. MAKS is an agent based model, where
this java program is capturing the server health data
like CPU utilization, Memory Usage, Free disk space
on various Linux servers deployed on the network
and forwarding them in form of SHM data to the
broker. This data can be a churned out by a single
Producer program or it may be coded in different
programs as per the need and complexity of the
system design.
SHM Dashboard: A dashboard is important as it gets
automated data feeds and provides a complete, easy
to comprehend picture of the whole deployment. In
MAKS dash board is designed on Spring
Boot application. Cassandra is chosen as a database.
Here springboot application fetches data from the
Cassandra database and sends it to the web page.
Server Health is displayed in form of graphical charts
and tables. The architecture diagram for SHM Data
monitoring Application is illustrated in Figure 3
below.
Dashboard deployment can also be achieved by using
other freeware tools like JFREECHARTS. Database
maintained at Cassandra can be further utilized for
finding out hidden information from the data using
IV. MAKS APPLICATION DESIGN
Server Health monitoring application MAKS is
developed by integrating Spark Streaming and Kafka
coordinated by Zookeeper. This application processes
real time server statistics data are sent by various
production serversin form of Server Health
Monitoring (SHM) data and use that data to monitor
their health and predict the overall health of the
Network.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
27
MAKS: Server Health Monitoring using Kafka
data analytics. Design of a good dashboard requires
detailed input from user so that an efficient display
can be provided.
predictive data analysis using R language or similar
platforms.
REFERENCES
CONCLUSION
[1]
MAKS can be used for maintaining high server
availability via real time monitoring. The proposed
design is capable of handling real time streaming
server health data by using fast platforms like Kafka
and Spark. Spark’s single execution engine and
unified programming model for batch and streaming
lead to some unique benefits over other traditional
streaming systems. Kafka being a novel framework
for preparing of substantial pieces of information is
ideal for a fetch based utilization model where Kafka
enables a purchaser to consume messages at its own
speed. MAKScan achieve good results by providing
effective and efficient monitoring. Further the data
stored in Cassandra database can be stored for
[2]
[3]
[4]
[5]
Mohsen Marjani, Fariza Nasaruddin, Abdullah Gani, “Big
IoT Data Analytics: Architecture, Opportunities, and Open
Research Challenges,” IEEE Access (Volume: 5) Page(s):
5247 – 5261, 29 March 2017
Lukasz KUFEL,”Tools for Distributed Systems Monitoring,”
Foundations of Computing Sciences and Decision Sciences
Vol. 41(2016), DOI: 10.1515/fcds-2016-0014No. 4
Jun Liu; Feng Liu, Nirwan Ansari, “Monitoring and
analyzing big traffic data of a large-scale cellular network
with Hadoop,“IEEE Network Year: 2014, Volume: 28, Issue:
4 Pages: 32 – 39
M. Chen, S. Mao, and Y. Liu, “Big data: a survey,” Mobile
Networks and Applications, vol. 19, no. 2, pp. 171–209,
2014.
W. B. Ali, ``Big data-driven smart policing: big data-based
patrol car dispatching,'' J. Geotech. Transp. Eng., vol. 1, no.
2, pp. 116, 2016.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
28
PERFORMANCE ENHANCEMENT AND ANALYSIS BY REDUCING
WEIGHT OF UNSPRUNG MASS OF FORMULA STUDENT RACING
CAR
1
ARUN NAIR, 2SHRUTI KAWADE, 3BRYAN DIAS, 4IVAN GEORGE, 5DHIRAJ K. BHANDARKAR
1,2
St. John College of Engineering and Management, Palghar (East), Maharashtra
5
Assist. Prof., Faculty of Mechanical Engineering, SJCEM
E-mail: 1anair3096@gmail.com, 2shrutikawade1996@gmail.com, 3bryandias4@gmail.com, 4ivan.h.george@gmail.com
Abstract - This paper is to redesign the unsprung mass of SAE SUPRA vehicle with a primary focus on reducing the weight of overall
assembly. The design of the wheel assembly is critical due to the forces acting on the wheel assembly during accelerating, braking,
cornering and tilting. Furthermore, the Wheel Assembly is an important part of an automobile and its failure is hazardous endangering
human life. Therefore it is required to design the Wheel Assembly and its components considering all the factors leading to the failure by
developing a safe design. It must also be noted, the components should be designed in such a way that they have a minimum weight at the
same time care must be taken that they do not cross a certain limit of stress value. In this study, the design of the Wheel Assembly for R10
Rims has been presented. The weight of the Vehicle is considered to be 300 kg along with the driver. The forces acting on the components,
the failure criteria is illustrated. The study deals with finding out the dimensions of the individual components and also detecting the
probable regions of stress concentration. The main objective is to redesign and reduce the unsprung weight by 30% compared to 2017 model
by the team. The design procedure follows all the rules laid down by FSAE Rule Book for Formula Type Cars.
Keywords - Unsprung Mass, Reducing Weight, Wheel Assembly, SAE SUPRA, FSAE
I. INTRODUCTION
II. COMPONENTS OF UNSPRUNG MASS
SAE SUPRA is a Student project that involves a
complete design and fabrication of an open wheel
formula-style race car. Being a race-car, the primary
goal is to achieve the best performance to weight
ratio. The reduction of weight in any area will allow
for better vehicle performance overall. An automobile
is said to function appropriately only when all its
systems are working as they are required to work.
Most of the vehicle’s weight is supported by a
suspension system. It suspends the body and
associated parts so that they are insulated from the
road shocks and vibrations that would otherwise be
transmitted to the passengers and the vehicle itself.
However, other parts of the vehicle are not supported
by the suspension system such as wheel axles, wheel
bearing, hub, tires, brakes, steering and suspension
parts are not supported by the springs. This mass is
called unsprung mass. Light weight construction is
important for the racing. Thus generally unsprung
weight should be kept as low as possible.
The unsprung mass must be lower than the sprung
mass and also should be as least as possible to
provide proper drive stability and load balancing of
the vehicle. There are a lot of forces acting on the
wheels in the static and especially in the dynamic
condition. Thus utmost care must be taken while
designing the Wheel Assembly. The objective of
Optimization is always to find the best possible and
suitable dimension.
Here, R10 rims have been used along with 16 x 6 x
10 tires. The Weight of the vehicle is considered to be
300 kg along with the driver. All the forces have been
found out on the above basis and according to the
above mentioned Wheels. The design procedure
follows all the rules laid down by SAE Rule Book for
Formula Type Cars.
1.
2.
3.
4.
5.
Wheels
Hub
Upright
Brake disc
Brake caliper
III. DESIGN CONSIDERATION
1) Getting the prerequisite parameters from the
suspension and steering geometry
Considering the Front Wheel Assembly the
Parameters are as follows
King Pine Inclination: 6.1°
Caster Angle: 0°
Track Width: 1200 mm
Wheel Diameter: 406.4 mm
2) Brake Calculation
Mass of vehicle (m) = 300 kg
At 40 kmph
Velocity (v) = 11.11 m/s Distance (s) = 8 m
²
Braking force
=
= 2314.35 N
.
Force on one wheel=
= 578.59 N
Braking torque on one wheel
= 528.59 x 9.5 x 25.4 x 10-3
= 139.614 Nm
Similarly, At 100 kmph
v = 27.78 m/s
s=8m
Braking torque = 872.897 Nm
Wilwood PS-1,
Piston diameter (d2) = 1.12 inch = 28.448 mm
Area (A2) = 0.99 inch2 = 638.7 mm2
Using Pulsar rear
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
29
Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car
Diameter of bore (d1) = 14mm
Area (A1) = 153.94 mm2
Force of 2000 N Pedal ratio = 4:1
Force on master (F1) = 2000 x 4 = 8000 N
F2 =
=
.
.
Therefore selecting SKF 6008 as the bearing suitable
for front wheel assembly
Therefore C=13200
Therefore P actual=3583.03N
As this is greater than the previously assumed load
Therefore, it is safe for our design
= 33192.153 N
b)
Rear Bearing
Similarly, Considering 300 kg vehicle the load on
rear will be 200 kg
Assuming entire load acts on a single bearing
Therefore, radial force is considered 1.5G
Therefore Fr = 1.5*200*9.81 =2943 N
C = 16263.15 N
Approximately C = 16500 N
Therefore selecting SKF 510001 as the bearing
suitable for rear wheel assembly
For 2nd piston,
Total Clamping Force = 2 x 33192.1= 66384.306 N
Frictional Force = 66384.306 x 0.4 = 26553.7224 N
Case 1: Considering 180 mm disc
Braking torque = 26553.7724 x 0.09 =2389.84 Nm
Case 2: Considering 120 mm disc
Braking Torque = 1593.223 Nm
4) Design of Hub
a) Determining the forces acting on the Hub:
Torque on the Brake Disk Petal:
A torque of 105Nm is acting on the Brake Disk Petal.
The Force acting on each hole
÷
=
Case 3: Considering 150 mm disc
Braking torque = 1991.53 Nm
3) Bearing Calculation
a)
Front Bearing
Let us consider 50:50 weight distribution of load
Therefore considering 300 kg vehicle the load on
front will be 150 kg
Considering that this entire load acts on a single
bearing
Therefore, radial force is considered 1.5G
Therefore Fr = 1.5 × 150 × 9.81 =2207.25N
÷
Force due to Side Impact: Here the side Impact force is taken to be 2G
= 2 × g × vehicle mass
Impact force = 2 × 9.81 × 300 = 5886 N
Impact force on 1 petal = 5886/4 = 1471.5 N
Axial force is considered 1G
Therefore Fa = 1 × 150 × 9.81=1471.5N
Now let us consider P = 1.5Fr…standard practice
P = 1.5 × 2207.25 = 3310.875N
Now, = ( ′10)
Loads on Bearing: The load on 1 bearing is 750 N
The load on 2nd bearing is 750 N
For ball bearing k=3
Therefore let us consider l’10 =50mr
Therefore C =3310.875 × 50
= 12197.368N
Approximately, C =12500N
The axial load on the bearing is 1450 N
b) Design of Wheel Petal
Shear Failure of Petal
Allowable stress in the Hub in shear = τ = 56.875
N/mm2
Force acting on Petal as obtained is 846.77 N
Now, τ =
Therefore from PSG page no 4.12, 4.13
Bearing
SKF6007
SKF6008
6008-RZ
SKF6206
SKF6207
SKF6208
/
=
= 846.77 N
Torque on the Wheel Petal: The Force acting on each hole = 486.11 N
D
(mm)
D
(mm)
B
(mm)
C
(N)
C0
(N)
N
(rpm)
35
62
14
12500
8800
13000
40
68
15
13200
9800
10000
40
68
15
17800
11600
22000
30
62
16
15300
10000
13000
35
72
17
20000
13700
10000
40
80
18
22800
Table 1
Bearing selection
16000
10000
56.675 =
.
×( × )
t x b = 7.43 =7.5
Where,
t= thickness of Wheel Petal
b= distance between the hole and the end of petal
If t = 10mm b= 0.743 mm
If t = 15mm b= 0.495 mm
This bending is due to the force of 846.77 N.
The radius of effective bending is 54 mm
Mb = 846.77 × 54
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
30
Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car
Mb = 45738 N-mm
Now,
By Flexural Equation,
σ
=
2)
Geometric modelling of Brake disc.
σb= 113.75 N/mm2
y=
2b=d
I = x t x d3
=
.
/
t=10mm, d=16mm
Total thickness is
= width + diameter of hole
=16+10 = 26 mm
Figure 2: Brake disc Geometric model
3)
Geometric modelling of Upright
c) Design of Brake Disk Petal
Allowable stress in the Hub in shear =τ
=56.875 N/mm2
σ
=
σb= 113.75 N/mm2
I = x b x t3
t= thickness of petal
b= width of petal =26 mm as found from above
calculation
Force acting on Petal as obtained is 846.77 N
Now,
.
= /
t = 9.62
The thickness of petal is taken as 10 mm.
.
56.675 = × ( × )
t x b = 7.44
If t = 4mm, b = 1.86 mm
Figure 3: Upright Geometric model
Thus the width of the petal is taken to be 5mm.
V. DESIGN ANALYSIS
IV. GEOMETRIC MODELLING
1)
1)
Material: alumec 89
Ultimate tensile strength: 590 MPa
Yield strength: 550 MPa
Geometric modelling of Hub.
Analysis of Hub
Figure 4: Stress Analysis of hub
Figure 1: Hub Geometric model
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
31
Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car
2)
Figure 5: Total deformation of hub
Figure 8: Stress Analysis of Brake disc
Figure 6: FOS of hub
Figure 9: Deformation of Brake disc
Analysis of Brake disc
3)
Analysis of Upright
Thermal Analysis
The following boundary conditions were applied on
the brake discConvection = 90 W/m2K
Heat power = 2203.896 W
Initial temperature = 30℃
The thermal properties of brake disc material are:
Thermal conductivity = 36 W/mK
Thermal expansion coefficient = 12µm/mK
Figure 10: Stress Analysis of Upright
Figure 11: Total Deformation of Upright
Figure 7: Thermal Analysis of Brake disc
Static Structural Analysis
The following boundary conditions were applied to
the brake discPressure = 25116078.09 N/m²
Frictional force = 33192.1N
The mechanical material properties of the brake disc
material areUltimate tensile stress: 630 MPa
Yield stress: 530 MPa
Figure 12: FOS of Upright
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
32
Performance Enhancement and Analysis by Reducing Weight of Unsprung Mass of Formula Student Racing Car
criteria for enduring the loads encountered by
formula student vehicle. The FEA analysis prove that
the assembly is able to endure loads in real track
condition. The reduced unsprung mass makes the
vehicle easy to handle while improving its
acceleration timing. This paper provides a basic
layout encompassing key factors for designing all
components involved in the design of wheel assembly
which would be instrumental for improvement in the
future design.
VI. ANALYSIS RESULT
COMPONENT
HUB
BRAKE
DISC
UPRIGHT
Material
Alumec 89
EN 8
Alumec 89
Ultimate tensile
strength
590 MPa
630 MPa
590 MPa
Yield Strength
550 MPa
530 MPa
550 MPa
Max stress
189 MPa
198 MPa
147 MPa
Max Deformation
0.43mm
0.6117mm
0.134mm
F.O.S
2.7
2.5
REFERENCES
[1]
3.4
[2]
[3]
All the values obtained from analysis are less than
their allowable values.
Hub, brake disc and upright design are safe based on
strength and rigidity criteria.
[4]
CONCLUSION
[5]
The design procedure was done by keeping the
suspension geometry as primary reference for upright
design. The hub is made with minimum weight
Joijode Vrushabh Umesh and Yadav Abhishek “Designing
and Optimization of Wheel Assembly of a Formula Student
Car”, IJCET E –ISSN 2277 – 4106, P-ISSN 2347 – 5161
Mr. MAHENDRA LAXMAN SHELAR “Design Analysis
and Optimization of Steering Knuckle Using Numerical
Methods and Design of Experiments”
Badih A. Jawad and Jason Baumann “Design of Formula
SAE Suspension”, Lawrence Technological University, SAE
TECHNICAL PAPER SERIES 2002-01- 3310
M. Miwa, Y. Kawasaki & A. Yoshimura “Influence of
vehicle unsprung-mass on dynamic wheel load” Technology
Research and Development Department (KOMAKI), General
Technology Division, ISSN 1743-3509
Prem J*.,Raghupathi P and Kalaiyarasan A “Analysis Of
Magnesium Alloy Wheel For Four Wheeler”, Muthayammal
Engineering College, Tamil Nadu, pp. 13126- 13130.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
33
DESIGN OF REGENERATIVE BRAKE TEST RIG
1
BHUSHAN C. NIKAMPATIL, 2SANJAY T. SATPUTE, 3LALITKUMARM. JUGULKAR
1,2,3
Rajarambapu Institute of Technology, Sakhrale, Sangli, Maharashtra, India
E-mail: bpatil034@gmail.com, 2sanjay.satpute@ritindia.edu,3lalitkumar.jugulkar@ritindia.edu
1
Abstract - This paper discusses about design of regenerative brake test rig for three-wheeler with the use of kinetic energy
recovery principle. Paper also discusses in detail about steps carried out in designing test rig. This paper is divided into three
parts designs of flywheel, coupling device and cone clutch. Flywheel is used for kinetic energy recovery since it has long life
and high energy density as well as maximum power output. For flywheel design new electric power train vehicle standards
are used. For transmission of power from motor to rear axle chain drive is used since it has positive drive and higher
efficiency. For engagement and disengagement of flywheel cone clutch is used. After theoretical design calculations all the
results are cross checkedand give proposed test setup.
Keywords - Regenerative Braking, Flywheel, Kinetic Energy Recovery System, Chain Drive, Cone Clutch
efficiency gets improved. Regenerative braking not
only improves the efficiency by saving the energy but
also improves the performance of vehicle by boosting
the acceleration of vehicle [11].
With increasingly serious environmental pollution
and energy crisis problem, electric cars more and
more get people’s attention and favor. The world’s
biggest carmaker also continuously introduces new
electric vehicles. Due to characteristics of the electric
vehicle’s motor and battery, it is convenient for
recycling braking energy. Research and design of
braking regeneration system are always focus to the
electric car manufacturers. At present, there is no
uniform standard for the evaluation and test of pure
electric vehicle braking energy recycling system.
Industrialization and commercialization of pure
electric vehicles requires establishment of a unified
and reasonable test methods for braking energy
recovery [7].
I. INTRODUCTION
Braking is one of the key features of vehicle in which
producing force that opposes the motion of wheel,
thereby reducing vehicle’s speed or bringing it to a
halt. When the brakes are applied, hydraulic pressure
actuates in the master cylinder as a result of which
brake pads under pressure rub against the surface of
rotor. Thus, the friction comes into play and kinetic
energy of rotor and eventually wheel gets hampered.
In this process, kinetic energy gets converted into
heat energy which is dissipated to the surroundings.
Hence, a part of energy extracted from engine gets
wasted and further energy is required to accelerate the
vehicle [11]. Regenerative braking system is an
energy recovery system that recovers significant
amount of kinetic energy of vehicle that
unnecessarily gets wasted during braking. The
recovered energy is stored in a suitable storage
system (battery or flywheel). “Stop and go”,
“decelerate and accelerate”, that’s usually the scene
of traffic in the city which results in a lot of braking.
The kinetic energy of vehicle is given by equation:
II. COMPONENTS
BRAKE TEST RIG
OF
REGENERATIVE
1. Flywheel
Flywheel is a heavy rotating mass that stores the
kinetic energy or the mechanical energy of rotating
wheel in the same form (rotational energy). This
process of recovering energy is more efficient. The
losses involved during energy transformation are
avoided, because the energy is being transmitted in
the mechanical form throughout the cycle. In case of
recovering the energy through motor/generator and
battery system, energy losses occur as mechanical
energy is being transformed into electrical energy
while charging the battery and during discharging
electrical energy gets converted into mechanical
form.
1
. .=
2
Where, E=rotational energy of flywheel
I=moment of inertia of flywheel
=angular velocity of flywheel
1
. .=
.
2
Where, E=kinetic energy of vehicle
m=mass of vehicle and v = velocity of vehicle
Ideally, this is the amount of energy which is
available for recuperation when brakes are applied.
This energy which usually gets wasted on the
application of conventional brakes can be recovered
with the help of regenerative braking. The efficiency
of regenerative braking mainly depends on the type of
energy storage system and drive train. Energy storage
system should be good enough to store the energy
and should also be capable to release the stored
energy or power. The transmission system should be
efficient to transmit the power to the driving wheels
to propel the vehicle. The amount of work done by
engine is reduced and thus the fuel consumption is
reduced. Hence the fuel economy and overall 30 %
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
34
Design of Regenerative Brake Test Rig
The amount of energy stored by flywheel depends
upon its mass, radius and rotational velocity. Thus,
the maximum energy stored by flywheel can be
enhanced by increasing moment of inertia and
angular velocity of flywheel [11].
2. Motor
The motor which is used in electric vehicles is BLDC
(Brushless DC motor). This motor is the heart of the
whole electric vehicles. BLDC motor control is the
main control of inverter, the commutation which is
achieved to control the order of conduction on the
inverter arm bridge. If BLDC motor to get control,
we must know the rotor location, thus it can
determine the commutation. Hall Effect sensor are the
sensors which are used commonly for predict the
rotor position [1].
3. Coupling devices
Device used for engagement of flywheel and motor
during normal running condition. And disengagement
of flywheel and motor during braking so motor act as
generator. To get more accuracy of test result ensures
minimum
losses
during
engagement
and
disengagement. A freewheel or overrunning clutch is
a device in a transmission that disengages the
driveshaft from the driven shaft when the driven shaft
rotates faster than the driveshaft. When a vehicle
going downhill or any situation where the driver takes
his or her foot off the accelerator pedal, closing the
throttle; the wheels want to drive the engine, possibly
at a higher RPM. To avoid this from happening we
use a freewheel unit which disengages the driven
shaft from the driveshaft.
4. Power electronics
Sophisticated electronic circuit is necessary to decide
when the motor should reverse, while specialized
electric circuits route the electricity generated by the
motor into the vehicle's batteries. In some cases, the
energy produced by these types of brakes is stored in
a series of capacitors for later use. In addition, since
vehicles using these kinds of brakes also have a
standard friction braking system, the vehicle's
electronics must decide which braking system is
appropriate at which time [15].
5. Control Electronics
A microcontroller is required to read the Hall Effect
sensor feedback and decide the required combination
of the switching [2]. A Hall effect sensor is
a transducer that varies its output voltage in response
to a magnetic field. Hall effect sensors are used
for proximity,
switching,
positioning,
speed
detection, and current sensing applications.
correspondingly results in a raise of the speed of the
flywheel. A typical FES system mainly includes three
parts: flywheel rotor, motor/generator and power
conversion subsystem. In electromechanical systems,
the flywheel rotor is accelerated by motor generator
when operating in motor mode, the energy stored in
the flywheel rotor is increased by accelerating the
rotor to higher speeds, i.e. the FES is being charged.
When required the energy stored in the flywheel rotor
can be released by operating motor generator in
generator mode producing electricity.
A flywheel is a heavy rotating body that acts as a
reservoir of energy. The energy is stored in flywheel
in the form of kinetic energy, The flywheel acts as an
energy bank between the source of power and the
driven machinery.
The functions of the flywheel are as follows:
1. To store and release energy when needed
during the work cycle
2. To reduce the power capacity of the electric
motor or engine
3. To reduce the amplitude of speed
fluctuations
Flywheel Materials
Traditionally, flywheels are made of cast iron. From
design considerations, cast iron flywheels offer the
following advantages
1. Cast iron flywheels are the cheapest.
2. Cast iron flywheel can be given any
complex shape without involving machining
operations
3. Cast iron flywheel has excellent iron
flywheel has excellent ability to damp
vibrations.
However, cast iron has poor tensile strength flywheel
compared to steel. The failure of cast iron is sudden
and total. The machinability of cast iron flywheel is
poor compared to steel flywheel.
IV. DESIGN PHASE
To find kinetic energy
. .=
.
………M= 320 kg, v = 25 km/hr
1
. . = × 320 × 6.944
2
. . = 7716.0493
To find Power
. .
=
Power = 7716.0493/10 …… Stopping time 10 s
= 771.60 W
To find dimensions of flywheel
1
. .=
2
2
=
60
2 × 2000
=
= 209.4395
/
60
III. FLYWHEEL ENERGY STORAGE SYSTEM
FES works by accelerating a rotor (flywheel) to a
tremendously high speed and maintaining the energy
in the system as rotational energy. When energy is
extracted from the system, the flywheel rotational
speed is reduced a consequence of the principle of
conservation of energy, adding energy to the system
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
35
Design of Regenerative Brake Test Rig
=
=
=
The chain drive is intermediate between belt and gear
drives. It has some features of belt drives and some of
gear drives. The advantages of the chain drives
compared with belt and gear drives are as follows:
1. Chain drives can be used for long as well as
short center distances.
2. Chain drive is positive drive
3. Efficiency of chain drive is from 96 % to
98%
4. Atmospheric conditions and temperatures do
not affect the performance of chain drives.
2
2
2
=
2
1
. .=
4
7716.0493 =
= 0.056
1
× 7100 ×
4
× 0.01 × 209.4395
Roller Chains
It consists of alternate links made of inner and outer
link plates. A roller chain consists of following five
parts
a. Pin
b. Bushing
c. Roller
d. Inner link plate
e. Outer link plate
........ρ = 7100kg/m3 for Grey Cast Iron FG 200
Thus, diameter of flywheel is taken as 112 mm
1. To find kW rating of chain
Assumptions
a.
No. of teeth on driving sprocket ( )= 21
b.
Speed reduction 3:1, hence no. of teeth on
driven sprocket ( )= 63
c.
Simple roller chain with only 1 strand
K1 = 1
Ks = 1.4
(Service factor for heavy shock)
K2 = 1.26
(Tooth correction factor)
×
ℎ
=
×
0.7716 × 1.4
ℎ
=
1 × 1.26
= 0.85733
Figure 1: Design of Flywheel
Analysis of flywheel
2. Selection of chain
From Design data book
Therefore, chain number 08 A is selected at 2000 rpm
Data for 08 A are as follows
From design data book we have
Pitch
12.7 mm
Roller diameter(d1)
7.95 mm
Width (b1)
7.85 mm
Transverse Pitch
14.38 mm
Figure 2: Modal analysis of Flywheel
Modal analysis shows that for 3382.2 Hz frequency
maximum deformation is 82.225 mm. Here operating
range of frequency is near about 210 Hz hence
assumptions made during design were correct and
design is safe.
3. To find pitch circle diameter of driving and
driven pulley
12.7
=
=
= 85.21
Design of Coupling Device
A chain drive consists of an endless chain wrapped
around two sprockets. A chain can be defined as a
series of links connected by pin joints. The sprocket
is a toothed wheel with a special profile for the teeth.
=
=
12.7
= 254.78
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
36
Design of Regenerative Brake Test Rig
4. To find No. of chain links
Assumptions
a. The number of pitches or links of the chain
should be always even.
b. The number of teeth on driving sprocket
should be always odd.
Analysis of sprocket
The center distance between sprocket wheel should
be between 30 P to 50 P
Taking mean value = 40 P
( ) = 40 = 40 × 12.7
∴
= 508
No. of links = 123
5. Corrected center distance (a)
a = 507.24 mm
Figure 4: Static structural analysis of sprocket
Dimensions of driving sprocket wheel
Static structural analysis shows that for chain tension
of 704.16 N, maximum deformation is 4.62e-5 mm.
Sprocket design is capable to handle such small
deformation. Hence, assumptions made during design
were correct and design is safe.
Design of cone clutch
Cone clutches are friction clutches. They are simple
in construction and are easy to disengage. However,
the driving and driven shafts must be perfectly
coaxial for efficient functioning of the clutch. A cone
clutch consists of two working surfaces, inner and
outer cone
For design of cone clutch uniform wear theory
considered.
Required conditions
Power = 0.85 kW
N= 2000 rpm
From design calculations following results are
obtained
Torque to be transmitted = 4.05 Nm
Material for shaft C45
Diameter of shaft = 20 mm
Semi Cone angle = 12.5 0
Figure 3: Design of sprocket
a)
b)
c)
d)
e)
f)
Outer Diameter = 91.86 mm
Root diameter = 77.05 mm
Tooth flank radius = 30.7138 mm
Tooth side radius = 12.7 mm
Tooth Width = 7.4575 mm
Tooth side relief = 1.58 mm
To find tension in the chain
× ×
=
60 × 1000
21 × 12.7 × 2000
=
60000
= 8.89 /
Chain tension is given by
1000 ×
=
1000 × 6.26
=
8.89
= 704.16 N
for 08 A
Braking load = 2500 N
∴
=
2500
= 3.55
704.16
Figure 5: Proposed Test Setup
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
37
Design of Regenerative Brake Test Rig
[6]
CONCLUSIONS
Design is important stage for any product
development process. As it decides life of product. In
this paper initial design of regenerative brake test set
up has been discussed. Each component design is
cross verified and has been found safe.
Theoretical design calculations were analytically
compared with the help of FEA software. Modal
analysis of flywheel shows that for 3382.2 Hz
frequency maximum deformation is 82.225 mm. Here
operating range of frequency is near about 210 Hz.
Also, Static structural analysis shows that for chain
tension of 704.16 N, maximum deformation is 4.62e5 mm. Sprocket design is capable to handle such
small deformation. In above both cases assumptions
made during design were correct and design is safe.
[7]
[8]
[9]
[10]
[11]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[12]
Soniya K. Malode, R. H. Adware., (2016) ‘Regenerative
Braking System in Electric Vehicles’, International Research
Journal of Engineering and Technology (IRJET), Vol. 03
Issue. 03
Sayed Nashit, Sufiyan Adhikari, Shaikh Farhan, Srivastava
Avinash, Amruta Gambhire., (2016) ‘Design, Fabrication and
Testing of Regenerative Braking Test Rig for BLDC Motor’,
International Research Journal of Engineering and
Technology (IRJET), Vol. 03 Issue. 05
Guizhou Ren, Guoqing Ma, Ning Cong., (2015) ‘Review of
electrical energy storage system for vehicular applications’,
Renewable and Sustainable Energy Reviews, 41, pp. 225-236
Tai-Ran Hsu. (2013) ‘On a flywheel-based regenerative
braking system for Regenerative energy recovery’,
Proceeding of Green Energy and System Conference, Long
Beach, CA, USA.
Junzhi Zhang, Xin Lu, JunliangXue, and Bos Li. (2008)
‘Regenerative braking system for series hybrid city bus’, The
World Electric Vehicle Journal, Vol 2, Issue 4
[13]
[14]
[15]
[16]
[17]
Bambang Sampurno, AriefAbdurrakhman, Herry Sufyan
Hadi. (2015), ‘Development of Electrical Kinetic Energy
Recovery System (KERS) on Motorcycle’, International
Conference on Advanced Mechatronics, Intelligent
Manufacture, and Industrial Automation, Surabaya,
Indonesia.
Gopi Krishnan, N. and Wani, K., "Design and Development
of a Hybrid Electric Two-Wheeler," SAE Technical Paper
2015-26-0118, 2015, doi:10.4271/2015-26-0118.
Naoki Kobayashi, ‘Development of Electric Motor for
Electric motorcycle for Business use’ SAE Technical Paper
2011-32-0560,2011, doi:21009560
Joseph Hartley, Andrew Day, Ion Campean, Rod G Mclellan,
John Richmond, ‘Braking System for a Full Electric Vehicle
with Regenerative Braking’ SAE Technical Paper 2010-011680,2010
Guirong, Z., (2012), June. Research of the regenerative
braking and energy recovery system for electric vehicle.
In World Automation Congress (WAC), 2012 (pp. 1-4).
IEEE.
Vishwakarma, D. and Chaurasia, S., 2016. Regenerative
Braking System. Imperial International Journal of EcoFriendly Technologies (IIJET), 1, pp.30-33.
Patel, P., Chandra, H. and Sahoo, T., 2015, August. Study on
associated
effects.
In Transportation
Electrification
Conference (ITEC), 2015 IEEE International (pp. 1-8). IEEE.
Liu, Z., Ortmann, W.J., Nefcy, B., Colvin, D. and Connolly,
F., 2017. Methods of Measuring Regenerative Braking
Efficiency in a Test Cycle. SAE International Journal of
Alternative Powertrains, 6(2017-01-1168), pp.103-112.
Nian, X., Peng, F. and Zhang, H., 2014. Regenerative braking
system of electric vehicle driven by brushless DC
motor. IEEE Transactions on Industrial Electronics, 61(10),
pp.5798-5808.
George Dobre, Mihai Robert Vladu, Power transmissions
Proceeding of 4th International Conference on Power
Transmissions (PT12), held at 20–23June 2012, in Sinaia,
Romania., Springer pp. 347-355.
Bhandari, V.B., 2010. Design of machine elements. Tata
McGraw-Hill Education.
http://auto.howstuffworks.com/auto-parts/brakes/braketypes/regenerative braking.html

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
38
EFFECT OF NOZZLE TO PLATE DISTANCE ON LOCAL HEAT
TRANSFER DISTRIBUTION BY INCOMPRESSIBLE CHEVRON JET
USING CFD
1
HARPREET SINGH, 2SUNIL CHANDEL
1
2
PG Student, Department of Mechanical Engineering, Girinagar, Pune (Mah.)
Asisstant Professor, Department of Mechanical Engineering, Girinagar, Pune (Mah.)
E-mail: 1harpreet910@hotmail.com, 2sunilchandel@diat.ac.in
Abstract - In this paper, numerical simulation was performed to analyze the effect of nozzle to plate distance on heat
transfer performance of an incompressible hot jet by a chevron nozzle on a flat surface. Influence is studied at the nozzle to
plate distance (z/d) 1, 2, 4, 6, 8 and 10 for Reynolds number of 28,000. Numerical analysis has been done by solving
conservation equations of momentum, mass and energy with two equations based RNG k- ε turbulence model and Energy
model to determine the local distribution of Nusselt number on the plate. A change in Nusselt number distribution is
observed, for lower nozzle to plate distance (z\d ≥ 4) secondary peak in the Nusselt number is present. From nozzle to plate
distance (z/d ≤ 6), the Nusselt number decreases gradually from the stagnation point in the radial direction.
Keywords - Chevron Nozzle, Nusselt Number, Heat Transfer, Computational Fluid Dynamics
number from 3600 to 27600 and observed that there
rise in the Nusselt number due to the transition from
laminar to turbulent flow at plate. They further
decrease the nozzle plate spacing which increases the
velocity of the flow in the gap which is responsible
for shifting the zone of the transition from laminar to
turbulent flow towards the stagnation point.
I. NOMENCLATURE
a
b
d
Nu
Re
z
-
Height of Chevron
Penetration depth
Diameter of nozzle
Nusselt number
Reynolds number
Nozzle to plate distance
Vinze et al. [4] conducted experiment and determine
the effect of impinging jet temperature on heat
transfer distribution on smooth plate. In his
experiment, it was observed that heat transfer does
not depend much on the temperature of jet. However,
jet having ambient temperature does maximum heat
transfer than compared to heated air jet. Another
experiment is conducted by Vinze et al. [5] to study
influence of shape of nozzle on heat transfer
distribution. It was observed that the shape of nozzle
has great influence on the heat transfer distribution.
Circular jet experiences the highest rate of heat
transfer compared that to square jet and then to
triangular nozzle. It was also observed that the
compressibility affects Nusselt number distribution
only in the stagnation region and has negligible
influence in transition and wall jet region.
II. INTRODUCTION
Jet impingement method is used for enhancing heat
transfer. These methods are used in steel
manufacturing industries, in cooling of Gas Turbine
blades, to cool down the material during grinding, in
cooling of combustion chamber wall and paper and
textile mills. Many researches are done to increase
the heat transfer by changing various arrangements
like non-circular nozzles (square, triangular, circular
and elliptical), fixing the tabs at the nozzle exit
(Chevron nozzle) and nozzle profiles (contoured
nozzle, pipe nozzle and orifice). A chevron is
basically a triangular tab which may be inclined at an
angle towards central axis of pipe fixed at periphery
of pipe exit. These tabs generate turbulence and they
increases heat transfer. Chevron nozzle is the least
explored, although it appears to have more potential
in increasing the heat transfer.
Nabadavis et al. [6] did the numerical investigation
emphasizes on studying the heat transfer
characteristics when a high velocity air jet impinges
upon a flat plate having constant heat flux. He
observed that the heat transfer rate increases with the
increase of Reynolds number of the jet and also there
is an optimum value for jet distance to nozzle
diameter for maximum heat transfer when all the
other parameters were kept fixed.
Many studies are carried out to study the method to
increase the heat transfer. Jambunathan et al. [1] and
Viskanta [2] provided comprehensive review on jet
impingement heat transfer. They studied the
impingement of jet for Reynolds number ranging
from 5000-1,24,000 by changing the jet diameter,
profile of flow device and nozzle to plate distance.
Lytle and Webb (1994)[3] studied the distribution of
Nusselt number on flat plate due to impingement of
jet for low jet exit to plate spacing and Reynolds
Vinze et al. [7] carried an experimental study to
investigate the influence of the chevrons on local heat
transfer distribution for impinging incompressible jets
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
39
Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by Incompressible Chevron Jet using CFD
at Reynolds number of 28,000, 35,000 and 40,000.
He observed that Nusselt number increases with the
increase in the number of chevrons and also with the
increase in the tip angle for a given number of
chevrons.
Yan et al. [8] numerically studied the heat transfer
characteristics of a circular air jet impinging on a flat
plate. He numerically studied seven turbulent models
for predicting this type of flow and heat transfer is
investigated and observed that the (RNG) k-epsilon
model, (SST) k-omega model and the large Eddy
simulation (LES) produces better results than others
turbulent model.
Figure 2: Physical domain
B.
Meshing
Unstructured mesh is created using ANSYS ICEM
CFD software. Grid generation is one of the
important stages of the simulation. Fine meshing is
done on the nozzle as compared to the enclosure.
Mesh independent study is done and optimum value
of number of nodes and element for the simulation is
found out as shown in Table 2.
III. GEOMETRY AND MODELLING
A.
Geometry Description
For this simulation geometry is created using ANSYS
SPACECLAIM design modeller. Figure 2 shows the
physical domain of the modelling for z/d = 8. Air
flow at high velocity passes through chevron nozzle
of diameter 10.8 mm having 4 numbers of triangular
tabs. The length of each chevron is a = .43d i.e. 4.644
mm as shown in Figure 1. Jet is impinged on a thin
foil of stainless steel having size 150mm x 130mm
and thickness of .08mm. This plate is not created in
ANSYS SPACE CLAIM program because of its
thickness .08mm, which is very less, it is difficult to
perform meshing operation on the plate. Shell
conduction technique is used in ANSYS FLUENT to
specify thickness of the plate rather than creating it in
ANSYS SPACECLAIM. Table 1 shows the distance
between the plate and the nozzle for different z/d
ratio. An enclosure is created between the plate and
nozzle.
Nozzle to plate distance
distance
1
2
4
6
8
10
Nozzle to plate distance
Number of ratio (z/d)
Number of
nodes elements
1
2
4
6
8
10
696683
1016734
1817381
2530348
3410251
4110553
118775
172462
306532
425960
573211
690370
Table 2
Number of nodes at different nozzle to plate ratio
C.
Turbulent Model
The RNG k-epsilon model was derived using a
statistical technique called renormalization group
theory. It is similar in form to the standard k-epsilon
model which is the most common model used in CFD
to simulate mean flow characteristics for turbulent
flow conditions. It is a two equation model which
gives a general description of turbulence by means of
two transport equations. The first transported variable
determines the energy in the turbulence and the
second transported determines the rate of dissipation
of the turbulent kinetic energy.
Nozzle to plate
ratio(z/d) (mm)
10.8
21.6
43.2
64.8
86.4
108
Table 1
Nozzle to plate distances of geometry
Figure 1: Geometry of chevron Nozzle
Figure 3: Local distribution of Nusselt number for nozzle to
plate distance z/d = 1
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
40
Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by Incompressible Chevron Jet using CFD
Figure 4: Local distribution of Nusselt number for nozzle to
plate distance z/d = 2
Figure 7: Local distribution of Nusselt number for nozzle to
plate distance z/d = 8
Figure 5: Local distribution of Nusselt number for nozzle to
plate distance z/d = 4
Figure 8: Local distribution of Nusselt number for nozzle to
plate distance z/d = 10
For turbulent kinetic energy k
(ρk) +
(ρku ) =
α μ
+ G +G −
(1)
α μ
+
ρε − Y + S
In these equations, G represents the generation of
turbulence kinetic energy due to the mean velocity
gradients. G is the generation of turbulence kinetic
energy due to buoyancy. Y
represents the
contribution of the fluctuating dilatation in
compressible turbulence to the overall dissipation
rate. The quantities α and α are the inverse effective
Prandtl numbers for k and ε, respectively. S and S
are user-defined source terms.
For dissipation ε
(ρε) +
C
(ρεu ) =
(G + C G ) − C ρ
− R +S
(2)
D.
Energy Model
ANSYS Fluent solves the energy equation in the
following form:
[
]
+ ∇ . v⃗[ρE + p] = ∇ . K ∇T −
∑ h J ⃗ + τ . V⃗ + S
(3)
where Keff is the effective conductivity (k+kt, where
kt is the turbulent thermal conductivity, defined
according to the turbulence model being used), and Jj
is the diffusion flux of species j. The first three terms
on the right-hand side of represent energy transfer
due to conduction, species diffusion, and viscous
dissipation, respectively. Sh includes the heat of
Figure 6: Local distribution of Nusselt number for nozzle to
plate distance z/d = 6
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
41
Effect of Nozzle to Plate Distance on Local Heat Transfer Distribution by Incompressible Chevron Jet using CFD
chemical reaction, and any other volumetric heat
sources defined.
CONCLUSION
A numerical study is carried out to investigate the
influence of nozzle to plate distance on local heat
transfer distribution for impinging incompressible
chevron jet on smooth flat plate at Reynolds number
of 28,000. From the study it is concluded that the
maximum heat transfer at a nozzle to plate distance of
six nozzle diameter at 28,000 Reynolds number. A
secondary peak in the Nusselt number distribution is
observed for lower nozzle to plate distances (z/d≤4).
E.
Boundary conditions
The mass flow rate of inlet of pipe for Reynolds
number 28,000 is .00454 Kg/sec having turbulence
intensity of 5% and hydraulic diameter of .0108 m.
The direction of flow of air is at negative-y direction.
The temperature at inlet of the nozzle is set to 350 K.
The wall of the nozzle is thermally insulated, so heat
flux through the nozzle wall is set to 0. All the sides
of enclosure except the plate side of the enclosure are
set to pressure - outlet. Thickness is given to plate
side of enclosure using shell conduction technique of
.08 mm and temperature of 300 K.
REFERENCES
[1]
RESULTS AND DISCUSSION
[2]
The Nusselt number distribution for different z/d ratio
is shown in Figure 3, Figure 4, Figure 5, Figure
6,Figure 7 and Figure 8. The Nusselt number
distribution shows that for lower nozzle to plate
distances (z/d ≤ 4), a secondary peak in the Nusselt
number is present. The presence of secondary peak
may be because of the fluid acceleration taking place
due to sudden change in flow direction which results
in increase in rate of heat transfer. Among all cases,
highest Nusselt number is measured at the stagnation
point and z/d = 6. For nozzle to plate distance z/d ≥ 6,
the Nusselt number decreases gradually from the
stagnation point in the radial direction forming
inverted bell shape.The Mach number is in the range
of 0.014-0.2, hence the jets are incompressible.
[3]
[4]
[5]
[6]
[7]
[8]
Viskanta R.,”Heat transfer to impinging isothermal gas and
flame jets”, Experimental Thermal and Fluid Science (1993),
Vol. 6, 111-134
Jambunathan K., Lai E., “Moss M.A. and Button B.L., A
review of heat transfer data for single circular jet
impingement”, International journal of Heat and Fluid Flow
(1992).
Lytle D. and Webb B.W., “Air jet impingement heat transfer
at low nozzle-plate spacing”, International Journal for Heat
and Mass Transfer (1994), Vol. 37, 1687-1697.
Ravish Vinze, S. Chandel, M.D. Limaye, S.V. Prabhu,
“Influence of jet temperature and nozzle shape on the heat
transfer distribution between a smooth plate and impinging
air jets”, International Journal of Thermal Sciences (2016),
136-151.
Ravish Vinze, S. Chandel, M.D. Limaye, S.V. Prabhu,
“Effect of compressibility and nozzle configuration on heat
transfer by impinging air jet over a smooth plate”,
International Journal of Thermal Sciences (2016), 136-151.
Asem Nabadavis and Dipti Prasad Mishra, “Numerical
Investigation of Jet Impingement Heat Transfer on a Flat
plate”, Carbon – Science and Technology (2016), 1-12.
Ravish Vinze, S. Chandel, M.D. Limaye, S.V. Prabhu, “Local
heat transfer distribution between smooth flat surface and
impinging incompressible air jet from a chevron nozzle”,
International Journal of Thermal Sciences (2016), 136-151.
Y. Y. Yan, J. Maltson, “Numerical Study on Stagnation Point
Heat Transfer by Jet Impingement in a Confined Narrow
Gap”, University of Nottingham.
.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
42
TOPOLOGY OPTIMIZATION AND MANUFACTURING ASPECTS
FOR HULL STRUCTURE OF WHEELED COMBAT VEHICLE
1
HARSHAL PINGALE, 2S.V.NIMJE, 3NILESH PATEL
1
M.Tech student, Defence Institute of Advanced Technology (DU),Pune–411025,India
Asst.Professor, Defence Institute of Advanced Technology (DU),Pune–411025,India
3
Scientist, DRDO–Vehicles Research and Development Establishment, Ahmednagar–414006,India
E-mail: 1hppingale54@gmail.com, 2sunil.nimje@diat.ac.in, 3nrpatel@vrde.drdo.in
2
Abstract - Light weight design of hull structure chassis of wheeled combat vehicle is quite challenging task considering
requirement of lower chassis weight with high stiffness during military operations and cross country mobility aspects. The
research work presents structural topology optimization of hull structure of combat vehicle to obtain optimal material
distribution within available space pertaining to required stiffness parameters and boundary constraints. Optimal weight of
vehicle is computed using density method by defining minimum compliance and volume as objective function of the
topology optimization study. Present study highlights problem formulation with solid isotropic material with penalisation
(SIMP) optimization technique. Various static and dynamic loading conditions have been considered for optimization of
vehicle structure. Based on the output of the optimization study, suitable recommendations have been made for hull structure
designer in terms of optimal layout configuration of structural members in the early stage of design.
Keywords - Topology Optimization, Chassis Design, Combat Vehicle, Compliance, Finite Element Analysis.
seeking for the most optimal distributing form
structural stiffness in design space or the best way to
pass power, in order to achieve optimization of some
behaviors or alignment of the structure weight.
Topology optimization is the first step in design of
structural optimization, followed by shape
optimization and size optimization. With maturation
and improvement of shape and size optimization
design in structure, the topology optimization has
been becoming the hotspot and the difficult problem
in structural optimization design research field.
Because of the topology optimization’s singularity
feasible region, its main problem is a big difference
between the global optimal solution and local optimal
solution. But the application of topology optimization
in practical engineering, often due to the numerical
instability phenomena which led to the boundary
shape optimization that the results are not clear, it is
exist the main numerical problem that is
checkerboard format, grid-dependent and local
maximum or minimum in topology optimization
process [1].
An optimization that only allows discrete design
variables (void or material) is unfortunately not a
realistic alternative when dealing with large numbers
of design variables [2]. Because of this, a continuous
measure of material existence, , is introduced.
Where and 0 is interpreted as void and 1 as solid
material. Value in between might be interpreted as a
material with a lower density and Young's modulus.
The induction of a continuous measure of material
presence in an element has been done for
computational reason; however, it is still desirable to
have discrete design variables (void or material). One
way to make the design variable more discrete is to
use the SIMP method (Solid Isotropic Material with
Penalization) [3].
I. INTRODUCTION
Chassis design of a combat vehicle is challenging
task considering the following major requirements of
chassis:a) To provide support for various subsystems,
e.g. power pack, transmission, drivelines,
weapon system, crew compartment, etc.
b) To withstand various static and dynamic
loads generated due to various terrain
conditions and vehicle dynamics
c) To provide protection against ballistic and
blast threats.
Combat vehicles have various configurations based
on role of the vehicle on battle field e.g. Armoured
Fighting Vehicles (AFVs), Armoured personnel
Carrier (APC), Recce and support vehicles, etc.
combining operational mobility with tactical
offensive and defensive capabilities. AFVs can be
wheeled or tracked.
Topology optimization is a powerful tool in many
areas of design such as structural mechanics, optics
and electronics. The field emerged from structural
design and so topology optimization applied in this
context is also known as structural optimization.
Applying topology optimization to structural design
typically includes considering quantities such as
weight, stiffness, stresses, displacements, buckling
loads and resonant frequencies, with some measure of
these defining the objective function and others
constraining the system. For other applications
aerodynamic performance, conductance, optical
performance may be of interest, in which case the
underlying state equations are very different to those
considered in the structural case.
Topology optimization, also called structural layout
optimization, the basic idea is a design method that
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
43
Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled Combat Vehicle
III.
TOPOLOGY
FORMULATION
respect to hull structure of wheeled combat vehicle as
shown in Figure 1. There are various types of
component developments processes going on
depending on project and application.
OPTIMIZATION
To formulate the structural optimization problem, an
objective function, design and state variables needs to
be introduced as described in [4]. The objective
function (f), represents an objective that could either
be maximized or minimized. A typical objective
could be the volume or stiffness of a structure.
Moreover, some structural design domain and state
variables associated to the objective function needs to
be defined. The design variables (x) describes the
design of the structure, it may represent the geometry.
The state variables (y) represents the structural
response which can for example be recognized as
stress, strain or displacement. Furthermore, the state
variables depend on the design variables y(x). The
objective function is subjected to the design and state
variable constraints to steer the optimization to a
sought solution.
min x



subject to

Figure 1. Isometric view of model.
Vehicle dimensions are length=6.3m, Breadth=2.5m,
Height=1.8m and total payload of vehicle consisting
of self-weight and external load= 13.5 ton. Loading
conditions were extended to the 3g case for safe
design. Material properties are given in Table 1.
f ( x, y ( x))
design constraint on x

state constraint on y ( x )
equilibrium constraint

Yield Stress (y)
Tensile Strength
Modulus of Elasticity
Mass Density ()
Poisson’s Ratio (ν)
(1)
A state function g(y) that represents state variables
can be introduced, for example displacement in a
certain direction. This state function can be
incorporated as a constraint to the optimization task,
where it is usually formulated such that g(y) ≤ 0.
Consider the case where g(y) is represented by a
displacement vector g(u(x)) in a discrete finite
element problem. To establish the state function, this
requires that nodal displacement is solved for
u ( x )  K ( x ) 1 f ( x)
Table 1. Material properties.
B. Meshing scheme
It is very important to establish the finite element
model for a complex structure. The model not only
affects the analysis process, but also influences the
reliability of the results. This work is done by Altair,
the finite element pre-processor used in this work is
HyperMesh. HyperMesh is easy to learn and has an
interface environment integrated with Optistruct
[5,6]. Mesh Convergence study has been done two
get proper results. Meshed model of vehicle is shown
in Figure 2 and details of meshing are given in Table
2.
(2)
where K is the global stiffness matrix and f is the
global load vector. This means that the optimization
task can be expressed in a so-called nested
formulation where the equilibrium constraint is taken
care of by the state function formulation
min x

subject to
f ( x)
g (u ( x))  0
750 MPa
1100 MPa
210 GPa
7800 kg/m3
0.3
Mesh Type
(2D)
Element
Size
No.
of
Elements
No. of
Nodes
Mixed
10 mm
255699
255977
Table 2. Meshing details.
(3)
The optimization task presented in equation (1) is
called simultaneous formulation in comparison.
Equation (3) is usually solved by evaluating
derivatives of f and g with respect to x.
IV.
TOPOLOGY
VEHICLE
OPTIMIZATION
OF
A. Geometric Modeling
The different steps have been taken during the current
component development process are explained with
Figure 2. Meshed model.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
44
Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled Combat Vehicle
C. Performing Topology Optimization
A detailed topology optimization study was carried
out on the existing design to realize the critical load
paths and thereby obtain an insight on the optimal
configuration. This is achieved through the use of a
density function based on load distribution over the
finite elements by using optimization parameters
given in Table 3.
Figure 4. Topology optimization nephogram of hull structure.
Figure 5. Iso surface of topology optimization.
Figure 3. The iterative process used in OptiStruct.
Objective function
Minimize Compliance
Design variable
State constraint
Volume fraction 0.3
Response
volume
Element density
The surfaces of the resulting beams are uneven
because of the limitation given by the element mesh.
Also, it could see irrational how some beams are
crooked. However, the load paths are, after some
iterative steps, relatively clear and easy for an
engineer to understand. It is in the nature of topology
optimization that the resulting structure is exposed to
tension and compression. With a minimum exposure
to bending and torsion, along with the manufacturing
constraints (MINDIM), it is hence most natural that
the beams are circular.
Compliance and total
Table 3. Topology optimization parameters [7].
OptiStruct has the advantage of being capable to
solve the major kinds of optimization problems. It is
able to solve problems with millions of design
variables, which this research will be dealing with.
The iterative workflow can be seen in Figure 3.
RESULTS
500
Compliance×104
V.
OPTIMIZATION
DISCUSSION
600
AND
400
300
200
The topology optimization nephogram and iso surface
of topology are shown in Figure 4 and Figure 5
respectively. Although the result of optimization is
rough comparatively, it still can be seen that the basic
shape profile consistent with the traditional design,
the link between the objective function compliance
and the number of iterations shown in Figure 6.
100
0
0
10
20
No. of Iterations
Figure 6. Convergence curve.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
45
30
40
Topology Optimization and Manufacturing Aspects for Hull Structure of Wheeled Combat Vehicle
This is especially true for such a complex
structure that is investigated in this project.
CONCLUSION




A recommendation is made to present topology
optimization at early stage where the big
decisions are made where design concepts and
load paths are more valuable than a detailed
design.
Topology optimization should be done parallel to
the design during development of a vehicle. It is
a powerful tool to use for giving input to
designers. Topology optimization is best to use
in the early phase of design where knowledge of
the structure is low and the design freedom is
high.
By applying topology optimization early, great
knowledge of the load paths and weaknesses in
the structure are received early and will help the
designer to make good decisions.
To use topology optimization as a tool for
material placement is more systematic than to
use more or less guesses based on experience.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Xiao Weihua, “The Application of Topology Optimization
Theory
in
Three-dimensional
Radial
Gate
Design.”ICICTA,2011, pp. 244-46.
Altair OptiStruct Manual, HyperWorks 10.
Klarbring, Anders; w. Christensen, Peter; “An Introduction to
Structural Optimization.” ISBN 978-1-4020-866-6, 2009, pp.
188-189.
Martin Philip Bendsøe and Noboru Kikuchi,“ Generating
optimal topologies in structural design using a
homogenization method.”Computer Methods in Applied
Mechanics and Engineering, 71(2):197-224, November 1988.
Altair Engineering Inc, “Weight Optimization of Turbine
Blades,” 2011.
Altair Product Design, “Airbus Selects Altair as a Product
Development Partner for Ongoing Aircraft Design
Programs.” 2012.
Case Study - OptiStruct Drives Weight Reduction in
Commercial Aircraft: Door Support Arm Design
Optimization, Altair Engineering, Inc.,2010.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
46
JAVA 8 NEW FEATURES AND DEVELOPMENT STANDARDS
MADHURESH KUMAR
Magadh University, Bodh Gaya, Bihar
E-mail: call2madhuresh@gmail.com
Abstract - This paper presents new features added in JDK platform (JDK 8). With no doubts, java 8 release is considered
one of the important releases in the java world since java 5. It brings lots of new features to the Java as a language, its
compiler, libraries, tools and the JVM (Java virtual machine) itself. We know that the changes to Java 8 are a lot of ways
more profound than the other changes to Java in its history. The features and enhancements allow us to write programs more
easily—instead of writing tedious code like the following (to sort a list of apples in inventory based on their weight), In this
paper we are going to take a look on all these changes and show the different usage scenarios on real examples. The
objective of development standards is to promote a consistent approach to java code formatting and design pattern across all
contributors to the code base. A consistent approach makes it much easier for new java developers joining the development
or support team, and to experienced java developers reviewing and/or modifying existing code. Wherever possible, the
standards will be supported by the development tools (specifically Eclipse) to make it as easy as possible for the standards to
be adhered as well.
Keywords - JDK 1.8, JVM, Stream, Lambda Expressions, Eclipse
functional interface before java 8 that will surprise
you but we have used informally, earlier known as
simple abstract method interface. For example, The
Runnable Interface which has just one method called
run() and Comparator Interface has compare()
method.
Functional interfaces are new feature introduced in
java 8. To create the functional interface, annotate the
interface with @FunctionalInterface and should not
have more than one abstract method.
I. INTRODUCTION
Java is evolved over the years and java 8 brings major
changes to the programming language and additional
more features when we compare to different java
versions. Java 8 is now not a just an object oriented
programming language, also supports functional style
programming and parallel processing. Several
companies and programmers are still working with
previous java versions, which are understandable,
since there are a lot of problems with migrating from
older version to new version. Many companies have
started working on new version of java. There are
very few good reasons to do this, because java 8 has
come up with some important improvements to the
programming language. The java coding standards
are very important to every programmer for several
reasons. The main goal of the recommendation of
coding standard is to improve readability, scalability,
uniform approach for solving the problem, there by
understanding, maintainability and general quality of
the code. It helps programmers to understand new
code more quickly and thoroughly. There is very
minimal chance that any software is developed and
maintained for its whole life by original author. For
example, Deprecation of Java methods and interfaces
and their members are a warning to developers that
the class or interface is been superseded and will
eventually be removed. Any new usage of deprecated
classes or interfaces and their members makes
transition to the new class or interface and eventual
removal of older technology difficult.
II. FEW IMPORTANT
FEATURES
JAVA
8
Functional Interface is used for passing functionality
to Lambda expressions. Lambda expressions are used
to express Anonymous classes in java 8 in short hand
notation and also it also helps the Lambda
expressions to understand which method to pick for
execution at runtime.
B. Lambda Expressions
Lambda expressions are one of the most popular and
vital new feature of java 8. They introduce functional
programming and parallel processing concept to java,
which is completely Object-Oriented programming
language. It permits us to write more readable,
maintainable
and
concise
code
and
conjointly give to use API terribly simply and
effectively.
Lambdas expressions are an anonymous function and
don’t have a name and do not belong to any class.
The conception of lambda expression was first
NEW
A. Functional Interfaces
Interfaces which have just only one abstract method
are called functional interfaces. We have also used
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
47
Java 8 New Features and Development Standards
introduced in LISP programming language and java
is last programming language which has implemented
concept of lambda expressions.
Lambdas are more concise syntax to implement a
“functional interface” conjointly referred to as Single
Abstract Method interface. It can be used where
application allows an inner class (e.g. Runnable,
callable) to define a single method. Lambdas can be
used for Stream processing where checked exceptions
(Layered Exception, Query Exception, and Call
Exception) will not be thrown.
programming,
streams
supports
Aggregate
Operations. The usual Aggregate operations are map,
sort, and match, reduce and filter.
It only has body and parameter list. In term of
parameter, Lambda expression may or may not have
parameters.
Consider Streams in the following cases to potentially
clarify the code.
In Java Programming, when we iterate the data
through the collections, normally we use either for
loop or iterations and its visible in code. But in java
8, Stream API provides methods like foreach, filter,
map and which internally iterates through the
elements. These kinds of iterations are called internal
iterations.
1.
2.
3.
Example without using Lambda Expression:
4.
5.
Use Streams where a single variable is being
iterated & item indices are not involved.
Use Streams statelessly.
Prefer filter, map, count and sum usage – avoid
more complicated reductions since these are
difficult for other developers to follow.
Use meaningfully named variables to aid
understanding & debuggability.
Generally, most of developer prefer explicit 'for'
loop to using Stream.forEach().we can
use collect( Collectors.toList()) to collect
resulting stream back to a list, for an imperative
'for loop' to iterate over.
D. Optional
'Optional' is a wrapper type able to hold optional
values. Java 8 APIs use it for methods (eg.
Stream.findFirst). which may not find a result.
Its most useful capability is function chaining –
Optional supports the map and filter operations, but
does not execute these on an 'empty' value and will
just return Optional.empty of the appropriate result
type.
Now, the below example is with the help of lambda
expression.
III. CODE DEVELOPMENT STANDARDS
A. Eclipse
In a matter of minutes, we can add some tools to
eclipse that help us to keep consistently formatted
code (as well as keeping consistent with coding
standards that do not relate directly to the format of
our code).
C. Stream API with Collections
Stream API is one of the very important features
introduced in Java 8, which is defined in
java.util.stream package. A stream API represents a
sequence of constituents and supports different kind
of operations and instance does not modify from
source. Stream API can be used with collections
when we need to process bulk data operation by using
Map, List, Array List, Set and other data structure.
The source can be refers to a collections, Arrays and
IO operation who provide data to the Stream API.
Stream maintains the order of data as it presents in
source. As like Java 8 supports functional
Formatter:
The eclipse Java
> Code Style > Formatter
Preference page allow us to manage our code
formatter profiles for the Java code formatter.
Installation:
To use it in your workspace:
1. Select Window > Preferences from the menu bar.
2. Select Java > Code Style > Formatter.
3. Press Import..., browse to the file sonatacore/ide/eclipse/JavaFormatter.xml and
press
OK.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
48
Java 8 New Features and Development Standards
Formatting files/sections:
To use the formatter when coding to format a section
of code, highlight that section and press Ctrl + Shift +
F. You can also format the entire file by doing that
same without highlighting anything. Formatting an
entire file should be avoided when modifying existing
files since it causes difficulties when comparing
revisions.
Class Naming (and types in general):
Class or type names should concisely convey the
high-level (business level) purpose of the type within
the Project codebase, but be able to differentiate it
from likely others.
1.
2.
The name should convey the domain entity it
expresses or interacts with;
Plus the technical role (eg. DAO, Service,
Integration layer, Strategy) it plays.
Choose names with the degree of generality/
specificity appropriate for long-term design
expectations (see below).
Save Actions:
You can also tell eclipse to automatically format the
code you modified when you save the file. To do this:
3.
1.
2.
3.
Remember that:
Select Window > Preferences from the menu bar.
Select Java > Editor > Save Actions.
Select perform the selected actions on
save, Format source code, Format edited
lines (you should not format the entire file for the
same reasons as mentioned above) and Organize
imports.
1.
2.
3.
Check Style:
A java check style configuration includes in the java
project that is designed to match the java formatter. It
can be used to check your code against the coding
standards and display warnings in the editor where
the coding standards are violated. This makes it very
easy to make sure we are writing consistent code.
Generality vs Specificity of Naming:
Simple names indicate more general behavior & a
simple, more obvious & easier-to-understand system.
Longer names indicate more-specific behavior &
should be used in more-specific usecases (not the
most general or default usecase).
Plug-in Installation:
The configuration file requires in the eclipse-cs plugin found at http://eclipse-cs.sourceforge.net/. The
instructions are on the website but if you are familiar
with installing eclipse plug-ins, all you need to know
is the update site which is: http://eclipsecs.sf.net/update/.
1.
2.
After you have installed the plug-in, you need to
import the check style configuration and activate it
for your projects:
1.
2.
3.
4.
Select Window > Preferences from the menu bar.
Select Checkstyle.
Press New....
Choose the External Configuration File type,
provide the complete path of file and press OK.
3.
4.
Simple names are often best; use these for longterm general/ primary behavior.
Remember having identified these types as
general, the implementations can be evolved
forwards; they don't have to meet all future
requirements now, just be reasonably identified
& evolvable to do so.
Naming must of course be sufficiently selective,
to distingueish the type within project.
Use longer and specific names for functionality
which is not the general standard.
General functionality should be named in terms of the
high-level business purpose (in abstract), not the
technical details which it encapsulates.
Now, for every project you want to use it with:
1.
2.
Naming should convey business purpose, first &
foremost.
Implementation details, unless relevant to the
calling contract, should be encapsulated and
therefore not exposed in the name.
Generally-named classes can evolve forwards
with required general business functionality, but
it is hard to rename overly-generally named
types.
Right click on the project.
Select Checkstyle > Activate Checkstyle.
Method Naming:
Method names must concisely convey the high-level
(business level) purpose of the method within the java
project codebase.
B. Class & Method Naming Guidelines
Naming is one the most important aspects of design,
as it very crucial to establishing and conveying the
meaning & sense of a design to others.
1.
These guidelines establish conventions for naming of
classes & methods.
Method names must generally convey a verb and
an entity – in OO programming, the object class
may sometimes imply one of these (typically the
entity).
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
49
Java 8 New Features and Development Standards
2.
3.
4.
Simple names are often best; use these for longterm general/ primary behavior
Remember having identified these methods as
general, the implementations can be evolved
forwards; they don't have to meet all future
requirements now, just be reasonably identified
& evolvable to do so.
More specific behaviors should be given
qualified (more specific) names.
Significant Operations or Values in Code:
Other significant code elements can be commented.
Elements which may be worth commenting include:
1.
2.
3.
Success or failure return values
Important calculations or operations
Significant values
Properties:
Properties (getter & setter) with minimal behavior,
should be considered as a single logical element.
C. Java Coding Commenting & Documentation
Guidelines
Class-level Javadoc:
Class Javadoc must establish the purpose & key
lifecycle/ interactions/ usage of a class within the
wider codebase.
1.
2.
Properties with minimal behavior should be
given a single Javadoc.
Methods with no behavior (just state) should be
written on a single line.
REFERENCES
1.
2.
3.
4.
5.
Headline stating the business name of the class
(which should be its purpose); qualified with
the context in which to understand that purpose.
Bullet points stating key business or technical
facts important to know, when using the class.
Provide key interaction and usage.
Where possible, link to the relevant functional
spec.
It is allowable to state the @author.
[1]
[2]
[3]
Method Javadoc:
Method Javadoc must establish the purpose & usage
of a method within the class.
1.
2.
3.
4.
5.
6.
[4]
[5]
Headline stating the business name of the method
(which should be its purpose); qualified with any
further context needed to understand that
purpose.
Bullets below stating significant business or
technical "wrinkles" which are important to
know.
eg. answered behavior if data is not found.
exceptions, formal parameter & return value
descriptions etc are considered fairly obvious.
They are preferred not to formalize for most
cases (unless otherwise ambiguous).
treat properties
Within the class, separate distinct topical groups
of methods with additional whitespace or dash
bars.
[6]
[7]
[8]
[9]
Pankaj Kumar August 3, 2013 [Online]. Available at
http://www.journaldev.com/1789/java-reflection-tutorialfor-classes-methods-fields-constructors-annotations-andmuch-more#get-class-object [Accessed at 27/01/2015]
Andreas Jan 30 '14, How to get Method Parameter names in
Java 8 using reflection? [Online]. Available at
http://stackoverflow.com/questions/21455403/how-to-getmethod-parameter-names-in-java-8-using-reflection
[Accessed at 25/01/2015]
Oracle. (2014) Compact Profile [Online]. Available at
http://docs.oracle.com/javase/8/docs/technotes/guides/compa
ctprofiles/compactprofiles.html [Accessed at 20/01/2015]
AJITESH, K. (2014) Why & When Use Java 8 Compact
Profiles? [Online]. Available at http://vitalflux.com/whywhen-use-java-8-compact-profiles/ [Accessed at 05/02/2015]
Jim Connors-Oracle. (2013) An Introduction to Java 8
Compact
Profiles
[Online].
Available
at
https://blogs.oracle.com/jtc/entry/a_first_look_at_compact
[Accessed at 07/02/2015]
Slides from deck presented at EclipseCon Europe 2011, on
November 2nd in Ludwigsburg, Germany
[Online].
Available at http://www.oracle.com/technetwork/articles/
javase/beta2-135158.html [Accessed at 15/02/2015]
Mario, F. (2013) Why We Need Lambda Expressions in Java
Part
1
[Online].
Available
at
http://java.dzone.com/articles/why-we-need-lambdaexpressions 03.27.2013 [Accessed at 25/02/2015]
Brian, G. (2014) java magazine, Lambda Expression, pg6
[Online]. Available at http://www.oraclejavamagazinedigital.com/javamagazine_open/20140304#pg7 [Accessed at
17/02/2015]
Anton, A. (2013) Java 8 Revealed: Lambdas, Default
Methods and Bulk Data Operations [Online]. Available at
http://zeroturnaround.com/rebellabs/java-8-revealedlambdas-default-methods-and-bulk-data-operations/
[Accessed at 19/02/2015]

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
50
SOLAR AND WIND ADVANCED WEATHER MONITORING SYSTEM
AT DMIETR CAMPUS
1
SAGAR PARATE, 2RAHUL CHAUDHARI, 3PRANAY KAKADE, 4CHETAN BHATARKAR,
5
SHAILESH BARDE, 6LAXMIKANT AKKEWAR, 7SRUSHTI CHAFLE
1,2,3,4,5,6
B.E Final Year, Department of Electrical Engineering, DMIETR, Wardha.
Assistant Professor, Department of Electrical Engineering, DMIETR, Wardha.
E-mail: 1sparate2907@gmail.com, 2rchaudhari661@gmail.com, 3pranaykakade3@gmail.com,
4
bhatarkar.chetan001@gmail.com, 5shaileshbarde94@gmail.com, 6laxmikantakkewar@gmail.com,
7
srushtichafle@yahoo.com
7
Abstract - In present non-renewable energy source is decreasing day-by-day due to it overuses. . In the 21st century, nonrenewable sources are no longer fit to full fill our demand. Thus we required by using a conventional source like wind and
solar we need to generating energy. This especially important country likes India where supply to demand ratio is very low.
In this paper, we identify the geographical area for solar and wind energy generation at low cost. We can achieve and
monitor atmospheric weather condition such as temperature, humidity, light intensity etc. Our system is designed which
gathered all the parameter which are essentially of weather monitoring system.
Keywords - Micro-controller Atmega328, Sensors, Wi-Fi Module, Wi-Fi Router.
see the all reading directly on the PC as well as
mobile.
I. INTRODUCTION
Weather monitoring system has been continuously
monitoring system and thus we calculate and
I.
determine atmospheric conditions via sensors.
Whether is determine by basic factors such as
temperature, humidity, cloudiness, visibility, pressure
and wind etc.
Sun is the major contributor of our planet heat energy
from sun create imbalanced in the temperature also
wind which are different placed to placed in different
regions. The sea plays a regulating effect on the
climate, due to which there is an significant
difference in the temperature, pressure and humidity
between the interior regions of the country and the
coastal areas. Especially country like India has
several geographical advantage for implementation of
power plants based on the renewable energy sources
such as wind and solar. The tropic of cancer passes
through Indian sub-continent, so the temperature
factor is abundant to suitable all the needs of solar
energy generation. Indian sub-continent is also near
to the equator which gives into a tropical climate and
monsoons. This type of climates is characterized by
highly and regular winds across over the country.
In fact, temperature conditions at very good
particularly, In the states like Gujarat, Maharashtra,
Rajasthan, Madhya Pradesh (M.P) & Chhattisgarh
(C.G). However, analysis of weather in this regions
are done foe these within the states to identify
naturally cloudy or shadow regions like this.
METHODOLOGY
The weather station is built around open source
microcontroller boards and electronic component.
which our module is setup on the top of building
being light in weight on indoor section of model
sensors are setup for calculating the required the
parameters and it stores in digital SD card (memory
card). In this way calculate it for weekly, monthly
and yearly on that basis.
1. Measured Variables
The prototype whether station only measures six
fundamentals whether data; temperature humidity,
barometric pressure, wind speed, solar radiation. The
prototype ran for one month the gathered data for this
month test run were then interrupted and analysed to
determine developed whether monitoring system for
the desired specification of project.
2. Monitoring Hardware
Our system is mainly based on microcontroller
(Atmega328); it is the main interactive part of our
system. It can also work as multifunctional work as in
our project. Also required some intended sensor
hardware are used in module such like as for
temperature, humidity and wind speed on which
application uses that sensors. DHT-22 is used
measured temperature and humidity. For solar
radiation pyranometer meter is used and for
calculating wind anemometer is used. The above data
is store micro SD card and real time clock (RTC) is
used to detect date and time.
3. Data logging & Visualization
By using this various sensors it can collected a lot
more data and I was created to display current
readings and logged data visualized through a graph
which can be further display shown with the
We are design a system, which can predict whether a
particular places/areas is suitable for establishment
the solar power plant as well as wind energy
generation of plant. We are design and implemented
at low cost and reliable system/module. We use WiFi router in module for collecting all type of sensor
data (temp, wind, solar radiation) etc. Then we can
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
51
Solar and Wind Advanced Weather Monitoring System at DMIETR Campus
microcontroller to interface with an SD card whether
data recording during the setting interval and WI-FI
module is also used for the continuously data
collection.
rectifies the ac input to the pulsating dc, which would
further made constant at 5V with the help of filtercapacitor arrangement and voltage stabilizer so that
any change in ac would not proportionally change to
dc. In the design all parameters are connected to the
microcontroller like pyranometer, anemometer and
dht11. Pyranometer measures the solar radiation in
W/m2, anemometer measures the wind speed or air
velocity in kmph, dht11 which is measures the
temperature in ⁰C and humidity in %. One SD storage
board is connected to the microcontroller for storage
of collecting data. Real time clock (RTC) is also
interface with atmega328 for time and date.
II. COMPONENTS USED
Component Name
Microcontroller circuit
Board
Pyranometer
Anemometer
SD Storage Board
RTC
WI-FI Module
Specification
Control all the
parameters
Measuring the solar
radiations in W/m2
Measuring the Air
velocity or Wind speed
II.
in kmph
They are small storage
device that are used to
store the data backup
such as the text, the
pictures, audio and
video.
The clock/calendar
provides seconds,
minutes, hours, day,
date, month and year
qualified data.
.Convenient, wireless
technology, portability,
and multiple
connections.
IV. TESTING
TemperatureSolar panel placed at 35° for maximum power output
with temperature rating 15° to 30°. 12noon to 3pm
temperature is more compared with other time
intervals. Here is the graph temperature vs. date.
III. HARDWARE AND CIRCUIT DESIGN OF
PROPOSED METER
Graph1: Temperature in °C vs. Date
HumidityHumidity affects efficiency of solar panel as it affects
the current of solar panels. However, it has little
effects on output voltages. When humidity is low
then current is increase. The humidity is measured for
a random sample of months or day and reading was
taken every one day of month. Here is graph of
humidity vs. date.
Figure. : Circuit Diagram of Proposed Design
From the design, first all input signal is applied to the
circuit which is 230V AC. The bridge rectifier
Graph2: Humidity in % vs. Date
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
52
Solar and Wind Advanced Weather Monitoring System at DMIETR Campus
Wind speedWhen wind speed is low then insufficient torque exerted by the wind on the turbine blades to make them rotates.
However, the speed increases, there is sufficient torque to produce electrical power. Here graph of wind speed in
kmph vs. date.
Graph3: Wind speed in kmph vs. date
Table 1. Comparison of Temperature Measurements
Table 2 Comparison of wind speed measurement
RESULT
CONCLUSION
The graph for temperature and humidity represented
in figure shows a trend for 12hour cycle, the highest
temperature occurred between 1pm to 3pm. During
those intervals the humidity is lowest and least
temperature obtained between 5:30 pm to 8 pm
during that period humidity is highest. The two
variables are inversely proportional, sense the
humidity decreases has the temperature is increases
and vise-versa when the temperature decrease
humidity is increases.
This research focuses on analysed whether condition
on various times and calculating what actual
condition of whether condition of whether system. It
can be monitoring, analysed it at low cost by
advanced micro-controller (Adriano 328) platform
and free wed service eponyms org the developed
system readings with the various sensors where
consistent and give the correct value throughout the
one month testing and calculating it.
Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
53
Solar and Wind Advanced Weather Monitoring System at DMIETR Campus
REFERENCES
[1]
[2]
[3]
Dev Gaurav, Dishant Mittal, Bhavya Vaidya, Jimmy
Mathew, “A GSM Based Low Cost Weather Monitoring
System For Solar and Wind Energy Generation”, The Fifth
International Conference on the Application of Digital
Information and Web Technologies (ICADIWT 2014).
N.Manjula, Vinusha Mandava, “Low cost weather
monitoring system for solar energy generation using WSN
technology”, International Journal of Scientific Engineering
and Technology Research- ISSN No.2319-8885, Aug-2015
Jess Christopher B. Lopez, Harreez M. Villaruz, “Low-cost
weather monitoring system with online logging and data
visualization”, 8th IEEE international confernce humanoid,
[4]
[5]
[6]
nanotechnology,
IT
communication
and
control,
environmental management (HNICEM) The institute of
Electrical and Electronics Engineers Inc.(IEEE)-Philippine
Section 9-12 December 2015 Water front hotel, Cebu,
Philippines
Hanif M., M. Ramzan, M. Rahman, M. Khan, M. Amin and
M. Aamir, “Studing Power Ouput of PV Solar Panel at
Different Temperature and Tilled Angle”,. Isesco Journal of
Science and Technology, volume 8, November 14, 2012.
E. Gertz and P. Di Justo, “Humidity, Temperature and Dew
Point”, in Environmental Monitoring with Arduino, 2012.
P. Bhosale and V. Dixit. “Agricon-Weather Monitoring
System and Irrigation Controller”, IOSRJECE, vol. 1, no. 6,
pp. 5-11, August 2012.

Proceedings of IRAJ International Conference, 15th April, 2018, Pune, India
54
Download