ISSN Number

ISSN: 2147-9690

Turkish Journal of Engineering, Science and Technology
Volume 2, Issue 1 (November 2014)

Velocity field analysis of a ceiling fan

Mohammed A. Azima

aAssistant Professor, Department of Mechanical Engineering, Bangladesh University of Engineering and Technology, Bangladesh


A mathematical analysis in vector notation for the velocity field of a ceiling (axial flow) fan has lead to an expression for its axial velocity distribution. In the analysis, momentum exerted by the fan on the fluid is approximated to be proportional to the momentum that a rotating disk exerts. Furthermore, the momentum exerted by the fan is assumed to be reduced by the amount of momentum absorbed due to the fluid mass entangled with the blade for its curved width. Axial velocity distribution obtained from the present study is found to be in good agreement with the existing experimental and numerical simulation data that validates the assumptions made herein for the velocity field analysis of the fan.

Keywords: Ceiling fan, Blade angle, Pressure gradient, Vector analysis, Axial velocity

Download PDF



Effect of Microwave Heat Treatment for Zircon Placer Mineral

Satya Sai Srikanta, P S Mukherjeeb, R Bhima Raoc

aAssistant Professor, Department of Electronics and Communication Engineering SRM University, Modinagar, Ghaziabad, 201204, India

Chief Scientist, IMMT-CSIR, Bhubaneswar 751013, India

Principal, Aryan Institute of Engineering and Technology, BPUT University, Bhubaneswar, Odisha, India



India is well-known for its higher zircon reserve in the world. The world trend obtaining the zircon products in form of zirconium metal and zirflor are direct interests through a process consisting with low power consumption, less time, clean and environmental friendly process. Microwave energy is one of the novel methods which satisfy the above conditions. This paper deals with an overall review of microwave applications on zircon minerals to produce value added products.

This paper briefly overviews about the effect of microwave heat treatment on absorbance of heat energy of zircon mineral with and without susceptor. The effect of microwave heat treatment followed by thermal shock treatment of zircon mineral are also been reviewed.

Keywords: Zircon, reducing agent, susceptor Microwave energy, ceramic material.

Download PDF



A Survey of Congestion Control Protocols Providing Energy Conservation In Wireless Sensor Networks

Ayhan Kiraza, Murat Çakıroğlub

aTechnical Education Faculty, Electronics & Computer Department, Sakarya University, Sakarya,TURKEY

bTechnology Faculty, Mechatronic Engineering Department, Sakarya University, Sakarya, TURKEY



Energy consumption is very important in recent years. Since, more and more energy is needed with increasing technology. In this case, energy-saving requirement increases more and more every day. Wireless sensor networks are composed of battery limited sensor nodes that can sense the physical information, process the sensed information, and report it to the sink. WSNs have wide range application areas because they have a lot of advantages such easy deployment, self-organization, scalability and low maintenance. But, they have some big challenges such as energy restriction and packet losses. Congestion is the one of the essential problems of WSNs since it increases energy consumption of sensor nodes due to packet drops and retransmissions of packets. Most of WSN applications require congestion controls to regulate traffic and prevent packet losses. A lot of protocols have been proposed to deal with congestion problem in WSNs.  In this paper, we have evaluated and summarized the representative WSN congestion protocols that provide energy conservation for the researchers who are newly on congestion. We have selected popular congestion control protocols and compared them in terms of some criterias.

Keywords: Transport Layer, wireless Sensor, congestion, Congestion Control, Energy Saving 

Download PDF



Water Powered Sensors  In Water Distribution Systems

F. Kayaalpa, A. Zenginb, R. Karac, M.A. Büyükgüçlüd
a Duzce College, Duzce University, Uzun Mustafa Mah. 81010 Duzce, Turkey
b Department of Computer Engineering, Sakarya University Esentepe Campus 54187 Serdivan  Sakarya , Turkey
c Department of Computer Engineering, Duzce University Konuralp Campus 81620 Duzce, Turkey
d Duzce College, Duzce University Uzun Mustafa Mah. 81010 Duzce, Turkey
With the parallel developments of both sensor and wireless communication technologies in recent years, wireless sensor networks (WSN) has become a so popular study area in computer science and preferred to use on different areas and applications such as military, health, industrial controls, fire brigade, greenhouse and so on. Water distibution systems are one of these. WSN based monitoring systems implemented on water distribution systems are used world-wide. Its main advantages are real-time monitoring and detecting leakages to prevent resource loss. But WSN have some challenges like power consumption (finite energy sources), storage area, coverage, security... All WSN systems have to face these problems. The aim of this work is to solve energy problem in WSN used in water distribution monitoring systems by generating energy from the water flow in the pipes.
Keywords: Wireless Sensor Networks, energy problem, energy harvesting, water distribution systems monitoring  


Download PDF


Energy Efficient location privacy preserving based data transfer using LAR method in Mobile network


 S. Yuvasria, Dr.A.Kathirvelb, Mr.S.T.Leninc

a,b,c Dept of Information Technology, Vivekanandha College of Engineering for women, Thiruchengode, India



To introduce an Energy Efficient Location Privacy Preserving (EELPP) Protocol for MANETs that is based on the Location Aided Routing (LAR). LAR makes significant reduction in the energy consumption of the mobile nodes batteries by limiting the area of discovering a new route to a smaller zone. Thus, control packets overhead are significantly reduced. In EELPP a reference wireless base station is used and the network's circular area centered at the base station is divided into six equal sub-areas. At route discovery instead of flooding control packets to the whole network area, they are flooded to only the sub-area of the destination mobile node. The base station stores locations of the mobile nodes in a position table. To show the efficiency of the proposed protocol we present simulations using NS-2. Simulation results show that EELAR protocol makes an improvement in control packet overhead and delivery ratio compared to AODV, LAR, and DSR protocols. To reduce the energy cost, nodes are active only during data transmission and the intersection of node creates a larger merged node, to reduce the number of fake packets and also boost privacy preservation. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection than routing-based schemes and requires much less energy than data preventing based.

Keywords: LAR, EELPP, NS2, OTCL, MAC

Download PDF


SAR To Perclude Wormhole and Blackhole Attack's in WSN

G.Revathia, Mr.P.E.Premb, Mr.K.Prabhakarc

a,b,c Dept of Information Technology, Vivekananda College of Engineering for women, Thiruchengode, India



In wireless sensor network have safe routing protocol, such as the security-aware ad hoc routing protocol (SAR), can be used to defend next to black hole and wormhole attacks. The security-aware ad hoc routing protocol is base on on-demand protocol, such as AODV. In SAR, a safety metric is additional into the way request packet, and a dissimilar route detection process is used. Intermediate nodes are given a route request small package with an exacting security metric or confidence level. At middle nodes, if the safety metric or trust level is content, the node will procedure the route ask for packet, and it will broadcast to its neighbors by means of controlled flood. Also use the cluster method. A cluster based routing algorithm to make bigger the lifetime of the network and to preserve a balanced power consumption of nodes. To get hold of it, we add a small slot in a surrounding frame, which is enabling to exchange the residual energy mail between the base station (BS), cluster heads, and nodes. The cluster is or else, the route ask for is dropped. If an end-to-end path with the necessary safety attributes be able to be found, the reason will produce a route request small package with the exact security metric. They have two types of black hole attacks internal and external black hole attacks on the network. Token device to use a safety based data broadcast on the system. Results have take some parameter like throughput, Packet end-to-end delay, network load are to be taken.

Keywords: SAR, WSN, BS, AODV

Download PDF



Hydraulic Fracturing Simulation of Mansouri Oil Field in Iran

M. S. Amiri Kerahroodia, M. Yousefib and M. Yousefic


aEnergy and Mechanical Engineering Department, Abbaspour College of Engineering, Shahid Beheshti University, P.O. Box.16765-1719, Tehran, Iran

bEnergy and Mechanical Engineering Department, Abbaspour College of Engineering, Shahid Beheshti University, P.O. Box.16765-1719, Tehran, Iran

cSchool of Mathematics, Iran University of Science and Technology, P.O.Box.16846-13114, Tehran, Iran



Hydraulic fracturing is one of the most important methods for well stimulating. The process of hydraulic fracturing is highly complex. Exact analysis of this process needs the study of different branches of mechanical science like solids mechanic, fracture mechanic and fluids mechanic. The principal of this paper is the simulation of well rupture pressure by using fracture mechanic. By using fracture mechanic, the main parameters of cohesive zone (the default sleazy zone) like stress intensify factor will be calculated and finally by using them, simulation of Mansouri oil field will be  performed and the output of ANSYS software will be compared with analytical formulas.

Keywords: Hydraulic fracturing, Fracture mechanic, Simulation, ANSYS, Stress intensify factor

Download PDF



Development of the E-Commerce Dialogues using Dynamic Context-aware Web Services Composition

Mohammad Javad Amiria, Aliyeh Khayatib, Behrouz Minaei-Bidgolic, Mohammad Reza Kangavarid*
aSoftware Engineering Group, Iran University of Science and Technology, School of Computer Engineering
Nowadays, e-commerce tries to expand its audience and improve the quality of services provided to end-users. There are two significant issues that should be considered to achieve these goals. First, studying the needs of mobile users growing with the development of communication technologies and, second, including features for providing context-aware services to enhance the performance of dialogue between users and systems. Dynamic composition of web services with context awareness is the approach that covers both issues. In this paper, by integrating an agent-based system with other models of dynamic web service composition, an abstract agent-based model capable of combining and adapting context-aware services coupled with quality service, has been proposed. In this model, the agent is used to minimize user intervention and completely automate service composition and the context processor is used in each service and agent, for context-aware adaptation and context-aware composition, respectively. Using the QoS component in agent section, the quality of service is controlled. Compared to other similar models, the advantages of proposed methods are controlling quality of service, considering dynamic of user context, utilizing both services composition and adaptation simultaneously.
 Keywords: Dynamic Web Service Composition, E-Commerce, context-aware, Agent-based System, Quality of Service Control

Download PDF


Online Submission

You need to register in order to add your article to the article tracking system. Please register and submit your manuscript electronically via online submission systems.

Free business joomla templates