Developing Pragmatic Data Pipelines using Apache Airflow on Google Cloud Platform
Research Paper | Journal Paper
Vol.10 , Issue.8 , pp.1-8, Aug-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i8.18
Abstract
Data Pipeline[1][2] is a series of actions which moves data from the one source to the destination, the complexity of Data Pipeline varies from use-case to use-case. The traditional data pipeline cleanups the data, aggregates the data and move it from one place to another, it sounds simple but it’s very complex as the organization deals with huge and complex data and the expectation from pipeline is that it should be robust, fast, notify about the status and it should do the same task repeatedly without failing. The modern data pipelines are slightly different in nature they are supposed to deal with Petabytes of data, they stores the data in various flavors of the cloud, should provide real-time data analysis. Apache Airflow is one such tool which simplifies the entire Data Pipeline creation to a great extent and the only pre-requisite is the basic Python Knowledge. This paper focuses on the stock-exchange data pipeline creation by using the Airflow concepts such as DAGs and Operators.
Key-Words / Index Term
Data-Pipeline, Python, Pandas, Seaborn, Apache-Airflow, GCP, Kaggle.
References
[1] P. Covington, J. Adams and E. Sargin, "Deep neural networks for youtube recommendations", Proceedings of the 10th ACM conference on recommender systems, pp. 191-198, 2016.
[2] H. H. Olsson and J. Bosch, "From opinions to data-driven software r&d: a multi-case study on how to close the’open loop’problem", 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 9-16, 2014.
[3] Panos Vassiliadis, ‘A Survey of Extract-Transform-Load Technology.,’ July 2009 International Journal of Data Warehousing and Mining 5:1-27
[4] Tziovara, V., Vassiliadis, P., & Simitsis, A. (2007). Deciding the Physical Implementation of ETL Work-?ows. Proceedings ACM 10th International Workshop on Data Warehousing and OLAP (DOLAP 2007), pp. 49-56, Lisbon, Portugal, 9 November 2007.
[5] Vassiliadis, P., & Simitsis, A. (2009). Extraction-Transformation-Loading. In Encyclopedia of Da-tabase Systems, L. Liu, T.M. Özsu (eds), Springer, 2009.
[6] Florian Waa, Tobias Freudenreich, Robert Wrembel, Maik Thiele, Christian Koncilia, Pedro Furtado, ‘OnDemand ELT Architecture for Right-Time BI: Extending the Vision’, International Journal of Data Warehousing and Mining 9(2):21-38 · April 2013
[7] FabianPrasser, HelmutSpengler, RaffaelBild, JohannaEicher, Klaus A.Kuhn, ‘Privacy-enhancing ETLprocesses for biomedical data’, International Journal of Medical Informatics, Vol.126, pp.72- 81, June 2019.
[8] Ibrahim Burak Ozyurt and Jeffrey S Grethe, ‘Foundry: a message-oriented, horizontally scalable ETL system for scientific data integration and enhancement’, Database (Oxford). 2018; 2018: bay130.C. Wohlin, P. Runeson, M. Host, M. Ohlsson, B. Regnell, ¨ and A. Wesslen. ´ Experimentation in Software Engineering. Computer Science. Springer, 2012.
[9] Venters, W., Whitley, E.A.: A Critical Review of Cloud Computing: Researching Desires and Realities. J. Inf. Technol. 27, 179–197, 2012.
[10] Justin, C., Ivan, B., Arvind, K. and Tom, A. “Seattle: A Platform for Educational Cloud Computing”SIGCSE09, March 37, 2009, Chattanooga, Tennessee, USA. 2009.
[11] Google Apps Education Edition: communication, collaboration, and security in the cloud.http://www.google.com/a/edu/
[12] Matei Zaharia, Reynold S Xin, Patrick Wendell, Tathagata Das, Michael Armbrust,Ankur Dave, Xiangrui Meng, Josh Rosen, Shivaram Venkataraman, Michael JFranklin, et al. Apache spark: a uni?ed engine for big data processing. Commu-nications of the ACM, 59(11):56–65, 2016.
[13] Creating Data Pipelines using Apache Airflow "Sameer Shukla" Volume 9 - Issue 4 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
[14] S. Fortune, J. Hopcroft, J. Wyllie The directed subgraph homeomorphism problem Theoret. Comput. Sci., 10, pp. 111-121, 1980.
[15] C.L. Lucchesi, M.C.M.T. Giglio, On the irrelevance of edge orientations on the acyclic directed two disjoint paths problem, IC Technical Report DCC-92-03, Universidade Estadual de Campinas, Instituto de Computação, 1992.
[16] Y. Perl, Y. Shiloach Finding two disjoint paths between two pairs of vertices in a graph J. ACM, 25, pp. 1-9, 1978.
[17] R. Agrawal and R. Srikant, "Mining Sequential Patterns", Proc. Int`l Conf. Data Eng. (ICDE `95), pp. 3-14, 1995.
[18] J. Chen and K. Xiao, "BISC: A Binary Itemset Support Counting Approach Towards Efficient Frequent Itemset Mining", ACM Trans. Knowledge Discovery in Data..
[19] Vassiliadis, P., Simitsis, A., Georgantas, P., Ter-rovitis, M., & Skiadopoulos, S. (2005). A generic and customizable framework for the design of ETL scenarios. Information Systems, 30, 7, 492-525, 2005.
[20] P. Merle, O. Barais, J. Parpaillon, N. Plouzeau and S. Tata, "A Precise Metamodel for Open Cloud Computing Interface", the 8th International Conference on Cloud Computing (CLOUD). IEEE, pp. 852-859, 2015.
[21] D. C. Schmidt, "Model-Driven Engineering", COMPUTER-IEEE COMPUTER SOCIETY-, vol. 39, no. 2, pp. 25, 2006.
[22] Bryant, P. G. and Smith, M (1995) Practical Data Analysis: Case Studies in Business Statistics. Homewood, IL: Richard D. Irwin Publishing.
[23] Zimmermann, O. (2009). An architectural decision modeling framework for service oriented architecture design. PhD thesis, Universitat Stuttgart.
[24] Badidi, E. (2013) “A Framework for Software-As-A-Service Selection and Provisioning”. In: International Journal of Computer Networks & Communications (IJCNC), 5(3): 189-200, 2013.
[25] F. Montesi and J. Weber, “Circuit Breakers, Discovery, and API Gateways in Microservices,” ArXiv160905830 Cs, Sep. 2016
[26] G. Grahne and J. Zhu, "Efficiently Using Prefix-Trees in Mining Frequent Itemsets", Proc. Workshop Frequent Itemset Mining Implementations (FIMI `03), 2003.
[27] Z. Zhang and M. Kitsuregawa, "LAPIN-SPAM: An Improved Algorithm for Mining Sequential Pattern", Proc. Int`l Special Workshop Databases for Next Generation Researchers, pp. 8-11, 2005.
Citation
Sameer Shukla, "Developing Pragmatic Data Pipelines using Apache Airflow on Google Cloud Platform," International Journal of Computer Sciences and Engineering, Vol.10, Issue.8, pp.1-8, 2022.
Migration Architecture Monolithic to Microservice on Information Technology Consultant Company
Research Paper | Journal Paper
Vol.10 , Issue.8 , pp.9-14, Aug-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i8.914
Abstract
This research aims to migrate the architecture from a monolithic to a microservices architecture on applications that were originally built with a monolithic architecture by an IT consulting firm. The goal is to migrate from monolithic architecture to microservices architecture to overcome problems that occur in applications with monolithic architectural designs that have been delivered to clients by an IT consulting company to improve customer satisfaction by improving the quality of the application. Microservices is one of the most popular architectural styles today. It is an independent, usable service modeled around a business domain. The advantages of using a microservices architecture in developing systems are flexibility and system maintenance. One method that is widely used in system migration is the Strangler Fig Application. There are 3 main stages: 1. Identifying assets to be relocated; 2. transferring assets; and 3. rerouting relocated assets. The migration results in a monolithic architecture totaling 2491 records consisting of 87 columns taking 2 hours 59 minutes 18 seconds or 1 data point for 4.3 seconds and heap memory of 99.0 percent, while the microservices architecture with an increase in data of 384 records takes 1 minute 33 seconds or 1 data point for 0.03 seconds and heap memory of 12.8 percent after implementation of the new architecture.
Key-Words / Index Term
Microservices, Monolithic, Migration System, Strangler Fig Application
References
[1] Chris Richardson, Microservices Patterns With Examples in Java. Shelter Island, NY: Manning Publications Co., 2019.
[2] Jakob Nielsen, Usability Engineering. California: Elsevier, 1993. doi: 10.1016/C2009-0-21512-1.
[3] Sam Newman, Monolith to Microservices Evolutionary Patterns to Transform Your Monolith, Second Edition. Gravenstein Highway North: O’Reilly Media, Inc., 2020.
[4] Mohammad Harry Khomas Saputra and Luthfi Muhammad Nabil, “PENERAPAN ARSITEKTUR MICROSERVICE PADA SISTEM TATA KELOLA MATAKULIAH PROYEK POLITEKNIK POS INDONESIA,” Teknik Informatika, vol. 13, no. 3, pp. 22–28, Aug. 2021, Accessed: Aug. 1, 2022. [Online]. Available: https://ejurnal.poltekpos.ac.id/index.php/informatika/article/view/1667
[5] R. Mufrizal and D. Indarti, “Refactoring Arsitektur Microservice Pada Aplikasi Absensi PT. Graha Usaha Teknik,” Jurnal Nasional Teknologi dan Sistem Informasi, vol. 5, no. 1, pp. 57–68, Apr. 2019, doi: 10.25077/TEKNOSI.v5i1.2019.57-68.
[6] J. A. Suthendra and M. A. I. Pakereng, “Implementation of Microservices Architecture on E-Commerce Web Service,” ComTech: Computer, Mathematics and Engineering Applications, vol. 11, no. 2, pp. 89–95, Dec. 2020, doi: 10.21512/comtech.v11i2.6453.
[7] N. Torvekar and P. S. Game, “Microservices and Its Applications An Overview,” International Journal of Computer Sciences and Engineering, vol. 7, no. 4, pp. 803–809, Apr. 2019, doi: 10.26438/ijcse/v7i4.803809.
[8] S. S. Paradkar, “eGovernment Integration Framework for Fragmented Systems,” International Journal of Computer Sciences and Engineering, vol. 9, no. 1, pp. 51–55, Jan. 2021, doi: 10.26438/ijcse/v9i1.5155.
Citation
Lutfi Ardiansyah, Yuli Karyanti, "Migration Architecture Monolithic to Microservice on Information Technology Consultant Company," International Journal of Computer Sciences and Engineering, Vol.10, Issue.8, pp.9-14, 2022.
Profit Analysis of a Computer System with Software Redundancy Subject to Hardware Inspection
Research Paper | Journal Paper
Vol.10 , Issue.8 , pp.15-22, Aug-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i8.1522
Abstract
In this research paper, the authors examined reliability modelling of a computer system with software redundancy by introducing the concept of inspection of hardware component. The system fails independently from normal mode. All the repair activities such as hardware repair, software up-gradation, hardware inspection and hardware replacement are carried out by a single server immediately on need basis. The failed hardware component undergoes for repair or replacement after inspection. All random variables are statistically independent. The negative exponential distribution is taken for the failure time of the component while the distributions of repair time, up-gradation time and replacement time are assumed arbitrary with different probability density functions. Semi-Markov process and regenerative point technique are used for obtaining the values various performance measures. The behaviour of some important performance measure has been examined for different parameters and costs. The profit comparison of the present model has also been made with that of the model analyzed by Munday and Malik [2015].
Key-Words / Index Term
Computer System, Software Redundancy, Up-gradation, Inspection, Replacement, Profit Analysis and Stochastic Modelling.
References
[1]. R.E., Barlow, P., Prochan, “Mathematical theory of Reliability”, John Wiley, New York, 1965.
[2]. M.H., Branson, B., Shah, “Reliability Analysis of System Comprises of Units with Arbitrary Repair Time Distributions”, IEEE Transactions on Reliability, Vol. 20, pp. 217 – 223, 1971.
[3]. J.R., Arora, “Reliability of Several Standby-Priority-Redundant Systems”, IEEE Transaction on Reliability, Vol. R–26, Issue 4, pp. 290 – 293, 1977.
[4]. K., Adachi, M., Kodama, “Availability Analysis of Two-Unit Warm Standby System with Inspection Time”, Microelectronics Reliability, Vol. 20, pp. 445-455, 1980.
[5]. M.N., Gopalan, R.S., Naidu, “Cost-Benefit Analysis of a One-Server System Subject to Inspection”, Microelectronics Reliability, Vol. 22, pp. 699 – 705, 1982.
[6]. L.R., Goel, G.C., Sharma, P., Gupta, “Reliability Analysis of a System with Preventive Maintenance, Inspection and Two Types of Repair”, Microelectronics Reliability, Vol. 26, Issue 3, pp. 429 – 433, 1986.
[7]. S.K., Singh, R.P., Singh, “Profit Evaluation of Two-Unit Cold Standby System Changing Two Types of Independent Repair Facilities”, International Journal of Management and System, Vol. 8, Issue 3, pp. 277-288, 1991.
[8]. R.K., Tuteja, S.C., Malik, “A System with Pre-Inspection and Two Types of Repairman”, Microelectronics Reliability, Vol. 34, Issue 3, pp. 373 – 377, 1994.
[9]. S. R.,Welke, S. W., Labib, A. M., Ahmed, “Reliability Modeling of Hardware/ Software System”, IEEE Transactions on Reliability, Vol. 44,Issue 3, pp.413-418, 1995.
[10]. V.S.S., Yadavalli, Chanderasekhar, R., Natarajan, “A study on two-unit standby system with Erlangian repair time”, Asia-Pacific Journal of Operational Research, Vol. 21, Issue 3, pp. 271-277, 2004.
[11]. Jyoti, Anand, S.C., Malik, “Analysis of a Computer System with Arbitrary Distributions for H/W and S/W Replacement Time and Priority to Repair Activities of H/W over Replacement of the S/W”, International Journal of Systems Assurance Engineering and Management, Vol. 3, Issue 3, pp. 230-236, 2012.
[12]. Jitender, Kumar, Mukender Singh, Kadyan, Suresh Chander, Malik, “Cost-analysis of a two-unit cold standby system subject to degradation, inspection and priority”, Maintenance and Reliability, Vol. 14, Issue 4, pp. 278-283, 2012.
[13]. S.C., Malik, J.K., Sureria, “Profit Analysis of a Computer System with H/W Repair and S/W Replacement”, International Journal of Computer Applications, Vol.47, Issue 1, pp. 19-26, 2012.
[14]. Sudesh K., Barak, S.C., Malik, “A Standby System with Priority to Repair over Preventive Maintenance”, International Journal of Engineering Research, Vol. 3, Issue 4, pp. 241-244, 2014.
[15]. Anju, Dhall, S.C., Malik, V.J. Munday “A Stochastic System with Possible Maintenance of Standby Unit and Replacement of the Failed Unit Subject to Inspection”, International Journal of Computer Applications, Vol. 97, Issue 8, pp. 26-30, 2014.
[16]. S.C., Malik, V.J., Munday, “Stochastic Modeling of a Computer System with Hardware Redundancy”, International Journal of Computer Applications, Vol. 89, Issue 7, pp. 26-30, 2014.
[17]. R.K., Bhardwaj, Komaldeep, Kaur, S.C., Malik, “Stochastic Modeling of a System with Maintenance and Replacement of Standby Subject to Inspection”, American Journal of Theoretical and Applied Statistics, Vol. 4, Issue 5, pp. 339-346, 2015
[18]. Ashish, Kumar, Monika S., Barak, S.C., Malik, “Economic Analysis of a Computer System with Software Up-gradation and Priority to Hardware Repair over Hardware Replacement Subject to Maximum Operation and Repair Times”, International Journal of Scientific and Engineering Research, Vol. 6, Issue 4, pp. 1661-1668, 2015.
[19]. V.J., Munday, S.C., Malik, “Stochastic Modelling of a Computer System with Software Redundancy”, International Journal of Engineering and Management Research, Vol. 5, Issue 1, pp.295-302, 2015.
[20]. Permila, S.C., Malik, “Stochastic Analysis of a 2-out-of-2: G System with Single Cold Standby and Replacement Using Weibull Distribution”, Journal of Statistics and Management Systems, Vol. 20, Issue 6, pp. 1051-1063, 2017.
[21]. A. Kumar, M., Saini, “Stochastic Modeling and Cost-benefit Analysis of Computing Device with Fault Detection Subject to Expert Repair Facility”, Vol. 10, Issue 3, pp. 391-401, 2018.
[22]. V.J. Munday, Permila, “Reliability Measures of a Computer System with Software Redundancy Subject to Maximum Repair Time”, World Journal of Engineering Research and Technology, Vol. 6, Issue 5, pp. 161-173, 2020.
Citation
V. J. Munday, Permila, Savita Deswal, "Profit Analysis of a Computer System with Software Redundancy Subject to Hardware Inspection," International Journal of Computer Sciences and Engineering, Vol.10, Issue.8, pp.15-22, 2022.
Use of Artificial Intelligence for Healthcare Purposes: A Structured Review
Review Paper | Journal Paper
Vol.10 , Issue.8 , pp.23-27, Aug-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i8.2327
Abstract
Artificial intelligence, which is widely defined as a machine`s ability to mimic intelligent human behaviour, includes the subfield of machine learning. Artificial intelligence systems are employed to carry out difficult jobs in a manner a kin to how people solve problems. Data mining is a method of automatically discovering information from massive databases or data sets. Data mining is a technique for locating the information that is concealed in a large, challenging-to-access database using only standard queries. Additionally, machine learning demonstrates its close ties to data mining. Making software that teaches computers to get smarter as they encounter new data is the core objective of machine learning. Prediction systems, image identification, Speech recognition, medical diagnosis and other applications employ machine learning. Numerous areas, including research, engineering, health care, and business, produce and a vast volumes of data every day. In this study, a few data mining approaches, algorithms, and applications are discussed. Also, application of artificial intelligence in the field of healthcare industry such as Oral Pre-Cancerous Lesions and Oral Cancer Detection, Neurodegenerative disorders, Medical Disorders, Drug Discovery are discussed.
Key-Words / Index Term
Machine Leaning, Healthcare, Artifical intelligence, Data mining.
References
[1] Solanki, H., 2013, “ Comparative Study of Data Mining Tools and Analysis with Unified Data Mining Theory” in International Journal of Computer Applications, 75(16), pp.23-28, 2013.
[2] S. L. Nalawade ,Dr. R.V. Kulkarni,“Application of Data Mining in Health Care” in International Journal of Science and Research (IJSR), 5(4), pp.262-268, 2016.
[3] Ms.Dhwani Sondhi "Application of Data Mining in Census Data Analysis using Weka", International Journal of Engineering Trends and Technology (IJETT), V52(3),157-161 October 2017. ISSN:2231-53817.
[4] Saima Anwar Lashari, Rosziati Ibrahim, Norhalina Senan, N. S. A. M. Taujuddin,”Application of Data Mining Techniques for Medical Data Classification: A Review”in MATEC Web of Conferences 150, 06003, 2018.
[5] D.Usha Rani, “A Survey on Data Mining Tools and Techniques in Medical Field” in International Journal of Advanced Networking & Applications (IJANA), Vol.08, Issue: 05 Pages: 51-54, 2017.
[6] Manpreet Kaura, Shivani Kanga, “Market Basket Analysis: Identify the changing trends of market data using association rule mining” in International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science 85, 78 – 85, 2016.
[7] M. Dhanabhakyam, Dr. M. Punithavalli, “A Survey on Data Mining Algorithm for Market Basket Analysis”in Global Journal of Computer Science and Technology Vol.11, Issue 11 Version 1.0 July 2011.
[8] Solanki, H., 2013,“Comparative Study of Data Mining Tools and Analysis with Unified Data Mining Theory” in International Journal of Computer Applications, 75(16), pp.23-28, 2013.
[9] Ashish Dutti, Maizatul Akmar Ismaili, Tutut Herawan, “ A Systematic Review on Educational Data Mining”in IEEE ACCESS, Vol.5, pp 15991-16005, 2017.
[10] Stefano Lonardi, Jake Chen, ?Data Mining in Bioinformatics: Selected Papers from BIOKDD in IEEE/ACM Transactions on Computational Biology and Bioinformatics, Vol.7, no. 2, April-June 2010.
[11] V.K. Jha, R.K. Singh, “Application of Data Mining in Manufacturing Industry” in International Journal of Information Sciences and Application. ISSN 0974- 2255 Vol.3, Number 2, pp. 59-64, 2011.
[12] Uddin, Osemengbe O., P. S. O. Uddin, “Data Mining: An Active Solution for Crime Investigation in IJCST Vol.5, SPl - 1, Jan - Mar 2014.
[13] Kumar, Y., Koul, A., Singla, R. and Ijaz, M., “Artificial intelligence in disease diagnosis: a systematic literature review, synthesizing framework and future research agenda” in Journal of Ambient Intelligence and Humanized Computing.
[14] Han Y, Han Z, Wu J, Yu Y, Gao S, Hua D, Yang A, “Artificial intelligence recommendation system of cancer rehabilitation scheme based on IoT technology” IEEE Access. 2020;8.44924–44935.
[15] Guram, Harsimran and Sharma, Ashok, Comparing the Performance of Various Machine Learning Approaches in Identifying Different Classes of Dementia (April 25, 2021). Proceedings of the International Conference on Innovative Computing & Communication (ICICC) 2021.
[16] Guram, Harsimran and Ashok, “improved dementia images detection and classification using transfer learning base convolution mapping with attention layer and xgboost classifier in Turkish Journal of Computer and Mathematics Education Vol.12No.6, 217-224, 2021
[17] Harsimran Guram Ashok Sharma,” Identifying the Rules of Transition from AD to Dementia and MCI Using Machine Learning in International Journal of Control and Automation, Vol.13 issue 4 Pp-718-729
[18] Guram, H. and Sharma, A., 2021. Patch base segmentation for classification of dementia disorder with optimize feature weight and random forest-based approach. Materials Today: Proceedings, [online] Available
[19] Sharma, A., Singh, P. and Dhar, G., 2021. Artificial Intelligence and Machine Learning for Healthcare Solutions. 3rd ed. US: John Wiley & Sons, Inc., pp.281-291, 2021.
[20] SHarma, A., Bachate, R., V Pawar, M. and Shardoor, N., 2022. Artificial intelligence-based solutions for COVID-19. 3rd ed. US: Academic Press, pp.167-189, 2022.
[21] SHarma, A., Singh, P. and Dhar, G., 2021. Machine Learning and Data Analytics for Predicting, Managing, and Monitoring Disease. 5th ed. US: IGI Global, pp.140-149, 2021.
[22] Sharma, A. and Dhar, G., 2019. Deep Learning A Compass To Medical Sciences. Think India, 22(17), pp.1737-1746, 2019.
[23] Sharma, A. and Gurram, H., 2022. Identifying the Rules of Transition from AD to Dementia and MCI Using Machine Learning. International Journal of Control and Automation, [online] 13(4), pp.718 - 729. Available at:
Citation
Ashok Sharma, Parveen Singh, "Use of Artificial Intelligence for Healthcare Purposes: A Structured Review," International Journal of Computer Sciences and Engineering, Vol.10, Issue.8, pp.23-27, 2022.
Experimental Investigation of Storage Tank Design on the Performance of a Solar Water Heating System: Review Approach
Review Paper | Journal Paper
Vol.10 , Issue.8 , pp.28-31, Aug-2022
Abstract
Solar energy is easily available in nature, pollute less, priceless and therefore it is accepted as one of the most capable unconventional energy sources. The effective use of solar energy is held up by the intermittent nature of its availability, limiting its use and success in domestic and industrial applications especially in water heating. This topic is about to investigation and optimization of solar water heating system by varying zig-zag tube arrangement with natural convection. By using zig-zag tube arrangement in the solar water heating system the efficiency will slightly increase. The aim of the research work is to improve the performance of solar water heater by changing the tubes geometry and material of tube. The purpose of this study is to improve the technology available for solar water heater. It is mature technology still it has many opportunities for modifications. Further research work is required in the field of cost and performance of collector plates and glazing cover plates.
Key-Words / Index Term
Solar Radiation Intensity, Tube Geometry, Tube Material, Type of Flat Plate Collector used
References
[1]. K. Hudon, T. Merrigan, J. Burch and J. Maguire, “Low-Cost Solar Water Heating Research and Development Roadmap”, National Renewable Energy Laboratory, Prepared under Task, (SHX1.1001) No. 2013.
[2]. Nosa Andrew Ogie, Ikponmwosa Oghogho, and Julius Jesumirewhe, “Design and Construction of a Solar Water Heater Based on the Thermosyphon Principle”, Ashdin publications, Fundamentals of Renewable Energy and Applications, (Article ID 23559) Vol. 3, 2013.
[3]. T. H. Holland and J. T. Borzoni, “Design, fabrication, testing and delivery of a solar energy collector system for residential heating and cooling”, HONEYWELL INC., Energy Resources, Contract No. NAS8-31327, 2015.
[4]. P. Sivakumar, W. Christraj, M. Sridharan, and N. Jayamalathi, “Performance improvement study of solar water heating system,” ARPN Journal of Engineering and Applied Sciences, vol.7, no.1, pp.45–49, 2012.
[5]. M. Z. H. Khan, M. R. Al-Mamun, S. Sikdar,1 P. K. Halder, and M. R. Hasan, “Design, Fabrication, and Efficiency Study of a Novel Solar Thermal Water Heating System: Towards Sustainable Development”, Hindawi Publishing Corporation, International Journal of Photoenergy, (Article ID 9698328) Vol. 2016.
[6]. H. I. Abu-Mulaweh, “Design and development of solar water heating system experimental apparatus,” Global Journal of Engineering Education, vol.14, no.1, pp.99–105, 2012.
[7]. S. Seddegh, X. Wang, A. D. Henderson, and Z. Xing, “Solar domestic hot water systems using latent heat energy storage medium: a review,” Renewable and Sustainable Energy Reviews, vol.49, pp.517–533, 2015.
[8]. L. Yuwu, C. Linlin, Y. Dandan et al., “The effect of measurement uncertainty and environment on domestic solar water heating systems’ energy efficiency grades,” Energy Procedia, vol.70, pp.371–378, 2015.
[9]. J. K. Kaldellis, K. El-Samani, and P. Koronakis, “Feasibility analysis of domestic solar water heating systems in Greece,” Renewable Energy, vol.30, no.5, pp.659–682, 2005.
[10] A. Houri, “Solar water heating in Lebanon: current status and future prospects,” Renewable Energy, vol.31, no.5, pp.663–675, 2006.
[11] R. Abdollah and T. Hessam, Experimental investigation on the performance of thermosyphon solar water heater in the South Caspian Sea, Thermal Science, 15, 447–456, 2011.
Citation
Swapnil Ambalal Patil, D.M. Patel, "Experimental Investigation of Storage Tank Design on the Performance of a Solar Water Heating System: Review Approach," International Journal of Computer Sciences and Engineering, Vol.10, Issue.8, pp.28-31, 2022.